Merge commit 'origin/fusionax' into account
[platal.git] / modules / admin.php
1 <?php
2 /***************************************************************************
3 * Copyright (C) 2003-2008 Polytechnique.org *
4 * http://opensource.polytechnique.org/ *
5 * *
6 * This program is free software; you can redistribute it and/or modify *
7 * it under the terms of the GNU General Public License as published by *
8 * the Free Software Foundation; either version 2 of the License, or *
9 * (at your option) any later version. *
10 * *
11 * This program is distributed in the hope that it will be useful, *
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
14 * GNU General Public License for more details. *
15 * *
16 * You should have received a copy of the GNU General Public License *
17 * along with this program; if not, write to the Free Software *
18 * Foundation, Inc., *
19 * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA *
20 ***************************************************************************/
21
22 class AdminModule extends PLModule
23 {
24 function handlers()
25 {
26 return array(
27 'phpinfo' => $this->make_hook('phpinfo', AUTH_MDP, 'admin'),
28 'get_rights' => $this->make_hook('get_rights', AUTH_MDP, 'admin'),
29 'admin' => $this->make_hook('default', AUTH_MDP, 'admin'),
30 'admin/ax-xorg' => $this->make_hook('ax_xorg', AUTH_MDP, 'admin'),
31 'admin/dead-but-active' => $this->make_hook('dead_but_active', AUTH_MDP, 'admin'),
32 'admin/deaths' => $this->make_hook('deaths', AUTH_MDP, 'admin'),
33 'admin/downtime' => $this->make_hook('downtime', AUTH_MDP, 'admin'),
34 'admin/homonyms' => $this->make_hook('homonyms', AUTH_MDP, 'admin'),
35 'admin/logger' => $this->make_hook('logger', AUTH_MDP, 'admin'),
36 'admin/logger/actions' => $this->make_hook('logger_actions', AUTH_MDP, 'admin'),
37 'admin/postfix/blacklist' => $this->make_hook('postfix_blacklist', AUTH_MDP, 'admin'),
38 'admin/postfix/delayed' => $this->make_hook('postfix_delayed', AUTH_MDP, 'admin'),
39 'admin/postfix/regexp_bounces' => $this->make_hook('postfix_regexpsbounces', AUTH_MDP, 'admin'),
40 'admin/postfix/whitelist' => $this->make_hook('postfix_whitelist', AUTH_MDP, 'admin'),
41 'admin/mx/broken' => $this->make_hook('mx_broken', AUTH_MDP, 'admin'),
42 'admin/skins' => $this->make_hook('skins', AUTH_MDP, 'admin'),
43 'admin/synchro_ax' => $this->make_hook('synchro_ax', AUTH_MDP, 'admin'),
44 'admin/user' => $this->make_hook('user', AUTH_MDP, 'admin'),
45 'admin/promo' => $this->make_hook('promo', AUTH_MDP, 'admin'),
46 'admin/validate' => $this->make_hook('validate', AUTH_MDP, 'admin'),
47 'admin/validate/answers' => $this->make_hook('validate_answers', AUTH_MDP, 'admin'),
48 'admin/wiki' => $this->make_hook('wiki', AUTH_MDP, 'admin'),
49 'admin/ipwatch' => $this->make_hook('ipwatch', AUTH_MDP, 'admin'),
50 'admin/icons' => $this->make_hook('icons', AUTH_MDP, 'admin'),
51 'admin/accounts' => $this->make_hook('accounts', AUTH_MDP, 'admin'),
52 'admin/account/types' => $this->make_hook('account_types', AUTH_MDP, 'admin'),
53 );
54 }
55
56 function handler_phpinfo(&$page)
57 {
58 phpinfo();
59 exit;
60 }
61
62 function handler_get_rights(&$page, $level)
63 {
64 if (S::suid()) {
65 $page->kill('Déjà en SUID');
66 }
67 $user =& S::user();
68 Platal::session()->startSUID($user, $level);
69
70 pl_redirect('/');
71 }
72
73 function handler_default(&$page)
74 {
75 $page->changeTpl('admin/index.tpl');
76 $page->setTitle('Administration');
77 }
78
79 function handler_postfix_delayed(&$page)
80 {
81 $page->changeTpl('admin/postfix_delayed.tpl');
82 $page->setTitle('Administration - Postfix : Retardés');
83
84 if (Env::has('del')) {
85 $crc = Env::v('crc');
86 XDB::execute("UPDATE postfix_mailseen SET release = 'del' WHERE crc = {?}", $crc);
87 $page->trigSuccess($crc." verra tous ses emails supprimés !");
88 } elseif (Env::has('ok')) {
89 $crc = Env::v('crc');
90 XDB::execute("UPDATE postfix_mailseen SET release = 'ok' WHERE crc = {?}", $crc);
91 $page->trigSuccess($crc." a le droit de passer !");
92 }
93
94 $sql = XDB::iterator(
95 "SELECT crc, nb, update_time, create_time,
96 FIND_IN_SET('del', release) AS del,
97 FIND_IN_SET('ok', release) AS ok
98 FROM postfix_mailseen
99 WHERE nb >= 30
100 ORDER BY release != ''");
101
102 $page->assign_by_ref('mails', $sql);
103 }
104
105 function handler_postfix_regexpsbounces(&$page, $new = null) {
106 $page->changeTpl('admin/emails_bounces_re.tpl');
107 $page->setTitle('Administration - Postfix : Regexps Bounces');
108 $page->assign('new', $new);
109
110 if (Post::has('submit')) {
111 foreach (Env::v('lvl') as $id=>$val) {
112 XDB::query(
113 "REPLACE INTO emails_bounces_re (id,pos,lvl,re,text) VALUES ({?}, {?}, {?}, {?}, {?})",
114 $id, $_POST['pos'][$id], $_POST['lvl'][$id], $_POST['re'][$id], $_POST['text'][$id]
115 );
116 }
117 }
118
119 $page->assign('bre', XDB::iterator("SELECT * FROM emails_bounces_re ORDER BY pos"));
120 }
121
122 // {{{ logger view
123
124 /** Retrieves the available days for a given year and month.
125 * Obtain a list of days of the given month in the given year
126 * that are within the range of dates that we have log entries for.
127 *
128 * @param integer year
129 * @param integer month
130 * @return array days in that month we have log entries covering.
131 * @private
132 */
133 function _getDays($year, $month)
134 {
135 // give a 'no filter' option
136 $months[0] = "----";
137
138 if ($year && $month) {
139 $day_max = Array(-1, 31, checkdate(2, 29, $year) ? 29 : 28 , 31,
140 30, 31, 30, 31, 31, 30, 31, 30, 31);
141 $res = XDB::query("SELECT YEAR (MAX(start)), YEAR (MIN(start)),
142 MONTH(MAX(start)), MONTH(MIN(start)),
143 DAYOFMONTH(MAX(start)),
144 DAYOFMONTH(MIN(start))
145 FROM logger.sessions");
146 list($ymax, $ymin, $mmax, $mmin, $dmax, $dmin) = $res->fetchOneRow();
147
148 if (($year < $ymin) || ($year == $ymin && $month < $mmin)) {
149 return array();
150 }
151
152 if (($year > $ymax) || ($year == $ymax && $month > $mmax)) {
153 return array();
154 }
155
156 $min = ($year==$ymin && $month==$mmin) ? intval($dmin) : 1;
157 $max = ($year==$ymax && $month==$mmax) ? intval($dmax) : $day_max[$month];
158
159 for($i = $min; $i<=$max; $i++) {
160 $days[$i] = $i;
161 }
162 }
163 return $days;
164 }
165
166
167 /** Retrieves the available months for a given year.
168 * Obtains a list of month numbers that are within the timeframe that
169 * we have log entries for.
170 *
171 * @param integer year
172 * @return array List of month numbers we have log info for.
173 * @private
174 */
175 function _getMonths($year)
176 {
177 // give a 'no filter' option
178 $months[0] = "----";
179
180 if ($year) {
181 $res = XDB::query("SELECT YEAR (MAX(start)), YEAR (MIN(start)),
182 MONTH(MAX(start)), MONTH(MIN(start))
183 FROM logger.sessions");
184 list($ymax, $ymin, $mmax, $mmin) = $res->fetchOneRow();
185
186 if (($year < $ymin) || ($year > $ymax)) {
187 return array();
188 }
189
190 $min = $year == $ymin ? intval($mmin) : 1;
191 $max = $year == $ymax ? intval($mmax) : 12;
192
193 for($i = $min; $i<=$max; $i++) {
194 $months[$i] = $i;
195 }
196 }
197 return $months;
198 }
199
200
201 /** Retrieves the available years.
202 * Obtains a list of years that we have log entries covering.
203 *
204 * @return array years we have log entries for.
205 * @private
206 */
207 function _getYears()
208 {
209 // give a 'no filter' option
210 $years[0] = "----";
211
212 // retrieve available years
213 $res = XDB::query("select YEAR(MAX(start)), YEAR(MIN(start)) FROM logger.sessions");
214 list($max, $min) = $res->fetchOneRow();
215
216 for($i = intval($min); $i<=$max; $i++) {
217 $years[$i] = $i;
218 }
219 return $years;
220 }
221
222
223 /** Make a where clause to get a user's sessions.
224 * Prepare the where clause request that will retrieve the sessions.
225 *
226 * @param $year INTEGER Only get log entries made during the given year.
227 * @param $month INTEGER Only get log entries made during the given month.
228 * @param $day INTEGER Only get log entries made during the given day.
229 * @param $uid INTEGER Only get log entries referring to the given user ID.
230 *
231 * @return STRING the WHERE clause of a query, including the 'WHERE' keyword
232 * @private
233 */
234 function _makeWhere($year, $month, $day, $uid)
235 {
236 // start constructing the "where" clause
237 $where = array();
238
239 if ($uid)
240 array_push($where, "uid='$uid'");
241
242 // we were given at least a year
243 if ($year) {
244 if ($day) {
245 $dmin = mktime(0, 0, 0, $month, $day, $year);
246 $dmax = mktime(0, 0, 0, $month, $day+1, $year);
247 } elseif ($month) {
248 $dmin = mktime(0, 0, 0, $month, 1, $year);
249 $dmax = mktime(0, 0, 0, $month+1, 1, $year);
250 } else {
251 $dmin = mktime(0, 0, 0, 1, 1, $year);
252 $dmax = mktime(0, 0, 0, 1, 1, $year+1);
253 }
254 $where[] = "start >= " . date("Ymd000000", $dmin);
255 $where[] = "start < " . date("Ymd000000", $dmax);
256 }
257
258 if (!empty($where)) {
259 return ' WHERE ' . implode($where, " AND ");
260 } else {
261 return '';
262 }
263 // WE know it's totally reversed, so better use array_reverse than a SORT BY start DESC
264 }
265
266 // }}}
267
268 function handler_logger(&$page, $action = null, $arg = null) {
269 if ($action == 'session') {
270
271 // we are viewing a session
272 $res = XDB::query("SELECT ls.*, a.alias AS username, sa.alias AS suer
273 FROM logger.sessions AS ls
274 LEFT JOIN aliases AS a ON (a.id = ls.uid AND a.type='a_vie')
275 LEFT JOIN aliases AS sa ON (sa.id = ls.suid AND sa.type='a_vie')
276 WHERE ls.id = {?}", $arg);
277
278 $page->assign('session', $a = $res->fetchOneAssoc());
279
280 $res = XDB::iterator('SELECT a.text, e.data, e.stamp
281 FROM logger.events AS e
282 LEFT JOIN logger.actions AS a ON e.action=a.id
283 WHERE e.session={?}', $arg);
284 while ($myarr = $res->next()) {
285 $page->append('events', $myarr);
286 }
287
288 } else {
289 $loguser = $action == 'user' ? $arg : Env::v('loguser');
290
291 $res = XDB::query('SELECT id FROM aliases WHERE alias={?}',
292 $loguser);
293 $loguid = $res->fetchOneCell();
294
295 if ($loguid) {
296 $year = Env::i('year');
297 $month = Env::i('month');
298 $day = Env::i('day');
299 } else {
300 $year = Env::i('year', intval(date('Y')));
301 $month = Env::i('month', intval(date('m')));
302 $day = Env::i('day', intval(date('d')));
303 }
304
305 if (!$year)
306 $month = 0;
307 if (!$month)
308 $day = 0;
309
310 // smarty assignments
311 // retrieve available years
312 $page->assign('years', $this->_getYears());
313 $page->assign('year', $year);
314
315 // retrieve available months for the current year
316 $page->assign('months', $this->_getMonths($year));
317 $page->assign('month', $month);
318
319 // retrieve available days for the current year and month
320 $page->assign('days', $this->_getDays($year, $month));
321 $page->assign('day', $day);
322
323 $page->assign('loguser', $loguser);
324 // smarty assignments
325
326 if ($loguid || $year) {
327
328 // get the requested sessions
329 $where = $this->_makeWhere($year, $month, $day, $loguid);
330 $select = "SELECT s.id, s.start, s.uid,
331 a.alias as username
332 FROM logger.sessions AS s
333 LEFT JOIN aliases AS a ON (a.id = s.uid AND a.type='a_vie')
334 $where
335 ORDER BY start DESC";
336 $res = XDB::iterator($select);
337
338 $sessions = array();
339 while ($mysess = $res->next()) {
340 $mysess['events'] = array();
341 $sessions[$mysess['id']] = $mysess;
342 }
343 array_reverse($sessions);
344
345 // attach events
346 $sql = "SELECT s.id, a.text
347 FROM logger.sessions AS s
348 LEFT JOIN logger.events AS e ON(e.session=s.id)
349 INNER JOIN logger.actions AS a ON(a.id=e.action)
350 $where";
351
352 $res = XDB::iterator($sql);
353 while ($event = $res->next()) {
354 array_push($sessions[$event['id']]['events'], $event['text']);
355 }
356 $page->assign_by_ref('sessions', $sessions);
357 } else {
358 $page->assign('msg_nofilters', "Sélectionner une annuée et/ou un utilisateur");
359 }
360 }
361
362 $page->changeTpl('admin/logger-view.tpl');
363
364 $page->setTitle('Administration - Logs des sessions');
365 }
366
367 function handler_user(&$page, $login = false)
368 {
369 global $globals;
370 $page->changeTpl('admin/utilisateurs.tpl');
371 $page->setTitle('Administration - Compte');
372 require_once("emails.inc.php");
373
374 if (S::suid()) {
375 $page->kill("Déjà en SUID !!!");
376 }
377
378 // Loads the user identity using the environment.
379 if ($login) {
380 $user = User::get($login);
381 } else if (Env::has('user_id')) {
382 $user = User::get(Env::i('user_id'));
383 } else if (Env::has('login')) {
384 $user = User::get(Env::v('login'));
385 }
386
387 if ($user) {
388 $login = $user->login();
389 $registered = $user->state != 'pending';
390 } else {
391 return;
392 }
393
394 // Handles specific requests (AX sync, su, ...).
395 if(Env::has('logs_account')) {
396 pl_redirect("admin/logger?loguser=$login&year=".date('Y')."&month=".date('m'));
397 }
398
399 if(Env::has('su_button') && $registered) {
400 if (!Platal::session()->startSUID($user)) {
401 $page->trigError('Impossible d\'effectuer un SUID sur ' . $user->login());
402 } else {
403 pl_redirect("");
404 }
405 }
406
407 // Fetches user data.
408 $redirect = ($registered ? new Redirect($user) : null);
409
410 // Account Form {{{
411 $to_update = array();
412 if (Env::has('disable_weak_access')) {
413 S::assert_xsrf_token();
414 $to_update['weak_password'] = null;
415 } else if (Env::has('update_account')) {
416 S::assert_xsrf_token();
417 if (Env::s('full_name') != $user->fullName()) {
418 $to_update['full_name'] = Env::s('full_name');
419 }
420 if (Env::s('display_name') != $user->displayName()) {
421 $to_update['display_name'] = Env::s('display_name');
422 }
423 if (Env::s('sex') != ($user->isFemale() ? 'female' : 'male')) {
424 $to_update['sex'] = Env::s('sex');
425 }
426 if (!Env::blank('hashpass')) {
427 $to_update['password'] = Env::s('hashpass');
428 }
429 if (!Env::blank('weak_password')) {
430 $to_update['weak_password'] = Env::s('weak_password');
431 }
432 if (Env::i('token_access', 0) != ($user->token_access ? 1 : 0)) {
433 $to_update['token'] = Env::i('token_access') ? rand_url_id(16) : null;
434 }
435 if (Env::i('skin', 0) != $user->skin) {
436 $to_update['skin'] = Env::i('skin', 0);
437 if ($to_update['skin'] == 0) {
438 $to_update['skin'] = null;
439 }
440 }
441 if (Env::s('state') != $user->state) {
442 $to_update['state'] = Env::s('state');
443 }
444 if (Env::i('is_admin', 0) != ($user->is_admin ? 1 : 0)) {
445 $to_update['is_admin'] = Env::b('is_admin');
446 }
447 if (Env::s('type') != $user->type) {
448 $to_update['type'] = Env::s('type');
449 }
450 if (Env::i('watch', 0) != ($user->watch ? 1 : 0)) {
451 $to_update['flags'] = new PlFlagset();
452 $to_update['flags']->addFlag('watch', Env::i('watch'));
453 }
454 if (Env::t('comment') != $user->comment) {
455 $to_update['comment'] = Env::blank('comment') ? null : Env::t('comment');
456 }
457 }
458 if (!empty($to_update)) {
459 $set = array();
460 foreach ($to_update as $k => $value) {
461 $set[] = XDB::format($k . ' = {?}', $value);
462 }
463 XDB::execute('UPDATE accounts
464 SET ' . implode(', ', $set) . '
465 WHERE uid = ' . XDB::format('{?}', $user->id()));
466 $page->trigSuccess('Données du compte mise à jour avec succès');
467 $user = User::getWithUID($user->id());
468 }
469 // }}}
470 // Profile form {{{
471 if (Env::has('add_profile') || Env::has('del_profile') || Env::has('owner')) {
472 S::assert_xsrf_token();
473 if (Env::i('del_profile', 0) != 0) {
474 XDB::execute('DELETE FROM account_profiles
475 WHERE uid = {?} AND pid = {?}',
476 $user->id(), Env::i('del_profile'));
477 } else if (!Env::blank('new_profile')) {
478 $profile = Profile::get(Env::t('new_profile'));
479 if (!$profile) {
480 $page->trigError('Le profil ' . Env::t('new_profile') . ' n\'existe pas');
481 } else {
482 XDB::execute('INSERT IGNORE INTO account_profiles (uid, pid)
483 VALUES ({?}, {?})',
484 $user->id(), $profile->id());
485 }
486 }
487 XDB::execute('UPDATE account_profiles
488 SET perms = IF(pid = {?}, CONCAT(perms, \',owner\'), REPLACE(perms, \'owner\', \'\'))
489 WHERE uid = {?}',
490 Env::i('owner'), $user->id());
491 }
492
493
494 // }}}
495
496 $page->addJsLink('ui.core.js');
497 $page->addJsLink('ui.tabs.js');
498
499
500 // Processes admin requests, if any.
501 foreach($_POST as $key => $val) {
502 S::assert_xsrf_token();
503
504 switch ($key) {
505 // Email redirection actions.
506 case "add_fwd":
507 $email = trim(Env::v('email'));
508 if (!isvalid_email_redirection($email)) {
509 $page->trigError("Email non valide: $email");
510 } else {
511 $redirect->add_email($email);
512 $page->trigSuccess("Ajout de $email effectué");
513 }
514 break;
515
516 case "del_fwd":
517 if (!empty($val)) {
518 $redirect->delete_email($val);
519 }
520 break;
521
522 case "activate_fwd":
523 if (!empty($val)) {
524 $redirect->modify_one_email($val, true);
525 }
526 break;
527 case "deactivate_fwd":
528 if (!empty($val)) {
529 $redirect->modify_one_email($val, false);
530 }
531 break;
532 case "disable_fwd":
533 $redirect->disable();
534 break;
535 case "enable_fwd":
536 $redirect->enable();
537 break;
538 case "clean_fwd":
539 if (!empty($val)) {
540 $redirect->clean_errors($val);
541 }
542 break;
543
544 // Alias actions.
545 case "add_alias":
546 global $globals;
547
548 // Splits new alias in user and fqdn.
549 $alias = trim(Env::v('email'));
550 if (strpos($alias, '@') !== false) {
551 list($alias, $domain) = explode('@', $alias);
552 } else {
553 $domain = $globals->mail->domain;
554 }
555
556 // Checks for alias' user validity.
557 if (!preg_match('/[-a-z0-9\.]+/s', $alias)) {
558 $page->trigError("'$alias' n'est pas un alias valide");
559 }
560
561 // Eventually adds the alias to the right domain.
562 if ($domain == $globals->mail->alias_dom || $domain == $globals->mail->alias_dom2) {
563 $req = new AliasReq($user, $alias, 'Admin request', false);
564 if ($req->commit()) {
565 $page->trigSuccess("Nouvel alias '$alias@$domain' attribué");
566 } else {
567 $page->trigError("Impossible d'ajouter l'alias '$alias@$domain', il est probablement déjà attribué");
568 }
569 } elseif ($domain == $globals->mail->domain || $domain == $globals->mail->domain2) {
570 $res = XDB::execute("INSERT INTO aliases (id,alias,type) VALUES ({?}, {?}, 'alias')",
571 $user->id(), $alias);
572 if ($res) {
573 $page->trigSuccess("Nouvel alias '$alias' ajouté");
574 } else {
575 $page->trigError("Impossible d'ajouter l'alias '$alias', il est probablement déjà attribué");
576 }
577 } else {
578 $page->trigError("Le domaine '$domain' n'est pas valide");
579 }
580 break;
581
582 case "del_alias":
583 if (!empty($val)) {
584 XDB::execute("DELETE FROM aliases
585 WHERE id = {?} AND alias = {?} AND
586 type NOT IN ('a_vie', 'homonyme')",
587 $user->id(), $val);
588 XDB::execute("UPDATE emails
589 SET rewrite = ''
590 WHERE uid = {?} AND rewrite LIKE CONCAT({?}, '@%')",
591 $user->id(), $val);
592 fix_bestalias($user);
593 $page->trigSuccess("L'alias '$val' a été supprimé");
594 }
595 break;
596
597 case "best":
598 XDB::execute("UPDATE aliases
599 SET flags = TRIM(BOTH ',' FROM REPLACE(CONCAT(',', flags, ','), ',bestalias,', ','))
600 WHERE id = {?}", $user->id());
601 XDB::execute("UPDATE aliases
602 SET flags = CONCAT_WS(',', IF(flags = '', NULL, flags), 'bestalias')
603 WHERE id = {?} AND alias = {?}", $user->id(), $val);
604
605 // As having a non-null bestalias value is critical in
606 // plat/al's code, we do an a posteriori check on the
607 // validity of the bestalias.
608 fix_bestalias($user);
609 break;
610
611 // Profile edition.
612 case "u_edit":
613 // Loads new values from environment.
614 $pass_encrypted = Env::v('newpass_clair') != "********" ? sha1(Env::v('newpass_clair')) : Env::v('passw');
615 $naiss = Env::v('naissanceN');
616 $deces = Env::v('decesN');
617 $perms = Env::v('permsN');
618 $prenom = Env::v('prenomN');
619 $nom = Env::v('nomN');
620 $nomusage = Env::v('nomusageN');
621 $promo = Env::i('promoN');
622 $sexe = Env::v('sexeN');
623 $comm = trim(Env::v('commentN'));
624 $watch = Env::v('watchN');
625
626 $flags = ($sexe ? 'femme' : '');
627 if ($watch) {
628 $flags .= ($flags ? ',watch' : 'watch');
629 }
630 if ($watch && !$comm) {
631 $page->trigError("Il est nécessaire de mettre un commentaire pour surveiller un compte");
632 break;
633 }
634
635 // Fetches fields to watch for changes.
636 $watch_query = "SELECT naissance, deces, password, perms, nom_usage,
637 prenom, nom, flags, promo, comment
638 FROM auth_user_md5
639 WHERE user_id = {?}";
640 $old_fields = XDB::query($watch_query, $user->id())->fetchOneAssoc();
641
642 // If user was newly banned, we need to ensure her php session
643 // is killed. This hack is ugly (and largely overkill); it should
644 // however suits our needs.
645 if ($perms == 'disabled' && $old_fields['perms'] != 'disabled') {
646 kill_sessions();
647 }
648
649 // Updates the user profile with the new values.
650 $res = XDB::execute("UPDATE auth_user_md5
651 SET naissance = {?}, deces = {?}, password = {?},
652 perms = {?}, prenom = {?}, nom = {?}, nom_usage = {?},
653 flags = {?}, promo = {?}, comment = {?}
654 WHERE user_id = {?}",
655 $naiss, $deces, $pass_encrypted,
656 $perms, $prenom, $nom, $nomusage,
657 $flags, $promo, $comm, $user->id());
658 if ($res) {
659 require_once("user.func.inc.php");
660 user_reindex($user->id());
661 $new_fields = XDB::query($watch_query, $user->id())->fetchOneAssoc();
662
663 $mailer = new PlMailer("admin/useredit.mail.tpl");
664 $mailer->assign("admin", S::user()->login());
665 $mailer->assign("user", $user->login());
666 $mailer->assign('old', $old_fields);
667 $mailer->assign('new', $new_fields);
668 $mailer->send();
669
670 $globals->updateNbIns();
671 $page->trigSuccess("Update was successful.");
672 } else {
673 $page->trigError("Update failed, please double check your values.");
674 }
675
676 // Checks for changes, and updates other tables of plat/al.
677 if (Env::v('nomusageN') != $mr['nom_usage']) {
678 set_new_usage($user->id(), Env::v('nomusageN'), make_username(Env::v('prenomN'), Env::v('nomusageN')));
679 }
680 if (Env::v('decesN') != $mr['deces']) {
681 require_once 'notifs.inc.php';
682 register_watch_op($user->id(), WATCH_DEATH, $mr['deces']);
683 user_clear_all_subs($user->id(), false);
684 }
685
686 // Eventually updates the Google Apps account.
687 if ($globals->mailstorage->googleapps_domain) {
688 // If the user did choose to use synchronized passwords,
689 // and the password was changed, updates the Google Apps
690 // password as well.
691 if (Env::v('newpass_clair') != "********") {
692 require_once 'googleapps.inc.php';
693 $account = new GoogleAppsAccount($user);
694 if ($account->active() && $account->sync_password) {
695 $account->set_password($pass_encrypted);
696 }
697 }
698
699 // If the update did disable the user account, disables
700 // the Google Apps account as well.
701 if ($new_fields['perms'] == 'disabled' && $new_fields['perms'] != $old_fields['perms']) {
702 require_once 'googleapps.inc.php';
703 $account = new GoogleAppsAccount($user);
704 $account->suspend();
705 }
706 }
707
708
709 // Reloads the user profile, to ensure the latest version will
710 // be served to the administrator.
711 $mr = XDB::query($userinfo_query, $user->id())->fetchOneAssoc();
712
713 break;
714
715 // User re-registration.
716 case "u_kill":
717 require_once('user.func.inc.php');
718 user_clear_all_subs($user->id());
719 $globals->updateNbIns();
720 $page->trigSuccess("'" . $user->id() . "' a été désinscrit !");
721
722 $mailer = new PlMailer("admin/useredit.mail.tpl");
723 $mailer->assign("admin", S::user()->login());
724 $mailer->assign("user", $user->login());
725 $mailer->assign("deletion", true);
726 $mailer->send();
727 break;
728
729 // Forum ban update.
730 case "b_edit":
731 XDB::execute("DELETE FROM forum_innd WHERE uid = {?}", $user->id());
732 if (Env::v('write_perm') != "" || Env::v('read_perm') != "" || Env::v('commentaire') != "" ) {
733 XDB::execute("INSERT INTO forum_innd
734 SET ipmin = '0', ipmax = '4294967295',
735 write_perm = {?}, read_perm = {?},
736 comment = {?}, priority = '200', uid = {?}",
737 Env::v('write_perm'), Env::v('read_perm'), Env::v('comment'), $user->id());
738 }
739 break;
740 }
741 }
742
743 // Displays last login and last host information.
744 $res = XDB::query("SELECT start, host
745 FROM logger.sessions
746 WHERE uid = {?} AND suid = 0
747 ORDER BY start DESC
748 LIMIT 1", $user->id());
749 list($lastlogin,$host) = $res->fetchOneRow();
750 $page->assign('lastlogin', $lastlogin);
751 $page->assign('host', $host);
752
753 // Display active aliases.
754 $page->assign('virtuals', $user->emailAliases());
755 $page->assign('aliases', XDB::iterator(
756 "SELECT alias, type='a_vie' AS for_life,FIND_IN_SET('bestalias',flags) AS best,expire
757 FROM aliases
758 WHERE id = {?} AND type != 'homonyme'
759 ORDER BY type != 'a_vie'", $user->id()));
760 $page->assign('account_types', XDB::iterator('SELECT * FROM account_types ORDER BY type'));
761 $page->assign('skins', XDB::iterator('SELECT id, name FROM skins ORDER BY name'));
762 $page->assign('profiles', XDB::iterator('SELECT p.pid, p.hrpid, FIND_IN_SET(\'owner\', ap.perms) AS owner
763 FROM account_profiles AS ap
764 INNER JOIN profiles AS p ON (ap.pid = p.pid)
765 WHERE ap.uid = {?}', $user->id()));
766
767 // Displays email redirection and the general profile.
768 if ($registered && $redirect) {
769 $page->assign('emails', $redirect->emails);
770 }
771
772 $page->assign('mr', $mr);
773 $page->assign('user', $user);
774
775 // Displays forum bans.
776 $res = XDB::query("SELECT write_perm, read_perm, comment
777 FROM forum_innd
778 WHERE uid = {?}", $user->id());
779 $bans = $res->fetchOneAssoc();
780 $page->assign('bans', $bans);
781 }
782
783 function getHruid($line, $key)
784 {
785 var_dump($line);
786 if (!isset($line['nom']) || !isset($line['prenom']) || !isset($line['promo'])) {
787 return null;
788 }
789 return make_forlife($line['prenom'], $line['nom'], $line['promo']);
790 }
791
792 function getMatricule($line, $key)
793 {
794 $mat = $line['matricule'];
795 $year = intval(substr($mat, 0, 3));
796 $rang = intval(substr($mat, 3, 3));
797 if ($year > 200) { $year /= 10; };
798 if ($year < 96) {
799 return null;
800 } else {
801 return sprintf('%04u%04u', 1900+$year, $rang);
802 }
803 }
804
805 function handler_promo(&$page, $action = null, $promo = null)
806 {
807 if (Env::has('promo')) {
808 if(Env::i('promo') > 1900 && Env::i('promo') < 2050) {
809 $action = Env::v('valid_promo') == 'Ajouter des membres' ? 'add' : 'ax';
810 pl_redirect('admin/promo/' . $action . '/' . Env::i('promo'));
811 } else {
812 $page->trigError('Promotion non valide.');
813 }
814 }
815
816 $page->changeTpl('admin/promo.tpl');
817 if ($promo > 1900 && $promo < 2050 && ($action == 'add' || $action == 'ax')) {
818 $page->assign('promo', $promo);
819 } else {
820 return;
821 }
822
823 $importer = new CSVImporter('auth_user_md5', 'matricule');
824 $importer->registerFunction('matricule', 'matricule Ecole vers X.org', array($this, 'getMatricule'));
825 switch ($action) {
826 case 'add':
827 $fields = array('hruid', 'nom', 'nom_ini', 'prenom', 'naissance_ini',
828 'prenom_ini', 'promo', 'promo_sortie', 'flags',
829 'matricule', 'matricule_ax', 'perms');
830 $importer->forceValue('hruid', array($this, 'getHruid'));
831 $importer->forceValue('promo', $promo);
832 $importer->forceValue('promo_sortie', $promo + 3);
833 break;
834 case 'ax':
835 $fields = array('matricule', 'matricule_ax');
836 break;
837 }
838 $importer->apply($page, "admin/promo/$action/$promo", $fields);
839 }
840
841 function handler_homonyms(&$page, $op = 'list', $target = null)
842 {
843 $page->changeTpl('admin/homonymes.tpl');
844 $page->setTitle('Administration - Homonymes');
845 $this->load("homonyms.inc.php");
846
847 if ($target) {
848 $user = User::getSilent($target);
849 if (!$user || !($loginbis = select_if_homonyme($user))) {
850 $target = 0;
851 } else {
852 $page->assign('user', $user);
853 $page->assign('loginbis',$loginbis);
854 }
855 }
856
857 $page->assign('op', $op);
858 $page->assign('target', $target);
859
860 // on a un $target valide, on prepare les mails
861 if ($target) {
862 // on examine l'op a effectuer
863 switch ($op) {
864 case 'mail':
865 S::assert_xsrf_token();
866
867 send_warning_homonyme($user, $loginbis);
868 switch_bestalias($user, $loginbis);
869 $op = 'list';
870 $page->trigSuccess('Email envoyé à ' . $user->forlifeEmail() . '.');
871 break;
872
873 case 'correct':
874 S::assert_xsrf_token();
875
876 switch_bestalias($user, $loginbis);
877 XDB::execute("UPDATE aliases
878 SET type = 'homonyme', expire=NOW()
879 WHERE alias = {?}", $loginbis);
880 XDB::execute("REPLACE INTO homonymes (homonyme_id,user_id)
881 VALUES ({?}, {?})", $target, $target);
882 send_robot_homonyme($user, $loginbis);
883 $op = 'list';
884 $page->trigSuccess('Email envoyé à ' . $user->forlifeEmail() . ', alias supprimé.');
885 break;
886 }
887 }
888
889 if ($op == 'list') {
890 $res = XDB::iterator(
891 "SELECT a.alias AS homonyme, s.alias AS forlife,
892 IF(h.homonyme_id = s.id, a.expire, NULL) AS expire,
893 IF(h.homonyme_id = s.id, a.type, NULL) AS type,
894 ac.uid AS user_id
895 FROM aliases AS a
896 LEFT JOIN homonymes AS h ON (h.homonyme_id = a.id)
897 INNER JOIN aliases AS s ON (s.id = h.user_id AND s.type='a_vie')
898 INNER JOIN accounts AS ac ON (ac.uid = a.id)
899 WHERE a.type = 'homonyme' OR a.expire != ''
900 ORDER BY a.alias, forlife");
901 $hnymes = Array();
902 while ($tab = $res->next()) {
903 $hnymes[$tab['homonyme']][] = $tab;
904 }
905 $page->assign_by_ref('hnymes',$hnymes);
906 }
907 }
908
909 function handler_ax_xorg(&$page)
910 {
911 $page->changeTpl('admin/ax-xorg.tpl');
912 $page->setTitle('Administration - AX/X.org');
913
914 // liste des différences
915 $res = XDB::query(
916 'SELECT u.promo,u.nom AS nom, u.prenom AS prenom, ia.nom AS nomax,
917 ia.prenom AS prenomax, u.matricule AS mat, ia.matricule_ax AS matax
918 FROM auth_user_md5 AS u
919 INNER JOIN identification_ax AS ia ON u.matricule_ax = ia.matricule_ax
920 WHERE (SOUNDEX(u.nom) != SOUNDEX(ia.nom) AND SOUNDEX(CONCAT(ia.particule,u.nom)) != SOUNDEX(ia.nom)
921 AND SOUNDEX(u.nom) != SOUNDEX(ia.nom_patro) AND SOUNDEX(CONCAT(ia.particule,u.nom)) != SOUNDEX(ia.nom_patro))
922 OR u.prenom != ia.prenom OR (u.promo != ia.promo AND u.promo != ia.promo+1 AND u.promo != ia.promo-1)
923 ORDER BY u.promo,u.nom,u.prenom');
924 $page->assign('diffs', $res->fetchAllAssoc());
925
926 // gens à l'ax mais pas chez nous
927 $res = XDB::query(
928 'SELECT ia.promo,ia.nom,ia.nom_patro,ia.prenom
929 FROM identification_ax as ia
930 LEFT JOIN auth_user_md5 AS u ON u.matricule_ax = ia.matricule_ax
931 WHERE u.nom IS NULL');
932 $page->assign('mank', $res->fetchAllAssoc());
933
934 // gens chez nous et pas à l'ax
935 $res = XDB::query('SELECT promo,nom,prenom FROM auth_user_md5 WHERE matricule_ax IS NULL');
936 $page->assign('plus', $res->fetchAllAssoc());
937 }
938
939 function handler_deaths(&$page, $promo = 0, $validate = false)
940 {
941 $page->changeTpl('admin/deces_promo.tpl');
942 $page->setTitle('Administration - Deces');
943
944 if (!$promo)
945 $promo = Env::i('promo');
946 if (Env::has('sub10')) $promo -= 10;
947 if (Env::has('sub01')) $promo -= 1;
948 if (Env::has('add01')) $promo += 1;
949 if (Env::has('add10')) $promo += 10;
950
951 $page->assign('promo',$promo);
952
953 if ($validate) {
954 S::assert_xsrf_token();
955
956 $res = XDB::iterRow("SELECT user_id,matricule,nom,prenom,deces FROM auth_user_md5 WHERE promo = {?}", $promo);
957 while (list($uid,$mat,$nom,$prenom,$deces) = $res->next()) {
958 $val = Env::v($mat);
959 if($val == $deces || empty($val)) {
960 continue;
961 }
962
963 XDB::execute('UPDATE auth_user_md5 SET deces={?} WHERE matricule = {?}', $val, $mat);
964 $page->trigSuccess('Ajout du décès de ' . $prenom . " " . $nom . ' le ' . $val . '.');
965 if($deces == '0000-00-00' || empty($deces)) {
966 require_once('notifs.inc.php');
967 register_watch_op($uid, WATCH_DEATH, $val);
968 require_once('user.func.inc.php');
969 user_clear_all_subs($uid, false); // by default, dead ppl do not loose their email
970 }
971 }
972 }
973
974 $res = XDB::iterator('SELECT matricule, nom, prenom, deces FROM auth_user_md5 WHERE promo = {?} ORDER BY nom,prenom', $promo);
975 $page->assign('decedes', $res);
976 }
977
978 function handler_dead_but_active(&$page)
979 {
980 $page->changeTpl('admin/dead_but_active.tpl');
981 $page->setTitle('Administration - Décédés');
982
983 $res = XDB::iterator(
984 "SELECT u.promo, u.nom, u.prenom, u.deces, u.matricule_ax, u.hruid, DATE(MAX(s.start)) AS last
985 FROM auth_user_md5 AS u
986 LEFT JOIN logger.sessions AS s ON (s.uid = u.user_id AND suid = 0)
987 WHERE perms IN ('admin', 'user') AND deces <> 0
988 GROUP BY u.user_id
989 ORDER BY u.promo, u.nom");
990 $page->assign('dead', $res);
991 }
992
993 function handler_synchro_ax(&$page, $login = null, $action = null)
994 {
995 $page->changeTpl('admin/synchro_ax.tpl');
996 $page->setTitle('Administration - Synchro AX');
997
998 // Checks for synchronization requirements.
999 require_once('synchro_ax.inc.php');
1000 if (is_ax_key_missing()) {
1001 $page->assign('no_private_key', true);
1002 $page->run();
1003 }
1004
1005 // Determines user identity using environment.
1006 if ($login) {
1007 $user = User::get($login);
1008 } else if (Env::has('user')) {
1009 $user = User::get(Env::v('user'));
1010 } else if (Env::has('mat')) {
1011 $res = XDB::query("SELECT user_id
1012 FROM auth_user_md5
1013 WHERE matricule = {?}",
1014 Env::i('mat'));
1015 $user = User::get($res->fetchOneCell());
1016 } else {
1017 return;
1018 }
1019
1020 // Finally synchronizes the AX and plat/al information.
1021 if ($action == 'import') {
1022 ax_synchronize($user->login(), S::v('uid'));
1023 }
1024
1025 require_once 'profil.func.inc.php';
1026 $userxorg = get_user_details($user->login(), S::v('uid'), 'ax');
1027 $userax = get_user_ax($userxorg['matricule_ax']);
1028 $diff = diff_user_details($userax, $userxorg, 'ax');
1029
1030 $page->assign('x', $userxorg);
1031 $page->assign('diff', $diff);
1032 }
1033
1034 function handler_validate(&$page, $action = 'list', $id = null)
1035 {
1036 $page->changeTpl('admin/valider.tpl');
1037 $page->setTitle('Administration - Valider une demande');
1038 $page->addCssLink('nl.css');
1039 $page->addJsLink('ajax.js');
1040 require_once("validations.inc.php");
1041
1042
1043 if ($action == 'edit' and !is_null($id)) {
1044 $page->assign('preview_id', $id);
1045 }
1046
1047 if(Env::has('uid') && Env::has('type') && Env::has('stamp')) {
1048 S::assert_xsrf_token();
1049
1050 $req = Validate::get_typed_request(Env::v('uid'), Env::v('type'), Env::v('stamp'));
1051 if ($req) {
1052 $req->handle_formu();
1053 } else {
1054 $page->trigWarning('La validation a déjà été effectuée.');
1055 }
1056 }
1057
1058 $r = XDB::iterator('SHOW COLUMNS FROM requests_answers');
1059 while (($a = $r->next()) && $a['Field'] != 'category');
1060 $page->assign('categories', $categories = explode(',', str_replace("'", '', substr($a['Type'], 5, -1))));
1061
1062 $hidden = array();
1063 $res = XDB::query('SELECT hidden_requests FROM requests_hidden WHERE user_id = {?}', S::v('uid'));
1064 $hide_requests = $res->fetchOneCell();
1065 if (Post::has('hide')) {
1066 $hide = array();
1067 foreach ($categories as $cat)
1068 if (!Post::v($cat)) {
1069 $hidden[$cat] = 1;
1070 $hide[] = $cat;
1071 }
1072 $hide_requests = join(',', $hide);
1073 XDB::query('REPLACE INTO requests_hidden (user_id, hidden_requests) VALUES({?}, {?})',
1074 S::v('uid'), $hide_requests);
1075 } elseif ($hide_requests) {
1076 foreach (explode(',', $hide_requests) as $hide_type)
1077 $hidden[$hide_type] = true;
1078 }
1079 $page->assign('hide_requests', $hidden);
1080
1081 // Update the count of item to validate here... useful in development configuration
1082 // where several copies of the site use the same DB, but not the same "dynamic configuration"
1083 global $globals;
1084 $globals->updateNbValid();
1085 $page->assign('vit', new ValidateIterator());
1086 }
1087
1088 function handler_validate_answers(&$page, $action = 'list', $id = null)
1089 {
1090 $page->setTitle('Administration - Réponses automatiques de validation');
1091 $page->assign('title', 'Gestion des réponses automatiques');
1092 $table_editor = new PLTableEditor('admin/validate/answers','requests_answers','id');
1093 $table_editor->describe('category','catégorie',true);
1094 $table_editor->describe('title','titre',true);
1095 $table_editor->describe('answer','texte',false);
1096 $table_editor->apply($page, $action, $id);
1097 }
1098
1099 function handler_skins(&$page, $action = 'list', $id = null)
1100 {
1101 $page->setTitle('Administration - Skins');
1102 $page->assign('title', 'Gestion des skins');
1103 $table_editor = new PLTableEditor('admin/skins','skins','id');
1104 $table_editor->describe('name','nom',true);
1105 $table_editor->describe('skin_tpl','nom du template',true);
1106 $table_editor->describe('auteur','auteur',false);
1107 $table_editor->describe('comment','commentaire',true);
1108 $table_editor->describe('date','date',false);
1109 $table_editor->describe('ext','extension du screenshot',false);
1110 $table_editor->apply($page, $action, $id);
1111 }
1112
1113 function handler_postfix_blacklist(&$page, $action = 'list', $id = null)
1114 {
1115 $page->setTitle('Administration - Postfix : Blacklist');
1116 $page->assign('title', 'Blacklist de postfix');
1117 $table_editor = new PLTableEditor('admin/postfix/blacklist','postfix_blacklist','email', true);
1118 $table_editor->describe('reject_text','Texte de rejet',true);
1119 $table_editor->describe('email','email',true);
1120 $table_editor->apply($page, $action, $id);
1121 }
1122
1123 function handler_postfix_whitelist(&$page, $action = 'list', $id = null)
1124 {
1125 $page->setTitle('Administration - Postfix : Whitelist');
1126 $page->assign('title', 'Whitelist de postfix');
1127 $table_editor = new PLTableEditor('admin/postfix/whitelist','postfix_whitelist','email', true);
1128 $table_editor->describe('email','email',true);
1129 $table_editor->apply($page, $action, $id);
1130 }
1131
1132 function handler_mx_broken(&$page, $action = 'list', $id = null)
1133 {
1134 $page->setTitle('Administration - MX Défaillants');
1135 $page->assign('title', 'MX Défaillant');
1136 $table_editor = new PLTableEditor('admin/mx/broken', 'mx_watch', 'host', true);
1137 $table_editor->describe('host', 'Masque', true);
1138 $table_editor->describe('state', 'Niveau', true);
1139 $table_editor->describe('text', 'Description du problème', false);
1140 $table_editor->apply($page, $action, $id);
1141 }
1142
1143 function handler_logger_actions(&$page, $action = 'list', $id = null)
1144 {
1145 $page->setTitle('Administration - Actions');
1146 $page->assign('title', 'Gestion des actions de logger');
1147 $table_editor = new PLTableEditor('admin/logger/actions','logger.actions','id');
1148 $table_editor->describe('text','intitulé',true);
1149 $table_editor->describe('description','description',true);
1150 $table_editor->apply($page, $action, $id);
1151 }
1152
1153 function handler_downtime(&$page, $action = 'list', $id = null)
1154 {
1155 $page->setTitle('Administration - Coupures');
1156 $page->assign('title', 'Gestion des coupures');
1157 $table_editor = new PLTableEditor('admin/downtime','coupures','id');
1158 $table_editor->describe('debut','date',true);
1159 $table_editor->describe('duree','durée',false);
1160 $table_editor->describe('resume','résumé',true);
1161 $table_editor->describe('services','services affectés',true);
1162 $table_editor->describe('description','description',false);
1163 $table_editor->apply($page, $action, $id);
1164 }
1165
1166 function handler_account_types(&$page, $action = 'list', $id = null)
1167 {
1168 $page->setTitle('Administration - Types de comptes');
1169 $page->assign('title', 'Gestion des types de comptes');
1170 $table_editor = new PLTableEditor('admin/account/types', 'account_types', 'type', true);
1171 $table_editor->describe('type', 'Catégorie', true);
1172 $table_editor->describe('perms', 'Permissions associées', true);
1173 $table_editor->apply($page, $action, $id);
1174 }
1175
1176 function handler_wiki(&$page, $action = 'list', $wikipage = null, $wikipage2 = null)
1177 {
1178 if (S::hasAuthToken()) {
1179 $page->setRssLink('Changement Récents',
1180 '/Site/AllRecentChanges?action=rss&user=' . S::v('hruid') . '&hash=' . S::v('token'));
1181 }
1182
1183 // update wiki perms
1184 if ($action == 'update') {
1185 S::assert_xsrf_token();
1186
1187 $perms_read = Post::v('read');
1188 $perms_edit = Post::v('edit');
1189 if ($perms_read || $perms_edit) {
1190 foreach ($_POST as $wiki_page => $val) {
1191 if ($val == 'on') {
1192 $wp = new PlWikiPage(str_replace(array('_', '/'), '.', $wiki_page));
1193 if ($wp->setPerms($perms_read ? $perms_read : $wp->readPerms(),
1194 $perms_edit ? $perms_edit : $wp->writePerms())) {
1195 $page->trigSuccess("Permission de la page $wiki_page mises à jour");
1196 } else {
1197 $page->trigError("Impossible de mettre les permissions de la page $wiki_page à jour");
1198 }
1199 }
1200 }
1201 }
1202 } else if ($action != 'list' && !empty($wikipage)) {
1203 $wp = new PlWikiPage($wikipage);
1204 S::assert_xsrf_token();
1205
1206 if ($action == 'delete') {
1207 if ($wp->delete()) {
1208 $page->trigSuccess("La page ".$wikipage." a été supprimée.");
1209 } else {
1210 $page->trigError("Impossible de supprimer la page ".$wikipage.".");
1211 }
1212 } else if ($action == 'rename' && !empty($wikipage2) && $wikipage != $wikipage2) {
1213 if ($changedLinks = $wp->rename($wikipage2)) {
1214 $s = 'La page <em>'.$wikipage.'</em> a été déplacée en <em>'.$wikipage2.'</em>.';
1215 if (is_numeric($changedLinks)) {
1216 $s .= $changedLinks.' lien'.(($changedLinks>1)?'s ont été modifiés.':' a été modifié.');
1217 }
1218 $page->trigSuccess($s);
1219 } else {
1220 $page->trigError("Impossible de déplacer la page ".$wikipage);
1221 }
1222 }
1223 }
1224
1225 $perms = PlWikiPage::permOptions();
1226
1227 // list wiki pages and their perms
1228 $wiki_pages = PlWikiPage::listPages();
1229 ksort($wiki_pages);
1230 $wiki_tree = array();
1231 foreach ($wiki_pages as $file => $desc) {
1232 list($cat, $name) = explode('.', $file);
1233 if (!isset($wiki_tree[$cat])) {
1234 $wiki_tree[$cat] = array();
1235 }
1236 $wiki_tree[$cat][$name] = $desc;
1237 }
1238
1239 $page->changeTpl('admin/wiki.tpl');
1240 $page->addJsLink('jquery.js');
1241 $page->assign('wiki_pages', $wiki_tree);
1242 $page->assign('perms_opts', $perms);
1243 }
1244
1245 function handler_ipwatch(&$page, $action = 'list', $ip = null)
1246 {
1247 $page->changeTpl('admin/ipwatcher.tpl');
1248
1249 $states = array('safe' => 'Ne pas surveiller',
1250 'unsafe' => 'Surveiller les inscriptions',
1251 'dangerous' => 'Surveiller tous les accès',
1252 'ban' => 'Bannir cette adresse');
1253 $page->assign('states', $states);
1254
1255 switch (Post::v('action')) {
1256 case 'create':
1257 if (trim(Post::v('ipN')) != '') {
1258 S::assert_xsrf_token();
1259 Xdb::execute('INSERT IGNORE INTO ip_watch (ip, mask, state, detection, last, uid, description)
1260 VALUES ({?}, {?}, {?}, CURDATE(), NOW(), {?}, {?})',
1261 ip_to_uint(trim(Post::v('ipN'))), ip_to_uint(trim(Post::v('maskN'))),
1262 Post::v('stateN'), S::i('uid'), Post::v('descriptionN'));
1263 };
1264 break;
1265
1266 case 'edit':
1267 S::assert_xsrf_token();
1268 Xdb::execute('UPDATE ip_watch
1269 SET state = {?}, last = NOW(), uid = {?}, description = {?}, mask = {?}
1270 WHERE ip = {?}', Post::v('stateN'), S::i('uid'), Post::v('descriptionN'),
1271 ip_to_uint(Post::v('maskN')), ip_to_uint(Post::v('ipN')));
1272 break;
1273
1274 default:
1275 if ($action == 'delete' && !is_null($ip)) {
1276 S::assert_xsrf_token();
1277 Xdb::execute('DELETE FROM ip_watch WHERE ip = {?}', ip_to_uint($ip));
1278 }
1279 }
1280 if ($action != 'create' && $action != 'edit') {
1281 $action = 'list';
1282 }
1283 $page->assign('action', $action);
1284
1285 if ($action == 'list') {
1286 $sql = "SELECT w.ip, IF(s.ip IS NULL,
1287 IF(w.ip = s2.ip, s2.host, s2.forward_host),
1288 IF(w.ip = s.ip, s.host, s.forward_host)),
1289 w.mask, w.detection, w.state, a.hruid
1290 FROM ip_watch AS w
1291 LEFT JOIN logger.sessions AS s ON (s.ip = w.ip)
1292 LEFT JOIN logger.sessions AS s2 ON (s2.forward_ip = w.ip)
1293 LEFT JOIN accounts AS a ON (a.uid = s.uid)
1294 GROUP BY w.ip, a.hruid
1295 ORDER BY w.state, w.ip, a.hruid";
1296 $it = Xdb::iterRow($sql);
1297
1298 $table = array();
1299 $props = array();
1300 while (list($ip, $host, $mask, $date, $state, $hruid) = $it->next()) {
1301 $ip = uint_to_ip($ip);
1302 $mask = uint_to_ip($mask);
1303 if (count($props) == 0 || $props['ip'] != $ip) {
1304 if (count($props) > 0) {
1305 $table[] = $props;
1306 }
1307 $props = array('ip' => $ip,
1308 'mask' => $mask,
1309 'host' => $host,
1310 'detection' => $date,
1311 'state' => $state,
1312 'users' => array($hruid));
1313 } else {
1314 $props['users'][] = $hruid;
1315 }
1316 }
1317 if (count($props) > 0) {
1318 $table[] = $props;
1319 }
1320 $page->assign('table', $table);
1321 } elseif ($action == 'edit') {
1322 $sql = "SELECT w.detection, w.state, w.last, w.description, w.mask,
1323 a1.hruid AS edit, a2.hruid AS hruid, s.host
1324 FROM ip_watch AS w
1325 LEFT JOIN accounts AS a1 ON (a1.uid = w.uid)
1326 LEFT JOIN logger.sessions AS s ON (w.ip = s.ip)
1327 LEFT JOIN accounts AS a2 ON (a2.uid = s.uid)
1328 WHERE w.ip = {?}
1329 GROUP BY a2.hruid
1330 ORDER BY a2.hruid";
1331 $it = Xdb::iterRow($sql, ip_to_uint($ip));
1332
1333 $props = array();
1334 while (list($detection, $state, $last, $description, $mask, $edit, $hruid, $host) = $it->next()) {
1335 if (count($props) == 0) {
1336 $props = array('ip' => $ip,
1337 'mask' => uint_to_ip($mask),
1338 'host' => $host,
1339 'detection' => $detection,
1340 'state' => $state,
1341 'last' => $last,
1342 'description' => $description,
1343 'edit' => $edit,
1344 'users' => array($hruid));
1345 } else {
1346 $props['users'][] = $hruid;
1347 }
1348 }
1349 $page->assign('ip', $props);
1350 }
1351 }
1352
1353 function handler_icons(&$page)
1354 {
1355 $page->changeTpl('admin/icons.tpl');
1356 $dh = opendir('../htdocs/images/icons');
1357 if (!$dh) {
1358 $page->trigError('Dossier des icones introuvables.');
1359 }
1360 $icons = array();
1361 while (($file = readdir($dh)) !== false) {
1362 if (strlen($file) > 4 && substr($file,-4) == '.gif') {
1363 array_push($icons, substr($file, 0, -4));
1364 }
1365 }
1366 sort($icons);
1367 $page->assign('icons', $icons);
1368 }
1369
1370 function handler_accounts(&$page)
1371 {
1372 $page->changeTpl('admin/accounts.tpl');
1373 $page->assign('disabled', XDB::iterator('SELECT a.hruid, FIND_IN_SET(\'watch\', a.flags) AS watch,
1374 a.state = \'disabled\' AS disabled, a.comment
1375 FROM accounts AS a
1376 WHERE a.state = \'disabled\' OR FIND_IN_SET(\'watch\', a.flags)
1377 ORDER BY a.hruid'));
1378 $page->assign('admins', XDB::iterator('SELECT a.hruid
1379 FROM accounts AS a
1380 WHERE a.is_admin
1381 ORDER BY a.hruid'));
1382 }
1383 }
1384
1385 // vim:set et sw=4 sts=4 sws=4 foldmethod=marker enc=utf-8:
1386 ?>