readconfigcommon.js 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270
  1. function createReader(file) {
  2. var image = new Image();
  3. reader.onload = function(evt) {
  4. var image = new Image();
  5. image.onload = function(evt) {
  6. var width = this.width;
  7. var height = this.height;
  8. };
  9. image.src = evt.target.result;
  10. };
  11. reader.readAsDataURL(file);
  12. }
  13. function split_line(input, delimiter = " =\t\r") {
  14. var Output = Array(0);
  15. var upper_input = input.toUpperCase();
  16. // if (input.includes("password") || input.includes("EapId") || input.includes("Token") || input.includes("ApiKey") || input.includes("http_password")) {
  17. if (upper_input.includes("PASSWORD") || upper_input.includes("EAPID") || upper_input.includes("TOKEN") || upper_input.includes("APIKEY") || upper_input.includes("HTTP_PASSWORD")) {
  18. var pos = input.indexOf("=");
  19. delimiter = " \t\r";
  20. Output.push(trim(input.substr(0, pos), delimiter));
  21. var is_pw_encrypted = input.substr(pos + 2, 6);
  22. if (is_pw_encrypted == "**##**") {
  23. Output.push(encryptDecrypt(input.substr(pos + 8, input.length)));
  24. }
  25. else {
  26. Output.push(trim(input.substr(pos + 1, input.length), delimiter));
  27. }
  28. }
  29. else {
  30. input = trim(input, delimiter);
  31. var pos = findDelimiterPos(input, delimiter);
  32. var token;
  33. while (pos > -1) {
  34. token = input.substr(0, pos);
  35. token = trim(token, delimiter);
  36. Output.push(token);
  37. input = input.substr(pos + 1, input.length);
  38. input = trim(input, delimiter);
  39. pos = findDelimiterPos(input, delimiter);
  40. }
  41. Output.push(input);
  42. }
  43. return Output;
  44. }
  45. function findDelimiterPos(input, delimiter) {
  46. var pos = -1;
  47. var input_temp;
  48. var akt_del;
  49. for (var anz = 0; anz < delimiter.length; ++anz) {
  50. akt_del = delimiter[anz];
  51. input_temp = input.indexOf(akt_del);
  52. if (input_temp > -1) {
  53. if (pos > -1) {
  54. if (input_temp < pos) {
  55. pos = input_temp;
  56. }
  57. }
  58. else {
  59. pos = input_temp;
  60. }
  61. }
  62. }
  63. return pos;
  64. }
  65. function trim(istring, adddelimiter) {
  66. while ((istring.length > 0) && (adddelimiter.indexOf(istring[0]) >= 0)) {
  67. istring = istring.substr(1, istring.length-1);
  68. }
  69. while ((istring.length > 0) && (adddelimiter.indexOf(istring[istring.length-1]) >= 0)) {
  70. istring = istring.substr(0, istring.length-1);
  71. }
  72. return istring;
  73. }
  74. function dataURLtoBlob(dataurl) {
  75. var arr = dataurl.split(','), mime = arr[0].match(/:(.*?);/)[1],
  76. bstr = atob(arr[1]), n = bstr.length, u8arr = new Uint8Array(n);
  77. while(n--){
  78. u8arr[n] = bstr.charCodeAt(n);
  79. }
  80. return new Blob([u8arr], {type:mime});
  81. }
  82. function FileCopyOnServer(_source, _target, _domainname = "") {
  83. url = _domainname + "/editflow?task=copy&in=" + _source + "&out=" + _target;
  84. var xhttp = new XMLHttpRequest();
  85. try {
  86. xhttp.open("GET", url, false);
  87. xhttp.send();
  88. } catch (error) {}
  89. }
  90. function FileDeleteOnServer(_filename, _domainname = "") {
  91. var xhttp = new XMLHttpRequest();
  92. var okay = false;
  93. xhttp.onreadystatechange = function() {
  94. if (xhttp.readyState == 4) {
  95. if (xhttp.status == 200) {
  96. okay = true;
  97. }
  98. }
  99. };
  100. try {
  101. var url = _domainname + "/delete" + _filename;
  102. xhttp.open("POST", url, false);
  103. xhttp.send();
  104. } catch (error) {}
  105. return okay;
  106. }
  107. function FileSendContent(_content, _filename, _domainname = "") {
  108. var xhttp = new XMLHttpRequest();
  109. var okay = false;
  110. xhttp.onreadystatechange = function() {
  111. if (xhttp.readyState == 4) {
  112. if (xhttp.status == 200) {
  113. okay = true;
  114. }
  115. else if (xhttp.status == 0) {
  116. firework.launch('Server closed the connection abruptly!', 'danger', 30000);
  117. }
  118. else {
  119. firework.launch('An error occured: ' + xhttp.responseText, 'danger', 30000);
  120. }
  121. }
  122. };
  123. try {
  124. upload_path = _domainname + "/upload" + _filename;
  125. xhttp.open("POST", upload_path, false);
  126. xhttp.send(_content);
  127. } catch (error) {}
  128. return okay;
  129. }
  130. function MakeTempRefImage(_filename, _enhance, _domainname){
  131. var filename = _filename["name"].replace("/config/", "/img_tmp/");
  132. var url = _domainname + "/editflow?task=cutref&in=/config/reference.jpg&out=" + filename + "&x=" + _filename["x"] + "&y=" + _filename["y"] + "&dx=" + _filename["dx"] + "&dy=" + _filename["dy"];
  133. if (_enhance == true){
  134. url = url + "&enhance=true";
  135. }
  136. var xhttp = new XMLHttpRequest();
  137. try {
  138. xhttp.open("GET", url, false);
  139. xhttp.send();
  140. } catch (error){}
  141. if (xhttp.responseText == "CutImage Done") {
  142. if (_enhance == true) {
  143. firework.launch('Image Contrast got enhanced', 'success', 5000);
  144. }
  145. else {
  146. firework.launch('Alignment Marker have been updated', 'success', 5000);
  147. }
  148. return true;
  149. }
  150. else {
  151. return false;
  152. }
  153. }
  154. // Encrypt password
  155. function EncryptPwString(pwToEncrypt) {
  156. var _pw_temp = "**##**";
  157. var pw_temp = "";
  158. if (isInString(pwToEncrypt, _pw_temp)) {
  159. pw_temp = pwToEncrypt;
  160. }
  161. else {
  162. pw_temp = _pw_temp + encryptDecrypt(pwToEncrypt);
  163. }
  164. return pw_temp;
  165. }
  166. // Decrypt password
  167. function DecryptPwString(pwToDencrypt) {
  168. var _pw_temp = "**##**";
  169. var pw_temp = "";
  170. if (isInString(pwToDencrypt, _pw_temp))
  171. {
  172. var _temp = ReplaceString(pwToDencrypt, _pw_temp, "");
  173. pw_temp = encryptDecrypt(_temp);
  174. }
  175. else
  176. {
  177. pw_temp = pwToDencrypt;
  178. }
  179. return pw_temp;
  180. }
  181. function decryptConfigPwOnSD(_domainname = getDomainname()) {
  182. var url = _domainname + "/edit_flow?task=pw_decrypt&config_decrypt=true";
  183. var xhttp = new XMLHttpRequest();
  184. try {
  185. xhttp.open("GET", url, false);
  186. xhttp.send();
  187. } catch (error) {}
  188. if (xhttp.responseText == "decrypted") {
  189. return true;
  190. }
  191. else {
  192. return false;
  193. }
  194. }
  195. function decryptWifiPwOnSD(_domainname = getDomainname()) {
  196. var url = _domainname + "/edit_flow?task=pw_decrypt&wifi_decrypt=true";
  197. var xhttp = new XMLHttpRequest();
  198. try {
  199. xhttp.open("GET", url, false);
  200. xhttp.send();
  201. } catch (error) {}
  202. if (xhttp.responseText == "decrypted") {
  203. return true;
  204. }
  205. else {
  206. return false;
  207. }
  208. }
  209. function encryptDecrypt(input) {
  210. var key = ['K', 'C', 'Q']; //Can be any chars, and any size array
  211. var output = [];
  212. for (var i = 0; i < input.length; i++) {
  213. var charCode = input.charCodeAt(i) ^ key[i % key.length].charCodeAt(0);
  214. output.push(String.fromCharCode(charCode));
  215. }
  216. return output.join("");
  217. }