77427d9b996d2e07ad049f3b51e25cc0252f09d2
2 /***************************************************************************
3 * Copyright (C) 2003-2009 Polytechnique.org *
4 * http://opensource.polytechnique.org/ *
6 * This program is free software; you can redistribute it and/or modify *
7 * it under the terms of the GNU General Public License as published by *
8 * the Free Software Foundation; either version 2 of the License, or *
9 * (at your option) any later version. *
11 * This program is distributed in the hope that it will be useful, *
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
14 * GNU General Public License for more details. *
16 * You should have received a copy of the GNU General Public License *
17 * along with this program; if not, write to the Free Software *
19 * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA *
20 ***************************************************************************/
22 class AdminModule
extends PLModule
27 'phpinfo' => $this->make_hook('phpinfo', AUTH_MDP
, 'admin'),
28 'admin' => $this->make_hook('default', AUTH_MDP
, 'admin'),
29 'admin/ax-xorg' => $this->make_hook('ax_xorg', AUTH_MDP
, 'admin'),
30 'admin/dead-but-active' => $this->make_hook('dead_but_active', AUTH_MDP
, 'admin'),
31 'admin/deaths' => $this->make_hook('deaths', AUTH_MDP
, 'admin'),
32 'admin/downtime' => $this->make_hook('downtime', AUTH_MDP
, 'admin'),
33 'admin/homonyms' => $this->make_hook('homonyms', AUTH_MDP
, 'admin'),
34 'admin/logger' => $this->make_hook('logger', AUTH_MDP
, 'admin'),
35 'admin/logger/actions' => $this->make_hook('logger_actions', AUTH_MDP
, 'admin'),
36 'admin/postfix/blacklist' => $this->make_hook('postfix_blacklist', AUTH_MDP
, 'admin'),
37 'admin/postfix/delayed' => $this->make_hook('postfix_delayed', AUTH_MDP
, 'admin'),
38 'admin/postfix/regexp_bounces' => $this->make_hook('postfix_regexpsbounces', AUTH_MDP
, 'admin'),
39 'admin/postfix/whitelist' => $this->make_hook('postfix_whitelist', AUTH_MDP
, 'admin'),
40 'admin/mx/broken' => $this->make_hook('mx_broken', AUTH_MDP
, 'admin'),
41 'admin/skins' => $this->make_hook('skins', AUTH_MDP
, 'admin'),
42 'admin/synchro_ax' => $this->make_hook('synchro_ax', AUTH_MDP
, 'admin'),
43 'admin/user' => $this->make_hook('user', AUTH_MDP
, 'admin'),
44 'admin/promo' => $this->make_hook('promo', AUTH_MDP
, 'admin'),
45 'admin/validate' => $this->make_hook('validate', AUTH_MDP
, 'admin'),
46 'admin/validate/answers' => $this->make_hook('validate_answers', AUTH_MDP
, 'admin'),
47 'admin/wiki' => $this->make_hook('wiki', AUTH_MDP
, 'admin'),
48 'admin/ipwatch' => $this->make_hook('ipwatch', AUTH_MDP
, 'admin'),
49 'admin/icons' => $this->make_hook('icons', AUTH_MDP
, 'admin'),
50 'admin/accounts' => $this->make_hook('accounts', AUTH_MDP
, 'admin'),
54 function handler_phpinfo(&$page)
60 function handler_default(&$page)
62 $page->changeTpl('admin/index.tpl');
63 $page->setTitle('Administration');
66 function handler_postfix_delayed(&$page)
68 $page->changeTpl('admin/postfix_delayed.tpl');
69 $page->setTitle('Administration - Postfix : Retardés');
71 if (Env
::has('del')) {
73 XDB
::execute("UPDATE postfix_mailseen SET release = 'del' WHERE crc = {?}", $crc);
74 $page->trigSuccess($crc . " verra tous ses emails supprimés !");
75 } elseif (Env
::has('ok')) {
77 XDB
::execute("UPDATE postfix_mailseen SET release = 'ok' WHERE crc = {?}", $crc);
78 $page->trigSuccess($crc . " a le droit de passer !");
82 "SELECT crc, nb, update_time, create_time,
83 FIND_IN_SET('del', p.release) AS del,
84 FIND_IN_SET('ok', p.release) AS ok
85 FROM postfix_mailseen AS p
87 ORDER BY p.release != ''");
89 $page->assign_by_ref('mails', $sql);
92 function handler_postfix_regexpsbounces(&$page, $new = null
) {
93 $page->changeTpl('admin/emails_bounces_re.tpl');
94 $page->setTitle('Administration - Postfix : Regexps Bounces');
95 $page->assign('new', $new);
97 if (Post
::has('submit')) {
98 foreach (Env
::v('lvl') as $id=>$val) {
100 "REPLACE INTO emails_bounces_re (id,pos,lvl,re,text) VALUES ({?}, {?}, {?}, {?}, {?})",
101 $id, $_POST['pos'][$id], $_POST['lvl'][$id], $_POST['re'][$id], $_POST['text'][$id]
106 $page->assign('bre', XDB
::iterator("SELECT * FROM emails_bounces_re ORDER BY pos"));
111 /** Retrieves the available days for a given year and month.
112 * Obtain a list of days of the given month in the given year
113 * that are within the range of dates that we have log entries for.
115 * @param integer year
116 * @param integer month
117 * @return array days in that month we have log entries covering.
120 function _getDays($year, $month)
122 // give a 'no filter' option
125 if ($year && $month) {
126 $day_max = Array(-1, 31, checkdate(2, 29, $year) ?
29 : 28 , 31,
127 30, 31, 30, 31, 31, 30, 31, 30, 31);
128 $res = XDB
::query("SELECT YEAR (MAX(start)), YEAR (MIN(start)),
129 MONTH(MAX(start)), MONTH(MIN(start)),
130 DAYOFMONTH(MAX(start)),
131 DAYOFMONTH(MIN(start))
132 FROM #logger#.sessions");
133 list($ymax, $ymin, $mmax, $mmin, $dmax, $dmin) = $res->fetchOneRow();
135 if (($year < $ymin) ||
($year == $ymin && $month < $mmin)) {
139 if (($year > $ymax) ||
($year == $ymax && $month > $mmax)) {
143 $min = ($year==$ymin && $month==$mmin) ?
intval($dmin) : 1;
144 $max = ($year==$ymax && $month==$mmax) ?
intval($dmax) : $day_max[$month];
146 for($i = $min; $i<=$max; $i++
) {
154 /** Retrieves the available months for a given year.
155 * Obtains a list of month numbers that are within the timeframe that
156 * we have log entries for.
158 * @param integer year
159 * @return array List of month numbers we have log info for.
162 function _getMonths($year)
164 // give a 'no filter' option
168 $res = XDB
::query("SELECT YEAR (MAX(start)), YEAR (MIN(start)),
169 MONTH(MAX(start)), MONTH(MIN(start))
170 FROM #logger#.sessions");
171 list($ymax, $ymin, $mmax, $mmin) = $res->fetchOneRow();
173 if (($year < $ymin) ||
($year > $ymax)) {
177 $min = $year == $ymin ?
intval($mmin) : 1;
178 $max = $year == $ymax ?
intval($mmax) : 12;
180 for($i = $min; $i<=$max; $i++
) {
188 /** Retrieves the available years.
189 * Obtains a list of years that we have log entries covering.
191 * @return array years we have log entries for.
196 // give a 'no filter' option
199 // retrieve available years
200 $res = XDB
::query("select YEAR(MAX(start)), YEAR(MIN(start)) FROM #logger#.sessions");
201 list($max, $min) = $res->fetchOneRow();
203 for($i = intval($min); $i<=$max; $i++
) {
210 /** Make a where clause to get a user's sessions.
211 * Prepare the where clause request that will retrieve the sessions.
213 * @param $year INTEGER Only get log entries made during the given year.
214 * @param $month INTEGER Only get log entries made during the given month.
215 * @param $day INTEGER Only get log entries made during the given day.
216 * @param $uid INTEGER Only get log entries referring to the given user ID.
218 * @return STRING the WHERE clause of a query, including the 'WHERE' keyword
221 function _makeWhere($year, $month, $day, $uid)
223 // start constructing the "where" clause
227 array_push($where, "uid='$uid'");
229 // we were given at least a year
232 $dmin = mktime(0, 0, 0, $month, $day, $year);
233 $dmax = mktime(0, 0, 0, $month, $day+
1, $year);
235 $dmin = mktime(0, 0, 0, $month, 1, $year);
236 $dmax = mktime(0, 0, 0, $month+
1, 1, $year);
238 $dmin = mktime(0, 0, 0, 1, 1, $year);
239 $dmax = mktime(0, 0, 0, 1, 1, $year+
1);
241 $where[] = "start >= " . date("Ymd000000", $dmin);
242 $where[] = "start < " . date("Ymd000000", $dmax);
245 if (!empty($where)) {
246 return ' WHERE ' . implode($where, " AND ");
250 // WE know it's totally reversed, so better use array_reverse than a SORT BY start DESC
255 function handler_logger(&$page, $action = null
, $arg = null
) {
256 if ($action == 'session') {
258 // we are viewing a session
259 $res = XDB
::query("SELECT ls.*, a.alias AS username, sa.alias AS suer
260 FROM #logger#.sessions AS ls
261 LEFT JOIN #x4dat#.aliases AS a ON (a.id = ls.uid AND a.type='a_vie')
262 LEFT JOIN #x4dat#.aliases AS sa ON (sa.id = ls.suid AND sa.type='a_vie')
263 WHERE ls.id = {?}", $arg);
265 $page->assign('session', $a = $res->fetchOneAssoc());
267 $res = XDB
::iterator('SELECT a.text, e.data, e.stamp
268 FROM #logger#.events AS e
269 LEFT JOIN #logger#.actions AS a ON e.action=a.id
270 WHERE e.session={?}', $arg);
271 while ($myarr = $res->next()) {
272 $page->append('events', $myarr);
276 $loguser = $action == 'user' ?
$arg : Env
::v('loguser');
278 $res = XDB
::query('SELECT id FROM aliases WHERE alias={?}',
280 $loguid = $res->fetchOneCell();
283 $year = Env
::i('year');
284 $month = Env
::i('month');
285 $day = Env
::i('day');
287 $year = Env
::i('year', intval(date('Y')));
288 $month = Env
::i('month', intval(date('m')));
289 $day = Env
::i('day', intval(date('d')));
297 // smarty assignments
298 // retrieve available years
299 $page->assign('years', $this->_getYears());
300 $page->assign('year', $year);
302 // retrieve available months for the current year
303 $page->assign('months', $this->_getMonths($year));
304 $page->assign('month', $month);
306 // retrieve available days for the current year and month
307 $page->assign('days', $this->_getDays($year, $month));
308 $page->assign('day', $day);
310 $page->assign('loguser', $loguser);
311 // smarty assignments
313 if ($loguid ||
$year) {
315 // get the requested sessions
316 $where = $this->_makeWhere($year, $month, $day, $loguid);
317 $select = "SELECT s.id, s.start, s.uid,
319 FROM #logger#.sessions AS s
320 LEFT JOIN #x4dat#.aliases AS a ON (a.id = s.uid AND a.type='a_vie')
322 ORDER BY start DESC";
323 $res = XDB
::iterator($select);
326 while ($mysess = $res->next()) {
327 $mysess['events'] = array();
328 $sessions[$mysess['id']] = $mysess;
330 array_reverse($sessions);
333 $sql = "SELECT s.id, a.text
334 FROM #logger#.sessions AS s
335 LEFT JOIN #logger#.events AS e ON(e.session=s.id)
336 INNER JOIN #logger#.actions AS a ON(a.id=e.action)
339 $res = XDB
::iterator($sql);
340 while ($event = $res->next()) {
341 array_push($sessions[$event['id']]['events'], $event['text']);
343 $page->assign_by_ref('sessions', $sessions);
345 $page->assign('msg_nofilters', "Sélectionner une annuée et/ou un utilisateur");
349 $page->changeTpl('admin/logger-view.tpl');
351 $page->setTitle('Administration - Logs des sessions');
354 function handler_user(&$page, $login = false
)
357 $page->changeTpl('admin/utilisateurs.tpl');
358 $page->setTitle('Administration - Edit/Su/Log');
359 require_once("emails.inc.php");
361 if (S
::has('suid')) {
362 $page->kill("Déjà en SUID !!!");
365 // Loads the user identity using the environment.
368 $user = User
::get($login);
369 } else if (Env
::has('user_id')) {
370 $user = User
::get(Env
::i('user_id'));
371 } else if (Env
::has('login')) {
372 $user = User
::get(Env
::v('login'));
376 $login = $user->login();
377 $registered = ($user->forlifeEmail() != null
);
382 // Handles specific requests (AX sync, su...).
383 if(Env
::has('logs_button') && $registered) {
384 pl_redirect("admin/logger?loguser=$login&year=".date('Y')."&month=".date('m'));
387 if (Env
::has('ax_button') && $registered) {
388 pl_redirect("admin/synchro_ax/" . $user->login());
391 if(Env
::has('suid_button') && $registered) {
392 S
::logger()->log("suid_start", "login on " . $user->login());
393 if (!Platal
::session()->startSUID($user->id())) {
394 $page->trigError('Impossible d\'effectuer un SUID sur ' . $user->id());
400 // Fetches user data.
401 $userinfo_query = "SELECT *, FIND_IN_SET('watch', flags) AS watch, FIND_IN_SET('femme', flags) AS sexe,
402 (year(naissance) > promo - 15 or year(naissance) < promo - 25) AS naiss_err
404 WHERE user_id = {?}";
405 $mr = XDB
::query($userinfo_query, $user->id())->fetchOneAssoc();
406 $redirect = ($registered ?
new Redirect($user) : null
);
408 // Processes admin requests, if any.
409 foreach($_POST as $key => $val) {
410 S
::assert_xsrf_token();
413 // Email redirection actions.
415 $email = trim(Env
::v('email'));
416 if (!isvalid_email_redirection($email)) {
417 $page->trigError("Email non valide: $email");
419 $redirect->add_email($email);
420 $page->trigSuccess("Ajout de $email effectué");
426 $redirect->delete_email($val);
432 $redirect->modify_one_email($val, true
);
435 case "deactivate_fwd":
437 $redirect->modify_one_email($val, false
);
441 $redirect->disable();
448 $redirect->clean_errors($val);
456 // Splits new alias in user and fqdn.
457 $alias = trim(Env
::v('email'));
458 if (strpos($alias, '@') !== false
) {
459 list($alias, $domain) = explode('@', $alias);
461 $domain = $globals->mail
->domain
;
464 // Checks for alias' user validity.
465 if (!preg_match('/[-a-z0-9\.]+/s', $alias)) {
466 $page->trigError("'$alias' n'est pas un alias valide");
470 // Eventually adds the alias to the right domain.
471 if ($domain == $globals->mail
->alias_dom ||
$domain == $globals->mail
->alias_dom2
) {
472 $req = new AliasReq($user, $alias, 'Admin request', false
);
473 if ($req->commit()) {
474 $page->trigSuccess("Nouvel alias '$alias@$domain' attribué");
476 $page->trigError("Impossible d'ajouter l'alias '$alias@$domain', il est probablement déjà attribué");
478 } elseif ($domain == $globals->mail
->domain ||
$domain == $globals->mail
->domain2
) {
479 $res = XDB
::execute("INSERT INTO aliases (id,alias,type) VALUES ({?}, {?}, 'alias')",
480 $user->id(), $alias);
482 $page->trigSuccess("Nouvel alias '$alias' ajouté");
484 $page->trigError("Impossible d'ajouter l'alias '$alias', il est probablement déjà attribué");
487 $page->trigError("Le domaine '$domain' n'est pas valide");
493 XDB
::execute("DELETE FROM aliases
494 WHERE id = {?} AND alias = {?} AND
495 type NOT IN ('a_vie', 'homonyme')",
497 XDB
::execute("UPDATE emails
499 WHERE uid = {?} AND rewrite LIKE CONCAT({?}, '@%')",
501 fix_bestalias($user);
502 $page->trigSuccess("L'alias '$val' a été supprimé");
507 XDB
::execute("UPDATE aliases
508 SET flags = TRIM(BOTH ',' FROM REPLACE(CONCAT(',', flags, ','), ',bestalias,', ','))
509 WHERE id = {?}", $user->id());
510 XDB
::execute("UPDATE aliases
511 SET flags = CONCAT_WS(',', IF(flags = '', NULL, flags), 'bestalias')
512 WHERE id = {?} AND alias = {?}", $user->id(), $val);
514 // As having a non-null bestalias value is critical in
515 // plat/al's code, we do an a posteriori check on the
516 // validity of the bestalias.
517 fix_bestalias($user);
522 // Loads new values from environment.
523 require_once('secure_hash.inc.php');
524 $pass_encrypted = Env
::v('newpass_clair') != "********" ?
hash_encrypt(Env
::v('newpass_clair')) : Env
::v('passw');
525 $naiss = Env
::v('naissanceN');
526 $deces = Env
::v('decesN');
527 $perms = Env
::v('permsN');
528 $prenom = Env
::v('prenomN');
529 $nom = Env
::v('nomN');
530 $nomusage = Env
::v('nomusageN');
531 $promo = Env
::i('promoN');
532 $sexe = Env
::v('sexeN');
533 $comm = trim(Env
::v('commentN'));
534 $watch = Env
::v('watchN');
536 $flags = ($sexe ?
'femme' : '');
538 $flags .= ($flags ?
',watch' : 'watch');
540 if ($watch && !$comm) {
541 $page->trigError("Il est nécessaire de mettre un commentaire pour surveiller un compte");
545 // Fetches fields to watch for changes.
546 $watch_query = "SELECT naissance, deces, password, perms, nom_usage,
547 prenom, nom, flags, promo, comment
549 WHERE user_id = {?}";
550 $old_fields = XDB
::query($watch_query, $user->id())->fetchOneAssoc();
552 // If user was newly banned, we need to ensure her php session
553 // is killed. This hack is ugly (and largely overkill); it should
554 // however suits our needs.
555 if ($perms == 'disabled' && $old_fields['perms'] != 'disabled') {
558 // Also serve a reminder to the admin: disabling an account
559 // does not deactivate email forwarding.
560 $page->trigWarning("N'oubliez pas, le cas échéant, de désactiver les redirections et le compte GoogleApps de l'utilisateur.");
563 // Updates the user profile with the new values.
564 $res = XDB
::execute("UPDATE auth_user_md5
565 SET naissance = {?}, deces = {?}, password = {?},
566 perms = {?}, prenom = {?}, nom = {?}, nom_usage = {?},
567 flags = {?}, promo = {?}, comment = {?}
568 WHERE user_id = {?}",
569 $naiss, $deces, $pass_encrypted,
570 $perms, $prenom, $nom, $nomusage,
571 $flags, $promo, $comm, $user->id());
573 require_once("user.func.inc.php");
574 user_reindex($user->id());
575 $new_fields = XDB
::query($watch_query, $user->id())->fetchOneAssoc();
577 // Redacts the password in the notification, to avoid transmitting
578 // sensitive information by email.
579 $new_fields['password'] = ($old_fields['password'] != $new_fields['password'] ?
'new' : 'old');
580 $old_fields['password'] = 'old';
582 // Notifies the admins of the profile update.
583 $mailer = new PlMailer("admin/useredit.mail.tpl");
584 $mailer->assign("admin", S
::user()->login());
585 $mailer->assign("user", $user->login());
586 $mailer->assign('old', $old_fields);
587 $mailer->assign('new', $new_fields);
590 $globals->updateNbIns();
591 $page->trigSuccess("La mise à jour a été faite avec succès.");
593 $page->trigError("La mise à jour a échoué. S'il te plaît, vérifie les valeurs.");
596 // Checks for changes, and updates other tables of plat/al.
597 if (Env
::v('nomusageN') != $mr['nom_usage']) {
598 set_new_usage($user->id(), Env
::v('nomusageN'), make_username(Env
::v('prenomN'), Env
::v('nomusageN')));
600 if (Env
::v('decesN') != $mr['deces']) {
601 require_once 'notifs.inc.php';
602 register_watch_op($user->id(), WATCH_DEATH
, $mr['deces']);
603 user_clear_all_subs($user->id(), false
);
606 // Eventually updates the Google Apps account.
607 if ($globals->mailstorage
->googleapps_domain
) {
608 // If the user did choose to use synchronized passwords,
609 // and the password was changed, updates the Google Apps
611 if (Env
::v('newpass_clair') != "********") {
612 require_once 'googleapps.inc.php';
613 $account = new GoogleAppsAccount($user);
614 if ($account->active() && $account->sync_password
) {
615 $account->set_password($pass_encrypted);
621 // Reloads the user profile, to ensure the latest version will
622 // be served to the administrator.
623 $mr = XDB
::query($userinfo_query, $user->id())->fetchOneAssoc();
627 // User re-registration.
629 require_once('user.func.inc.php');
630 user_clear_all_subs($user->id());
631 $globals->updateNbIns();
632 $page->trigSuccess($user->login() . ' a été désinscrit !');
634 $mailer = new PlMailer("admin/useredit.mail.tpl");
635 $mailer->assign("admin", S
::user()->login());
636 $mailer->assign("user", $user->login());
637 $mailer->assign("deletion", true
);
643 XDB
::execute("DELETE FROM #forums#.innd WHERE uid = {?}", $user->id());
644 if (Env
::v('write_perm') != "" || Env
::v('read_perm') != "" || Env
::v('commentaire') != "" ) {
645 XDB
::execute("INSERT INTO #forums#.innd
646 SET ipmin = '0', ipmax = '4294967295',
647 write_perm = {?}, read_perm = {?},
648 comment = {?}, priority = '200', uid = {?}",
649 Env
::v('write_perm'), Env
::v('read_perm'), Env
::v('comment'), $user->id());
655 // Displays last login and last host information.
656 $res = XDB
::query("SELECT start, host
657 FROM #logger#.sessions
658 WHERE uid = {?} AND suid = 0
660 LIMIT 1", $user->id());
661 list($lastlogin,$host) = $res->fetchOneRow();
662 $page->assign('lastlogin', $lastlogin);
663 $page->assign('host', $host);
665 // Display active aliases.
666 $page->assign('virtuals', XDB
::iterator(
669 INNER JOIN virtual_redirect USING (vid)
670 WHERE type = 'user' AND (redirect = {?} OR redirect = {?})",
671 $user->forlifeEmail(),
672 // TODO: remove this über-ugly hack. The issue is that you need
673 // to remove all @m4x.org addresses in virtual_redirect first.
674 $user->login() . '@' . $globals->mail
->domain2
));
676 $page->assign('aliases', XDB
::iterator(
677 "SELECT alias, type='a_vie' AS for_life,FIND_IN_SET('bestalias',flags) AS best,expire
679 WHERE id = {?} AND type != 'homonyme'
680 ORDER BY type != 'a_vie'", $user->id()));
682 // Displays email redirection and the general profile.
683 if ($registered && $redirect) {
684 $page->assign('emails', $redirect->emails
);
687 $page->assign('mr', $mr);
688 $page->assign('user', $user);
690 // Displays forum bans.
691 $res = XDB
::query("SELECT write_perm, read_perm, comment
693 WHERE uid = {?}", $user->id());
694 $bans = $res->fetchOneAssoc();
695 $page->assign('bans', $bans);
698 function getHruid($line, $key, $relation)
700 $prenom = CSVImporter
::getValue($line, 'prenom', $relation['prenom']);
701 $nom = CSVImporter
::getValue($line, 'nom', $relation['nom']);
702 $promo = CSVImporter
::getValue($line, 'promo', $relation['promo']);
704 if ($prenom != 'NULL' && $nom != 'NULL' && $promo != 'NULL') {
705 return make_forlife($prenom, $nom, $promo);
710 function getMatricule($line, $key, $relation)
712 $mat = $line['matricule'];
713 $year = intval(substr($mat, 0, 3));
714 $rang = intval(substr($mat, 3, 3));
715 if ($year > 200) { $year /= 10; };
719 return sprintf('%04u%04u', 1900+
$year, $rang);
723 function handler_promo(&$page, $action = null
, $promo = null
)
725 if (Env
::has('promo')) {
726 if(Env
::i('promo') > 1900 && Env
::i('promo') < 2050) {
727 $action = Env
::v('valid_promo') == 'Ajouter des membres' ?
'add' : 'ax';
728 pl_redirect('admin/promo/' . $action . '/' . Env
::i('promo'));
730 $page->trigError('Promo non valide');
734 $page->changeTpl('admin/promo.tpl');
735 if ($promo > 1900 && $promo < 2050 && ($action == 'add' ||
$action == 'ax')) {
736 $page->assign('promo', $promo);
741 $importer = new CSVImporter('auth_user_md5', 'matricule');
742 $importer->registerFunction('matricule', 'matricule Ecole vers X.org', array($this, 'getMatricule'));
745 $fields = array('hruid', 'nom', 'nom_ini', 'prenom', 'naissance_ini',
746 'prenom_ini', 'promo', 'promo_sortie', 'flags',
747 'matricule', 'matricule_ax', 'perms');
748 $importer->forceValue('hruid', array($this, 'getHruid'));
749 $importer->forceValue('promo', $promo);
750 $importer->forceValue('promo_sortie', $promo +
3);
753 $fields = array('matricule', 'matricule_ax');
756 $importer->apply($page, "admin/promo/$action/$promo", $fields);
759 function handler_homonyms(&$page, $op = 'list', $target = null
)
761 $page->changeTpl('admin/homonymes.tpl');
762 $page->setTitle('Administration - Homonymes');
763 require_once("homonymes.inc.php");
766 if (! list($prenom,$nom,$forlife,$loginbis) = select_if_homonyme($target)) {
769 $page->assign('nom',$nom);
770 $page->assign('prenom',$prenom);
771 $page->assign('forlife',$forlife);
772 $page->assign('loginbis',$loginbis);
776 $page->assign('op', $op);
777 $page->assign('target', $target);
779 // on a un $target valide, on prepare les mails
781 // on examine l'op a effectuer
784 S
::assert_xsrf_token();
786 send_warning_homonyme($prenom, $nom, $forlife, $loginbis);
787 switch_bestalias($target, $loginbis);
789 $page->trigSuccess('Email envoyé à ' . $forlife . '.');
793 S
::assert_xsrf_token();
795 switch_bestalias($target, $loginbis);
796 XDB
::execute("UPDATE aliases SET type='homonyme',expire=NOW() WHERE alias={?}", $loginbis);
797 XDB
::execute("REPLACE INTO homonymes (homonyme_id,user_id) VALUES({?},{?})", $target, $target);
798 send_robot_homonyme($prenom, $nom, $forlife, $loginbis);
800 $page->trigSuccess('Email envoyé à ' . $forlife . ', alias supprimé.');
806 $res = XDB
::iterator(
807 "SELECT a.alias AS homonyme,s.id AS user_id,s.alias AS forlife,
809 IF(h.homonyme_id=s.id, a.expire, NULL) AS expire,
810 IF(h.homonyme_id=s.id, a.type, NULL) AS type
812 LEFT JOIN homonymes AS h ON (h.homonyme_id = a.id)
813 INNER JOIN aliases AS s ON (s.id = h.user_id AND s.type='a_vie')
814 INNER JOIN auth_user_md5 AS u ON (s.id=u.user_id)
815 WHERE a.type='homonyme' OR a.expire!=''
816 ORDER BY a.alias,promo");
818 while ($tab = $res->next()) {
819 $hnymes[$tab['homonyme']][] = $tab;
821 $page->assign_by_ref('hnymes',$hnymes);
825 function handler_ax_xorg(&$page) {
826 $page->changeTpl('admin/ax-xorg.tpl');
827 $page->setTitle('Administration - AX/X.org');
829 // liste des différences
831 'SELECT u.promo,u.nom AS nom,u.prenom AS prenom,ia.nom AS nomax,ia.prenom AS prenomax,u.matricule AS mat,ia.matricule_ax AS matax
832 FROM auth_user_md5 AS u
833 INNER JOIN identification_ax AS ia ON u.matricule_ax = ia.matricule_ax
834 WHERE (SOUNDEX(u.nom) != SOUNDEX(ia.nom) AND SOUNDEX(CONCAT(ia.particule,u.nom)) != SOUNDEX(ia.nom)
835 AND SOUNDEX(u.nom) != SOUNDEX(ia.nom_patro) AND SOUNDEX(CONCAT(ia.particule,u.nom)) != SOUNDEX(ia.nom_patro))
836 OR u.prenom != ia.prenom OR (u.promo != ia.promo AND u.promo != ia.promo+1 AND u.promo != ia.promo-1)
837 ORDER BY u.promo,u.nom,u.prenom');
838 $page->assign('diffs', $res->fetchAllAssoc());
840 // gens à l'ax mais pas chez nous
842 'SELECT ia.promo,ia.nom,ia.nom_patro,ia.prenom
843 FROM identification_ax as ia
844 LEFT JOIN auth_user_md5 AS u ON u.matricule_ax = ia.matricule_ax
845 WHERE u.nom IS NULL');
846 $page->assign('mank', $res->fetchAllAssoc());
848 // gens chez nous et pas à l'ax
849 $res = XDB
::query('SELECT promo,nom,prenom FROM auth_user_md5 WHERE matricule_ax IS NULL');
850 $page->assign('plus', $res->fetchAllAssoc());
853 function handler_deaths(&$page, $promo = 0, $validate = false
) {
854 $page->changeTpl('admin/deces_promo.tpl');
855 $page->setTitle('Administration - Deces');
858 $promo = Env
::i('promo');
859 if (Env
::has('sub10')) $promo -= 10;
860 if (Env
::has('sub01')) $promo -= 1;
861 if (Env
::has('add01')) $promo +
= 1;
862 if (Env
::has('add10')) $promo +
= 10;
864 $page->assign('promo',$promo);
867 S
::assert_xsrf_token();
869 $res = XDB
::iterRow("SELECT user_id,matricule,nom,prenom,deces FROM auth_user_md5 WHERE promo = {?}", $promo);
870 while (list($uid,$mat,$nom,$prenom,$deces) = $res->next()) {
872 if($val == $deces ||
empty($val)) {
876 XDB
::execute('UPDATE auth_user_md5 SET deces={?} WHERE matricule = {?}', $val, $mat);
877 $page->trigSuccess('Ajout du décès de ' . $prenom . " " . $nom . ' le ' . $val . '.');
878 if($deces == '0000-00-00' ||
empty($deces)) {
879 require_once('notifs.inc.php');
880 register_watch_op($uid, WATCH_DEATH
, $val);
881 require_once('user.func.inc.php');
882 user_clear_all_subs($uid, false
); // by default, dead ppl do not loose their email
887 $res = XDB
::iterator('SELECT matricule, nom, prenom, deces FROM auth_user_md5 WHERE promo = {?} ORDER BY nom,prenom', $promo);
888 $page->assign('decedes', $res);
891 function handler_dead_but_active(&$page) {
892 $page->changeTpl('admin/dead_but_active.tpl');
893 $page->setTitle('Administration - Décédés');
895 $res = XDB
::iterator(
896 "SELECT u.promo, u.nom, u.prenom, u.deces, u.hruid, DATE(MAX(s.start)) AS last
897 FROM #x4dat#.auth_user_md5 AS u
898 LEFT JOIN #logger#.sessions AS s ON (s.uid = u.user_id AND suid = 0)
899 WHERE perms IN ('admin', 'user') AND deces <> 0
901 ORDER BY u.promo, u.nom");
902 $page->assign('dead', $res);
905 function handler_synchro_ax(&$page, $login = null
, $action = null
) {
906 $page->changeTpl('admin/synchro_ax.tpl');
907 $page->setTitle('Administration - Synchro AX');
909 // Checks for synchronization requirements.
910 require_once('synchro_ax.inc.php');
911 if (is_ax_key_missing()) {
912 $page->assign('no_private_key', true
);
916 // Determines user identity using environment.
918 $user = User
::get($login);
919 } else if (Env
::has('user')) {
920 $user = User
::get(Env
::v('user'));
921 } else if (Env
::has('mat')) {
922 $res = XDB
::query("SELECT user_id FROM auth_user_md5 WHERE matricule = {?}", Env
::i('mat'));
923 $user = User
::get($res->fetchOneCell());
928 // Finally synchronizes the AX and plat/al information.
929 if ($action == 'import') {
930 ax_synchronize($user->login(), S
::v('uid'));
933 require_once 'profil.func.inc.php';
934 $userxorg = get_user_details($user->login(), S
::v('uid'), 'ax');
935 $userax = get_user_ax($userxorg['matricule_ax']);
936 $diff = diff_user_details($userax, $userxorg, 'ax');
938 $page->assign('x', $userxorg);
939 $page->assign('diff', $diff);
942 function handler_validate(&$page, $action = 'list', $id = null
)
944 $page->changeTpl('admin/valider.tpl');
945 $page->setTitle('Administration - Valider une demande');
946 $page->addCssLink('nl.css');
947 $page->addJsLink('ajax.js');
948 require_once("validations.inc.php");
951 if ($action == 'edit' and !is_null($id)) {
952 $page->assign('preview_id', $id);
955 if(Env
::has('uid') && Env
::has('type') && Env
::has('stamp')) {
956 S
::assert_xsrf_token();
958 $req = Validate
::get_typed_request(Env
::v('uid'), Env
::v('type'), Env
::v('stamp'));
960 $req->handle_formu();
962 $page->trigWarning('La validation a déjà été effectuée.');
966 $r = XDB
::iterator('SHOW COLUMNS FROM requests_answers');
967 while (($a = $r->next()) && $a['Field'] != 'category');
968 $page->assign('categories', $categories = explode(',', str_replace("'", '', substr($a['Type'], 5, -1))));
971 $res = XDB
::query('SELECT hidden_requests FROM requests_hidden WHERE user_id = {?}', S
::v('uid'));
972 $hide_requests = $res->fetchOneCell();
973 if (Post
::has('hide')) {
975 foreach ($categories as $cat)
976 if (!Post
::v($cat)) {
980 $hide_requests = join(',', $hide);
981 XDB
::query('REPLACE INTO requests_hidden (user_id, hidden_requests) VALUES({?}, {?})',
982 S
::v('uid'), $hide_requests);
983 } elseif ($hide_requests) {
984 foreach (explode(',', $hide_requests) as $hide_type)
985 $hidden[$hide_type] = true
;
987 $page->assign('hide_requests', $hidden);
989 // Update the count of item to validate here... useful in development configuration
990 // where several copies of the site use the same DB, but not the same "dynamic configuration"
992 $globals->updateNbValid();
993 $page->assign('vit', new ValidateIterator());
996 function handler_validate_answers(&$page, $action = 'list', $id = null
) {
997 $page->setTitle('Administration - Réponses automatiques de validation');
998 $page->assign('title', 'Gestion des réponses automatiques');
999 $table_editor = new PLTableEditor('admin/validate/answers','requests_answers','id');
1000 $table_editor->describe('category','catégorie',true
);
1001 $table_editor->describe('title','titre',true
);
1002 $table_editor->describe('answer','texte',false
);
1003 $table_editor->apply($page, $action, $id);
1005 function handler_skins(&$page, $action = 'list', $id = null
) {
1006 $page->setTitle('Administration - Skins');
1007 $page->assign('title', 'Gestion des skins');
1008 $table_editor = new PLTableEditor('admin/skins','skins','id');
1009 $table_editor->describe('name','nom',true
);
1010 $table_editor->describe('skin_tpl','nom du template',true
);
1011 $table_editor->describe('auteur','auteur',false
);
1012 $table_editor->describe('comment','commentaire',true
);
1013 $table_editor->describe('date','date',false
);
1014 $table_editor->describe('ext','extension du screenshot',false
);
1015 $table_editor->apply($page, $action, $id);
1018 function handler_postfix_blacklist(&$page, $action = 'list', $id = null
) {
1019 $page->setTitle('Administration - Postfix : Blacklist');
1020 $page->assign('title', 'Blacklist de postfix');
1021 $table_editor = new PLTableEditor('admin/postfix/blacklist','postfix_blacklist','email', true
);
1022 $table_editor->describe('reject_text','Texte de rejet',true
);
1023 $table_editor->describe('email','email',true
);
1024 $table_editor->apply($page, $action, $id);
1026 function handler_postfix_whitelist(&$page, $action = 'list', $id = null
) {
1027 $page->setTitle('Administration - Postfix : Whitelist');
1028 $page->assign('title', 'Whitelist de postfix');
1029 $table_editor = new PLTableEditor('admin/postfix/whitelist','postfix_whitelist','email', true
);
1030 $table_editor->describe('email','email',true
);
1031 $table_editor->apply($page, $action, $id);
1033 function handler_mx_broken(&$page, $action = 'list', $id = null
) {
1034 $page->setTitle('Administration - MX Défaillants');
1035 $page->assign('title', 'MX Défaillant');
1036 $table_editor = new PLTableEditor('admin/mx/broken', 'mx_watch', 'host', true
);
1037 $table_editor->describe('host', 'Masque', true
);
1038 $table_editor->describe('state', 'Niveau', true
);
1039 $table_editor->describe('text', 'Description du problème', false
);
1040 $table_editor->apply($page, $action, $id);
1042 function handler_logger_actions(&$page, $action = 'list', $id = null
) {
1043 $page->setTitle('Administration - Actions');
1044 $page->assign('title', 'Gestion des actions de logger');
1045 $table_editor = new PLTableEditor('admin/logger/actions','#logger#.actions','id');
1046 $table_editor->describe('text','intitulé',true
);
1047 $table_editor->describe('description','description',true
);
1048 $table_editor->apply($page, $action, $id);
1050 function handler_downtime(&$page, $action = 'list', $id = null
) {
1051 $page->setTitle('Administration - Coupures');
1052 $page->assign('title', 'Gestion des coupures');
1053 $table_editor = new PLTableEditor('admin/downtime','coupures','id');
1054 $table_editor->describe('debut','date',true
);
1055 $table_editor->describe('duree','durée',false
);
1056 $table_editor->describe('resume','résumé',true
);
1057 $table_editor->describe('services','services affectés',true
);
1058 $table_editor->describe('description','description',false
);
1059 $table_editor->apply($page, $action, $id);
1062 function handler_wiki(&$page, $action = 'list', $wikipage = null
, $wikipage2 = null
)
1064 if (S
::v('core_rss_hash')) {
1065 $page->setRssLink('Changement Récents',
1066 '/Site/AllRecentChanges?action=rss&user=' . S
::v('hruid') . '&hash=' . S
::v('core_rss_hash'));
1069 // update wiki perms
1070 if ($action == 'update') {
1071 S
::assert_xsrf_token();
1073 $perms_read = Post
::v('read');
1074 $perms_edit = Post
::v('edit');
1075 if ($perms_read ||
$perms_edit) {
1076 foreach ($_POST as $wiki_page => $val) {
1078 $wp = new PlWikiPage(str_replace(array('_', '/'), '.', $wiki_page));
1079 if ($wp->setPerms($perms_read ?
$perms_read : $wp->readPerms(),
1080 $perms_edit ?
$perms_edit : $wp->writePerms())) {
1081 $page->trigSuccess("Permission de la page $wiki_page mises à jour");
1083 $page->trigError("Impossible de mettre les permissions de la page $wiki_page à jour");
1088 } else if ($action != 'list' && !empty($wikipage)) {
1089 $wp = new PlWikiPage($wikipage);
1090 S
::assert_xsrf_token();
1092 if ($action == 'delete') {
1093 if ($wp->delete()) {
1094 $page->trigSuccess("La page ".$wikipage." a été supprimée.");
1096 $page->trigError("Impossible de supprimer la page ".$wikipage.".");
1098 } else if ($action == 'rename' && !empty($wikipage2) && $wikipage != $wikipage2) {
1099 if ($changedLinks = $wp->rename($wikipage2)) {
1100 $s = 'La page <em>'.$wikipage.'</em> a été déplacée en <em>'.$wikipage2.'</em>.';
1101 if (is_numeric($changedLinks)) {
1102 $s .= $changedLinks.' lien'.(($changedLinks>1)?
's ont été modifiés.':' a été modifié.');
1104 $page->trigSuccess($s);
1106 $page->trigError("Impossible de déplacer la page ".$wikipage);
1111 $perms = PlWikiPage
::permOptions();
1113 // list wiki pages and their perms
1114 $wiki_pages = PlWikiPage
::listPages();
1116 $wiki_tree = array();
1117 foreach ($wiki_pages as $file => $desc) {
1118 list($cat, $name) = explode('.', $file);
1119 if (!isset($wiki_tree[$cat])) {
1120 $wiki_tree[$cat] = array();
1122 $wiki_tree[$cat][$name] = $desc;
1125 $page->changeTpl('admin/wiki.tpl');
1126 $page->assign('wiki_pages', $wiki_tree);
1127 $page->assign('perms_opts', $perms);
1130 function handler_ipwatch(&$page, $action = 'list', $ip = null
)
1132 $page->changeTpl('admin/ipwatcher.tpl');
1134 $states = array('safe' => 'Ne pas surveiller',
1135 'unsafe' => 'Surveiller les inscriptions',
1136 'dangerous' => 'Surveiller tous les accès',
1137 'ban' => 'Bannir cette adresse');
1138 $page->assign('states', $states);
1140 switch (Post
::v('action')) {
1142 if (trim(Post
::v('ipN')) != '') {
1143 S
::assert_xsrf_token();
1144 Xdb
::execute('INSERT IGNORE INTO ip_watch (ip, mask, state, detection, last, uid, description)
1145 VALUES ({?}, {?}, {?}, CURDATE(), NOW(), {?}, {?})',
1146 ip_to_uint(trim(Post
::v('ipN'))), ip_to_uint(trim(Post
::v('maskN'))),
1147 Post
::v('stateN'), S
::i('uid'), Post
::v('descriptionN'));
1152 S
::assert_xsrf_token();
1153 Xdb
::execute('UPDATE ip_watch
1154 SET state = {?}, last = NOW(), uid = {?}, description = {?}, mask = {?}
1155 WHERE ip = {?}', Post
::v('stateN'), S
::i('uid'), Post
::v('descriptionN'),
1156 ip_to_uint(Post
::v('maskN')), ip_to_uint(Post
::v('ipN')));
1160 if ($action == 'delete' && !is_null($ip)) {
1161 S
::assert_xsrf_token();
1162 Xdb
::execute('DELETE FROM ip_watch WHERE ip = {?}', ip_to_uint($ip));
1165 if ($action != 'create' && $action != 'edit') {
1168 $page->assign('action', $action);
1170 if ($action == 'list') {
1171 $sql = "SELECT w.ip, IF(s.ip IS NULL,
1172 IF(w.ip = s2.ip, s2.host, s2.forward_host),
1173 IF(w.ip = s.ip, s.host, s.forward_host)),
1174 w.mask, w.detection, w.state, u.hruid
1175 FROM #x4dat#.ip_watch AS w
1176 LEFT JOIN #logger#.sessions AS s ON (s.ip = w.ip)
1177 LEFT JOIN #logger#.sessions AS s2 ON (s2.forward_ip = w.ip)
1178 LEFT JOIN #x4dat#.auth_user_md5 AS u ON (u.user_id = s.uid)
1179 GROUP BY w.ip, u.hruid
1180 ORDER BY w.state, w.ip, u.hruid";
1181 $it = Xdb
::iterRow($sql);
1185 while (list($ip, $host, $mask, $date, $state, $hruid) = $it->next()) {
1186 $ip = uint_to_ip($ip);
1187 $mask = uint_to_ip($mask);
1188 if (count($props) == 0 ||
$props['ip'] != $ip) {
1189 if (count($props) > 0) {
1192 $props = array('ip' => $ip,
1195 'detection' => $date,
1197 'users' => array($hruid));
1199 $props['users'][] = $hruid;
1202 if (count($props) > 0) {
1205 $page->assign('table', $table);
1206 } elseif ($action == 'edit') {
1207 $sql = "SELECT w.detection, w.state, w.last, w.description, w.mask,
1208 u1.hruid AS edit, u2.hruid AS hruid, s.host
1209 FROM #x4dat#.ip_watch AS w
1210 LEFT JOIN #x4dat#.auth_user_md5 AS u1 ON (u1.user_id = w.uid)
1211 LEFT JOIN #logger#.sessions AS s ON (w.ip = s.ip)
1212 LEFT JOIN #x4dat#.auth_user_md5 AS u2 ON (u2.user_id = s.uid)
1216 $it = Xdb
::iterRow($sql, ip_to_uint($ip));
1219 while (list($detection, $state, $last, $description, $mask, $edit, $hruid, $host) = $it->next()) {
1220 if (count($props) == 0) {
1221 $props = array('ip' => $ip,
1222 'mask' => uint_to_ip($mask),
1224 'detection' => $detection,
1227 'description' => $description,
1229 'users' => array($hruid));
1231 $props['users'][] = $hruid;
1234 $page->assign('ip', $props);
1238 function handler_icons(&$page)
1240 $page->changeTpl('admin/icons.tpl');
1241 $dh = opendir('../htdocs/images/icons');
1243 $page->trigError('Dossier des icones introuvables.');
1246 while (($file = readdir($dh)) !== false
) {
1247 if (strlen($file) > 4 && substr($file,-4) == '.gif') {
1248 array_push($icons, substr($file, 0, -4));
1252 $page->assign('icons', $icons);
1255 function handler_accounts(&$page)
1257 $page->changeTpl('admin/accounts.tpl');
1258 $page->assign('disabled', XDB
::iterator('SELECT u.nom, u.prenom, u.promo, u.comment, u.hruid
1259 FROM auth_user_md5 AS u
1260 WHERE perms = \'disabled\'
1261 ORDER BY nom, prenom'));
1262 $page->assign('admins', XDB
::iterator('SELECT u.nom, u.prenom, u.promo, u.hruid
1263 FROM auth_user_md5 AS u
1264 WHERE perms = \'admin\'
1265 ORDER BY nom, prenom'));
1269 // vim:set et sw=4 sts=4 sws=4 foldmethod=marker enc=utf-8: