#!/usr/bin/php -q /dev/null") ?: ""; } function anonymize($text,$select) { global $all, $customShares; if ($all) return $text; switch ($select) { case 1: $rows = explode("\n", $text); $regex = "/\b((disk|cache|parity|cpu|eth|dev)[0-9]+)|(smart|flash|flashbackup|cache|parity|cpu$customShares)\b/"; foreach ($rows as &$row) { if (!preg_match($regex, $row)) { $row = preg_replace("/^(\s*\[\S).*(\S\])( => Array)$/","$1..$2$3",$row); $row = preg_replace("/^(\s*\[(cachePool|name|nameOrig|comment|flashGUID|regGUID|regTo|readList|writeList|csrf_token)\] => \S).*(\S)$/","$1..$3",$row); } } return implode("\n", $rows); case 2: $name = basename($text,'.cfg'); if ($name !== "cache") { $len = strlen($name); if ($len>2) { $dash = str_repeat('-',$len-2); $name = preg_replace("/^(\S).*(\S)/","$1$dash$2",$name); $i = 1; while (file_exists(dirname($text)."/$name.cfg")) {$name = substr($name,0,$len)." ($i)"; $i++;} } } return dirname($text)."/$name.cfg"; } } function prefix($key) { return preg_replace('/\d+$/','',$key); } function cache_only($disk) { return $disk['type']=='Cache'; } function cache_filter($disks) { return array_filter($disks,'cache_only'); } function pools_filter($disks) { return array_unique(array_map('prefix',array_keys(cache_filter($disks)))); } function download_url($url, $path = "", $bg = false, $timeout = 15) { $ch = curl_init(); curl_setopt($ch,CURLOPT_URL,$url); curl_setopt($ch,CURLOPT_FRESH_CONNECT,true); curl_setopt($ch,CURLOPT_RETURNTRANSFER,true); curl_setopt($ch,CURLOPT_CONNECTTIMEOUT,10); curl_setopt($ch,CURLOPT_TIMEOUT,$timeout); curl_setopt($ch,CURLOPT_ENCODING,""); curl_setopt($ch,CURLOPT_RETURNTRANSFER,true); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true); $out = curl_exec($ch); curl_close($ch); if ( $path ) file_put_contents($path,$out); return $out ?: false; } function geturls_certdetails($file, $hostname) { // called by the geturls() function // best to ensure the file exists before calling this function if (!file_exists($file)) return ['', '']; // read the cert $data = null; exec("/usr/bin/openssl x509 -noout -subject -nameopt multiline -in ".escapeshellarg($file), $data); $data = implode("\n", $data); // determine cn preg_match('/ *commonName *= (.*)/', $data, $matches); $cn = trim($matches[1]); // replace wildcard with hostname $cn = str_replace('*', $hostname, $cn); $cn_priv = $cn; // anonymize Unraid.net hash $cn_priv = preg_replace('/.*\.unraid\.net/', 'hash.unraid.net', $cn_priv); // determine type $type = 'user-provided'; if (strpos($data, "Self-signed") !== false) $type = 'self-signed'; if (strpos($cn, ".unraid.net") !== false) $type = 'unraid.net'; return [$cn, $cn_priv, $type]; } function geturls_checkhost($host, $hostpriv="") { // called by the geturls() function // the 'host' command will fail if there is no TLD or if it is ".local", so skip it if (strpos($host, '.') === false || strpos($host, '.local') !== false) { return ''; } if (!$hostpriv) $hostpriv = $host; $output = $result = null; exec("/usr/bin/host ".escapeshellarg($host), $output, $result); return ($result != 0) ? " ERROR: the host {$hostpriv} does not resolve on this network\n" : ''; } function geturls() { $var = parse_ini_file('/var/local/emhttp/var.ini'); extract(parse_ini_file('/var/local/emhttp/network.ini',true)); $internalip = $internalip_msg = $eth0['IPADDR:0']; if (filter_var($internalip, FILTER_VALIDATE_IP, FILTER_FLAG_NO_PRIV_RANGE)) { $internalip = "ipaddress"; $internalip_msg = "redacted (FYI - this system has a routable IP address, ensure it is behind a firewall)"; } $host_tld_msg = $var['LOCAL_TLD'] ? '': '[blank] (FYI - a blank TLD can cause issues for Mac and Linux clients)'; $rebindip = "192.168.42.42"; $rebindtest_ip = exec("host -4 rebindtest.unraid.net 2>/dev/null|sed -n 's/.*has address //p'"); $rebind_msg = ($rebindtest_ip != $rebindip) ? "is enabled, hash.unraid.net urls will not work" : "is disabled, hash.unraid.net urls will work"; // show raw data from config files $urls = ''; $urls .= "Server Name: {$var['NAME']}\n"; $urls .= "Local TLD: {$var['LOCAL_TLD']}{$host_tld_msg}\n"; $urls .= "HTTP port: {$var['PORT']}\n"; $urls .= "HTTPS port: {$var['PORTSSL']}\n"; $urls .= "Internal IP: {$internalip_msg}\n"; $urls .= "USE SSL: {$var['USE_SSL']}\n"; $urls .= "DNS Rebinding Protection {$rebind_msg} on this network\n\n"; $urls .= "Available URLs:\n (the URL marked with an asterisk is the primary url for this server)\n"; // calculate variables $cert_path = "/boot/config/ssl/certs/"; $host_name = $var['NAME']; $host_tld = $var['LOCAL_TLD'] ? ".{$var['LOCAL_TLD']}" : ''; $expected_host = "{$host_name}{$host_tld}"; $http_port = $var['PORT'] != 80 ? ":{$var['PORT']}" : ''; $https_port = $var['PORTSSL'] != 443 ? ":{$var['PORTSSL']}" : ''; $http_primary = $https_1_primary = $https_2_primary = $http_msg = $https_1_msg = ''; switch($var['USE_SSL']) { case "no": $http_primary = '*'; break; case "yes": $https_1_primary = '*'; $http_msg = "\n (this will redirect to the primary url)"; break; case "auto": $https_2_primary = '*'; $http_msg = "\n (this will redirect to the primary url)"; $https_1_msg = "\n (this will redirect to the primary url)"; break; } // calculate http ip url $http_ip_url = "http://{$internalip}{$http_port}"; $urls .= "HTTP IP url: {$http_ip_url}{$http_msg}\n"; // calculate http url $http_url = "http://{$expected_host}{$http_port}"; $urls .= "{$http_primary}HTTP url: {$http_url}{$http_msg}\n"; $urls .= geturls_checkhost($expected_host); // calculate https url - self-signed or user-provided // this is available when USE_SSL != no, and the certificate file exists $https_1_cert = "{$var['NAME']}_unraid_bundle.pem"; if ($var['USE_SSL'] != "no" && file_exists("{$cert_path}{$https_1_cert}")) { [$https_1_host, $https_1_hostpriv, $https_1_type] = geturls_certdetails("{$cert_path}{$https_1_cert}", $var['NAME']); $https_1_url = "https://{$https_1_hostpriv}{$https_port}"; $urls .= "{$https_1_primary}HTTPS url 1 ($https_1_type): {$https_1_url}{$https_1_msg}\n"; $urls .= geturls_checkhost($https_1_host, $https_1_hostpriv); if ($https_1_host != $expected_host) { $urls .= " ERROR: the certificate Subject CN in {$https_1_cert} should be {$expected_host}\n"; } } else { // add a note that this url is not configured $urls .= "HTTPS url 1 (undefined): https://{$expected_host}{$https_port}\n (this url is not configured, it will not work)\n"; $urls .= geturls_checkhost($expected_host); } // calculate https url // this is available if the certificate file exists, regardless of the USE_SSL setting // this is usually an Unraid.net LE cert, but it can also be a user-provided cert $https_2_cert = 'certificate_bundle.pem'; if (file_exists("{$cert_path}{$https_2_cert}")) { [$https_2_host, $https_2_hostpriv, $https_2_type] = geturls_certdetails("{$cert_path}{$https_2_cert}", $var['NAME']); $https_2_url = "https://{$https_2_hostpriv}{$https_port}"; $urls .= "{$https_2_primary}HTTPS url 2 ({$https_2_type}): {$https_2_url}\n"; $urls .= geturls_checkhost($https_2_host, $https_2_hostpriv); if (strpos($https_2_host, ".unraid.net") === false && $https_2_host != $expected_host) { $urls .= " ERROR: the certificate Subject CN in {$https_2_cert} should be {$expected_host}\n"; } } if ($var['USE_SSL'] != "no") { $telnet_disabled = ($var['USE_TELNET'] == "no") ? " (disabled)" : ""; $ssh_disabled = ($var['USE_SSH'] == "no") ? " (disabled)" : ""; $urls .= "\nTip: if DNS goes down and you lose access to the webgui, use telnet{$telnet_disabled}, "; $urls .= "ssh{$ssh_disabled}, or a local keyboard/monitor to run:\n"; $urls .= " use_ssl no\n"; $urls .= "to enable 'HTTP IP url' and make 'HTTP url' the primary url for the system. "; if ($var['USE_SSL'] == "auto") { $urls .= "Or:\n"; $urls .= " use_ssl yes\n"; $urls .= "to make 'HTTPS url 1' the primary."; } $urls .= "\nOnce DNS has been restored, navigate to Settings -> Management Access and set 'Use SSL' back to '{$var['USE_SSL']}'\n"; } // get a list of the certificate files on the flash drive $dirlisting[0] = "{$cert_path}"; if (file_exists($cert_path)) { exec("ls -l ".escapeshellarg($cert_path), $dirlisting); } else { $dirlisting[1] = "Directory not found"; } $urls .= "\n\n".implode("\n", $dirlisting)."\n"; $urls = str_replace("\n", "\r\n", $urls); return $urls; } exert("mkdir -p /boot/logs"); if ($cli) { // script is called from CLI echo "Starting diagnostics collection... "; $server = isset($var['NAME']) ? str_replace(' ','_',strtolower($var['NAME'])) : 'tower'; $date = date('Ymd-Hi'); $diag = "$server-diagnostics-$date"; $zip = "/boot/logs/$diag.zip"; } else { // script is called from GUI $diag = basename($zip, '.zip'); $split = explode('-', $diag); $date = "{$split[2]}-{$split[3]}"; } // don't anonymize system share names $vardomain = (array)@parse_ini_file('/boot/config/domain.cfg'); $vardocker = (array)@parse_ini_file('/boot/config/docker.cfg'); $showshares = []; $showshares[] = current(array_slice(explode('/',$vardomain['IMAGE_FILE']), 3, 1)).'.cfg'; $showshares[] = current(array_slice(explode('/',$vardomain['DOMAINDIR']), 3, 1)).'.cfg'; $showshares[] = current(array_slice(explode('/',$vardomain['MEDIADIR']), 3, 1)).'.cfg'; $showshares[] = current(array_slice(explode('/',$vardomain['DISKDIR']), 3, 1)).'.cfg'; $showshares[] = current(array_slice(explode('/',$vardocker['DOCKER_IMAGE_FILE']), 3, 1)).'.cfg'; $showshares[] = current(array_slice(explode('/',$vardocker['DOCKER_APP_CONFIG_PATH']), 3, 1)).'.cfg'; $showshares[] = current(array_slice(explode('/',$vardocker['DOCKER_HOME']), 3, 1)).'.cfg'; foreach ($showshares as $show) { $showme = str_replace(".cfg","",$show); if ($showme) $customShares .= "|$showme"; } // create folder structure exert("mkdir -p ".escapeshellarg("/$diag/system")." ".escapeshellarg("/$diag/config")." ".escapeshellarg("/$diag/logs")." ".escapeshellarg("/$diag/shares")." ".escapeshellarg("/$diag/smart")." ".escapeshellarg("/$diag/qemu")." ".escapeshellarg("/$diag/xml")); // get utilization of running processes exert("top -bn1 -o%CPU 2>/dev/null|todos >".escapeshellarg("/$diag/system/top.txt")); // make Unraid version reference $unraid = parse_ini_file('/etc/unraid-version'); file_put_contents("/$diag/unraid-".$unraid['version'].".txt",$unraid['version']); // copy ini variables foreach (glob("$get/*.ini") as $file) { $ini = basename($file,".ini"); // skip users file in anonymized mode if ($all || $ini != "users") file_put_contents("/$diag/system/vars.txt",preg_replace(["/\n/","/^Array/"],["\r\n",$ini],anonymize(print_r(parse_ini_file($file,true),true),1)),FILE_APPEND); } // Create loads.txt $cpuload = exert("uptime")." Cores: ".exert("nproc")."\r\n".(string)@file_get_contents("$get/cpuload.ini")."\r\n"; $diskload = (array)@file("$get/diskload.ini"); $disks = (array)@parse_ini_file("$get/disks.ini",true); $loadTxt = []; foreach ($diskload as $loadLine) { $load = explode('=',$loadLine); foreach ($disks as $disk) { if ($load[0]==$disk['device']) { $loadTxt[] = "{$disk['device']} ({$disk['name']})=".trim($load[1]); break; } } } file_put_contents("/$diag/system/loads.txt",$cpuload.implode("\r\n",$loadTxt)); // individual commands execution (suppress errors) exert("lscpu 2>/dev/null|todos >".escapeshellarg("/$diag/system/lscpu.txt")); exert("lsscsi -vgl 2>/dev/null|todos >".escapeshellarg("/$diag/system/lsscsi.txt")); exert("lspci -knn 2>/dev/null|todos >".escapeshellarg("/$diag/system/lspci.txt")); exert("lsusb 2>/dev/null|todos >".escapeshellarg("/$diag/system/lsusb.txt")); exert("free -mth 2>/dev/null|todos >".escapeshellarg("/$diag/system/memory.txt")); exert("ps -auxf --sort=-pcpu 2>/dev/null|todos >".escapeshellarg("/$diag/system/ps.txt")); exert("lsof -Pni 2>/dev/null|todos >".escapeshellarg("/$diag/system/lsof.txt")); exert("lsmod|sort 2>/dev/null|todos >".escapeshellarg("/$diag/system/lsmod.txt")); exert("df -h 2>/dev/null|todos >".escapeshellarg("/$diag/system/df.txt")); exert("ifconfig -a -s 2>/dev/null|grep -Po '^(eth|bond)[0-9]+'", $ports); exert("dmidecode -qt2|awk -F: '/^\tManufacturer:/{m=\$2};/^\tProduct Name:/{p=\$2} END{print m\" -\"p}' 2>/dev/null|todos >".escapeshellarg("/$diag/system/motherboard.txt")); exert("dmidecode -qt0 2>/dev/null|todos >>".escapeshellarg("/$diag/system/motherboard.txt")); exert("cat /proc/meminfo 2>/dev/null|todos >".escapeshellarg("/$diag/system/meminfo.txt")); exert("dmidecode --type 17 2>/dev/null|todos >>".escapeshellarg("/$diag/system/meminfo.txt")); // create ethernet information information (suppress errors) foreach ($ports as $port) { exert("ethtool ".escapeshellarg($port)." 2>/dev/null|todos >>".escapeshellarg("/$diag/system/ethtool.txt")); file_put_contents("/$diag/system/ethtool.txt", "\r\n", FILE_APPEND); exert("ethtool -i ".escapeshellarg($port)." 2>/dev/null|todos >>".escapeshellarg("/$diag/system/ethtool.txt")); file_put_contents("/$diag/system/ethtool.txt", "--------------------------------\r\n", FILE_APPEND); } exert("ifconfig -a 2>/dev/null|todos >".escapeshellarg("/$diag/system/ifconfig.txt")); // create system information (suppress errors) exert("find /sys/kernel/iommu_groups/ -type l 2>/dev/null|sort -V|todos >".escapeshellarg("/$diag/system/iommu_groups.txt")); exert("todos ".escapeshellarg("/$diag/system/cmdline.txt")); // create folder structure listing $dest = "/$diag/system/folders.txt"; foreach ($folders as $folder) { if (is_dir($folder)) exert("echo -ne ".escapeshellarg("\r\n$folder\r\n")." >>".escapeshellarg($dest).";ls -l ".escapeshellarg($folder)."|todos >>".escapeshellarg("$dest")); else exert("echo -ne ".escapeshellarg("\r\n$folder\r\nfolder does not exist\r\n")." >>".escapeshellarg("$dest")); } // copy configuration files (suppress errors) exert("cp /boot/config/*.{cfg,conf,dat} ".escapeshellarg("/$diag/config")." 2>/dev/null"); exert("cp /boot/config/go ".escapeshellarg("/$diag/config/go.txt")." 2>/dev/null"); if (!$all) exert("sed -i -e '/password/c ***line removed***' -e '/user/c ***line removed***' -e '/pass/c ***line removed***' ".escapeshellarg("/$diag/config/go.txt")); // anonymize configuration files if (!$all) exert("sed -ri 's/^((disk|flash)(Read|Write)List.*=\")[^\"]+/\\1.../' ".escapeshellarg("/$diag/config/*.cfg")." 2>/dev/null"); // copy share information (anonymize if applicable) $files = glob("/boot/config/shares/*.cfg"); foreach ($files as $file) { $dest = "/$diag/shares/".basename($file); if (!in_array(basename($file),$showshares)) { $dest = anonymize($dest,2); } @copy($file, $dest); if (!$all) exert("sed -ri 's/^(share(Comment|ReadList|WriteList)=\")[^\"]+/\\1.../' ".escapeshellarg($dest)." 2>/dev/null"); $share = pathinfo(basename($file),PATHINFO_FILENAME); $shareExists = explode(",",shareDisks($share)); unset($exists); foreach ($shareExists as $anon) { if ( !$all ) if (!preg_match("/\b((disk)[0-9]+)|(cache)\b/", $anon)) { $len = strlen($anon); if ($len>2) { $dash = str_repeat('-',$len-2); $exists[] = substr($anon,0,1).$dash.substr($anon,-1); } } else $exists[] = $anon; } $shareDisk .= $exists ? str_pad(pathinfo($dest,PATHINFO_FILENAME),34).str_pad(exec("cat ".escapeshellarg($file)." | grep shareUseCache"),22)." Exists on ".implode(", ",$exists)."\r\n" : ""; $exists = $exists ?: ["no drives"]; file_put_contents($dest,"# Share exists on ".implode(", ",$exists)."\r\n",FILE_APPEND); } file_put_contents("/$diag/shares/shareDisks.txt",$shareDisk); // create default user shares information $shares = (array)@parse_ini_file("$get/shares.ini", true); foreach ($shares as $share) { $name = $share['name']; if (!in_array("/boot/config/shares/$name.cfg",$files)) file_put_contents(anonymize("/$diag/shares/$name.cfg",2),"# This share has default settings.\r\n# Share exists on ".shareDisks($name)."\r\n"); } // copy pools information (anonymize) $files = glob("/boot/config/pools/*.cfg"); @mkdir("/$diag/config/pools"); foreach ($files as $file) { $dest = anonymize("/$diag/config/pools/".basename($file),2); @copy($file,$dest); } // copy modprobe information $files = glob("/boot/config/modprobe.d/*.conf"); if ($files) { @mkdir("/$diag/config/modprobe.d"); foreach ($files as $file) { $dest = "/$diag/config/modprobe.d/".basename($file); @copy($file,$dest); } } // copy docker information (if existing) $max = 1*1024*1024; //=1MB $docker = "/var/log/docker.log"; if (file_exists($docker)) { $log = "/$diag/logs/docker"; exert("todos <$docker >".escapeshellarg("$log.txt")); if (filesize($docker)>=$max) { exert("tail -n 200 ".escapeshellarg("$log.txt")." >".escapeshellarg("$log.last200.txt")); exert("truncate -s '<$max' ".escapeshellarg("$log.txt")); } } // create SMART reports (suppress errors) $disks = (array)@parse_ini_file("$get/disks.ini", true); include_once "$docroot/webGui/include/CustomMerge.php"; include_once "$docroot/webGui/include/Wrappers.php"; exert("ls -l /dev/disk/by-id/[asun]* 2>/dev/null|sed '/-part/d;s|^.*/by-id/[^-]*-||;s|-> ../../||;s|:|-|'", $devices); foreach ($devices as $device) { list($name,$port) = explode(' ',$device); $diskName = ''; $type = ''; foreach ($disks as $find) { if ($find['device']==$port) { $diskName = $find['name']; $type = get_value($find,'smType',''); get_ctlr_options($type, $find); $port = $find['smDevice'] ?? $port; break; } } $port = port_name($port); $status = $find['status'] == "DISK_OK" ? "" : " - {$find['status']}"; exert("smartctl -x $type ".escapeshellarg("/dev/$port")." 2>/dev/null|todos >".escapeshellarg("/$diag/smart/$name-$date $diskName ($port)$status.txt")); } // create pool btrfs information foreach (pools_filter($disks) as $pool) { if (strpos($disks[$pool]['fsType'],'btrfs')!==false) { exert("echo 'Pool: $pool'|todos >>".escapeshellarg("/$diag/system/btrfs-usage.txt")); exert("/sbin/btrfs filesystem usage -T /mnt/$pool 2>/dev/null|todos >>".escapeshellarg("/$diag/system/btrfs-usage.txt")); } } // create installed plugin information $pluginList = json_decode(download_url("https://raw.githubusercontent.com/Squidly271/AppFeed/master/pluginList.json"),true); if ( ! $pluginList ) $installedPlugins = "Could not download current plugin versions\r\n\r\n"; $plugins = glob("/var/log/plugins/*.plg"); foreach ($plugins as $plugin) { $plgVer = exert("plugin version ".escapeshellarg($plugin)); $plgURL = exert("plugin pluginURL ".escapeshellarg($plugin)); $installedPlugins .= basename($plugin)." - $plgVer"; if ( $pluginList && ! $pluginList[$plgURL] && basename($plugin) !== "unRAIDServer.plg") $installedPlugins .= " (Unknown to Community Applications)"; if ( $pluginList[$plgURL]['blacklist'] ) $installedPlugins .= " (Blacklisted)"; if ( $pluginList[$plgURL]['deprecated'] || ( $pluginList[$plgURL]['dmax'] && version_compare($pluginList[$plgURL]['dmax'],$unraid['version'],"<") ) ) $installedPlugins .= " (Deprecated)"; if ( $pluginList[$plgURL]['version'] > $plgVer ) $installedPlugins .= " (Update available: {$pluginList[$plgURL]['version']})"; elseif ($pluginList[$plgURL]) $installedPlugins .= " (Up to date)"; if ( $pluginList[$plgURL]['max'] && version_compare($pluginList[$plgURL]['max'],$unraid['version'],"<") ) $installedPlugins .= " (Incompatible)"; if ( $pluginList[$plgURL]['min'] && version_compare($pluginList[$plgURL]['min'],$unraid['version'],">") ) $installedPlugins .= " (Incompatible)"; $installedPlugins .= "\r\n"; } $installedPlugins = $installedPlugins ?: "No additional Plugins Installed"; file_put_contents("/$diag/system/plugins.txt",$installedPlugins); // determine urls file_put_contents("/$diag/system/urls.txt",geturls()); // copy libvirt information (if existing) $libvirtd = "/var/log/libvirt/libvirtd.log"; if (file_exists($libvirtd)) { $log = "/$diag/logs/libvirt"; exert("todos <$libvirtd >".escapeshellarg("$log.txt")); if (filesize($libvirtd)>=$max) { exert("tail -n 200 ".escapeshellarg("$log.txt")." >".escapeshellarg("$log.last200.txt")); exert("truncate -s '<$max' ".escapeshellarg("$log.txt")); } } // copy VMs information (if existing) $qemu = glob("/var/log/libvirt/qemu/*.log*"); if ($qemu) { foreach ($qemu as $file) { $log = "/$diag/qemu/".basename($file,'.log'); exert("todos <".escapeshellarg($file)." >".escapeshellarg("$log.txt")); if (filesize($file)>=$max) { exert("tail -n 200 ".escapeshellarg("$log.txt")." >".escapeshellarg("$log.last200.txt")); exert("truncate -s '<$max' ".escapeshellarg("$log.txt")); } } } else { file_put_contents("/$diag/qemu/no qemu log files",""); } // copy VM XML config files exert("cp /etc/libvirt/qemu/*.xml ".escapeshellarg("/$diag/xml")." 2>/dev/null"); // anonymize MAC OSK info $all_xml = glob("/$diag/xml/*.xml"); foreach ($all_xml as $xml) { exert("sed -ri 's/(,osk=).+/\\1.../' ".escapeshellarg("$xml")." 2>/dev/null"); exert("sed -ri 's/(passwd=).+/\\1.../' ".escapeshellarg("$xml")." 2>/dev/null"); } // copy syslog information (anonymize if applicable) $max = 2*1024*1024; //=2MB foreach (glob("/var/log/syslog*") as $file) { $log = "/$diag/logs/".basename($file); exert("todos <".escapeshellarg($file)." >".escapeshellarg("$log.txt")); if (!$all) { unset($titles,$rows); exert("grep -Po 'logger: moving \"\K[^\"]+' ".escapeshellarg("$log.txt")." 2>/dev/null|sort|uniq", $titles); exert("sed -ri 's|\b\S+@\S+\.\S+\b|email@removed.com|;s|\b(username\|password)([=:])\S+\b|\\1\\2xxx|;s|(GUID: \S)\S+(\S) |\\1..\\2 |;s|(moving \"\S\|\"/mnt/user/\S).*(\S)\"|\\1..\\2\"|' ".escapeshellarg("$log.txt")); exert("sed -ri 's|(host: \").+(\.unraid\.net(:[0-9]+)?\")|\\1hash\\2|;s|(referrer: \"https?://).+(\.unraid\.net)|\\1hash\\2|' ".escapeshellarg("$log.txt")); foreach ($titles as $mover) { $title = "/{$mover[0]}..".substr($mover,-1)."/..."; exert("sed -ri 's|(logger: [.>cr].*)[ /]$mover/.*$|\\1 file: $title|' ".escapeshellarg("$log.txt")." 2>/dev/null"); } exert("grep -n ' cache_dirs: -' ".escapeshellarg("$log.txt")." 2>/dev/null|cut -d: -f1", $rows); for ($i = 0; $i < count($rows); $i += 2) for ($row = $rows[$i]+1; $row < $rows[$i+1]; $row++) exert("sed -ri '$row s|(cache_dirs: \S).*(\S)|\\1..\\2|' ".escapeshellarg("$log.txt")." 2>/dev/null"); } // replace consecutive repeated lines in syslog exert("awk -i inplace '{if(s!=substr(\$0,17)){if(x>0)print\"### [PREVIOUS LINE REPEATED \"x\" TIMES] ###\\r\";print;x=0}else{x++}s=substr(\$0,17)}END{if(x>0)print\"### [PREVIOUS LINE REPEATED \"x\" TIMES] ###\\r\"}' ".escapeshellarg("$log.txt")); // remove SHA256 hashes exert("sed -ri 's/(SHA256:).+[^\s\b]/SHA256:***REMOVED***/gm' $log.txt"); // truncate syslog if too big if (basename($file)=='syslog' && filesize($file)>=$max) exert("tail -n 200 ".escapeshellarg("$log.txt")." >".escapeshellarg("$log.last200.txt")); exert("truncate -s '<$max' ".escapeshellarg("$log.txt")); } // copy dhcplog $dhcplog = "/var/log/dhcplog"; if (file_exists($dhcplog)) { $log = "/$diag/logs/dhcplog.txt"; exert("todos <$dhcplog >".escapeshellarg($log)); } // copy graphql-api.log $graphql = "/var/log/graphql-api.log"; if (file_exists($graphql)) { $log = "/$diag/logs/graphql-api.txt"; exert("todos <$graphql >".escapeshellarg($log)); } // copy vfio-pci log $vfiopci = "/var/log/vfio-pci"; if (file_exists($vfiopci)) { $log = "/$diag/logs/vfio-pci.txt"; exert("todos <$vfiopci >".escapeshellarg($log)); } // generate unraid-api.txt if (file_exists("/usr/local/sbin/unraid-api")) { $log = "/$diag/system/unraid-api.txt"; exert("unraid-api report | todos >".escapeshellarg($log)); } // create resulting zip file and remove temp folder exert("zip -qmr ".escapeshellarg($zip)." ".escapeshellarg("/$diag")); if ($cli) { echo "done.\nZIP file '$zip' created.\n"; } else { copy($zip,"/boot/logs/".basename($zip)); } publish("diagnostic",basename($zip)."FINISHED"); ?>