mirror of
https://github.com/jomjol/AI-on-the-edge-device.git
synced 2026-01-30 22:32:51 +03:00
test1
This commit is contained in:
@@ -1,31 +1,3 @@
|
||||
function SaveConfigToServer(_domainname){
|
||||
// leere Zeilen am Ende löschen
|
||||
var zw = config_split.length - 1;
|
||||
|
||||
while (config_split[zw] == "") {
|
||||
config_split.pop();
|
||||
}
|
||||
|
||||
var config_gesamt = "";
|
||||
|
||||
for (var i = 0; i < config_split.length; ++i)
|
||||
{
|
||||
config_gesamt = config_gesamt + config_split[i] + "\n";
|
||||
}
|
||||
|
||||
FileDeleteOnServer("/config/config.ini", _domainname);
|
||||
|
||||
FileSendContent(config_gesamt, "/config/config.ini", _domainname);
|
||||
}
|
||||
|
||||
function UpdateConfig(zw, _index, _enhance, _domainname){
|
||||
var namezw = zw["name"];
|
||||
FileCopyOnServer("/img_tmp/ref_zw.jpg", namezw, _domainname);
|
||||
var namezw = zw["name"].replace(".jpg", "_org.jpg");
|
||||
FileCopyOnServer("/img_tmp/ref_zw_org.jpg", namezw, _domainname);
|
||||
}
|
||||
|
||||
|
||||
function createReader(file) {
|
||||
var image = new Image();
|
||||
|
||||
@@ -43,32 +15,26 @@ function createReader(file) {
|
||||
reader.readAsDataURL(file);
|
||||
}
|
||||
|
||||
|
||||
function ZerlegeZeile(input, delimiter = " =\t\r") {
|
||||
function split_line(input, delimiter = " =\t\r") {
|
||||
var Output = Array(0);
|
||||
// delimiter = " =,\t";
|
||||
|
||||
/* The input can have multiple formats:
|
||||
* - key = value
|
||||
* - key = value1 value2 value3 ...
|
||||
* - key value1 value2 value3 ...
|
||||
*
|
||||
* Examples:
|
||||
* - ImageSize = VGA
|
||||
* - IO0 = input disabled 10 false false
|
||||
* - main.dig1 28 144 55 100 false
|
||||
*
|
||||
* This causes issues eg. if a password key has a whitespace or equal sign in its value.
|
||||
* As a workaround and to not break any legacy usage, we enforce to only use the
|
||||
* equal sign, if the key is "password"
|
||||
*/
|
||||
if (input.includes("password") || input.includes("Token")) { // Line contains a password, use the equal sign as the only delimiter and only split on first occurrence
|
||||
var upper_input = input.toUpperCase();
|
||||
|
||||
// if (input.includes("password") || input.includes("EapId") || input.includes("Token") || input.includes("ApiKey") || input.includes("http_password")) {
|
||||
if (upper_input.includes("PASSWORD") || upper_input.includes("EAPID") || upper_input.includes("TOKEN") || upper_input.includes("APIKEY") || upper_input.includes("HTTP_PASSWORD")) {
|
||||
var pos = input.indexOf("=");
|
||||
delimiter = " \t\r"
|
||||
delimiter = " \t\r";
|
||||
Output.push(trim(input.substr(0, pos), delimiter));
|
||||
Output.push(trim(input.substr(pos +1, input.length), delimiter));
|
||||
|
||||
var is_pw_encrypted = input.substr(pos + 2, 6);
|
||||
|
||||
if (is_pw_encrypted == "**##**") {
|
||||
Output.push(encryptDecrypt(input.substr(pos + 8, input.length)));
|
||||
}
|
||||
else {
|
||||
Output.push(trim(input.substr(pos + 1, input.length), delimiter));
|
||||
}
|
||||
}
|
||||
else { // Legacy Mode
|
||||
else {
|
||||
input = trim(input, delimiter);
|
||||
var pos = findDelimiterPos(input, delimiter);
|
||||
var token;
|
||||
@@ -77,7 +43,8 @@ function ZerlegeZeile(input, delimiter = " =\t\r") {
|
||||
token = input.substr(0, pos);
|
||||
token = trim(token, delimiter);
|
||||
Output.push(token);
|
||||
input = input.substr(pos+1, input.length);
|
||||
|
||||
input = input.substr(pos + 1, input.length);
|
||||
input = trim(input, delimiter);
|
||||
pos = findDelimiterPos(input, delimiter);
|
||||
}
|
||||
@@ -86,33 +53,31 @@ function ZerlegeZeile(input, delimiter = " =\t\r") {
|
||||
}
|
||||
|
||||
return Output;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
function findDelimiterPos(input, delimiter) {
|
||||
var pos = -1;
|
||||
var zw;
|
||||
var input_temp;
|
||||
var akt_del;
|
||||
|
||||
for (var anz = 0; anz < delimiter.length; ++anz) {
|
||||
akt_del = delimiter[anz];
|
||||
zw = input.indexOf(akt_del);
|
||||
input_temp = input.indexOf(akt_del);
|
||||
|
||||
if (zw > -1) {
|
||||
if (input_temp > -1) {
|
||||
if (pos > -1) {
|
||||
if (zw < pos) {
|
||||
pos = zw;
|
||||
if (input_temp < pos) {
|
||||
pos = input_temp;
|
||||
}
|
||||
}
|
||||
else {
|
||||
pos = zw;
|
||||
pos = input_temp;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return pos;
|
||||
}
|
||||
|
||||
|
||||
function trim(istring, adddelimiter) {
|
||||
while ((istring.length > 0) && (adddelimiter.indexOf(istring[0]) >= 0)) {
|
||||
@@ -126,27 +91,6 @@ function trim(istring, adddelimiter) {
|
||||
return istring;
|
||||
}
|
||||
|
||||
|
||||
function getConfig() {
|
||||
return config_gesamt;
|
||||
}
|
||||
|
||||
|
||||
function loadConfig(_domainname) {
|
||||
var xhttp = new XMLHttpRequest();
|
||||
|
||||
try {
|
||||
url = _domainname + '/fileserver/config/config.ini';
|
||||
xhttp.open("GET", url, false);
|
||||
xhttp.send();
|
||||
config_gesamt = xhttp.responseText;
|
||||
config_gesamt = config_gesamt.replace("InitalRotate", "InitialRotate"); // Korrigiere Schreibfehler in config.ini !!!!!
|
||||
} catch (error) {}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
|
||||
function dataURLtoBlob(dataurl) {
|
||||
var arr = dataurl.split(','), mime = arr[0].match(/:(.*?);/)[1],
|
||||
bstr = atob(arr[1]), n = bstr.length, u8arr = new Uint8Array(n);
|
||||
@@ -157,7 +101,6 @@ function dataURLtoBlob(dataurl) {
|
||||
|
||||
return new Blob([u8arr], {type:mime});
|
||||
}
|
||||
|
||||
|
||||
function FileCopyOnServer(_source, _target, _domainname = "") {
|
||||
url = _domainname + "/editflow?task=copy&in=" + _source + "&out=" + _target;
|
||||
@@ -169,7 +112,6 @@ function FileCopyOnServer(_source, _target, _domainname = "") {
|
||||
} catch (error) {}
|
||||
}
|
||||
|
||||
|
||||
function FileDeleteOnServer(_filename, _domainname = "") {
|
||||
var xhttp = new XMLHttpRequest();
|
||||
var okay = false;
|
||||
@@ -179,14 +121,6 @@ function FileDeleteOnServer(_filename, _domainname = "") {
|
||||
if (xhttp.status == 200) {
|
||||
okay = true;
|
||||
}
|
||||
else if (xhttp.status == 0) {
|
||||
// firework.launch('Server closed the connection abruptly!', 'danger', 30000);
|
||||
// location.reload()
|
||||
}
|
||||
else {
|
||||
// firework.launch('An error occured: ' + xhttp.responseText, 'danger', 30000);
|
||||
// location.reload()
|
||||
}
|
||||
}
|
||||
};
|
||||
|
||||
@@ -199,7 +133,6 @@ function FileDeleteOnServer(_filename, _domainname = "") {
|
||||
return okay;
|
||||
}
|
||||
|
||||
|
||||
function FileSendContent(_content, _filename, _domainname = "") {
|
||||
var xhttp = new XMLHttpRequest();
|
||||
var okay = false;
|
||||
@@ -227,11 +160,10 @@ function FileSendContent(_content, _filename, _domainname = "") {
|
||||
return okay;
|
||||
}
|
||||
|
||||
|
||||
function MakeRefImageZW(zw, _enhance, _domainname){
|
||||
var _filename = zw["name"].replace("/config/", "/img_tmp/");
|
||||
function MakeTempRefImage(_filename, _enhance, _domainname){
|
||||
var filename = _filename["name"].replace("/config/", "/img_tmp/");
|
||||
|
||||
var url = _domainname + "/editflow?task=cutref&in=/config/reference.jpg&out=" + _filename + "&x=" + zw["x"] + "&y=" + zw["y"] + "&dx=" + zw["dx"] + "&dy=" + zw["dy"];
|
||||
var url = _domainname + "/editflow?task=cutref&in=/config/reference.jpg&out=" + filename + "&x=" + _filename["x"] + "&y=" + _filename["y"] + "&dx=" + _filename["dx"] + "&dy=" + _filename["dy"];
|
||||
|
||||
if (_enhance == true){
|
||||
url = url + "&enhance=true";
|
||||
@@ -257,3 +189,82 @@ function MakeRefImageZW(zw, _enhance, _domainname){
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
// Encrypt password
|
||||
function EncryptPwString(pwToEncrypt) {
|
||||
var _pw_temp = "**##**";
|
||||
var pw_temp = "";
|
||||
|
||||
if (isInString(pwToEncrypt, _pw_temp)) {
|
||||
pw_temp = pwToEncrypt;
|
||||
}
|
||||
else {
|
||||
pw_temp = _pw_temp + encryptDecrypt(pwToEncrypt);
|
||||
}
|
||||
|
||||
return pw_temp;
|
||||
}
|
||||
|
||||
// Decrypt password
|
||||
function DecryptPwString(pwToDencrypt) {
|
||||
var _pw_temp = "**##**";
|
||||
var pw_temp = "";
|
||||
|
||||
if (isInString(pwToDencrypt, _pw_temp))
|
||||
{
|
||||
var _temp = ReplaceString(pwToDencrypt, _pw_temp, "");
|
||||
pw_temp = encryptDecrypt(_temp);
|
||||
}
|
||||
else
|
||||
{
|
||||
pw_temp = pwToDencrypt;
|
||||
}
|
||||
|
||||
return pw_temp;
|
||||
}
|
||||
|
||||
function decryptConfigPwOnSD(_domainname = getDomainname()) {
|
||||
var url = _domainname + "/edit_flow?task=pw_decrypt&config_decrypt=true";
|
||||
var xhttp = new XMLHttpRequest();
|
||||
|
||||
try {
|
||||
xhttp.open("GET", url, false);
|
||||
xhttp.send();
|
||||
} catch (error) {}
|
||||
|
||||
if (xhttp.responseText == "decrypted") {
|
||||
return true;
|
||||
}
|
||||
else {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
function decryptWifiPwOnSD(_domainname = getDomainname()) {
|
||||
var url = _domainname + "/edit_flow?task=pw_decrypt&wifi_decrypt=true";
|
||||
var xhttp = new XMLHttpRequest();
|
||||
|
||||
try {
|
||||
xhttp.open("GET", url, false);
|
||||
xhttp.send();
|
||||
} catch (error) {}
|
||||
|
||||
if (xhttp.responseText == "decrypted") {
|
||||
return true;
|
||||
}
|
||||
else {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
function encryptDecrypt(input) {
|
||||
var key = ['K', 'C', 'Q']; //Can be any chars, and any size array
|
||||
var output = [];
|
||||
|
||||
for (var i = 0; i < input.length; i++) {
|
||||
var charCode = input.charCodeAt(i) ^ key[i % key.length].charCodeAt(0);
|
||||
output.push(String.fromCharCode(charCode));
|
||||
}
|
||||
|
||||
return output.join("");
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user