Cloudlog/application/controllers/Lotw.php

648 wiersze
20 KiB
PHP
Czysty Zwykły widok Historia

<?php if ( ! defined('BASEPATH')) exit('No direct script access allowed');
class Lotw extends CI_Controller {
/* Controls who can access the controller and its functions */
function __construct()
{
parent::__construct();
$this->load->helper(array('form', 'url'));
}
2016-01-09 23:50:42 +00:00
/*
|--------------------------------------------------------------------------
| Function: index
|--------------------------------------------------------------------------
|
| Default function for the controller which loads when doing /lotw
| this shows all the uploaded lotw p12 certificates the user has uploaded
|
*/
public function index() {
// Load required models for page generation
$this->load->model('LotwCert');
// Get Array of the logged in users LOTW certs.
$data['lotw_cert_results'] = $this->LotwCert->lotw_certs($this->session->userdata('user_id'));
// Set Page Title
$data['page_title'] = "Logbook of the World";
// Load Views
$this->load->view('interface_assets/header', $data);
$this->load->view('lotw_views/index');
$this->load->view('interface_assets/footer');
}
/*
|--------------------------------------------------------------------------
| Function: cert_upload
|--------------------------------------------------------------------------
|
| Nothing fancy just shows the cert_upload form for uploading p12 files
|
*/
public function cert_upload() {
// Set Page Title
$data['page_title'] = "Logbook of the World";
// Load Views
$this->load->view('interface_assets/header', $data);
$this->load->view('lotw_views/upload_cert', array('error' => ' ' ));
$this->load->view('interface_assets/footer');
}
/*
|--------------------------------------------------------------------------
| Function: do_cert_upload
|--------------------------------------------------------------------------
|
| do_cert_upload is called from cert_upload form submit and handles uploading
| and processing of p12 files and storing the data into mysql
|
*/
public function do_cert_upload()
{
$config['upload_path'] = './uploads/lotw/certs';
$config['allowed_types'] = 'p12';
$this->load->library('upload', $config);
if ( ! $this->upload->do_upload('userfile'))
{
// Upload of P12 Failed
$error = array('error' => $this->upload->display_errors());
// Set Page Title
$data['page_title'] = "Logbook of the World";
// Load Views
$this->load->view('interface_assets/header', $data);
$this->load->view('lotw_views/upload_cert', $error);
$this->load->view('interface_assets/footer');
}
else
{
// Load database queries
$this->load->model('LotwCert');
//Upload of P12 successful
$data = array('upload_data' => $this->upload->data());
$info = $this->decrypt_key($data['upload_data']['full_path']);
// Check to see if certificate is already in the system
$new_certficiate = $this->LotwCert->find_cert($info['issued_callsign'], $this->session->userdata('user_id'));
// Check DXCC & Store Country Name
$this->load->model('Logbook_model');
$dxcc_check = $this->Logbook_model->check_dxcc_table($info['issued_callsign'], $info['validFrom']);
$dxcc = $dxcc_check[1];
if($new_certficiate == 0) {
// New Certificate Store in Database
// Store Certificate Data into MySQL
$this->LotwCert->store_certficiate($this->session->userdata('user_id'), $info['issued_callsign'], $dxcc, $info['validFrom'], $info['validTo_Date'], $info['pem_key']);
// Cert success flash message
$this->session->set_flashdata('Success', $info['issued_callsign'].' Certficiate Imported.');
} else {
// Certficiate is in the system time to update
$this->LotwCert->update_certficiate($this->session->userdata('user_id'), $info['issued_callsign'], $dxcc, $info['validFrom'], $info['validTo_Date'], $info['pem_key']);
// Cert success flash message
$this->session->set_flashdata('Success', $info['issued_callsign'].' Certficiate Updated.');
}
// p12 certificate processed time to delete the file
unlink($data['upload_data']['full_path']);
// Get Array of the logged in users LOTW certs.
$data['lotw_cert_results'] = $this->LotwCert->lotw_certs($this->session->userdata('user_id'));
// Set Page Title
$data['page_title'] = "Logbook of the World";
// Load Views
$this->load->view('interface_assets/header', $data);
$this->load->view('lotw_views/index');
$this->load->view('interface_assets/footer');
}
}
/*
|--------------------------------------------------------------------------
| Function: lotw_upload
|--------------------------------------------------------------------------
|
| This function Uploads to LOTW
|
*/
public function lotw_upload() {
// Get Station Profile Data
$this->load->model('Stations');
$station_profiles = $this->Stations->all();
if ($station_profiles->num_rows() >= 1) {
foreach ($station_profiles->result() as $station_profile)
{
print_r($station_profile);
// Get Certificate Data
$this->load->model('LotwCert');
$lotw_cert_info = $this->LotwCert->lotw_cert_details($station_profile->station_callsign, $this->session->userdata('user_id'));
print_r($lotw_cert_info);
}
} else {
echo "No Station Profiles";
}
// Get Certificate Data
$this->load->model('LotwCert');
// Set QSOs for Station Profile that havent been uploaded
// Build ADIF file
// Save TQ8
// Upload TQ8
// Destory TQ8
}
/*
|--------------------------------------------------------------------------
| Function: delete_cert
|--------------------------------------------------------------------------
|
| Deletes LOTW certificate from the MySQL table
|
*/
public function delete_cert($cert_id) {
$this->load->model('LotwCert');
$this->LotwCert->delete_certficiate($this->session->userdata('user_id'), $cert_id);
$this->session->set_flashdata('Success', 'Certficiate Deleted.');
redirect('/lotw/');
}
/*
|--------------------------------------------------------------------------
| Function: peter
|--------------------------------------------------------------------------
|
| Temp function to test development bits
|
*/
public function peter() {
$this->load->model('LotwCert');
$this->load->model('Logbook_model');
$dxcc = $this->Logbook_model->check_dxcc_table("2M0SQL", "2020-05-07 17:20:27");
print_r($dxcc);
// Get Array of the logged in users LOTW certs.
echo $this->LotwCert->find_cert($this->session->userdata('user_id'), "2M0SQL");
}
/*
|--------------------------------------------------------------------------
| Function: decrypt_key
|--------------------------------------------------------------------------
|
| Accepts p12 file and optional password and encrypts the file returning
| the required fields for LOTW and the PEM Key
|
*/
public function decrypt_key($file, $password = "") {
2020-08-13 22:03:25 +00:00
$results = array();
$password = $password; // Only needed if 12 has a password set
$filename = file_get_contents('file://'.$file);
2020-08-13 22:03:25 +00:00
$worked = openssl_pkcs12_read($filename, $results, $password);
if($worked) {
// Reading p12 successful
$new_password = "cloudlog"; // set default password
2020-08-13 22:03:25 +00:00
$result = null;
$worked = openssl_pkey_export($results['pkey'], $result, $new_password);
if($worked) {
// Store PEM Key in Array
$data['pem_key'] = $result;
2020-08-13 22:03:25 +00:00
} else {
// Error Log Error Message
log_message('error', openssl_error_string());
// Set warning message redirect to LOTW main page
$this->session->set_flashdata('Warning', openssl_error_string());
redirect('/lotw/');
2020-08-13 22:03:25 +00:00
}
} else {
// Reading p12 failed log error message
log_message('error', openssl_error_string());
// Set warning message redirect to LOTW main page
$this->session->set_flashdata('Warning', openssl_error_string());
redirect('/lotw/');
2020-08-13 22:03:25 +00:00
}
// Read Cert Data
$certdata= openssl_x509_parse($results['cert'],0);
// Store Variables
$data['issued_callsign'] = $certdata['subject']['undefined'];
$data['issued_name'] = $certdata['subject']['commonName'];
$data['validFrom'] = $certdata['extensions']['1.3.6.1.4.1.12348.1.2'];
$data['validTo_Date'] = $certdata['extensions']['1.3.6.1.4.1.12348.1.3'];
return $data;
2020-08-13 22:03:25 +00:00
}
private function loadFromFile($filepath)
{
$this->load->model('user_model');
if(!$this->user_model->authorize(2)) { $this->session->set_flashdata('notice', 'You\'re not allowed to do that!'); redirect('dashboard'); }
// Figure out how we should be marking QSLs confirmed via LoTW
$query = $query = $this->db->query('SELECT lotw_rcvd_mark FROM config');
$q = $query->row();
$config['lotw_rcvd_mark'] = $q->lotw_rcvd_mark;
2016-01-09 23:50:42 +00:00
2013-02-24 00:40:06 +00:00
ini_set('memory_limit', '-1');
set_time_limit(0);
$this->load->library('adif_parser');
$this->adif_parser->load_from_file($filepath);
$this->adif_parser->initialize();
$tableheaders = "<table width=\"100%\">";
$tableheaders .= "<tr class=\"titles\">";
$tableheaders .= "<td>QSO Date</td>";
$tableheaders .= "<td>Call</td>";
$tableheaders .= "<td>Mode</td>";
$tableheaders .= "<td>LoTW QSL Received</td>";
$tableheaders .= "<td>Date LoTW Confirmed</td>";
$tableheaders .= "<td>State</td>";
$tableheaders .= "<td>Log Status</td>";
$tableheaders .= "<td>LoTW Status</td>";
2016-01-09 23:53:50 +00:00
$tableheaders .= "</tr>";
$table = "";
while($record = $this->adif_parser->get_record())
{
2016-01-09 23:50:42 +00:00
$time_on = date('Y-m-d', strtotime($record['qso_date'])) ." ".date('H:i', strtotime($record['time_on']));
2016-01-09 23:50:42 +00:00
$qsl_date = date('Y-m-d', strtotime($record['qslrdate'])) ." ".date('H:i', strtotime($record['qslrdate']));
if (isset($record['time_off'])) {
$time_off = date('Y-m-d', strtotime($record['qso_date'])) ." ".date('H:i', strtotime($record['time_off']));
} else {
2016-01-09 23:50:42 +00:00
$time_off = date('Y-m-d', strtotime($record['qso_date'])) ." ".date('H:i', strtotime($record['time_on']));
}
2016-01-09 23:50:42 +00:00
// If we have a positive match from LoTW, record it in the DB according to the user's preferences
if ($record['qsl_rcvd'] == "Y")
{
$record['qsl_rcvd'] = $config['lotw_rcvd_mark'];
}
2016-01-09 23:50:42 +00:00
$status = $this->logbook_model->import_check($time_on, $record['call'], $record['band']);
$skipNewQso = $this->input->post('importMissing'); // If import missing was checked
if($status == "No Match" && $skipNewQso != NULL) {
$station_id = $this->logbook_model->find_correct_station_id($record['station_callsign'], $record['my_gridsquare']);
if ($station_id != NULL) {
$result = $this->logbook_model->import($record, $station_id, NULL, NULL, NULL); // Create the Entry
if ($result == "") {
$lotw_status = 'QSO imported';
} else {
$lotw_status = $result;
}
}
} else {
if (isset($record['state'])) {
$state = $record['state'];
} else {
$state = "";
}
$lotw_status = $this->logbook_model->lotw_update($time_on, $record['call'], $record['band'], $qsl_date, $record['qsl_rcvd'], $state);
}
2016-01-09 23:50:42 +00:00
$table .= "<tr>";
$table .= "<td>".$time_on."</td>";
$table .= "<td>".$record['call']."</td>";
$table .= "<td>".$record['mode']."</td>";
$table .= "<td>".$record['qsl_rcvd']."</td>";
$table .= "<td>".$qsl_date."</td>";
$table .= "<td>".$state."</td>";
$table .= "<td>QSO Record: ".$status."</td>";
$table .= "<td>LoTW Record: ".$lotw_status."</td>";
2016-01-09 23:50:42 +00:00
$table .= "</tr>";
}
2016-01-09 23:50:42 +00:00
if ($table != "")
{
$table .= "</table>";
$data['lotw_table_headers'] = $tableheaders;
$data['lotw_table'] = $table;
}
2016-01-09 23:50:42 +00:00
2013-02-24 00:40:06 +00:00
unlink($filepath);
$data['page_title'] = "LoTW ADIF Information";
2019-01-14 16:29:06 +00:00
$this->load->view('interface_assets/header', $data);
$this->load->view('lotw/analysis');
2019-01-14 16:29:06 +00:00
$this->load->view('interface_assets/footer');
}
2016-01-09 23:50:42 +00:00
public function import() {
$this->load->model('user_model');
if(!$this->user_model->authorize(2)) { $this->session->set_flashdata('notice', 'You\'re not allowed to do that!'); redirect('dashboard'); }
$data['page_title'] = "LoTW ADIF Import";
$config['upload_path'] = './uploads/';
$config['allowed_types'] = 'adi|ADI';
2016-01-09 23:50:42 +00:00
$this->load->library('upload', $config);
2016-01-09 23:50:42 +00:00
$this->load->model('logbook_model');
2016-01-09 23:50:42 +00:00
if ($this->input->post('lotwimport') == 'fetch')
2016-01-09 23:50:42 +00:00
{
$file = $config['upload_path'] . 'lotwreport_download.adi';
2016-01-09 23:50:42 +00:00
// Get credentials for LoTW
$query = $this->user_model->get_by_id($this->session->userdata('user_id'));
$q = $query->row();
$data['user_lotw_name'] = $q->user_lotw_name;
$data['user_lotw_password'] = $q->user_lotw_password;
2016-01-09 23:50:42 +00:00
// Get URL for downloading LoTW
$query = $query = $this->db->query('SELECT lotw_download_url FROM config');
$q = $query->row();
$lotw_url = $q->lotw_download_url;
2016-01-09 23:50:42 +00:00
// Validate that LoTW credentials are not empty
// TODO: We don't actually see the error message
if ($data['user_lotw_name'] == '' || $data['user_lotw_password'] == '')
{
2013-03-07 05:33:39 +00:00
$this->session->set_flashdata('warning', 'You have not defined your ARRL LoTW credentials!'); redirect('lotw/import');
}
2016-01-09 23:50:42 +00:00
$customDate = $this->input->post('from');
if ($customDate != NULL) {
$customDate = DateTime::createFromFormat('d/m/Y', $customDate);
$customDate = $customDate->format('Y-m-d');
$lotw_last_qsl_date = date($customDate);
}
else {
// Query the logbook to determine when the last LoTW confirmation was
$lotw_last_qsl_date = date('Y-m-d', strtotime($this->logbook_model->lotw_last_qsl_date()));
}
2016-01-09 23:50:42 +00:00
// Build URL for LoTW report file
$lotw_url .= "?";
$lotw_url .= "login=" . $data['user_lotw_name'];
$lotw_url .= "&password=" . $data['user_lotw_password'];
$lotw_url .= "&qso_query=1&qso_qsl='yes'&qso_qsldetail='yes'&qso_mydetail='yes'";
2016-01-09 23:50:42 +00:00
//TODO: Option to specifiy whether we download location data from LoTW or not
//$lotw_url .= "&qso_qsldetail=\"yes\";
2016-01-09 23:50:42 +00:00
$lotw_url .= "&qso_qslsince=";
$lotw_url .= "$lotw_last_qsl_date";
2016-01-09 23:50:42 +00:00
// Only pull back entries that belong to this callsign
$lotw_call = $this->session->userdata('user_callsign');
$lotw_url .= "&qso_owncall=$lotw_call";
2016-01-09 23:50:42 +00:00
file_put_contents($file, file_get_contents($lotw_url));
2016-01-09 23:50:42 +00:00
ini_set('memory_limit', '-1');
2013-02-24 00:40:06 +00:00
$this->loadFromFile($file);
}
else
{
if ( ! $this->upload->do_upload())
{
2016-01-09 23:50:42 +00:00
$data['error'] = $this->upload->display_errors();
2019-01-14 16:29:06 +00:00
$this->load->view('interface_assets/header', $data);
$this->load->view('lotw/import');
2019-01-14 16:29:06 +00:00
$this->load->view('interface_assets/footer');
}
else
{
$data = array('upload_data' => $this->upload->data());
2016-01-09 23:50:42 +00:00
2013-02-24 00:40:06 +00:00
$this->loadFromFile('./uploads/'.$data['upload_data']['file_name']);
}
}
} // end function
2016-01-09 23:50:42 +00:00
public function export() {
$this->load->model('user_model');
if(!$this->user_model->authorize(2)) { $this->session->set_flashdata('notice', 'You\'re not allowed to do that!'); redirect('dashboard'); }
$data['page_title'] = "LoTW .TQ8 Upload";
$config['upload_path'] = './uploads/';
$config['allowed_types'] = 'tq8|TQ8';
$this->load->library('upload', $config);
if ( ! $this->upload->do_upload())
{
$data['error'] = $this->upload->display_errors();
2019-01-14 16:29:06 +00:00
$this->load->view('interface_assets/header', $data);
$this->load->view('lotw/export');
2019-01-14 16:29:06 +00:00
$this->load->view('interface_assets/footer');
}
else
2016-01-09 23:50:42 +00:00
{
$data = array('upload_data' => $this->upload->data());
2016-01-09 23:50:42 +00:00
// Figure out how we should be marking QSLs confirmed via LoTW
$query = $query = $this->db->query('SELECT lotw_login_url FROM config');
$q = $query->row();
$config['lotw_login_url'] = $q->lotw_login_url;
2016-01-09 23:50:42 +00:00
2013-03-07 05:33:39 +00:00
// Set some fields that we're going to need for ARRL login
$query = $this->user_model->get_by_id($this->session->userdata('user_id'));
$q = $query->row();
2013-03-07 05:33:39 +00:00
$fields['login'] = $q->user_lotw_name;
$fields['password'] = $q->user_lotw_password;
$fields['acct_sel'] = "";
2016-01-09 23:50:42 +00:00
2013-03-07 05:33:39 +00:00
if ($fields['login'] == '' || $fields['password'] == '')
{
$this->session->set_flashdata('warning', 'You have not defined your ARRL LoTW credentials!'); redirect('lotw/status');
}
2016-01-09 23:50:42 +00:00
// Curl stuff goes here
2016-01-09 23:50:42 +00:00
// First we need to get a cookie
// options
$cookie_file_path = "./uploads/cookies.txt";
$agent = "Mozilla/4.0 (compatible;)";
// begin script
2016-01-09 23:50:42 +00:00
$ch = curl_init();
// extra headers
$headers[] = "Accept: */*";
$headers[] = "Connection: Keep-Alive";
// basic curl options for all requests
curl_setopt($ch, CURLOPT_HTTPHEADER, $headers);
curl_setopt($ch, CURLOPT_HEADER, 0);
2016-01-09 23:50:42 +00:00
// TODO: These SSL things should probably be set to true :)
curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
2016-01-09 23:50:42 +00:00
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
curl_setopt($ch, CURLOPT_USERAGENT, $agent);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
curl_setopt($ch, CURLOPT_COOKIEFILE, $cookie_file_path);
curl_setopt($ch, CURLOPT_COOKIEJAR, $cookie_file_path);
// Set login URL
2013-03-07 05:33:39 +00:00
curl_setopt($ch, CURLOPT_URL, $config['lotw_login_url']);
2016-01-09 23:50:42 +00:00
// set postfields using what we extracted from the form
2016-01-09 23:50:42 +00:00
$POSTFIELDS = http_build_query($fields);
// set post options
2016-01-09 23:50:42 +00:00
curl_setopt($ch, CURLOPT_POST, 1);
curl_setopt($ch, CURLOPT_POSTFIELDS, $POSTFIELDS);
// perform login
2016-01-09 23:50:42 +00:00
$result = curl_exec($ch);
2013-03-07 05:33:39 +00:00
if (stristr($result, "Username/password incorrect"))
{
$this->session->set_flashdata('warning', 'Your ARRL username and/or password is incorrect.'); redirect('lotw/status');
}
2016-01-09 23:50:42 +00:00
// Now we need to use that cookie and upload the file
// change URL to upload destination URL
curl_setopt($ch, CURLOPT_URL, $config['lotw_login_url']);
2016-01-09 23:50:42 +00:00
// Grab the file
$postfile = array(
"upfile"=>"@./uploads/".$data['upload_data']['file_name'],
);
2016-01-09 23:50:42 +00:00
//Upload it
2016-01-09 23:50:42 +00:00
curl_setopt($ch, CURLOPT_POSTFIELDS, $postfile);
$response = curl_exec($ch);
2013-03-07 05:33:39 +00:00
if (stristr($response, "accepted"))
{
$this->session->set_flashdata('lotw_status', 'accepted');
$data['page_title'] = "LoTW .TQ8 Sent";
2016-01-09 23:50:42 +00:00
}
2013-03-07 05:33:39 +00:00
elseif (stristr($response, "rejected"))
{
$this->session->set_flashdata('lotw_status', 'rejected');
$data['page_title'] = "LoTW .TQ8 Sent";
}
else
{
// If we're here, we didn't find what we're looking for in the ARRL response
// and LoTW is probably down or broken.
$this->session->set_flashdata('warning', 'Did not receive proper response from LoTW. Try again later.');
$data['page_title'] = "LoTW .TQ8 Not Sent";
}
2016-01-09 23:50:42 +00:00
// Now we need to clean up
unlink($cookie_file_path);
unlink('./uploads/'.$data['upload_data']['file_name']);
2016-01-09 23:50:42 +00:00
2019-01-14 16:29:06 +00:00
$this->load->view('interface_assets/header', $data);
2013-03-07 05:33:39 +00:00
$this->load->view('lotw/status');
2019-01-14 16:29:06 +00:00
$this->load->view('interface_assets/footer');
2016-01-09 23:50:42 +00:00
}
}
2016-01-09 23:50:42 +00:00
/*
Load the ARRL LOTW User Activity CSV into LOTW User Table for cross checking when logging
*/
function load_users() {
set_time_limit(0);
$this->load->model('lotw_user');
$this->lotw_user->empty_table();
$row = 1;
if (($handle = fopen("https://lotw.arrl.org/lotw-user-activity.csv", "r")) !== FALSE) {
while (($data = fgetcsv($handle, 1000, ",")) !== FALSE) {
$num = count($data);
$row++;
if(isset($data[2])) {
$callsign = $data[0];
$upload_date = $data[1]." ".$data[2];
$this->lotw_user->add_lotwuser($callsign, $upload_date);
}
}
fclose($handle);
}
}
/*
Check if callsign is an active LOTW user and return whether its true or not
*/
function lotw_usercheck($callsign) {
$this->load->model('lotw_user');
$lotw_user_result = $this->lotw_user->check($callsign);
}
function signlog() {
2020-08-13 22:03:25 +00:00
$qso_string = "14IO87IPEU-0052770CM2MG0IIQ435.355562145.878136FMSAT2020-08-1212:10:53ZAO-92";
2020-08-13 22:03:25 +00:00
$key = "";
$pkeyid = openssl_pkey_get_private($key, 'peter');
2020-08-13 22:03:25 +00:00
//openssl_sign($plaintext, $signature, $pkeyid, OPENSSL_ALGO_SHA1 );
//openssl_free_key($pkeyid);
2020-08-13 22:03:25 +00:00
if(openssl_sign($qso_string, $signature, $pkeyid, OPENSSL_ALGO_SHA1)) {
openssl_free_key($pkeyid);
$signature_b64 = base64_encode($signature);
echo($signature_b64."\n");
}
}
2016-01-09 23:50:42 +00:00
} // end class