blob: 3e792fc130863b05c5e71b255e546e9a5bad3a1c [file] [log] [blame]
Andrey Andreevc5536aa2012-11-01 17:33:58 +02001<?php
Derek Allard2067d1a2008-11-13 22:59:24 +00002/**
3 * CodeIgniter
4 *
Andrey Andreevfe9309d2015-01-09 17:48:58 +02005 * An open source application development framework for PHP
Derek Allard2067d1a2008-11-13 22:59:24 +00006 *
Andrey Andreevbdb96ca2014-10-28 00:13:31 +02007 * This content is released under the MIT License (MIT)
Andrey Andreev64e98aa2012-01-07 20:29:10 +02008 *
Andrey Andreevfe9309d2015-01-09 17:48:58 +02009 * Copyright (c) 2014 - 2015, British Columbia Institute of Technology
Andrey Andreev64e98aa2012-01-07 20:29:10 +020010 *
Andrey Andreevbdb96ca2014-10-28 00:13:31 +020011 * Permission is hereby granted, free of charge, to any person obtaining a copy
12 * of this software and associated documentation files (the "Software"), to deal
13 * in the Software without restriction, including without limitation the rights
14 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
15 * copies of the Software, and to permit persons to whom the Software is
16 * furnished to do so, subject to the following conditions:
Derek Jonesf4a4bd82011-10-20 12:18:42 -050017 *
Andrey Andreevbdb96ca2014-10-28 00:13:31 +020018 * The above copyright notice and this permission notice shall be included in
19 * all copies or substantial portions of the Software.
20 *
21 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
22 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
23 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
24 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
25 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
26 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
27 * THE SOFTWARE.
28 *
29 * @package CodeIgniter
30 * @author EllisLab Dev Team
darwinel871754a2014-02-11 17:34:57 +010031 * @copyright Copyright (c) 2008 - 2014, EllisLab, Inc. (http://ellislab.com/)
Andrey Andreevfe9309d2015-01-09 17:48:58 +020032 * @copyright Copyright (c) 2014 - 2015, British Columbia Institute of Technology (http://bcit.ca/)
Andrey Andreevbdb96ca2014-10-28 00:13:31 +020033 * @license http://opensource.org/licenses/MIT MIT License
34 * @link http://codeigniter.com
35 * @since Version 1.0.0
Derek Allard2067d1a2008-11-13 22:59:24 +000036 * @filesource
37 */
Andrey Andreevc5536aa2012-11-01 17:33:58 +020038defined('BASEPATH') OR exit('No direct script access allowed');
Derek Allard2067d1a2008-11-13 22:59:24 +000039
Derek Allard2067d1a2008-11-13 22:59:24 +000040/**
41 * Input Class
42 *
43 * Pre-processes global input data for security
44 *
45 * @package CodeIgniter
46 * @subpackage Libraries
47 * @category Input
Derek Jonesf4a4bd82011-10-20 12:18:42 -050048 * @author EllisLab Dev Team
Derek Allard2067d1a2008-11-13 22:59:24 +000049 * @link http://codeigniter.com/user_guide/libraries/input.html
50 */
51class CI_Input {
Derek Allard2067d1a2008-11-13 22:59:24 +000052
David Behler9b5df592011-08-14 21:04:17 +020053 /**
54 * IP address of the current user
55 *
Andrey Andreev1887ec62012-10-27 16:22:07 +030056 * @var string
David Behler9b5df592011-08-14 21:04:17 +020057 */
Andrey Andreev1887ec62012-10-27 16:22:07 +030058 public $ip_address = FALSE;
Andrey Andreev92ebfb62012-05-17 12:49:24 +030059
David Behler9b5df592011-08-14 21:04:17 +020060 /**
Andrey Andreev1887ec62012-10-27 16:22:07 +030061 * Allow GET array flag
David Behler9b5df592011-08-14 21:04:17 +020062 *
Andrey Andreev1887ec62012-10-27 16:22:07 +030063 * If set to FALSE, then $_GET will be set to an empty array.
David Behler9b5df592011-08-14 21:04:17 +020064 *
Andrey Andreev1887ec62012-10-27 16:22:07 +030065 * @var bool
David Behler9b5df592011-08-14 21:04:17 +020066 */
Andrey Andreev1887ec62012-10-27 16:22:07 +030067 protected $_allow_get_array = TRUE;
Andrey Andreev92ebfb62012-05-17 12:49:24 +030068
David Behler9b5df592011-08-14 21:04:17 +020069 /**
Andrey Andreevbfb635b2014-01-08 18:32:05 +020070 * Standardize new lines flag
David Behler9b5df592011-08-14 21:04:17 +020071 *
Andrey Andreev1887ec62012-10-27 16:22:07 +030072 * If set to TRUE, then newlines are standardized.
73 *
74 * @var bool
David Behler9b5df592011-08-14 21:04:17 +020075 */
Andrey Andreevefc08e92014-04-15 14:32:52 +030076 protected $_standardize_newlines;
Andrey Andreev92ebfb62012-05-17 12:49:24 +030077
David Behler9b5df592011-08-14 21:04:17 +020078 /**
Andrey Andreev1887ec62012-10-27 16:22:07 +030079 * Enable XSS flag
80 *
81 * Determines whether the XSS filter is always active when
82 * GET, POST or COOKIE data is encountered.
83 * Set automatically based on config setting.
84 *
85 * @var bool
86 */
87 protected $_enable_xss = FALSE;
88
89 /**
90 * Enable CSRF flag
91 *
David Behler9b5df592011-08-14 21:04:17 +020092 * Enables a CSRF cookie token to be set.
Andrey Andreev1887ec62012-10-27 16:22:07 +030093 * Set automatically based on config setting.
David Behler9b5df592011-08-14 21:04:17 +020094 *
Andrey Andreev1887ec62012-10-27 16:22:07 +030095 * @var bool
David Behler9b5df592011-08-14 21:04:17 +020096 */
Andrey Andreev1887ec62012-10-27 16:22:07 +030097 protected $_enable_csrf = FALSE;
Andrey Andreev92ebfb62012-05-17 12:49:24 +030098
David Behler9b5df592011-08-14 21:04:17 +020099 /**
100 * List of all HTTP request headers
101 *
102 * @var array
103 */
Andrey Andreev1887ec62012-10-27 16:22:07 +0300104 protected $headers = array();
David Behler9b5df592011-08-14 21:04:17 +0200105
Andrey Andreevd0ac8b12015-02-27 11:41:52 +0200106 /**
107 * Raw input stream data
108 *
109 * Holds a cache of php://input contents
110 *
111 * @var string
112 */
Ignasimgcae95882015-02-26 02:46:14 +0100113 protected $_raw_input_stream;
Ignasimgf9fbf112015-02-06 09:21:07 +0100114
Derek Allard2067d1a2008-11-13 22:59:24 +0000115 /**
Andrey Andreevd0ac8b12015-02-27 11:41:52 +0200116 * Parsed input stream data
Andrey Andreev303eef02012-11-06 14:55:48 +0200117 *
118 * Parsed from php://input at runtime
119 *
120 * @see CI_Input::input_stream()
121 * @var array
122 */
Andrey Andreevd0ac8b12015-02-27 11:41:52 +0200123 protected $_input_stream;
124
125 // --------------------------------------------------------------------
Andrey Andreev303eef02012-11-06 14:55:48 +0200126
127 /**
Andrey Andreev1887ec62012-10-27 16:22:07 +0300128 * Class constructor
Greg Akera9263282010-11-10 15:26:43 -0600129 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300130 * Determines whether to globally enable the XSS processing
131 * and whether to allow the $_GET array.
Andrey Andreev92ebfb62012-05-17 12:49:24 +0300132 *
133 * @return void
Greg Akera9263282010-11-10 15:26:43 -0600134 */
135 public function __construct()
Derek Allard2067d1a2008-11-13 22:59:24 +0000136 {
Andrey Andreevbfb635b2014-01-08 18:32:05 +0200137 $this->_allow_get_array = (config_item('allow_get_array') === TRUE);
138 $this->_enable_xss = (config_item('global_xss_filtering') === TRUE);
139 $this->_enable_csrf = (config_item('csrf_protection') === TRUE);
fabianozenatti523cda32014-03-21 12:13:03 +0100140 $this->_standardize_newlines = (bool) config_item('standardize_newlines');
Derek Jones69fc4fc2010-03-02 13:36:31 -0600141
Andrey Andreevc26b9eb2014-02-24 11:31:36 +0200142 $this->security =& load_class('Security', 'core');
Derek Jones69fc4fc2010-03-02 13:36:31 -0600143
Pascal Krieteaaec1e42011-01-20 00:01:21 -0500144 // Do we need the UTF-8 class?
Derek Jones69fc4fc2010-03-02 13:36:31 -0600145 if (UTF8_ENABLED === TRUE)
146 {
Andrey Andreevc26b9eb2014-02-24 11:31:36 +0200147 $this->uni =& load_class('Utf8', 'core');
Derek Jones69fc4fc2010-03-02 13:36:31 -0600148 }
149
150 // Sanitize global arrays
Derek Allard2067d1a2008-11-13 22:59:24 +0000151 $this->_sanitize_globals();
Andrey Andreev90726b82015-01-20 12:39:22 +0200152
153 log_message('info', 'Input Class Initialized');
Derek Allard2067d1a2008-11-13 22:59:24 +0000154 }
155
156 // --------------------------------------------------------------------
157
158 /**
Greg Akera9263282010-11-10 15:26:43 -0600159 * Fetch from array
160 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300161 * Internal method used to retrieve values from global arrays.
Greg Akera9263282010-11-10 15:26:43 -0600162 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300163 * @param array &$array $_GET, $_POST, $_COOKIE, $_SERVER, etc.
Ahmad Anbarff89a4e2014-12-02 17:26:30 +0200164 * @param mixed $index Index for item to be fetched from $array
Andrey Andreev1887ec62012-10-27 16:22:07 +0300165 * @param bool $xss_clean Whether to apply XSS filtering
166 * @return mixed
Greg Akera9263282010-11-10 15:26:43 -0600167 */
Andrey Andreev7c60b122014-02-08 18:47:19 +0200168 protected function _fetch_from_array(&$array, $index = NULL, $xss_clean = NULL)
Derek Allard2067d1a2008-11-13 22:59:24 +0000169 {
Andrey Andreevef29f832014-12-02 18:03:47 +0200170 is_bool($xss_clean) OR $xss_clean = $this->_enable_xss;
171
Andrey Andreev7c60b122014-02-08 18:47:19 +0200172 // If $index is NULL, it means that the whole $array is requested
Andrey Andreevef29f832014-12-02 18:03:47 +0200173 isset($index) OR $index = array_keys($array);
174
175 // allow fetching multiple keys at once
176 if (is_array($index))
Andrey Andreev7c60b122014-02-08 18:47:19 +0200177 {
178 $output = array();
Andrey Andreev6b3bf4c2014-12-02 18:04:41 +0200179 foreach ($index as $key)
Andrey Andreev7c60b122014-02-08 18:47:19 +0200180 {
181 $output[$key] = $this->_fetch_from_array($array, $key, $xss_clean);
182 }
183
184 return $output;
185 }
186
nisheeth-barthwala7447d22013-03-21 15:48:10 +0530187 if (isset($array[$index]))
Derek Allard2067d1a2008-11-13 22:59:24 +0000188 {
nisheeth-barthwala7447d22013-03-21 15:48:10 +0530189 $value = $array[$index];
190 }
nisheeth-barthwal47ea5a82013-03-26 18:57:28 +0530191 elseif (($count = preg_match_all('/(?:^[^\[]+)|\[[^]]*\]/', $index, $matches)) > 1) // Does the index contain array notation
nisheeth-barthwala7447d22013-03-21 15:48:10 +0530192 {
nisheeth-barthwal47ea5a82013-03-26 18:57:28 +0530193 $value = $array;
nisheeth-barthwal77236e02013-03-25 23:42:36 +0530194 for ($i = 0; $i < $count; $i++)
nisheeth-barthwala7447d22013-03-21 15:48:10 +0530195 {
nisheeth-barthwal77236e02013-03-25 23:42:36 +0530196 $key = trim($matches[0][$i], '[]');
nisheeth-barthwal408cbb42013-03-26 19:06:40 +0530197 if ($key === '') // Empty notation will return the value as array
nisheeth-barthwala7447d22013-03-21 15:48:10 +0530198 {
nisheeth-barthwal77236e02013-03-25 23:42:36 +0530199 break;
nisheeth-barthwala7447d22013-03-21 15:48:10 +0530200 }
nisheeth-barthwal47ea5a82013-03-26 18:57:28 +0530201
202 if (isset($value[$key]))
nisheeth-barthwala7447d22013-03-21 15:48:10 +0530203 {
nisheeth-barthwal47ea5a82013-03-26 18:57:28 +0530204 $value = $value[$key];
nisheeth-barthwal77236e02013-03-25 23:42:36 +0530205 }
206 else
207 {
208 return NULL;
nisheeth-barthwala7447d22013-03-21 15:48:10 +0530209 }
210 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000211 }
nisheeth-barthwal77236e02013-03-25 23:42:36 +0530212 else
Derek Allard2067d1a2008-11-13 22:59:24 +0000213 {
nisheeth-barthwal77236e02013-03-25 23:42:36 +0530214 return NULL;
Derek Allard2067d1a2008-11-13 22:59:24 +0000215 }
216
nisheeth-barthwal77236e02013-03-25 23:42:36 +0530217 return ($xss_clean === TRUE)
218 ? $this->security->xss_clean($value)
219 : $value;
Derek Allard2067d1a2008-11-13 22:59:24 +0000220 }
221
222 // --------------------------------------------------------------------
223
224 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400225 * Fetch an item from the GET array
226 *
Ahmad Anbarff89a4e2014-12-02 17:26:30 +0200227 * @param mixed $index Index for item to be fetched from $_GET
Andrey Andreev1887ec62012-10-27 16:22:07 +0300228 * @param bool $xss_clean Whether to apply XSS filtering
229 * @return mixed
Timothy Warren40403d22012-04-19 16:38:50 -0400230 */
Andrey Andreev80a16b12014-01-08 17:19:03 +0200231 public function get($index = NULL, $xss_clean = NULL)
Derek Allard2067d1a2008-11-13 22:59:24 +0000232 {
nisheeth-barthwala5bcfb12013-03-23 10:53:51 +0530233 return $this->_fetch_from_array($_GET, $index, $xss_clean);
Derek Allard2067d1a2008-11-13 22:59:24 +0000234 }
235
236 // --------------------------------------------------------------------
237
238 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400239 * Fetch an item from the POST array
240 *
Ahmad Anbarff89a4e2014-12-02 17:26:30 +0200241 * @param mixed $index Index for item to be fetched from $_POST
Andrey Andreev1887ec62012-10-27 16:22:07 +0300242 * @param bool $xss_clean Whether to apply XSS filtering
243 * @return mixed
Timothy Warren40403d22012-04-19 16:38:50 -0400244 */
Andrey Andreev80a16b12014-01-08 17:19:03 +0200245 public function post($index = NULL, $xss_clean = NULL)
Derek Allard2067d1a2008-11-13 22:59:24 +0000246 {
nisheeth-barthwala5bcfb12013-03-23 10:53:51 +0530247 return $this->_fetch_from_array($_POST, $index, $xss_clean);
Derek Allard2067d1a2008-11-13 22:59:24 +0000248 }
249
250 // --------------------------------------------------------------------
251
252 /**
Andrey Andreev1887ec62012-10-27 16:22:07 +0300253 * Fetch an item from POST data with fallback to GET
Timothy Warren40403d22012-04-19 16:38:50 -0400254 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300255 * @param string $index Index for item to be fetched from $_POST or $_GET
256 * @param bool $xss_clean Whether to apply XSS filtering
257 * @return mixed
Timothy Warren40403d22012-04-19 16:38:50 -0400258 */
Andrey Andreev7c60b122014-02-08 18:47:19 +0200259 public function post_get($index, $xss_clean = NULL)
Derek Allard2067d1a2008-11-13 22:59:24 +0000260 {
Andrey Andreev9448afb2012-02-08 19:49:19 +0200261 return isset($_POST[$index])
nisheeth-barthwala5bcfb12013-03-23 10:53:51 +0530262 ? $this->post($index, $xss_clean)
263 : $this->get($index, $xss_clean);
Derek Allard2067d1a2008-11-13 22:59:24 +0000264 }
265
266 // --------------------------------------------------------------------
267
268 /**
vlakoff441fd262013-08-11 20:36:41 +0200269 * Fetch an item from GET data with fallback to POST
270 *
271 * @param string $index Index for item to be fetched from $_GET or $_POST
272 * @param bool $xss_clean Whether to apply XSS filtering
273 * @return mixed
274 */
Andrey Andreev7c60b122014-02-08 18:47:19 +0200275 public function get_post($index, $xss_clean = NULL)
vlakoff441fd262013-08-11 20:36:41 +0200276 {
277 return isset($_GET[$index])
278 ? $this->get($index, $xss_clean)
279 : $this->post($index, $xss_clean);
280 }
281
282 // --------------------------------------------------------------------
283
284 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400285 * Fetch an item from the COOKIE array
286 *
Ahmad Anbarff89a4e2014-12-02 17:26:30 +0200287 * @param mixed $index Index for item to be fetched from $_COOKIE
Andrey Andreev1887ec62012-10-27 16:22:07 +0300288 * @param bool $xss_clean Whether to apply XSS filtering
289 * @return mixed
Timothy Warren40403d22012-04-19 16:38:50 -0400290 */
Andrey Andreev7c60b122014-02-08 18:47:19 +0200291 public function cookie($index = NULL, $xss_clean = NULL)
Derek Allard2067d1a2008-11-13 22:59:24 +0000292 {
nisheeth-barthwala5bcfb12013-03-23 10:53:51 +0530293 return $this->_fetch_from_array($_COOKIE, $index, $xss_clean);
Derek Allard2067d1a2008-11-13 22:59:24 +0000294 }
295
Andrey Andreev1887ec62012-10-27 16:22:07 +0300296 // --------------------------------------------------------------------
297
298 /**
299 * Fetch an item from the SERVER array
300 *
Ahmad Anbarff89a4e2014-12-02 17:26:30 +0200301 * @param mixed $index Index for item to be fetched from $_SERVER
Andrey Andreev1887ec62012-10-27 16:22:07 +0300302 * @param bool $xss_clean Whether to apply XSS filtering
303 * @return mixed
304 */
Andrey Andreev7c60b122014-02-08 18:47:19 +0200305 public function server($index, $xss_clean = NULL)
Andrey Andreev1887ec62012-10-27 16:22:07 +0300306 {
307 return $this->_fetch_from_array($_SERVER, $index, $xss_clean);
308 }
309
Derek Jones69fc4fc2010-03-02 13:36:31 -0600310 // ------------------------------------------------------------------------
311
312 /**
Andrey Andreev303eef02012-11-06 14:55:48 +0200313 * Fetch an item from the php://input stream
314 *
315 * Useful when you need to access PUT, DELETE or PATCH request data.
316 *
317 * @param string $index Index for item to be fetched
318 * @param bool $xss_clean Whether to apply XSS filtering
319 * @return mixed
320 */
Andrey Andreev7c60b122014-02-08 18:47:19 +0200321 public function input_stream($index = NULL, $xss_clean = NULL)
Andrey Andreev303eef02012-11-06 14:55:48 +0200322 {
Andrey Andreevdc134a82014-05-08 10:00:55 +0300323 // Prior to PHP 5.6, the input stream can only be read once,
324 // so we'll need to check if we have already done that first.
Andrey Andreev303eef02012-11-06 14:55:48 +0200325 if ( ! is_array($this->_input_stream))
326 {
Ignasimgcae95882015-02-26 02:46:14 +0100327 // $this->raw_input_stream will trigger __get().
Ignasimg0b5569f2015-02-20 17:56:55 +0100328 parse_str($this->raw_input_stream, $this->_input_stream);
Andrey Andreev7c60b122014-02-08 18:47:19 +0200329 is_array($this->_input_stream) OR $this->_input_stream = array();
Andrey Andreev303eef02012-11-06 14:55:48 +0200330 }
331
332 return $this->_fetch_from_array($this->_input_stream, $index, $xss_clean);
333 }
334
335 // ------------------------------------------------------------------------
336
337 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400338 * Set cookie
339 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300340 * Accepts an arbitrary number of parameters (up to 7) or an associative
Timothy Warren40403d22012-04-19 16:38:50 -0400341 * array in the first parameter containing all the values.
342 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300343 * @param string|mixed[] $name Cookie name or an array containing parameters
344 * @param string $value Cookie value
345 * @param int $expire Cookie expiration time in seconds
346 * @param string $domain Cookie domain (e.g.: '.yourdomain.com')
347 * @param string $path Cookie path (default: '/')
348 * @param string $prefix Cookie name prefix
349 * @param bool $secure Whether to only transfer cookies via SSL
350 * @param bool $httponly Whether to only makes the cookie accessible via HTTP (no javascript)
Timothy Warren40403d22012-04-19 16:38:50 -0400351 * @return void
352 */
Andrey Andreev8f5420b2014-01-06 10:34:23 +0200353 public function set_cookie($name, $value = '', $expire = '', $domain = '', $path = '/', $prefix = '', $secure = FALSE, $httponly = FALSE)
Derek Jones69fc4fc2010-03-02 13:36:31 -0600354 {
355 if (is_array($name))
356 {
tobiasbg9aa7dc92011-02-18 21:57:13 +0100357 // always leave 'name' in last place, as the loop will break otherwise, due to $$item
freewil4ad0fd82012-03-13 22:37:42 -0400358 foreach (array('value', 'expire', 'domain', 'path', 'prefix', 'secure', 'httponly', 'name') as $item)
Derek Jones69fc4fc2010-03-02 13:36:31 -0600359 {
360 if (isset($name[$item]))
361 {
362 $$item = $name[$item];
363 }
364 }
365 }
366
Alex Bilbieed944a32012-06-02 11:07:47 +0100367 if ($prefix === '' && config_item('cookie_prefix') !== '')
Derek Jones69fc4fc2010-03-02 13:36:31 -0600368 {
369 $prefix = config_item('cookie_prefix');
370 }
Andrey Andreev9ba661b2012-06-04 14:44:34 +0300371
372 if ($domain == '' && config_item('cookie_domain') != '')
Derek Jones69fc4fc2010-03-02 13:36:31 -0600373 {
374 $domain = config_item('cookie_domain');
375 }
Andrey Andreev9ba661b2012-06-04 14:44:34 +0300376
Alex Bilbieed944a32012-06-02 11:07:47 +0100377 if ($path === '/' && config_item('cookie_path') !== '/')
Derek Jones69fc4fc2010-03-02 13:36:31 -0600378 {
379 $path = config_item('cookie_path');
380 }
Andrey Andreev9ba661b2012-06-04 14:44:34 +0300381
Andrey Andreevd444d442014-10-06 00:00:08 +0300382 if ($secure === FALSE && config_item('cookie_secure') === TRUE)
tobiasbg9aa7dc92011-02-18 21:57:13 +0100383 {
384 $secure = config_item('cookie_secure');
385 }
Andrey Andreev9ba661b2012-06-04 14:44:34 +0300386
Alex Bilbieed944a32012-06-02 11:07:47 +0100387 if ($httponly === FALSE && config_item('cookie_httponly') !== FALSE)
freewil4ad0fd82012-03-13 22:37:42 -0400388 {
389 $httponly = config_item('cookie_httponly');
390 }
Derek Jones69fc4fc2010-03-02 13:36:31 -0600391
392 if ( ! is_numeric($expire))
393 {
394 $expire = time() - 86500;
395 }
396 else
397 {
Phil Sturgeonc8089152010-12-27 19:06:28 +0000398 $expire = ($expire > 0) ? time() + $expire : 0;
Derek Jones69fc4fc2010-03-02 13:36:31 -0600399 }
400
freewil4ad0fd82012-03-13 22:37:42 -0400401 setcookie($prefix.$name, $value, $expire, $path, $domain, $secure, $httponly);
Derek Jones69fc4fc2010-03-02 13:36:31 -0600402 }
403
Derek Allard2067d1a2008-11-13 22:59:24 +0000404 // --------------------------------------------------------------------
405
406 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400407 * Fetch the IP Address
408 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300409 * Determines and validates the visitor's IP address.
410 *
411 * @return string IP address
Timothy Warren40403d22012-04-19 16:38:50 -0400412 */
Bo-Yi Wu4db872f2011-09-12 10:52:37 +0800413 public function ip_address()
Derek Allard2067d1a2008-11-13 22:59:24 +0000414 {
415 if ($this->ip_address !== FALSE)
416 {
417 return $this->ip_address;
418 }
Barry Mienydd671972010-10-04 16:33:58 +0200419
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300420 $proxy_ips = config_item('proxy_ips');
Andrey Andreevea7a8662012-10-09 13:36:31 +0300421 if ( ! empty($proxy_ips) && ! is_array($proxy_ips))
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300422 {
423 $proxy_ips = explode(',', str_replace(' ', '', $proxy_ips));
424 }
Andrey Andreev5b92ae12012-10-04 13:05:03 +0300425
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300426 $this->ip_address = $this->server('REMOTE_ADDR');
427
428 if ($proxy_ips)
429 {
430 foreach (array('HTTP_X_FORWARDED_FOR', 'HTTP_CLIENT_IP', 'HTTP_X_CLIENT_IP', 'HTTP_X_CLUSTER_CLIENT_IP') as $header)
Jordan Pittman8960acf2012-07-23 09:05:49 -0300431 {
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300432 if (($spoof = $this->server($header)) !== NULL)
Jordan Pittman8960acf2012-07-23 09:05:49 -0300433 {
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300434 // Some proxies typically list the whole chain of IP
435 // addresses through which the client has reached us.
436 // e.g. client_ip, proxy_ip1, proxy_ip2, etc.
Andrey Andreeve24eed72012-11-02 23:33:45 +0200437 sscanf($spoof, '%[^,]', $spoof);
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300438
439 if ( ! $this->valid_ip($spoof))
440 {
441 $spoof = NULL;
442 }
443 else
444 {
Jordan Pittmana5a71352012-07-20 19:36:43 -0300445 break;
446 }
447 }
Andrey Andreev5b92ae12012-10-04 13:05:03 +0300448 }
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300449
Andrey Andreeve45ad2b2012-10-09 13:11:15 +0300450 if ($spoof)
Andrey Andreev5b92ae12012-10-04 13:05:03 +0300451 {
Andrey Andreev9df35b42012-10-09 13:37:58 +0300452 for ($i = 0, $c = count($proxy_ips); $i < $c; $i++)
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300453 {
454 // Check if we have an IP address or a subnet
455 if (strpos($proxy_ips[$i], '/') === FALSE)
456 {
457 // An IP address (and not a subnet) is specified.
458 // We can compare right away.
459 if ($proxy_ips[$i] === $this->ip_address)
460 {
461 $this->ip_address = $spoof;
462 break;
463 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000464
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300465 continue;
466 }
467
468 // We have a subnet ... now the heavy lifting begins
469 isset($separator) OR $separator = $this->valid_ip($this->ip_address, 'ipv6') ? ':' : '.';
470
471 // If the proxy entry doesn't match the IP protocol - skip it
472 if (strpos($proxy_ips[$i], $separator) === FALSE)
473 {
474 continue;
475 }
476
477 // Convert the REMOTE_ADDR IP address to binary, if needed
Andrey Andreev82d2cf12012-10-13 12:38:42 +0300478 if ( ! isset($ip, $sprintf))
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300479 {
480 if ($separator === ':')
481 {
482 // Make sure we're have the "full" IPv6 format
Andrey Andreev82d2cf12012-10-13 12:38:42 +0300483 $ip = explode(':',
484 str_replace('::',
485 str_repeat(':', 9 - substr_count($this->ip_address, ':')),
486 $this->ip_address
487 )
488 );
489
490 for ($i = 0; $i < 8; $i++)
491 {
492 $ip[$i] = intval($ip[$i], 16);
493 }
494
495 $sprintf = '%016b%016b%016b%016b%016b%016b%016b%016b';
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300496 }
497 else
498 {
Andrey Andreev82d2cf12012-10-13 12:38:42 +0300499 $ip = explode('.', $this->ip_address);
500 $sprintf = '%08b%08b%08b%08b';
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300501 }
502
Andrey Andreev82d2cf12012-10-13 12:38:42 +0300503 $ip = vsprintf($sprintf, $ip);
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300504 }
505
506 // Split the netmask length off the network address
Andrey Andreeve24eed72012-11-02 23:33:45 +0200507 sscanf($proxy_ips[$i], '%[^/]/%d', $netaddr, $masklen);
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300508
509 // Again, an IPv6 address is most likely in a compressed form
510 if ($separator === ':')
511 {
Andrey Andreev82d2cf12012-10-13 12:38:42 +0300512 $netaddr = explode(':', str_replace('::', str_repeat(':', 9 - substr_count($netaddr, ':')), $netaddr));
513 for ($i = 0; $i < 8; $i++)
514 {
515 $netaddr[$i] = intval($netaddr[$i], 16);
516 }
517 }
518 else
519 {
520 $netaddr = explode('.', $netaddr);
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300521 }
522
Andrey Andreev82d2cf12012-10-13 12:38:42 +0300523 // Convert to binary and finally compare
524 if (strncmp($ip, vsprintf($sprintf, $netaddr), $masklen) === 0)
Andrey Andreev9ac557f2012-10-06 20:27:57 +0300525 {
526 $this->ip_address = $spoof;
527 break;
528 }
529 }
530 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000531 }
532
Derek Allard2067d1a2008-11-13 22:59:24 +0000533 if ( ! $this->valid_ip($this->ip_address))
534 {
Andrey Andreev64e98aa2012-01-07 20:29:10 +0200535 return $this->ip_address = '0.0.0.0';
Derek Allard2067d1a2008-11-13 22:59:24 +0000536 }
537
538 return $this->ip_address;
539 }
540
541 // --------------------------------------------------------------------
542
543 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400544 * Validate IP Address
545 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300546 * @param string $ip IP address
547 * @param string $which IP protocol: 'ipv4' or 'ipv6'
Timothy Warren40403d22012-04-19 16:38:50 -0400548 * @return bool
549 */
Andrey Andreev5a257182012-06-10 06:18:14 +0300550 public function valid_ip($ip, $which = '')
Derek Allard2067d1a2008-11-13 22:59:24 +0000551 {
Andrey Andreev5a257182012-06-10 06:18:14 +0300552 switch (strtolower($which))
553 {
554 case 'ipv4':
555 $which = FILTER_FLAG_IPV4;
556 break;
557 case 'ipv6':
558 $which = FILTER_FLAG_IPV6;
559 break;
560 default:
561 $which = NULL;
562 break;
563 }
564
565 return (bool) filter_var($ip, FILTER_VALIDATE_IP, $which);
Derek Allard2067d1a2008-11-13 22:59:24 +0000566 }
567
568 // --------------------------------------------------------------------
569
570 /**
Andrey Andreev1887ec62012-10-27 16:22:07 +0300571 * Fetch User Agent string
Timothy Warren40403d22012-04-19 16:38:50 -0400572 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300573 * @return string|null User Agent string or NULL if it doesn't exist
Timothy Warren40403d22012-04-19 16:38:50 -0400574 */
Andrey Andreev8850e372014-02-27 21:56:06 +0200575 public function user_agent($xss_clean = NULL)
Derek Allard2067d1a2008-11-13 22:59:24 +0000576 {
Andrey Andreev8850e372014-02-27 21:56:06 +0200577 return $this->_fetch_from_array($_SERVER, 'HTTP_USER_AGENT', $xss_clean);
Derek Allard2067d1a2008-11-13 22:59:24 +0000578 }
579
580 // --------------------------------------------------------------------
581
582 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400583 * Sanitize Globals
584 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300585 * Internal method serving for the following purposes:
Timothy Warren40403d22012-04-19 16:38:50 -0400586 *
Andrey Andreevb78a8c72014-04-15 17:21:16 +0300587 * - Unsets $_GET data, if query strings are not enabled
Andrey Andreev1887ec62012-10-27 16:22:07 +0300588 * - Cleans POST, COOKIE and SERVER data
589 * - Standardizes newline characters to PHP_EOL
Timothy Warren40403d22012-04-19 16:38:50 -0400590 *
591 * @return void
592 */
Andrey Andreev90cfe142012-01-08 04:46:42 +0200593 protected function _sanitize_globals()
Derek Allard2067d1a2008-11-13 22:59:24 +0000594 {
Derek Jones69fc4fc2010-03-02 13:36:31 -0600595 // Is $_GET data allowed? If not we'll set the $_GET to an empty array
Alex Bilbieed944a32012-06-02 11:07:47 +0100596 if ($this->_allow_get_array === FALSE)
Derek Allard2067d1a2008-11-13 22:59:24 +0000597 {
Derek Jones69fc4fc2010-03-02 13:36:31 -0600598 $_GET = array();
Derek Allard2067d1a2008-11-13 22:59:24 +0000599 }
Andrey Andreev9448afb2012-02-08 19:49:19 +0200600 elseif (is_array($_GET) && count($_GET) > 0)
Derek Allard2067d1a2008-11-13 22:59:24 +0000601 {
Andrey Andreev9448afb2012-02-08 19:49:19 +0200602 foreach ($_GET as $key => $val)
Derek Allard2067d1a2008-11-13 22:59:24 +0000603 {
Andrey Andreev9448afb2012-02-08 19:49:19 +0200604 $_GET[$this->_clean_input_keys($key)] = $this->_clean_input_data($val);
Derek Allard2067d1a2008-11-13 22:59:24 +0000605 }
606 }
607
Derek Jones69fc4fc2010-03-02 13:36:31 -0600608 // Clean $_POST Data
Andrey Andreev9448afb2012-02-08 19:49:19 +0200609 if (is_array($_POST) && count($_POST) > 0)
Derek Allard2067d1a2008-11-13 22:59:24 +0000610 {
Pascal Kriete5d5895f2011-02-14 13:27:07 -0500611 foreach ($_POST as $key => $val)
Derek Jones69fc4fc2010-03-02 13:36:31 -0600612 {
613 $_POST[$this->_clean_input_keys($key)] = $this->_clean_input_data($val);
614 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000615 }
616
Derek Jones69fc4fc2010-03-02 13:36:31 -0600617 // Clean $_COOKIE Data
Andrey Andreev9448afb2012-02-08 19:49:19 +0200618 if (is_array($_COOKIE) && count($_COOKIE) > 0)
Derek Allard2067d1a2008-11-13 22:59:24 +0000619 {
Derek Jones69fc4fc2010-03-02 13:36:31 -0600620 // Also get rid of specially treated cookies that might be set by a server
621 // or silly application, that are of no use to a CI application anyway
622 // but that when present will trip our 'Disallowed Key Characters' alarm
623 // http://www.ietf.org/rfc/rfc2109.txt
624 // note that the key names below are single quoted strings, and are not PHP variables
Andrey Andreev5ac428b2014-01-08 16:07:31 +0200625 unset(
626 $_COOKIE['$Version'],
627 $_COOKIE['$Path'],
628 $_COOKIE['$Domain']
629 );
Derek Jones69fc4fc2010-03-02 13:36:31 -0600630
Pascal Kriete5d5895f2011-02-14 13:27:07 -0500631 foreach ($_COOKIE as $key => $val)
Derek Jones69fc4fc2010-03-02 13:36:31 -0600632 {
Andrey Andreevfd0aabb2013-09-23 13:18:20 +0300633 if (($cookie_key = $this->_clean_input_keys($key)) !== FALSE)
634 {
635 $_COOKIE[$cookie_key] = $this->_clean_input_data($val);
636 }
637 else
638 {
639 unset($_COOKIE[$key]);
640 }
Derek Jones69fc4fc2010-03-02 13:36:31 -0600641 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000642 }
643
Derek Jones69fc4fc2010-03-02 13:36:31 -0600644 // Sanitize PHP_SELF
645 $_SERVER['PHP_SELF'] = strip_tags($_SERVER['PHP_SELF']);
646
Derek Jones69fc4fc2010-03-02 13:36:31 -0600647 // CSRF Protection check
Andrey Andreevf964b162013-11-12 17:04:55 +0200648 if ($this->_enable_csrf === TRUE && ! is_cli())
Derek Allard2067d1a2008-11-13 22:59:24 +0000649 {
Derek Jones69fc4fc2010-03-02 13:36:31 -0600650 $this->security->csrf_verify();
Derek Allard2067d1a2008-11-13 22:59:24 +0000651 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000652
Andrey Andreevfd0aabb2013-09-23 13:18:20 +0300653 log_message('debug', 'Global POST, GET and COOKIE data sanitized');
Derek Allard2067d1a2008-11-13 22:59:24 +0000654 }
655
656 // --------------------------------------------------------------------
657
658 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400659 * Clean Input Data
660 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300661 * Internal method that aids in escaping data and
662 * standardizing newline characters to PHP_EOL.
Timothy Warren40403d22012-04-19 16:38:50 -0400663 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300664 * @param string|string[] $str Input string(s)
Timothy Warren40403d22012-04-19 16:38:50 -0400665 * @return string
666 */
Andrey Andreev90cfe142012-01-08 04:46:42 +0200667 protected function _clean_input_data($str)
Derek Allard2067d1a2008-11-13 22:59:24 +0000668 {
Derek Jones69fc4fc2010-03-02 13:36:31 -0600669 if (is_array($str))
Derek Allard2067d1a2008-11-13 22:59:24 +0000670 {
Derek Jones69fc4fc2010-03-02 13:36:31 -0600671 $new_array = array();
Andrey Andreev1887ec62012-10-27 16:22:07 +0300672 foreach (array_keys($str) as $key)
Derek Jones69fc4fc2010-03-02 13:36:31 -0600673 {
Andrey Andreev1887ec62012-10-27 16:22:07 +0300674 $new_array[$this->_clean_input_keys($key)] = $this->_clean_input_data($str[$key]);
Derek Jones69fc4fc2010-03-02 13:36:31 -0600675 }
676 return $new_array;
Derek Allard2067d1a2008-11-13 22:59:24 +0000677 }
678
Andrey Andreevaf728622011-10-20 10:11:59 +0300679 /* We strip slashes if magic quotes is on to keep things consistent
680
681 NOTE: In PHP 5.4 get_magic_quotes_gpc() will always return 0 and
682 it will probably not exist in future versions at all.
683 */
684 if ( ! is_php('5.4') && get_magic_quotes_gpc())
Derek Allard2067d1a2008-11-13 22:59:24 +0000685 {
Derek Jones69fc4fc2010-03-02 13:36:31 -0600686 $str = stripslashes($str);
687 }
688
689 // Clean UTF-8 if supported
690 if (UTF8_ENABLED === TRUE)
691 {
692 $str = $this->uni->clean_string($str);
693 }
David Behler9b5df592011-08-14 21:04:17 +0200694
Pascal Kriete14a0ac62011-04-05 14:55:56 -0400695 // Remove control characters
Andrey Andreev5ac428b2014-01-08 16:07:31 +0200696 $str = remove_invisible_characters($str, FALSE);
Derek Jones69fc4fc2010-03-02 13:36:31 -0600697
Derek Jones69fc4fc2010-03-02 13:36:31 -0600698 // Standardize newlines if needed
Eric Robertsb75e13d2013-01-27 20:10:09 -0600699 if ($this->_standardize_newlines === TRUE)
Derek Jones69fc4fc2010-03-02 13:36:31 -0600700 {
Eric Robertsb75e13d2013-01-27 20:10:09 -0600701 return preg_replace('/(?:\r\n|[\r\n])/', PHP_EOL, $str);
Derek Allard2067d1a2008-11-13 22:59:24 +0000702 }
703
704 return $str;
705 }
706
707 // --------------------------------------------------------------------
708
709 /**
Timothy Warren40403d22012-04-19 16:38:50 -0400710 * Clean Keys
711 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300712 * Internal method that helps to prevent malicious users
Timothy Warren40403d22012-04-19 16:38:50 -0400713 * from trying to exploit keys we make sure that keys are
714 * only named with alpha-numeric text and a few other items.
715 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300716 * @param string $str Input string
Ä°rfan Evrensd02a69a2015-02-06 20:53:22 +0200717 * @param bool $fatal Whether to terminate script exection
Andrey Andreevfd0aabb2013-09-23 13:18:20 +0300718 * or to return FALSE if an invalid
719 * key is encountered
720 * @return string|bool
Timothy Warren40403d22012-04-19 16:38:50 -0400721 */
Andrey Andreevfd0aabb2013-09-23 13:18:20 +0300722 protected function _clean_input_keys($str, $fatal = TRUE)
Derek Allard2067d1a2008-11-13 22:59:24 +0000723 {
bigCat3c0846b2012-08-21 00:20:20 +0800724 if ( ! preg_match('/^[a-z0-9:_\/|-]+$/i', $str))
Derek Allard2067d1a2008-11-13 22:59:24 +0000725 {
Andrey Andreevfd0aabb2013-09-23 13:18:20 +0300726 if ($fatal === TRUE)
727 {
728 return FALSE;
729 }
730 else
731 {
732 set_status_header(503);
733 echo 'Disallowed Key Characters.';
Andrey Andreev7cf682a2014-03-13 14:55:45 +0200734 exit(7); // EXIT_USER_INPUT
Andrey Andreevfd0aabb2013-09-23 13:18:20 +0300735 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000736 }
737
Derek Jones69fc4fc2010-03-02 13:36:31 -0600738 // Clean UTF-8 if supported
739 if (UTF8_ENABLED === TRUE)
740 {
Andrey Andreev64e98aa2012-01-07 20:29:10 +0200741 return $this->uni->clean_string($str);
Derek Jones69fc4fc2010-03-02 13:36:31 -0600742 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000743
Derek Jones69fc4fc2010-03-02 13:36:31 -0600744 return $str;
745 }
Derek Allard2067d1a2008-11-13 22:59:24 +0000746
Greg Akerec2f5712010-11-15 16:22:12 -0600747 // --------------------------------------------------------------------
748
749 /**
750 * Request Headers
751 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300752 * @param bool $xss_clean Whether to apply XSS filtering
Andrey Andreev64e98aa2012-01-07 20:29:10 +0200753 * @return array
Greg Akerec2f5712010-11-15 16:22:12 -0600754 */
755 public function request_headers($xss_clean = FALSE)
756 {
CJ71cff1d2013-04-16 21:50:55 +0800757 // If header is already defined, return it immediately
758 if ( ! empty($this->headers))
759 {
760 return $this->headers;
761 }
762
Andrey Andreev1887ec62012-10-27 16:22:07 +0300763 // In Apache, you can simply call apache_request_headers()
Greg Akerec2f5712010-11-15 16:22:12 -0600764 if (function_exists('apache_request_headers'))
765 {
CJ71cff1d2013-04-16 21:50:55 +0800766 return $this->headers = apache_request_headers();
Greg Akerec2f5712010-11-15 16:22:12 -0600767 }
CJd195f222013-04-17 01:04:13 +0800768
CJ8347f912013-04-17 21:45:22 +0800769 $this->headers['Content-Type'] = isset($_SERVER['CONTENT_TYPE']) ? $_SERVER['CONTENT_TYPE'] : @getenv('CONTENT_TYPE');
CJd195f222013-04-17 01:04:13 +0800770
771 foreach ($_SERVER as $key => $val)
Greg Akerec2f5712010-11-15 16:22:12 -0600772 {
CJd195f222013-04-17 01:04:13 +0800773 if (sscanf($key, 'HTTP_%s', $header) === 1)
Greg Akerec2f5712010-11-15 16:22:12 -0600774 {
CJd195f222013-04-17 01:04:13 +0800775 // take SOME_HEADER and turn it into Some-Header
776 $header = str_replace('_', ' ', strtolower($header));
777 $header = str_replace(' ', '-', ucwords($header));
Greg Akerec2f5712010-11-15 16:22:12 -0600778
CJd195f222013-04-17 01:04:13 +0800779 $this->headers[$header] = $this->_fetch_from_array($_SERVER, $key, $xss_clean);
CJ826990f2013-04-16 14:17:53 +0800780 }
Greg Akerec2f5712010-11-15 16:22:12 -0600781 }
David Behler9b5df592011-08-14 21:04:17 +0200782
Greg Akerec2f5712010-11-15 16:22:12 -0600783 return $this->headers;
784 }
785
786 // --------------------------------------------------------------------
787
788 /**
789 * Get Request Header
790 *
791 * Returns the value of a single member of the headers class member
792 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300793 * @param string $index Header name
794 * @param bool $xss_clean Whether to apply XSS filtering
Adriano Rosaf112e4a2014-10-03 13:15:46 -0300795 * @return string|null The requested header on success or NULL on failure
Greg Akerec2f5712010-11-15 16:22:12 -0600796 */
797 public function get_request_header($index, $xss_clean = FALSE)
798 {
799 if (empty($this->headers))
800 {
801 $this->request_headers();
802 }
David Behler9b5df592011-08-14 21:04:17 +0200803
Greg Akerec2f5712010-11-15 16:22:12 -0600804 if ( ! isset($this->headers[$index]))
805 {
Phil Sturgeon55a6ddb2012-05-23 18:37:24 +0100806 return NULL;
Greg Akerec2f5712010-11-15 16:22:12 -0600807 }
808
Andrey Andreev9448afb2012-02-08 19:49:19 +0200809 return ($xss_clean === TRUE)
810 ? $this->security->xss_clean($this->headers[$index])
811 : $this->headers[$index];
Greg Akerec2f5712010-11-15 16:22:12 -0600812 }
813
Greg Aker081ac9d2010-11-22 14:42:53 -0600814 // --------------------------------------------------------------------
Phil Sturgeonc3828712011-01-19 12:31:47 +0000815
Greg Aker081ac9d2010-11-22 14:42:53 -0600816 /**
Andrey Andreev1887ec62012-10-27 16:22:07 +0300817 * Is AJAX request?
Greg Aker081ac9d2010-11-22 14:42:53 -0600818 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300819 * Test to see if a request contains the HTTP_X_REQUESTED_WITH header.
Greg Aker081ac9d2010-11-22 14:42:53 -0600820 *
Andrey Andreev9448afb2012-02-08 19:49:19 +0200821 * @return bool
Greg Aker081ac9d2010-11-22 14:42:53 -0600822 */
823 public function is_ajax_request()
824 {
Andrey Andreev9448afb2012-02-08 19:49:19 +0200825 return ( ! empty($_SERVER['HTTP_X_REQUESTED_WITH']) && strtolower($_SERVER['HTTP_X_REQUESTED_WITH']) === 'xmlhttprequest');
Greg Aker081ac9d2010-11-22 14:42:53 -0600826 }
827
Phil Sturgeonc3828712011-01-19 12:31:47 +0000828 // --------------------------------------------------------------------
829
830 /**
Andrey Andreev1887ec62012-10-27 16:22:07 +0300831 * Is CLI request?
Phil Sturgeonc3828712011-01-19 12:31:47 +0000832 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300833 * Test to see if a request was made from the command line.
Phil Sturgeonc3828712011-01-19 12:31:47 +0000834 *
Andrey Andreevf964b162013-11-12 17:04:55 +0200835 * @deprecated 3.0.0 Use is_cli() instead
836 * @return bool
Phil Sturgeonc3828712011-01-19 12:31:47 +0000837 */
838 public function is_cli_request()
839 {
Andrey Andreevf964b162013-11-12 17:04:55 +0200840 return is_cli();
Phil Sturgeonc3828712011-01-19 12:31:47 +0000841 }
842
Michiel Vugteveenbe0ca262012-03-07 19:09:51 +0100843 // --------------------------------------------------------------------
844
845 /**
846 * Get Request Method
847 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300848 * Return the request method
Michiel Vugteveenbe0ca262012-03-07 19:09:51 +0100849 *
Andrey Andreev1887ec62012-10-27 16:22:07 +0300850 * @param bool $upper Whether to return in upper or lower case
851 * (default: FALSE)
852 * @return string
Michiel Vugteveenbe0ca262012-03-07 19:09:51 +0100853 */
Michiel Vugteveen704fb162012-03-07 20:42:33 +0100854 public function method($upper = FALSE)
Michiel Vugteveenbe0ca262012-03-07 19:09:51 +0100855 {
Michiel Vugteveendc900df2012-03-07 20:41:37 +0100856 return ($upper)
857 ? strtoupper($this->server('REQUEST_METHOD'))
858 : strtolower($this->server('REQUEST_METHOD'));
Michiel Vugteveenbe0ca262012-03-07 19:09:51 +0100859 }
860
Andrey Andreevd0ac8b12015-02-27 11:41:52 +0200861 // ------------------------------------------------------------------------
862
863 /**
864 * Magic __get()
865 *
866 * Allows read access to protected properties
867 *
868 * @param string $name
869 * @return mixed
870 */
871 public function __get($name)
872 {
873 if ($name === 'raw_input_stream')
874 {
875 isset($this->_raw_input_stream) OR $this->_raw_input_stream = file_get_contents('php://input');
876 return $this->_raw_input_stream;
877 }
878 }
879
Derek Allard2067d1a2008-11-13 22:59:24 +0000880}