dir/include/dba.php
Roland Häder d400ed3342
Rewrite:
- don't download files - more worse JavaScript - from external CDNs
- this is a security nightmare when the remote CDN is compromised and starts
  distributing worms/trojan horses (see NSA scandal)
- this will give them away your user's IP addresses
- removed no longer used js/main.js as there is assets/js/main.js around
- moved css/js files in their own folder (assets/<css|js>)
- removed executable right from include/dba.php, no need for this

Signed-off-by: Roland Häder <roland@mxchange.org>
2017-05-11 16:49:02 +02:00

193 lines
3.4 KiB
PHP

<?php
// MySQL database class
//
// For debugging, insert 'dbg(x);' anywhere in the program flow.
// x = 1: display db success/failure following content
// x = 2: display full queries following content
// x = 3: display full queries using echo; which will mess up display
// really bad but will return output in stubborn cases.
class dba
{
private $debug = 0;
public $db;
public function __construct($server, $user, $pass, $db, $install = false)
{
$this->db = @new mysqli($server, $user, $pass, $db);
if ((mysqli_connect_errno()) && (! install)) {
system_unavailable();
}
}
public function getdb()
{
return $this->db;
}
public function q($sql)
{
global $debug_text;
if (! $this->db) {
return false;
}
$result = @$this->db->query($sql);
if ($this->debug) {
$mesg = '';
if ($this->db->mysqli->errno) {
$debug_text .= $this->db->mysqli->error . EOL;
}
if ($result === false) {
$mesg = 'false';
} elseif ($result === true) {
$mesg = 'true';
} else {
$mesg = $result->num_rows.' results' . EOL;
}
$str = 'SQL = ' . printable($sql) . EOL . 'SQL returned ' . $mesg . EOL;
switch ($this->debug) {
case 3:
echo $str;
break;
default:
$debug_text .= $str;
break;
}
}
if (($result === true) || ($result === false)) {
return $result;
}
$r = array();
if ($result->num_rows) {
while ($x = $result->fetch_array(MYSQL_ASSOC)) {
$r[] = $x;
}
$result->free_result();
}
if ($this->debug == 2) {
$debug_text .= printable(print_r($r, true). EOL);
} elseif ($this->debug == 3) {
echo printable(print_r($r, true) . EOL) ;
}
return $r;
}
public function dbg($dbg)
{
$this->debug = $dbg;
}
public function escape($str)
{
return @$this->db->real_escape_string($str);
}
public function __destruct()
{
@$this->db->close();
}
}
if (! function_exists('printable')) {
function printable($s)
{
$s = preg_replace("~([\x01-\x08\x0E-\x0F\x10-\x1F\x7F-\xFF])~", ".", $s);
$s = str_replace("\x00", '.', $s);
if (x($_SERVER, 'SERVER_NAME')) {
$s = escape_tags($s);
}
return $s;
}
}
// Procedural functions
if (! function_exists('dbg')) {
function dbg($state)
{
global $db;
$db->dbg($state);
}
}
if (! function_exists('dbesc')) {
function dbesc($str)
{
global $db;
if ($db) {
return($db->escape($str));
}
}
}
// Function: q($sql,$args);
// Description: execute SQL query with printf style args.
// Example: $r = q("SELECT * FROM `%s` WHERE `uid` = %d",
// 'user', 1);
if (! function_exists('q')) {
function q($sql)
{
global $db;
$args = func_get_args();
unset($args[0]);
if ($db) {
$ret = $db->q(vsprintf($sql, $args));
}
if ($db->db->errno) {
logger('dba: ' . $db->db->error);
}
return $ret;
}
}
// Caller is responsible for ensuring that any integer arguments to
// dbesc_array are actually integers and not malformed strings containing
// SQL injection vectors. All integer array elements should be specifically
// cast to int to avoid trouble.
if (! function_exists('dbesc_array_cb')) {
function dbesc_array_cb(&$item, $key)
{
if (is_string($item)) {
$item = dbesc($item);
}
}
}
if (! function_exists('dbesc_array')) {
function dbesc_array(&$arr)
{
if (is_array($arr) && count($arr)) {
array_walk($arr, 'dbesc_array_cb');
}
}
}
if (! function_exists('closedb')) {
function closedb()
{
global $db;
// $db->close();
}
}