Fix DB_MySQL_PDO::escape_binary().
[bugdar.git] / login.php
1 <?php
2 /*=====================================================================*\
3 || ###################################################################
4 || # Bugdar
5 || # Copyright 2002-2007 Blue Static
6 || #
7 || # This program is free software; you can redistribute it and/or modify
8 || # it under the terms of the GNU General Public License as published by
9 || # the Free Software Foundation; version 2 of the License.
10 || #
11 || # This program is distributed in the hope that it will be useful, but
12 || # WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
13 || # or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 || # more details.
15 || #
16 || # You should have received a copy of the GNU General Public License along
17 || # with this program; if not, write to the Free Software Foundation, Inc.,
18 || # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
19 || ###################################################################
20 \*=====================================================================*/
21
22 $fetchtemplates = array(
23 'login',
24 'lostpassword',
25 'passwordreset'
26 );
27
28
29 $focus['user'] = 'focus';
30
31 require_once('./global.php');
32 require_once('./includes/api_user.php');
33 require_once('./includes/class_api_error.php');
34
35 APIError(array(new API_Error_Handler($message), 'user_cumulative'));
36
37 // ###################################################################
38
39 if ($bugsys->userinfo['userid'] AND $_REQUEST['do'] != 'logout' AND $_POST['do'] != 'cplogin' AND $_REQUEST['do'] != 'cplogout')
40 {
41 $message->error(T('You are already logged in.'));
42 }
43
44 // ###################################################################
45
46 if (empty($_REQUEST['do']))
47 {
48 eval('$template->flush("' . $template->fetch('login') . '");');
49 }
50
51 // ###################################################################
52
53 if ($_POST['do'] == 'login' OR $_POST['do'] == 'cplogin')
54 {
55 $keeplogin = $bugsys->input_clean('rememberme', TYPE_BOOL);
56 if ($_POST['cplogin'])
57 {
58 $keeplogin = 0;
59 }
60
61 if ($_SERVER['HTTP_REFERER'] AND !$_POST['goindex'])
62 {
63 $url = $_SERVER['HTTP_REFERER'];
64 }
65 else
66 {
67 $url = 'index.php';
68 }
69
70 if ($auth->authenticateLogin($bugsys->in['email'], $bugsys->in['password'], $keeplogin))
71 {
72 if ($_POST['do'] == 'cplogin')
73 {
74 $hash = $funct->rand(90);
75 $db->query("INSERT INTO " . TABLE_PREFIX . "adminsession (sessionid, userid, dateline) VALUES ('$hash', " . $auth->bugdarUser['userid'] . ", " . TIMENOW . ")");
76 $funct->cookie(COOKIE_PREFIX . 'adminsession', $hash, false);
77 }
78 $message->redirect(T('Welcome back! You are now logged in.'), $url);
79 }
80 else
81 {
82 $message->error(T('Invalid email or password.'));
83 }
84 }
85
86 // ###################################################################
87
88 if ($_REQUEST['do'] == 'logout')
89 {
90 if ($bugsys->userinfo['userid'])
91 {
92 $db->query("DELETE FROM " . TABLE_PREFIX . "adminsession WHERE sessionid = '" . $bugsys->input_escape(COOKIE_PREFIX . 'adminsession') . "'");
93 $auth->clearCookies();
94 $funct->cookie(COOKIE_PREFIX . 'adminsession');
95 $message->redirect(T('You have been logged out.'), ($_SERVER['HTTP_REFERER'] ? $_SERVER['HTTP_REFERER'] : 'index.php'));
96 }
97 else
98 {
99 $message->error(T('You need to be logged in to access this feature.'));
100 }
101 }
102
103 // ###################################################################
104
105 if ($_POST['do'] == 'sendpw')
106 {
107 $user = new UserAPI($bugsys);
108 $user->set('email', $bugsys->in['email'], true, false); // don't verify so we don't get errors about existing emails
109 $user->set_condition(array('email'));
110 $user->fetch();
111
112 if ($message->hasErrors())
113 {
114 $show['lostpwerror'] = true;
115 $_REQUEST['do'] = 'lostpw';
116 }
117 else
118 {
119 $activator = $funct->rand(25);
120 $db->query("INSERT INTO " . TABLE_PREFIX . "passwordreset (activatorid, dateline, userid) VALUES ('" . $activator . "', " . TIMENOW . ", " . $user->objdata['userid'] . ")");
121
122 eval('$email = "' . $template->fetch(FetchEmailPath('passwordreset.xml', bugdar::$datastore['language'][$user->objdata['languageid']]['langcode'])) . '";');
123 $email = $bugsys->xml->parse($email);
124
125 $mail->setSubject($email['email']['subject']['value']);
126 $mail->setBodyText($email['email']['bodyText']['value']);
127
128 $mail->send($user->objdata['email'], $user->objdata['displayname']);
129
130 $message->message(sprintf(T('An email has been dispatched to %1$s that contains instructions on how to reset your password.'), $user->objdata['email']));
131 }
132 }
133
134 // ###################################################################
135
136 if ($_REQUEST['do'] == 'lostpw')
137 {
138 eval('$template->flush("' . $template->fetch('lostpassword') . '");');
139 }
140
141 // ###################################################################
142
143 if ($_POST['do'] == 'resetpw')
144 {
145 // remove old activators
146 $db->query("DELETE FROM " . TABLE_PREFIX . "passwordreset WHERE dateline < " . (TIMENOW - 86400));
147
148 // now look for ours
149 $activation = $db->query_first("SELECT * FROM " . TABLE_PREFIX . "passwordreset WHERE activatorid = '" . $bugsys->input_escape('activator') . "'");
150 if (!$activation)
151 {
152 $message->error(L_INVALID_ID);
153 }
154
155 $user = new UserAPI($bugsys);
156 $user->set('userid', $activation['userid']);
157 $user->set_condition();
158
159 if ($bugsys->in['fix_password'] != $bugsys->in['confirm_password'])
160 {
161 $message->addError(T('The passwords you entered do not patch.'));
162 }
163 if (empty($bugsys->in['fix_password']))
164 {
165 $message->addError(T('Your new password cannot be empty.'));
166 }
167
168 $user->set('password', $bugsys->in['fix_password']);
169
170 if (!$message->hasErrors())
171 {
172 // remove old other activators for this user
173 $db->query("DELETE FROM " . TABLE_PREFIX . "passwordreset WHERE userid = " . $activation['userid']);
174
175 $user->update();
176 $message->redirect(T('Your password has been changed successfully. You will now be redirected to the login page.'), 'login.php');
177 }
178 else
179 {
180 $show['errors'] = true;
181 $_REQUEST['do'] = 'recoverpw';
182 }
183 }
184
185 // ###################################################################
186
187 if ($_REQUEST['do'] == 'recoverpw')
188 {
189 // remove old activators
190 $db->query("DELETE FROM " . TABLE_PREFIX . "passwordreset WHERE dateline < " . (TIMENOW - 86400));
191
192 // now look for ours
193 $activation = $db->query_first("SELECT * FROM " . TABLE_PREFIX . "passwordreset WHERE activatorid = '" . $bugsys->input_escape('activator') . "'");
194 if (!$activation)
195 {
196 $message->error(T('Invalid activation reset key. Please make sure you copied the URL exactly as it appeared in the email.'));
197 }
198
199 eval('$template->flush("' . $template->fetch('passwordreset') . '");');
200 }
201
202 // ###################################################################
203
204 if ($_REQUEST['do'] == 'cplogout')
205 {
206 if ($_COOKIE[COOKIE_PREFIX . 'adminsession'])
207 {
208 $db->query("DELETE FROM " . TABLE_PREFIX . "adminsession WHERE sessionid = '" . $bugsys->input_escape(COOKIE_PREFIX . 'adminsession') . "'");
209 $funct->cookie(COOKIE_PREFIX . 'adminsession');
210 $message->redirect(T('You have been logged out.'), 'admin/');
211 }
212 else
213 {
214 $message->error(T('You are not logged in.'));
215 }
216 }
217