friendica/include/dba.php

198 lines
4.1 KiB
PHP
Raw Normal View History

2010-07-02 01:48:07 +02:00
<?php
/**
*
* MySQL database class
*
* For debugging, insert 'dbg(1);' anywhere in the program flow.
* dbg(0); will turn it off. Logging is performed at LOGGER_DATA level.
* When logging, all binary info is converted to text and html entities are escaped so that
* the debugging stream is safe to view within both terminals and web pages.
*
*/
2010-07-02 01:48:07 +02:00
if(! class_exists('dba')) {
class dba {
private $debug = 0;
private $db;
public $connected = false;
2010-07-02 01:48:07 +02:00
function __construct($server,$user,$pass,$db,$install = false) {
$this->db = @new mysqli($server,$user,$pass,$db);
if(! mysqli_connect_errno()) {
$this->connected = true;
}
else {
$this->db = null;
if(! $install)
system_unavailable();
}
2010-07-02 01:48:07 +02:00
}
2010-08-16 06:49:29 +02:00
public function getdb() {
return $this->db;
}
2010-07-02 01:48:07 +02:00
public function q($sql) {
if((! $this->db) || (! $this->connected))
2010-07-02 01:48:07 +02:00
return false;
$result = @$this->db->query($sql);
if($this->debug) {
$mesg = '';
2010-10-30 22:25:37 +02:00
if($this->db->errno)
logger('dba: ' . $this->db->error);
2010-07-02 01:48:07 +02:00
if($result === false)
$mesg = 'false';
elseif($result === true)
$mesg = 'true';
else
$mesg = $result->num_rows . ' results' . EOL;
2010-07-02 01:48:07 +02:00
$str = 'SQL = ' . printable($sql) . EOL . 'SQL returned ' . $mesg . EOL;
2010-07-02 01:48:07 +02:00
logger('dba: ' . $str );
2010-07-02 01:48:07 +02:00
}
2010-10-07 03:14:11 +02:00
else {
/*
* If dbfail.out exists, we will write any failed calls directly to it,
* regardless of any logging that may or may nor be in effect.
* These usually indicate SQL syntax errors that need to be resolved.
*/
2010-10-27 07:09:13 +02:00
if($result === false) {
logger('dba: ' . printable($sql) . ' returned false.');
if(file_exists('dbfail.out'))
file_put_contents('dbfail.out', printable($sql) . ' returned false' . "\n", FILE_APPEND);
}
2010-10-07 03:14:11 +02:00
}
2010-07-02 01:48:07 +02:00
if(($result === true) || ($result === false))
return $result;
$r = array();
if($result->num_rows) {
while($x = $result->fetch_array(MYSQL_ASSOC))
$r[] = $x;
$result->free_result();
}
if($this->debug)
logger('dba: ' . printable(print_r($r, true)), LOGGER_DATA);
2010-07-02 01:48:07 +02:00
return($r);
}
public function dbg($dbg) {
$this->debug = $dbg;
}
public function escape($str) {
if($this->db && $this->connected)
return @$this->db->real_escape_string($str);
2010-07-02 01:48:07 +02:00
}
function __destruct() {
@$this->db->close();
}
}}
2010-08-12 07:24:08 +02:00
if(! function_exists('printable')) {
function printable($s) {
$s = preg_replace("~([\x01-\x08\x0E-\x0F\x10-\x1F\x7F-\xFF])~",".", $s);
$s = str_replace("\x00",'.',$s);
if(x($_SERVER,'SERVER_NAME'))
$s = escape_tags($s);
return $s;
2010-08-12 07:24:08 +02:00
}}
2010-07-02 01:48:07 +02:00
// Procedural functions
if(! function_exists('dbg')) {
function dbg($state) {
global $db;
if($db)
2010-07-02 01:48:07 +02:00
$db->dbg($state);
}}
if(! function_exists('dbesc')) {
function dbesc($str) {
global $db;
if($db && $db->connected)
2011-01-10 22:57:59 +01:00
return($db->escape($str));
else
return(str_replace("'","\\'",$str));
2010-07-02 01:48:07 +02:00
}}
// Function: q($sql,$args);
// Description: execute SQL query with printf style args.
// Example: $r = q("SELECT * FROM `%s` WHERE `uid` = %d",
// 'user', 1);
if(! function_exists('q')) {
function q($sql) {
global $db;
$args = func_get_args();
unset($args[0]);
if($db && $db->connected) {
$ret = $db->q(vsprintf($sql,$args));
return $ret;
}
/**
*
* This will happen occasionally trying to store the
* session data after abnormal program termination
*
*/
logger('dba: no database: ' . print_r($args,true));
return false;
2010-07-02 01:48:07 +02:00
}}
/**
*
* Raw db query, no arguments
*
*/
if(! function_exists('dbq')) {
function dbq($sql) {
global $db;
if($db && $db->connected)
$ret = $db->q($sql);
else
$ret = false;
return $ret;
}}
2010-07-02 01:48:07 +02:00
// Caller is responsible for ensuring that any integer arguments to
// dbesc_array are actually integers and not malformed strings containing
// SQL injection vectors. All integer array elements should be specifically
// cast to int to avoid trouble.
if(! function_exists('dbesc_array_cb')) {
function dbesc_array_cb(&$item, $key) {
if(is_string($item))
$item = dbesc($item);
}}
if(! function_exists('dbesc_array')) {
2010-07-16 10:26:42 +02:00
function dbesc_array(&$arr) {
if(is_array($arr) && count($arr)) {
array_walk($arr,'dbesc_array_cb');
2010-07-02 01:48:07 +02:00
}
}}