-
Notifications
You must be signed in to change notification settings - Fork 4
/
Copy pathArgs.php
94 lines (82 loc) · 3.25 KB
/
Args.php
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
<?php
/*
* This file is part of the Winbox packages.
*
* (c) John Stevenson <[email protected]>
*
* For the full copyright and license information, please view the LICENSE
* file that was distributed with this source code.
*/
namespace Winbox;
class Args
{
/**
* Escapes a string to be used as a shell argument
*
* Provides a more robust method on Windows than escapeshellarg. When $meta
* is true cmd.exe meta-characters will also be escaped. If $module is true,
* the argument will be treated as the name of the module (executable) to
* be invoked, with an additional check for edge-case characters that cannot
* be reliably escaped for cmd.exe. This has no effect if $meta is false.
*
* Feel free to copy this function, but please keep the following notice:
* MIT Licensed (c) John Stevenson <[email protected]>
* See https://github.com/johnstevenson/winbox-args for more information.
*
* @param string $arg The argument to be escaped
* @param bool $meta Additionally escape cmd.exe meta characters
* @param bool $module The argument is the module to invoke
*
* @return string The escaped argument
*/
public static function escape($arg, $meta = true, $module = false)
{
if (!defined('PHP_WINDOWS_VERSION_BUILD')) {
// Escape single-quotes and enclose in single-quotes
return "'".str_replace("'", "'\\''", $arg)."'";
}
// Check for whitespace or an empty value
$quote = strpbrk($arg, " \t") !== false || (string) $arg === '';
// Escape double-quotes and double-up preceding backslashes
$arg = preg_replace('/(\\\\*)"/', '$1$1\\"', $arg, -1, $dquotes);
if ($meta) {
// Check for expansion %..% sequences
$meta = $dquotes || preg_match('/%[^%]+%/', $arg);
if (!$meta) {
// Check for characters that can be escaped in double-quotes
$quote = $quote || strpbrk($arg, '^&|<>()') !== false;
} elseif ($module && !$dquotes && $quote) {
// Caret-escaping a module name with whitespace will split the
// argument, so just quote it and hope there is no expansion
$meta = false;
}
}
if ($quote) {
// Double-up trailing backslashes and enclose in double-quotes
$arg = '"'.preg_replace('/(\\\\*)$/', '$1$1', $arg).'"';
}
if ($meta) {
// Caret-escape all meta characters
$arg = preg_replace('/(["^&|<>()%])/', '^$1', $arg);
}
return $arg;
}
/**
* Escapes an array of arguments that make up a shell command
*
* The first argument must be the module (executable) to be invoked.
*
* @param array $args A list of arguments, with the module name first
* @param bool $meta Additionally escape cmd.exe meta characters
*
* @return string The escaped command line
*/
public static function escapeCommand(array $args, $meta = true)
{
$cmd = self::escape(array_shift($args), $meta, true);
foreach ($args as $arg) {
$cmd .= ' '.self::escape($arg, $meta);
}
return $cmd;
}
}