|
1
|
|
|
<?php |
|
2
|
|
|
$defflip = (!cfip()) ? exit(header('HTTP/1.1 401 Unauthorized')) : 1; |
|
3
|
|
|
|
|
4
|
|
|
class User extends Base { |
|
5
|
|
|
protected $table = 'accounts'; |
|
6
|
|
|
private $userID = false; |
|
7
|
|
|
private $user = array(); |
|
8
|
|
|
|
|
9
|
|
|
/** |
|
10
|
|
|
* We allow changing the database for shared accounts across pools |
|
11
|
|
|
* Load the config on construct so we can assign the DB name |
|
12
|
|
|
* @param config array MPOS configuration |
|
13
|
|
|
* @return none |
|
|
|
|
|
|
14
|
|
|
**/ |
|
15
|
|
|
public function __construct($config) { |
|
16
|
|
|
$this->setConfig($config); |
|
17
|
|
|
$this->table = $this->config['db']['shared']['accounts'] . '.' . $this->table; |
|
|
|
|
|
|
18
|
|
|
} |
|
19
|
|
|
|
|
20
|
|
|
// get and set methods |
|
21
|
|
|
private function getHash($string, $version=0, $pepper='') { |
|
22
|
|
|
switch($version) { |
|
23
|
|
|
case 0: |
|
24
|
|
|
return hash('sha256', $string.$this->salt); |
|
|
|
|
|
|
25
|
|
|
break; |
|
|
|
|
|
|
26
|
|
|
case 1: |
|
27
|
|
|
return '$' . $version . '$' . $pepper . '$' . hash('sha256', $string.$this->salt.$pepper); |
|
28
|
|
|
break; |
|
|
|
|
|
|
29
|
|
|
} |
|
30
|
|
|
} |
|
31
|
|
|
public function getUserName($id) { |
|
32
|
|
|
return $this->getSingle($id, 'username', 'id'); |
|
33
|
|
|
} |
|
34
|
|
|
public function getUserNameAnon($id) { |
|
35
|
|
|
return $this->getSingle($id, 'is_anonymous', 'id'); |
|
36
|
|
|
} |
|
37
|
|
|
public function getUserNameByEmail($email) { |
|
38
|
|
|
return $this->getSingle($email, 'username', 'email', 's'); |
|
39
|
|
|
} |
|
40
|
|
|
public function getUserId($username, $lower=false) { |
|
41
|
|
|
return $this->getSingle($username, 'id', 'username', 's', $lower); |
|
42
|
|
|
} |
|
43
|
|
|
public function getUserIdByEmail($email, $lower=false) { |
|
44
|
|
|
return $this->getSingle($email, 'id', 'email', 's', $lower); |
|
45
|
|
|
} |
|
46
|
|
|
public function getUserEmail($username, $lower=false) { |
|
47
|
|
|
return $this->getSingle($username, 'email', 'username', 's', $lower); |
|
48
|
|
|
} |
|
49
|
|
|
public function getUserEmailById($id) { |
|
50
|
|
|
return $this->getSingle($id, 'email', 'id', 'i'); |
|
51
|
|
|
} |
|
52
|
|
|
public function getUserPasswordHashById($id) { |
|
53
|
|
|
return $this->getSingle($id, 'pass', 'id', 'i'); |
|
54
|
|
|
} |
|
55
|
|
|
public function getUserPinHashById($id) { |
|
56
|
|
|
return $this->getSingle($id, 'pin', 'id', 'i'); |
|
57
|
|
|
} |
|
58
|
|
|
public function getUserNoFee($id) { |
|
59
|
|
|
return $this->getSingle($id, 'no_fees', 'id'); |
|
60
|
|
|
} |
|
61
|
|
|
public function getUserDonatePercent($id) { |
|
62
|
|
|
return $this->getDonatePercent($id); |
|
63
|
|
|
} |
|
64
|
|
|
public function getUserAdmin($id) { |
|
65
|
|
|
return $this->getSingle($id, 'is_admin', 'id'); |
|
66
|
|
|
} |
|
67
|
|
|
public function getUserLocked($id) { |
|
68
|
|
|
return $this->getSingle($id, 'is_locked', 'id'); |
|
69
|
|
|
} |
|
70
|
|
|
public function getUserIp($id) { |
|
71
|
|
|
return $this->getSingle($id, 'loggedIp', 'id'); |
|
72
|
|
|
} |
|
73
|
|
|
public function getLastLogin($id) { |
|
74
|
|
|
return $this->getSingle($id, 'last_login', 'id'); |
|
75
|
|
|
} |
|
76
|
|
|
public function getEmail($email) { |
|
77
|
|
|
return $this->getSingle($email, 'email', 'email', 's'); |
|
78
|
|
|
} |
|
79
|
|
|
public function getUserFailed($id) { |
|
80
|
|
|
return $this->getSingle($id, 'failed_logins', 'id'); |
|
81
|
|
|
} |
|
82
|
|
|
public function getUserPinFailed($id) { |
|
83
|
|
|
return $this->getSingle($id, 'failed_pins', 'id'); |
|
84
|
|
|
} |
|
85
|
|
|
public function isNoFee($id) { |
|
86
|
|
|
return $this->getUserNoFee($id); |
|
87
|
|
|
} |
|
88
|
|
|
public function isLocked($id) { |
|
89
|
|
|
return $this->getUserLocked($id); |
|
90
|
|
|
} |
|
91
|
|
|
public function isAdmin($id) { |
|
92
|
|
|
return $this->getUserAdmin($id); |
|
93
|
|
|
} |
|
94
|
|
|
public function getSignupTime($id) { |
|
95
|
|
|
return $this->getSingle($id, 'signup_timestamp', 'id'); |
|
96
|
|
|
} |
|
97
|
|
|
public function changeNoFee($id) { |
|
98
|
|
|
$field = array('name' => 'no_fees', 'type' => 'i', 'value' => !$this->isNoFee($id)); |
|
99
|
|
|
$this->log->log("warn", $this->getUserName($id)." changed no_fees to ".$this->isNoFee($id)); |
|
100
|
|
|
return $this->updateSingle($id, $field); |
|
|
|
|
|
|
101
|
|
|
} |
|
102
|
|
|
public function setLocked($id, $value) { |
|
103
|
|
|
$field = array('name' => 'is_locked', 'type' => 'i', 'value' => $value); |
|
104
|
|
|
$this->log->log("warn", $this->getUserName($id)." changed is_locked to $value"); |
|
105
|
|
|
return $this->updateSingle($id, $field); |
|
|
|
|
|
|
106
|
|
|
} |
|
107
|
|
|
public function changeAdmin($id) { |
|
108
|
|
|
$field = array('name' => 'is_admin', 'type' => 'i', 'value' => !$this->isAdmin($id)); |
|
109
|
|
|
$this->log->log("warn", $this->getUserName($id)." changed is_admin to ".$this->isAdmin($id)); |
|
110
|
|
|
return $this->updateSingle($id, $field); |
|
|
|
|
|
|
111
|
|
|
} |
|
112
|
|
|
public function setUserFailed($id, $value) { |
|
113
|
|
|
$field = array( 'name' => 'failed_logins', 'type' => 'i', 'value' => $value); |
|
114
|
|
|
return $this->updateSingle($id, $field); |
|
|
|
|
|
|
115
|
|
|
} |
|
116
|
|
|
public function setUserPinFailed($id, $value) { |
|
117
|
|
|
$field = array( 'name' => 'failed_pins', 'type' => 'i', 'value' => $value); |
|
118
|
|
|
return $this->updateSingle($id, $field); |
|
|
|
|
|
|
119
|
|
|
} |
|
120
|
|
|
private function incUserFailed($id) { |
|
121
|
|
|
$field = array( 'name' => 'failed_logins', 'type' => 'i', 'value' => $this->getUserFailed($id) + 1); |
|
122
|
|
|
return $this->updateSingle($id, $field); |
|
|
|
|
|
|
123
|
|
|
} |
|
124
|
|
|
private function incUserPinFailed($id) { |
|
125
|
|
|
$field = array( 'name' => 'failed_pins', 'type' => 'i', 'value' => $this->getUserPinFailed($id) + 1); |
|
126
|
|
|
return $this->updateSingle($id, $field); |
|
|
|
|
|
|
127
|
|
|
} |
|
128
|
|
|
private function setUserIp($id, $ip) { |
|
129
|
|
|
$field = array( 'name' => 'loggedIp', 'type' => 's', 'value' => $ip ); |
|
130
|
|
|
return $this->updateSingle($id, $field); |
|
|
|
|
|
|
131
|
|
|
} |
|
132
|
|
|
|
|
133
|
|
|
/** |
|
134
|
|
|
* Fetch all users for administrative tasks |
|
135
|
|
|
* @param none |
|
136
|
|
|
* @return data array All users with db columns as array fields |
|
137
|
|
|
**/ |
|
138
|
|
|
public function getUsers($filter='%') { |
|
139
|
|
|
$stmt = $this->mysqli->prepare("SELECT * FROM " . $this->getTableName() . " WHERE username LIKE ?"); |
|
140
|
|
|
if ($this->checkStmt($stmt) && $stmt->bind_param('s', $filter) && $stmt->execute() && $result = $stmt->get_result()) { |
|
141
|
|
|
return $result->fetch_all(MYSQLI_ASSOC); |
|
142
|
|
|
} |
|
143
|
|
|
} |
|
144
|
|
|
|
|
145
|
|
|
/** |
|
146
|
|
|
* Fetch last registered users for administrative tasks |
|
147
|
|
|
* @param none |
|
148
|
|
|
* @return data array All users with db columns as array fields |
|
149
|
|
|
**/ |
|
150
|
|
View Code Duplication |
public function getLastRegisteredUsers($limit=10,$start=0) { |
|
|
|
|
|
|
151
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
152
|
|
|
$invitation = new Invitation(); |
|
153
|
|
|
$invitation->setMysql($this->mysqli); |
|
154
|
|
|
$invitation->setDebug($this->debug); |
|
155
|
|
|
$invitation->setLog($this->log); |
|
156
|
|
|
$stmt = $this->mysqli->prepare(" |
|
157
|
|
|
SELECT a.id,a.username as mposuser,a.email,a.signup_timestamp,u.username AS inviter FROM " . $this->getTableName() . " AS a |
|
158
|
|
|
LEFT JOIN " . $invitation->getTableName() . " AS i |
|
159
|
|
|
ON a.email = i.email |
|
160
|
|
|
LEFT JOIN " . $this->getTableName() . " AS u |
|
161
|
|
|
ON i.account_id = u.id |
|
162
|
|
|
ORDER BY a.id DESC LIMIT ?,?"); |
|
163
|
|
|
if ($this->checkStmt($stmt) && $stmt->bind_param("ii", $start, $limit) && $stmt->execute() && $result = $stmt->get_result()) { |
|
164
|
|
|
return $result->fetch_all(MYSQLI_ASSOC); |
|
165
|
|
|
} |
|
166
|
|
|
} |
|
167
|
|
|
|
|
168
|
|
|
/** |
|
169
|
|
|
* Fetch Top 10 Inviters |
|
170
|
|
|
* @param none |
|
171
|
|
|
* @return data array All users with db columns as array fields |
|
172
|
|
|
**/ |
|
173
|
|
View Code Duplication |
public function getTopInviters($limit=10,$start=0) { |
|
|
|
|
|
|
174
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
175
|
|
|
$invitation = new Invitation(); |
|
176
|
|
|
$invitation->setMysql($this->mysqli); |
|
177
|
|
|
$invitation->setDebug($this->debug); |
|
178
|
|
|
$invitation->setLog($this->log); |
|
179
|
|
|
$stmt = $this->mysqli->prepare(" |
|
180
|
|
|
SELECT COUNT(i.account_id) AS invitationcount,a.id,a.username,a.email, |
|
181
|
|
|
(SELECT COUNT(account_id) FROM " . $invitation->getTableName() . " WHERE account_id = i.account_id AND is_activated = 1 GROUP BY account_id) AS activated |
|
182
|
|
|
FROM " . $invitation->getTableName() . " AS i |
|
183
|
|
|
LEFT JOIN " . $this->getTableName() . " AS a |
|
184
|
|
|
ON a.id = i.account_id |
|
185
|
|
|
GROUP BY i.account_id |
|
186
|
|
|
ORDER BY invitationcount ASC |
|
187
|
|
|
LIMIT ?,?"); |
|
188
|
|
|
if ($this->checkStmt($stmt) && $stmt->bind_param("ii", $start, $limit) && $stmt->execute() && $result = $stmt->get_result()) { |
|
189
|
|
|
return $result->fetch_all(MYSQLI_ASSOC); |
|
190
|
|
|
} |
|
191
|
|
|
} |
|
192
|
|
|
|
|
193
|
|
|
/** |
|
194
|
|
|
* Check user login |
|
195
|
|
|
* @param username string Username |
|
196
|
|
|
* @param password string Password |
|
197
|
|
|
* @return bool |
|
198
|
|
|
**/ |
|
199
|
|
|
public function checkLogin($username, $password) { |
|
200
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
201
|
|
|
$this->debug->append("Checking login for $username with password $password", 2); |
|
202
|
|
|
if (empty($username) || empty($password)) { |
|
203
|
|
|
$this->setErrorMessage("Invalid username or password."); |
|
204
|
|
|
return false; |
|
205
|
|
|
} |
|
206
|
|
|
if (!filter_var($username, FILTER_VALIDATE_EMAIL)) { |
|
207
|
|
|
$this->debug->append("Not an e-mail address, rejecting login", 2); |
|
208
|
|
|
$this->setErrorMessage("Please login with your e-mail address"); |
|
209
|
|
|
return false; |
|
210
|
|
|
} else { |
|
211
|
|
|
$this->debug->append("Username is an e-mail: $username", 2); |
|
212
|
|
|
if (!$username = $this->getUserNameByEmail($username)) { |
|
213
|
|
|
$this->setErrorMessage("Invalid username or password."); |
|
214
|
|
|
return false; |
|
215
|
|
|
} |
|
216
|
|
|
} |
|
217
|
|
|
if ($this->isLocked($this->getUserId($username))) { |
|
218
|
|
|
$this->setErrorMessage('Account locked. Please Check your Email for instructions to unlock.'); |
|
219
|
|
|
return false; |
|
220
|
|
|
} |
|
221
|
|
|
if ($this->checkUserPassword($username, $password)) { |
|
|
|
|
|
|
222
|
|
|
// delete notification cookies |
|
223
|
|
|
setcookie("motd-box", "", time()-3600); |
|
224
|
|
|
setcookie("lastlogin-box", "", time()-3600); |
|
225
|
|
|
setcookie("backend-box", "", time()-3600); |
|
226
|
|
|
// rest of login process |
|
227
|
|
|
$uid = $this->getUserId($username); |
|
228
|
|
|
$lastLoginTime = $this->getLastLogin($uid); |
|
229
|
|
|
$this->updateLoginTimestamp($uid); |
|
|
|
|
|
|
230
|
|
|
$getIPAddress = $this->getUserIp($uid); |
|
231
|
|
|
if ($getIPAddress !== $this->getCurrentIP()) { |
|
232
|
|
|
$this->log->log("warn", "$username has logged in with a different IP, saved is [$getIPAddress]"); |
|
233
|
|
|
} |
|
234
|
|
|
$setIPAddress = $this->setUserIp($uid, $_SERVER['REMOTE_ADDR']); |
|
235
|
|
|
$this->createSession($username, $getIPAddress, $lastLoginTime); |
|
|
|
|
|
|
236
|
|
|
if ($setIPAddress) { |
|
237
|
|
|
// send a notification if success_login is active |
|
238
|
|
|
$uid = $this->getUserId($username); |
|
239
|
|
|
$notifs = new Notification(); |
|
240
|
|
|
$notifs->setDebug($this->debug); |
|
241
|
|
|
$notifs->setMysql($this->mysqli); |
|
242
|
|
|
$notifs->setSmarty($this->smarty); |
|
243
|
|
|
$notifs->setConfig($this->config); |
|
244
|
|
|
$notifs->setSetting($this->setting); |
|
|
|
|
|
|
245
|
|
|
$notifs->setErrorCodes($this->aErrorCodes); |
|
246
|
|
|
$ndata = $notifs->getNotificationSettings($uid); |
|
247
|
|
|
if ((array_key_exists('push_success_lo', $ndata) && $ndata['push_success_lo']) || (array_key_exists('success_login', $ndata) && $ndata['success_login'])){ |
|
248
|
|
|
// seems to be active, let's send it |
|
249
|
|
|
$aDataN['username'] = $username; |
|
|
|
|
|
|
250
|
|
|
$aDataN['email'] = $this->getUserEmail($username); |
|
251
|
|
|
$aDataN['subject'] = 'Successful login notification'; |
|
252
|
|
|
$aDataN['LOGINIP'] = $this->getCurrentIP(); |
|
253
|
|
|
$aDataN['LOGINUSER'] = $username; |
|
254
|
|
|
$aDataN['LOGINTIME'] = date('m/d/y H:i:s'); |
|
255
|
|
|
$notifs->sendNotification($uid, 'success_login', $aDataN); |
|
256
|
|
|
} |
|
257
|
|
|
return true; |
|
258
|
|
|
} |
|
259
|
|
|
} |
|
260
|
|
|
$this->setErrorMessage("Invalid username or password"); |
|
261
|
|
|
$this->log->log('error', "Authentication failed for $username"); |
|
262
|
|
View Code Duplication |
if ($id = $this->getUserId($username)) { |
|
|
|
|
|
|
263
|
|
|
$this->incUserFailed($id); |
|
264
|
|
|
// Check if this account should be locked |
|
265
|
|
|
if (isset($this->config['maxfailed']['login']) && $this->getUserFailed($id) >= $this->config['maxfailed']['login']) { |
|
266
|
|
|
$this->setLocked($id, 1); |
|
267
|
|
|
$this->log->log("warn", "$username locked due to failed logins, saved is [".$this->getUserIp($this->getUserId($username))."]"); |
|
268
|
|
|
if ($token = $this->token->createToken('account_unlock', $id)) { |
|
|
|
|
|
|
269
|
|
|
$aData['token'] = $token; |
|
|
|
|
|
|
270
|
|
|
$aData['username'] = $username; |
|
271
|
|
|
$aData['email'] = $this->getUserEmail($username); |
|
272
|
|
|
$aData['subject'] = 'Account auto-locked'; |
|
273
|
|
|
$this->mail->sendMail('notifications/locked', $aData); |
|
|
|
|
|
|
274
|
|
|
} |
|
275
|
|
|
} |
|
276
|
|
|
} |
|
277
|
|
|
|
|
278
|
|
|
return false; |
|
279
|
|
|
} |
|
280
|
|
|
|
|
281
|
|
|
/** |
|
282
|
|
|
* Check the users PIN for confirmation |
|
283
|
|
|
* @param userID int User ID |
|
284
|
|
|
* @param pin int PIN to check |
|
285
|
|
|
* @return bool |
|
286
|
|
|
**/ |
|
287
|
|
|
public function checkPin($userId, $pin='') { |
|
288
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
289
|
|
|
$this->debug->append("Confirming PIN for $userId and pin $pin", 2); |
|
290
|
|
|
$strPinHash = $this->getUserPinHashById($userId); |
|
291
|
|
|
$aPin = explode('$', $strPinHash); |
|
292
|
|
|
count($aPin) == 1 ? $pin_hash = $this->getHash($pin, 0) : $pin_hash = $this->getHash($pin, $aPin[1], $aPin[2]); |
|
293
|
|
|
$stmt = $this->mysqli->prepare("SELECT pin FROM $this->table WHERE id = ? AND pin = ? LIMIT 1"); |
|
294
|
|
View Code Duplication |
if ($stmt->bind_param('is', $userId, $pin_hash) && $stmt->execute() && $stmt->bind_result($row_pin) && $stmt->fetch()) { |
|
|
|
|
|
|
295
|
|
|
$stmt->close(); |
|
296
|
|
|
$this->setUserPinFailed($userId, 0); |
|
297
|
|
|
return ($pin_hash === $row_pin); |
|
|
|
|
|
|
298
|
|
|
} |
|
299
|
|
|
$this->log->log('info', $this->getUserName($userId).' incorrect pin'); |
|
300
|
|
|
$this->incUserPinFailed($userId); |
|
301
|
|
|
// Check if this account should be locked |
|
302
|
|
View Code Duplication |
if (isset($this->config['maxfailed']['pin']) && $this->getUserPinFailed($userId) >= $this->config['maxfailed']['pin']) { |
|
|
|
|
|
|
303
|
|
|
$this->setLocked($userId, 1); |
|
304
|
|
|
$this->log->log("warn", $this->getUserName($userId)." was locked due to incorrect pins"); |
|
305
|
|
|
if ($token = $this->token->createToken('account_unlock', $userId)) { |
|
306
|
|
|
$username = $this->getUserName($userId); |
|
307
|
|
|
$aData['token'] = $token; |
|
|
|
|
|
|
308
|
|
|
$aData['username'] = $username; |
|
309
|
|
|
$aData['email'] = $this->getUserEmail($username); |
|
310
|
|
|
$aData['subject'] = 'Account auto-locked'; |
|
311
|
|
|
$this->mail->sendMail('notifications/locked', $aData); |
|
312
|
|
|
} |
|
313
|
|
|
$this->logoutUser(); |
|
314
|
|
|
} |
|
315
|
|
|
return false; |
|
316
|
|
|
} |
|
317
|
|
|
|
|
318
|
|
|
public function generatePin($userID, $current) { |
|
319
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
320
|
|
|
$username = $this->getUserName($userID); |
|
321
|
|
|
$email = $this->getUserEmail($username); |
|
322
|
|
|
$strPasswordHash = $this->getUserPasswordHashById($userID); |
|
323
|
|
|
$aPassword = explode('$', $strPasswordHash); |
|
324
|
|
|
count($aPassword) == 1 ? $password_hash = $this->getHash($current, 0) : $password_hash = $this->getHash($current, $aPassword[1], $aPassword[2]); |
|
325
|
|
|
$newpin = intval( '0' . rand(1,9) . rand(0,9) . rand(0,9) . rand(0,9) ); |
|
326
|
|
|
$aData['username'] = $username; |
|
|
|
|
|
|
327
|
|
|
$aData['email'] = $email; |
|
328
|
|
|
$aData['pin'] = $newpin; |
|
329
|
|
|
$newpin = $this->getHash($newpin, HASH_VERSION, bin2hex(openssl_random_pseudo_bytes(32))); |
|
330
|
|
|
$aData['subject'] = 'PIN Reset Request'; |
|
331
|
|
|
$stmt = $this->mysqli->prepare("UPDATE $this->table SET pin = ? WHERE ( id = ? AND pass = ? )"); |
|
332
|
|
|
if ($this->checkStmt($stmt) && $stmt->bind_param('sis', $newpin, $userID, $password_hash) && $stmt->execute()) { |
|
333
|
|
|
if ($stmt->errno == 0 && $stmt->affected_rows === 1) { |
|
334
|
|
|
if ($this->mail->sendMail('pin/reset', $aData)) { |
|
335
|
|
|
$this->log->log("info", "$username was sent a pin reset e-mail"); |
|
336
|
|
|
return true; |
|
337
|
|
|
} else { |
|
338
|
|
|
$this->log->log("warn", "$username request a pin reset but failed to send mail"); |
|
339
|
|
|
$this->setErrorMessage('Unable to send mail to your address'); |
|
340
|
|
|
return false; |
|
341
|
|
|
} |
|
342
|
|
|
} |
|
343
|
|
|
} |
|
344
|
|
|
$this->log->log("warn", "$username incorrect pin reset attempt"); |
|
345
|
|
|
$this->setErrorMessage( 'Unable to generate PIN, current password incorrect?' ); |
|
346
|
|
|
return false; |
|
347
|
|
|
} |
|
348
|
|
|
|
|
349
|
|
|
/** |
|
350
|
|
|
* Get all users that have auto payout setup |
|
351
|
|
|
* @param none |
|
352
|
|
|
* @return data array All users with payout setup |
|
353
|
|
|
**/ |
|
354
|
|
|
public function getAllAutoPayout() { |
|
355
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
356
|
|
|
$stmt = $this->mysqli->prepare(" |
|
357
|
|
|
SELECT |
|
358
|
|
|
a.id, a.username, ca.coin_address AS coin_address, ca.ap_threshold |
|
359
|
|
|
FROM " . $this->getTableName() . " AS a |
|
360
|
|
|
LEFT JOIN " . $this->coin_address->getTableName() . " AS ca |
|
|
|
|
|
|
361
|
|
|
ON a.id = ca.account_id |
|
362
|
|
|
WHERE ca.ap_threshold > 0 AND ca.currency = ? |
|
363
|
|
|
AND ca.coin_address IS NOT NULL |
|
364
|
|
|
"); |
|
365
|
|
View Code Duplication |
if ( $this->checkStmt($stmt) && $stmt->bind_param('s', $this->config['currency']) && $stmt->execute() && $result = $stmt->get_result()) { |
|
|
|
|
|
|
366
|
|
|
return $result->fetch_all(MYSQLI_ASSOC); |
|
367
|
|
|
} |
|
368
|
|
|
$this->debug->append("Unable to fetch users with AP set"); |
|
369
|
|
|
return false; |
|
|
|
|
|
|
370
|
|
|
} |
|
371
|
|
|
|
|
372
|
|
|
/** |
|
373
|
|
|
* Fetch users donation value |
|
374
|
|
|
* @param userID int UserID |
|
375
|
|
|
* @return data string Coin Address |
|
376
|
|
|
**/ |
|
377
|
|
|
public function getDonatePercent($userID) { |
|
378
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
379
|
|
|
$dPercent = $this->getSingle($userID, 'donate_percent', 'id'); |
|
380
|
|
|
if ($dPercent > 100) $dPercent = 100; |
|
381
|
|
|
if ($dPercent < 0) $dPercent = 0; |
|
382
|
|
|
return $dPercent; |
|
383
|
|
|
} |
|
384
|
|
|
|
|
385
|
|
|
/** |
|
386
|
|
|
* Send e-mail to confirm a change for 2fa |
|
387
|
|
|
* @param strType string Token type name |
|
388
|
|
|
* @param userID int User ID |
|
389
|
|
|
* @return bool |
|
390
|
|
|
*/ |
|
391
|
|
|
public function sendChangeConfigEmail($strType, $userID) { |
|
392
|
|
|
$exists = $this->token->doesTokenExist($strType, $userID); |
|
393
|
|
|
if ($exists == 0) { |
|
394
|
|
|
$token = $this->token->createToken($strType, $userID); |
|
395
|
|
|
$aData['token'] = $token; |
|
|
|
|
|
|
396
|
|
|
$aData['username'] = $this->getUserName($userID); |
|
397
|
|
|
$aData['email'] = $this->getUserEmail($aData['username']); |
|
398
|
|
|
switch ($strType) { |
|
399
|
|
|
case 'account_edit': |
|
400
|
|
|
$aData['subject'] = 'Account detail change confirmation'; |
|
401
|
|
|
break; |
|
402
|
|
|
case 'change_pw': |
|
403
|
|
|
$aData['subject'] = 'Account password change confirmation'; |
|
404
|
|
|
break; |
|
405
|
|
|
case 'withdraw_funds': |
|
406
|
|
|
$aData['subject'] = 'Manual payout request confirmation'; |
|
407
|
|
|
break; |
|
408
|
|
|
default: |
|
409
|
|
|
$aData['subject'] = ''; |
|
410
|
|
|
} |
|
411
|
|
|
$this->log->log("info", $aData['username']." was sent a $strType token e-mail"); |
|
412
|
|
|
if ($this->mail->sendMail('notifications/'.$strType, $aData)) { |
|
413
|
|
|
return true; |
|
414
|
|
|
} else { |
|
415
|
|
|
$this->setErrorMessage('Failed to send the notification'); |
|
416
|
|
|
$this->log->log("warn", $aData['username']." requested a $strType token but sending mail failed"); |
|
417
|
|
|
return false; |
|
418
|
|
|
} |
|
419
|
|
|
} |
|
420
|
|
|
$this->log->log("warn", $this->getUserName($userID)." attempted to request multiple $strType tokens"); |
|
421
|
|
|
$this->setErrorMessage('A request has already been sent to your e-mail address. Please wait an hour for it to expire.'); |
|
422
|
|
|
return false; |
|
423
|
|
|
} |
|
424
|
|
|
|
|
425
|
|
|
/** |
|
426
|
|
|
* Update the accounts password |
|
427
|
|
|
* @param userID int User ID |
|
428
|
|
|
* @param current string Current password |
|
429
|
|
|
* @param new1 string New password |
|
430
|
|
|
* @param new2 string New password confirmation |
|
431
|
|
|
* @param strToken string Token for confirmation |
|
432
|
|
|
* @return bool |
|
433
|
|
|
**/ |
|
434
|
|
|
public function updatePassword($userID, $current, $new1, $new2, $strToken) { |
|
435
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
436
|
|
|
if ($new1 !== $new2) { |
|
437
|
|
|
$this->setErrorMessage( 'New passwords do not match' ); |
|
438
|
|
|
return false; |
|
439
|
|
|
} |
|
440
|
|
|
if ( strlen($new1) < 8 ) { |
|
441
|
|
|
$this->setErrorMessage( 'New password is too short, please use more than 8 chars' ); |
|
442
|
|
|
return false; |
|
443
|
|
|
} |
|
444
|
|
|
$strPasswordHash = $this->getUserPasswordHashById($userID); |
|
445
|
|
|
$aPassword = explode('$', $strPasswordHash); |
|
446
|
|
|
count($aPassword) == 1 ? $password_hash = $this->getHash($current, 0) : $password_hash = $this->getHash($current, $aPassword[1], $aPassword[2]); |
|
447
|
|
|
$new = $this->getHash($new1, HASH_VERSION, bin2hex(openssl_random_pseudo_bytes(32))); |
|
448
|
|
View Code Duplication |
if ($this->config['twofactor']['enabled'] && $this->config['twofactor']['options']['changepw']) { |
|
|
|
|
|
|
449
|
|
|
$tValid = $this->token->isTokenValid($userID, $strToken, 6); |
|
450
|
|
|
if ($tValid) { |
|
451
|
|
|
if ($this->token->deleteToken($strToken)) { |
|
452
|
|
|
$this->log->log("info", $this->getUserName($userID)." deleted change password token"); |
|
453
|
|
|
// token deleted, continue |
|
454
|
|
|
} else { |
|
455
|
|
|
$this->log->log("warn", $this->getUserName($userID)." failed to delete the change password token"); |
|
456
|
|
|
$this->setErrorMessage('Token deletion failed'); |
|
457
|
|
|
return false; |
|
458
|
|
|
} |
|
459
|
|
|
} else { |
|
460
|
|
|
$this->log->log("error", $this->getUserName($userID)." attempted to use an invalid change password token"); |
|
461
|
|
|
$this->setErrorMessage('Invalid token'); |
|
462
|
|
|
return false; |
|
463
|
|
|
} |
|
464
|
|
|
} |
|
465
|
|
|
$stmt = $this->mysqli->prepare("UPDATE $this->table SET pass = ? WHERE ( id = ? AND pass = ? )"); |
|
466
|
|
|
if ($this->checkStmt($stmt)) { |
|
467
|
|
|
$stmt->bind_param('sis', $new, $userID, $password_hash); |
|
468
|
|
|
$stmt->execute(); |
|
469
|
|
|
if ($stmt->errno == 0 && $stmt->affected_rows === 1) { |
|
470
|
|
|
$this->log->log("info", $this->getUserName($userID)." updated password"); |
|
471
|
|
|
return true; |
|
472
|
|
|
} |
|
473
|
|
|
$stmt->close(); |
|
474
|
|
|
} |
|
475
|
|
|
$this->log->log("warn", $this->getUserName($userID)." incorrect password update attempt"); |
|
476
|
|
|
$this->setErrorMessage( 'Unable to update password, current password wrong?' ); |
|
477
|
|
|
return false; |
|
478
|
|
|
} |
|
479
|
|
|
|
|
480
|
|
|
/** |
|
481
|
|
|
* Update account information from the edit account page |
|
482
|
|
|
* @param userID int User ID |
|
483
|
|
|
* @param address string new coin address |
|
484
|
|
|
* @param threshold float auto payout threshold |
|
485
|
|
|
* @param donat float donation % of income |
|
486
|
|
|
* @param strToken string Token for confirmation |
|
487
|
|
|
* @return bool |
|
488
|
|
|
**/ |
|
489
|
|
|
public function updateAccount($userID, $address, $threshold, $donate, $email, $timezone, $is_anonymous, $strToken) { |
|
490
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
491
|
|
|
$bUser = false; |
|
|
|
|
|
|
492
|
|
|
$donate = round($donate, 2); |
|
493
|
|
|
// number validation checks |
|
494
|
|
|
if (!is_numeric($threshold)) { |
|
495
|
|
|
$this->setErrorMessage('Invalid input for auto-payout'); |
|
496
|
|
|
return false; |
|
497
|
|
|
} else if ($threshold < $this->config['ap_threshold']['min'] && $threshold != 0) { |
|
498
|
|
|
$this->setErrorMessage('Threshold below configured minimum of ' . $this->config['ap_threshold']['min']); |
|
499
|
|
|
return false; |
|
500
|
|
|
} else if ($threshold > $this->config['ap_threshold']['max']) { |
|
501
|
|
|
$this->setErrorMessage('Threshold above configured maximum of ' . $this->config['ap_threshold']['max']); |
|
502
|
|
|
return false; |
|
503
|
|
|
} |
|
504
|
|
|
if (!is_numeric($donate)) { |
|
505
|
|
|
$this->setErrorMessage('Invalid input for donation'); |
|
506
|
|
|
return false; |
|
507
|
|
|
} else if ($donate < $this->config['donate_threshold']['min'] && $donate != 0) { |
|
508
|
|
|
$this->setErrorMessage('Donation below allowed ' . $this->config['donate_threshold']['min'] . '% limit'); |
|
509
|
|
|
return false; |
|
510
|
|
|
} else if ($donate > 100) { |
|
511
|
|
|
$this->setErrorMessage('Donation above allowed 100% limit'); |
|
512
|
|
|
return false; |
|
513
|
|
|
} |
|
514
|
|
|
if ($email != 'hidden' && $email != NULL && !filter_var($email, FILTER_VALIDATE_EMAIL)) { |
|
515
|
|
|
$this->setErrorMessage('Invalid email address'); |
|
516
|
|
|
return false; |
|
517
|
|
|
} |
|
518
|
|
|
if (!empty($address)) { |
|
519
|
|
View Code Duplication |
if ($address != $this->coin_address->getCoinAddress($userID) && $this->coin_address->existsCoinAddress($address)) { |
|
|
|
|
|
|
520
|
|
|
$this->setErrorMessage('Address is already in use'); |
|
521
|
|
|
return false; |
|
522
|
|
|
} |
|
523
|
|
|
if ($this->bitcoin->can_connect() === true) { |
|
524
|
|
|
if (!$this->bitcoin->validateaddress($address)) { |
|
|
|
|
|
|
525
|
|
|
$this->setErrorMessage('Invalid coin address'); |
|
526
|
|
|
return false; |
|
527
|
|
|
} |
|
528
|
|
|
} else { |
|
529
|
|
|
$this->setErrorMessage('Unable to connect to RPC server for coin address validation'); |
|
530
|
|
|
return false; |
|
531
|
|
|
} |
|
532
|
|
|
} else { |
|
533
|
|
|
$address = NULL; |
|
534
|
|
|
} |
|
535
|
|
|
|
|
536
|
|
|
// Number sanitizer, just in case we fall through above |
|
537
|
|
|
$threshold = min($this->config['ap_threshold']['max'], max(0, floatval($threshold))); |
|
538
|
|
|
$donate = min(100, max(0, floatval($donate))); |
|
539
|
|
|
|
|
540
|
|
|
// twofactor - consume the token if it is enabled and valid |
|
541
|
|
View Code Duplication |
if ($this->config['twofactor']['enabled'] && $this->config['twofactor']['options']['details']) { |
|
|
|
|
|
|
542
|
|
|
$tValid = $this->token->isTokenValid($userID, $strToken, 5); |
|
543
|
|
|
if ($tValid) { |
|
544
|
|
|
if ($this->token->deleteToken($strToken)) { |
|
545
|
|
|
$this->log->log("info", $this->getUserName($userID)." deleted account update token"); |
|
546
|
|
|
} else { |
|
547
|
|
|
$this->setErrorMessage('Token deletion failed'); |
|
548
|
|
|
$this->log->log("warn", $this->getUserName($userID)." updated their account details but failed to delete token"); |
|
549
|
|
|
return false; |
|
550
|
|
|
} |
|
551
|
|
|
} else { |
|
552
|
|
|
$this->setErrorMessage('Invalid token'); |
|
553
|
|
|
$this->log->log("warn", $this->getUserName($userID)." attempted to use an invalid token account update token"); |
|
554
|
|
|
return false; |
|
555
|
|
|
} |
|
556
|
|
|
} |
|
557
|
|
|
|
|
558
|
|
|
// If we hide our email or it's not set, fetch current one to update |
|
559
|
|
|
if ($email == 'hidden' || $email == NULL) |
|
560
|
|
|
$email = $this->getUserEmailById($userID); |
|
561
|
|
|
// We passed all validation checks so update the account |
|
562
|
|
|
$stmt = $this->mysqli->prepare("UPDATE $this->table SET donate_percent = ?, email = ?, timezone = ?, is_anonymous = ? WHERE id = ?"); |
|
563
|
|
|
if ($this->checkStmt($stmt) && $stmt->bind_param('dssii', $donate, $email, $timezone, $is_anonymous, $userID) && $stmt->execute()) { |
|
564
|
|
|
$this->log->log("info", $this->getUserName($userID)." updated their account details"); |
|
565
|
|
|
// Update coin address and ap_threshold if coin_address is set |
|
566
|
|
|
if ($address) { |
|
|
|
|
|
|
567
|
|
|
if ($this->coin_address->update($userID, $address, $threshold)) { |
|
568
|
|
|
return true; |
|
569
|
|
|
} |
|
570
|
|
|
} else { |
|
571
|
|
|
if ($this->coin_address->remove($userID, $address)) { |
|
572
|
|
|
return true; |
|
573
|
|
|
} |
|
574
|
|
|
} |
|
575
|
|
|
} |
|
576
|
|
|
// Catchall |
|
577
|
|
|
$this->setErrorMessage('Failed to update your account'); |
|
578
|
|
|
$this->debug->append('Account update failed: ' . $this->mysqli->lastused->error); |
|
579
|
|
|
return false; |
|
580
|
|
|
} |
|
581
|
|
|
|
|
582
|
|
|
/** |
|
583
|
|
|
* Check API key for authentication |
|
584
|
|
|
* @param key string API key hash |
|
585
|
|
|
* @return bool |
|
586
|
|
|
**/ |
|
587
|
|
|
public function checkApiKey($key) { |
|
588
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
589
|
|
|
if (!is_string($key)) return false; |
|
590
|
|
|
$stmt = $this->mysqli->prepare("SELECT api_key, id FROM $this->table WHERE api_key = ? LIMIT 1"); |
|
591
|
|
View Code Duplication |
if ($this->checkStmt($stmt) && $stmt->bind_param("s", $key) && $stmt->execute() && $stmt->bind_result($api_key, $id) && $stmt->fetch()) { |
|
|
|
|
|
|
592
|
|
|
if ($api_key === $key) |
|
|
|
|
|
|
593
|
|
|
return $id; |
|
|
|
|
|
|
594
|
|
|
} |
|
595
|
|
|
header("HTTP/1.1 401 Unauthorized"); |
|
596
|
|
|
die('Access denied'); |
|
597
|
|
|
} |
|
598
|
|
|
|
|
599
|
|
|
/** |
|
600
|
|
|
* Check a password for a user |
|
601
|
|
|
* @param username string Username |
|
602
|
|
|
* @param password string Password |
|
603
|
|
|
* @return bool |
|
604
|
|
|
**/ |
|
605
|
|
|
private function checkUserPassword($username, $password) { |
|
606
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
607
|
|
|
$user = array(); |
|
|
|
|
|
|
608
|
|
|
$stmt = $this->mysqli->prepare("SELECT username, pass, id, timezone, is_admin FROM $this->table WHERE LOWER(username) = LOWER(?) LIMIT 1"); |
|
609
|
|
|
if ($this->checkStmt($stmt) && $stmt->bind_param('s', $username) && $stmt->execute() && $stmt->bind_result($row_username, $row_password, $row_id, $row_timezone, $row_admin)) { |
|
|
|
|
|
|
610
|
|
|
$stmt->fetch(); |
|
611
|
|
|
$stmt->close(); |
|
612
|
|
|
$aPassword = explode('$', $row_password); |
|
|
|
|
|
|
613
|
|
|
count($aPassword) == 1 ? $password_hash = $this->getHash($password, 0) : $password_hash = $this->getHash($password, $aPassword[1], $aPassword[2]); |
|
614
|
|
|
// Store the basic login information |
|
615
|
|
|
$this->user = array('username' => $row_username, 'id' => $row_id, 'timezone' => $row_timezone, 'is_admin' => $row_admin); |
|
|
|
|
|
|
616
|
|
|
return $password_hash === $row_password && strtolower($username) === strtolower($row_username); |
|
|
|
|
|
|
617
|
|
|
} |
|
618
|
|
|
return $this->sqlError(); |
|
619
|
|
|
} |
|
620
|
|
|
|
|
621
|
|
|
/** |
|
622
|
|
|
* Create a PHP session for a user |
|
623
|
|
|
* @param username string Username to create session for |
|
624
|
|
|
* @return none |
|
625
|
|
|
**/ |
|
626
|
|
|
private function createSession($username, $lastIP='', $lastLoginTime='') { |
|
|
|
|
|
|
627
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
628
|
|
|
$this->debug->append("Log in user to _SESSION", 2); |
|
629
|
|
|
if (!empty($lastIP) && (!empty($lastLoginTime))) { |
|
630
|
|
|
$_SESSION['last_ip_pop'] = array($lastIP, $lastLoginTime); |
|
631
|
|
|
} |
|
632
|
|
|
session_regenerate_id(true); |
|
633
|
|
|
$_SESSION['AUTHENTICATED'] = '1'; |
|
634
|
|
|
// $this->user from checkUserPassword |
|
635
|
|
|
$_SESSION['USERDATA'] = $this->user; |
|
636
|
|
|
if ($this->config['protect_session_state']) { |
|
637
|
|
|
$_SESSION['STATE'] = md5($_SESSION['USERDATA']['username'].$_SESSION['USERDATA']['id'].@$_SERVER['HTTP_USER_AGENT']); |
|
638
|
|
|
} |
|
639
|
|
|
} |
|
640
|
|
|
|
|
641
|
|
|
/** |
|
642
|
|
|
* Update users last_login timestamp |
|
643
|
|
|
* @param id int UserID |
|
644
|
|
|
* @return bool true of false |
|
645
|
|
|
**/ |
|
646
|
|
|
private function updateLoginTimestamp($id) { |
|
647
|
|
|
$field = array('name' => 'last_login', 'type' => 'i', 'value' => time()); |
|
648
|
|
|
return $this->updateSingle($id, $field); |
|
|
|
|
|
|
649
|
|
|
} |
|
650
|
|
|
|
|
651
|
|
|
/** |
|
652
|
|
|
* Log out current user, destroy the session |
|
653
|
|
|
* @param none |
|
654
|
|
|
* @return true |
|
655
|
|
|
**/ |
|
656
|
|
|
public function logoutUser() { |
|
657
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
658
|
|
|
// Unset all of the session variables |
|
659
|
|
|
$_SESSION = array(); |
|
660
|
|
|
// As we're killing the sesison, also kill the cookie! |
|
661
|
|
|
setcookie(session_name(), '', time() - 42000); |
|
662
|
|
|
// Destroy the session. |
|
663
|
|
|
session_destroy(); |
|
664
|
|
|
// Enforce generation of a new Session ID and delete the old |
|
665
|
|
|
session_regenerate_id(true); |
|
666
|
|
|
|
|
667
|
|
|
// Enforce a page reload and point towards login with referrer included, if supplied |
|
668
|
|
|
$port = ($_SERVER["SERVER_PORT"] == "80" || $_SERVER["SERVER_PORT"] == "443") ? "" : (":".$_SERVER["SERVER_PORT"]); |
|
669
|
|
|
$pushto = $_SERVER['SCRIPT_NAME'].'?page=login'; |
|
670
|
|
|
$location = (@$_SERVER['HTTPS'] == 'on') ? 'https://' . $_SERVER['HTTP_HOST'] . $port . $pushto : 'http://' . $_SERVER['HTTP_HOST'] . $port . $pushto; |
|
671
|
|
|
if (!headers_sent()) header('Location: ' . $location); |
|
672
|
|
|
exit('<meta http-equiv="refresh" content="0; url=' . $location . '"/>'); |
|
673
|
|
|
} |
|
674
|
|
|
|
|
675
|
|
|
/** |
|
676
|
|
|
* Get all users for admin panel |
|
677
|
|
|
**/ |
|
678
|
|
|
public function getAllUsers($filter='%') { |
|
679
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
680
|
|
|
$stmt = $this->mysqli->prepare(" |
|
681
|
|
|
SELECT |
|
682
|
|
|
a.id AS id, |
|
683
|
|
|
a.username AS username |
|
684
|
|
|
FROM " . $this->getTableName() . " AS a |
|
685
|
|
|
WHERE a.username LIKE ? |
|
686
|
|
|
GROUP BY username"); |
|
687
|
|
View Code Duplication |
if ($this->checkStmt($stmt) && $stmt->bind_param('s', $filter) && $stmt->execute() && $result = $stmt->get_result()) { |
|
|
|
|
|
|
688
|
|
|
while ($row = $result->fetch_assoc()) { |
|
689
|
|
|
$aData[$row['id']] = $row['username']; |
|
|
|
|
|
|
690
|
|
|
} |
|
691
|
|
|
return $aData; |
|
|
|
|
|
|
692
|
|
|
} |
|
693
|
|
|
return false; |
|
694
|
|
|
} |
|
695
|
|
|
|
|
696
|
|
|
/** |
|
697
|
|
|
* Fetch this classes table name |
|
698
|
|
|
* @return table string This classes table name |
|
699
|
|
|
**/ |
|
700
|
|
|
public function getTableName() { |
|
701
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
702
|
|
|
return $this->table; |
|
703
|
|
|
} |
|
704
|
|
|
|
|
705
|
|
|
/** |
|
706
|
|
|
* Fetch some basic user information to store for later user |
|
707
|
|
|
* @param userID int User ID |
|
708
|
|
|
* return data array Database fields as used in SELECT |
|
709
|
|
|
**/ |
|
710
|
|
|
public function getUserData($userID) { |
|
711
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
712
|
|
|
$this->debug->append("Fetching user information for user id: $userID"); |
|
713
|
|
|
$stmt = $this->mysqli->prepare(" |
|
714
|
|
|
SELECT |
|
715
|
|
|
id AS id, username, pin, api_key, is_admin, is_anonymous, email, timezone, no_fees, |
|
716
|
|
|
IFNULL(donate_percent, '0') as donate_percent |
|
717
|
|
|
FROM " . $this->getTableName() . " |
|
718
|
|
|
WHERE id = ? LIMIT 0,1"); |
|
719
|
|
|
if ($this->checkStmt($stmt) && $stmt->bind_param('i', $userID) && $stmt->execute() && $result = $stmt->get_result()) { |
|
720
|
|
|
$aData = $result->fetch_assoc(); |
|
721
|
|
|
$aData['coin_address'] = $this->coin_address->getCoinAddress($userID); |
|
722
|
|
|
if (! $aData['ap_threshold'] = $this->coin_address->getAPThreshold($userID)) |
|
723
|
|
|
$aData['ap_threshold'] = 0; |
|
724
|
|
|
$stmt->close(); |
|
725
|
|
|
return $aData; |
|
726
|
|
|
} |
|
727
|
|
|
$this->debug->append("Failed to fetch user information for $userID"); |
|
728
|
|
|
return $this->sqlError(); |
|
729
|
|
|
} |
|
730
|
|
|
|
|
731
|
|
|
/** |
|
732
|
|
|
* Register a new user in the system |
|
733
|
|
|
* @param username string Username |
|
734
|
|
|
* @param password1 string Password |
|
735
|
|
|
* @param password2 string Password verification |
|
736
|
|
|
* @param pin int 4 digit PIN code |
|
737
|
|
|
* @param email1 string Email address |
|
738
|
|
|
* @param email2 string Email confirmation |
|
739
|
|
|
* @return bool |
|
740
|
|
|
**/ |
|
741
|
|
|
public function register($username, $coinaddress, $password1, $password2, $pin, $email1='', $email2='', $tac='', $strToken='') { |
|
742
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
743
|
|
|
if ($tac != 1) { |
|
744
|
|
|
$this->setErrorMessage('You need to accept our <a href="'.$_SERVER['SCRIPT_NAME'].'?page=tac" target="_blank">Terms and Conditions</a>'); |
|
745
|
|
|
return false; |
|
746
|
|
|
} |
|
747
|
|
|
if (strlen($username) > 40) { |
|
748
|
|
|
$this->setErrorMessage('Username exceeding character limit'); |
|
749
|
|
|
return false; |
|
750
|
|
|
} |
|
751
|
|
|
if (!is_null($coinaddress)) { |
|
752
|
|
|
if ($this->coin_address->existsCoinAddress($coinaddress)) { |
|
753
|
|
|
$this->setErrorMessage('Coin address is already taken'); |
|
754
|
|
|
return false; |
|
755
|
|
|
} |
|
756
|
|
|
if (!$this->bitcoin->validateaddress($coinaddress)) { |
|
757
|
|
|
$this->setErrorMessage('Coin address is not valid'); |
|
758
|
|
|
return false; |
|
759
|
|
|
} |
|
760
|
|
|
} |
|
761
|
|
|
if (preg_match('/[^a-z_\-0-9]/i', $username)) { |
|
762
|
|
|
$this->setErrorMessage('Username may only contain alphanumeric characters'); |
|
763
|
|
|
return false; |
|
764
|
|
|
} |
|
765
|
|
|
if ($this->getEmail($email1)) { |
|
766
|
|
|
$this->setErrorMessage( 'This e-mail address is already taken' ); |
|
767
|
|
|
return false; |
|
768
|
|
|
} |
|
769
|
|
|
if (strlen($password1) < 8) { |
|
770
|
|
|
$this->setErrorMessage( 'Password is too short, minimum of 8 characters required' ); |
|
771
|
|
|
return false; |
|
772
|
|
|
} |
|
773
|
|
|
if ($password1 !== $password2) { |
|
774
|
|
|
$this->setErrorMessage( 'Password do not match' ); |
|
775
|
|
|
return false; |
|
776
|
|
|
} |
|
777
|
|
View Code Duplication |
if (empty($email1) || !filter_var($email1, FILTER_VALIDATE_EMAIL)) { |
|
|
|
|
|
|
778
|
|
|
$this->setErrorMessage( 'Invalid e-mail address' ); |
|
779
|
|
|
return false; |
|
780
|
|
|
} |
|
781
|
|
|
if ($email1 !== $email2) { |
|
782
|
|
|
$this->setErrorMessage( 'E-mail do not match' ); |
|
783
|
|
|
return false; |
|
784
|
|
|
} |
|
785
|
|
|
if (!is_numeric($pin) || strlen($pin) > 4 || strlen($pin) < 4) { |
|
786
|
|
|
$this->setErrorMessage( 'Invalid PIN' ); |
|
787
|
|
|
return false; |
|
788
|
|
|
} |
|
789
|
|
|
if (isset($strToken) && !empty($strToken)) { |
|
790
|
|
|
if ( ! $aToken = $this->token->getToken($strToken, 'invitation')) { |
|
791
|
|
|
$this->setErrorMessage('Unable to find token'); |
|
792
|
|
|
return false; |
|
793
|
|
|
} |
|
794
|
|
|
// Circle dependency, so we create our own object here |
|
795
|
|
|
$invitation = new Invitation(); |
|
796
|
|
|
$invitation->setMysql($this->mysqli); |
|
797
|
|
|
$invitation->setDebug($this->debug); |
|
798
|
|
|
$invitation->setLog($this->log); |
|
799
|
|
|
$invitation->setUser($this); |
|
800
|
|
|
$invitation->setConfig($this->config); |
|
801
|
|
|
if (!$invitation->setActivated($aToken['id'])) { |
|
802
|
|
|
$this->setErrorMessage('Unable to activate your invitation'); |
|
803
|
|
|
return false; |
|
804
|
|
|
} |
|
805
|
|
|
if (!$this->token->deleteToken($strToken)) { |
|
806
|
|
|
$this->setErrorMessage('Unable to remove used token'); |
|
807
|
|
|
$this->log->log("warn", "$username tried to register but failed to delete the invitation token"); |
|
808
|
|
|
return false; |
|
809
|
|
|
} |
|
810
|
|
|
} |
|
811
|
|
|
if ($this->mysqli->query("SELECT id FROM $this->table LIMIT 1")->num_rows > 0) { |
|
812
|
|
|
! $this->setting->getValue('accounts_confirm_email_disabled') ? $is_locked = 1 : $is_locked = 0; |
|
813
|
|
|
$is_admin = 0; |
|
814
|
|
|
$stmt = $this->mysqli->prepare(" |
|
815
|
|
|
INSERT INTO $this->table (username, pass, email, signup_timestamp, pin, api_key, is_locked) |
|
816
|
|
|
VALUES (?, ?, ?, ?, ?, ?, ?) |
|
817
|
|
|
"); |
|
818
|
|
|
} else { |
|
819
|
|
|
$is_locked = 0; |
|
820
|
|
|
$is_admin = 1; |
|
821
|
|
|
$stmt = $this->mysqli->prepare(" |
|
822
|
|
|
INSERT INTO $this->table (username, pass, email, signup_timestamp, pin, api_key, is_admin, is_locked) |
|
823
|
|
|
VALUES (?, ?, ?, ?, ?, ?, 1, ?) |
|
824
|
|
|
"); |
|
825
|
|
|
} |
|
826
|
|
|
|
|
827
|
|
|
// Create hashed strings using original string and salt |
|
828
|
|
|
$password_hash = $this->getHash($password1, HASH_VERSION, bin2hex(openssl_random_pseudo_bytes(32))); |
|
829
|
|
|
$pin_hash = $this->getHash($pin, HASH_VERSION, bin2hex(openssl_random_pseudo_bytes(32))); |
|
830
|
|
|
$apikey_hash = $this->getHash($username, 0); |
|
831
|
|
|
$username_clean = strip_tags($username); |
|
832
|
|
|
$signup_time = time(); |
|
833
|
|
|
|
|
834
|
|
|
if ($this->checkStmt($stmt) && $stmt->bind_param('sssissi', $username_clean, $password_hash, $email1, $signup_time, $pin_hash, $apikey_hash, $is_locked) && $stmt->execute()) { |
|
835
|
|
|
$new_account_id = $this->mysqli->lastused->insert_id; |
|
836
|
|
|
if (!is_null($coinaddress)) $this->coin_address->add($new_account_id, $coinaddress); |
|
837
|
|
|
if (! $this->setting->getValue('accounts_confirm_email_disabled') && $is_admin != 1) { |
|
838
|
|
|
if ($token = $this->token->createToken('confirm_email', $stmt->insert_id)) { |
|
839
|
|
|
$aData['username'] = $username_clean; |
|
|
|
|
|
|
840
|
|
|
$aData['token'] = $token; |
|
841
|
|
|
$aData['email'] = $email1; |
|
842
|
|
|
$aData['subject'] = 'E-Mail verification'; |
|
843
|
|
View Code Duplication |
if (!$this->mail->sendMail('register/confirm_email', $aData)) { |
|
|
|
|
|
|
844
|
|
|
$this->setErrorMessage('Unable to request email confirmation: ' . $this->mail->getError()); |
|
845
|
|
|
return false; |
|
846
|
|
|
} |
|
847
|
|
|
return true; |
|
848
|
|
|
} else { |
|
849
|
|
|
$this->setErrorMessage('Failed to create confirmation token'); |
|
850
|
|
|
$this->debug->append('Unable to create confirm_email token: ' . $this->token->getError()); |
|
851
|
|
|
return false; |
|
852
|
|
|
} |
|
853
|
|
|
} else { |
|
854
|
|
|
return true; |
|
855
|
|
|
} |
|
856
|
|
|
} else { |
|
857
|
|
|
$this->setErrorMessage( 'Unable to register' ); |
|
858
|
|
|
$this->debug->append('Failed to insert user into DB: ' . $this->mysqli->lastused->error); |
|
859
|
|
|
echo $this->mysqli->lastused->error; |
|
860
|
|
|
if ($stmt->sqlstate == '23000') $this->setErrorMessage( 'Username or email already registered' ); |
|
861
|
|
|
return false; |
|
862
|
|
|
} |
|
863
|
|
|
return false; |
|
|
|
|
|
|
864
|
|
|
} |
|
865
|
|
|
|
|
866
|
|
|
/** |
|
867
|
|
|
* User a one time token to reset a password |
|
868
|
|
|
* @param token string one time token |
|
869
|
|
|
* @param new1 string New password |
|
870
|
|
|
* @param new2 string New password verification |
|
871
|
|
|
* @return bool |
|
872
|
|
|
**/ |
|
873
|
|
|
public function resetPassword($token, $new1, $new2) { |
|
874
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
875
|
|
|
if ($aToken = $this->token->getToken($token, 'password_reset')) { |
|
876
|
|
|
if ($new1 !== $new2) { |
|
877
|
|
|
$this->setErrorMessage( 'New passwords do not match' ); |
|
878
|
|
|
return false; |
|
879
|
|
|
} |
|
880
|
|
|
if ( strlen($new1) < 8 ) { |
|
881
|
|
|
$this->setErrorMessage( 'New password is too short, please use more than 8 chars' ); |
|
882
|
|
|
return false; |
|
883
|
|
|
} |
|
884
|
|
|
$new_hash = $this->getHash($new1, HASH_VERSION, bin2hex(openssl_random_pseudo_bytes(32))); |
|
885
|
|
|
$stmt = $this->mysqli->prepare("UPDATE $this->table SET pass = ? WHERE id = ?"); |
|
886
|
|
|
if ($this->checkStmt($stmt) && $stmt->bind_param('si', $new_hash, $aToken['account_id']) && $stmt->execute() && $stmt->affected_rows === 1) { |
|
887
|
|
|
if ($this->token->deleteToken($aToken['token'])) { |
|
888
|
|
|
return true; |
|
889
|
|
|
} else { |
|
890
|
|
|
$this->setErrorMessage('Unable to invalidate used token'); |
|
891
|
|
|
} |
|
892
|
|
|
} else { |
|
893
|
|
|
$this->setErrorMessage('Unable to set new password or you chose the same password. Please use a different one.'); |
|
894
|
|
|
} |
|
895
|
|
|
} else { |
|
896
|
|
|
$this->setErrorMessage('Invalid token: ' . $this->token->getError()); |
|
897
|
|
|
} |
|
898
|
|
|
$this->debug->append('Failed to update password:' . $this->mysqli->lastused->error); |
|
899
|
|
|
return false; |
|
900
|
|
|
} |
|
901
|
|
|
|
|
902
|
|
|
/** |
|
903
|
|
|
* Reset a password by sending a password reset mail |
|
904
|
|
|
* @param username string Username to reset password for |
|
905
|
|
|
* @return bool |
|
906
|
|
|
**/ |
|
907
|
|
|
public function initResetPassword($username) { |
|
908
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
909
|
|
|
// Fetch the users mail address |
|
910
|
|
|
if (empty($username)) { |
|
911
|
|
|
$this->setErrorMessage("Username must not be empty"); |
|
912
|
|
|
return false; |
|
913
|
|
|
} |
|
914
|
|
|
if (filter_var($username, FILTER_VALIDATE_EMAIL)) { |
|
915
|
|
|
$this->debug->append("Username is an e-mail: $username", 2); |
|
916
|
|
|
if (!$username = $this->getUserNameByEmail($username)) { |
|
917
|
|
|
$this->setErrorMessage("Invalid username or password."); |
|
918
|
|
|
return false; |
|
919
|
|
|
} |
|
920
|
|
|
} |
|
921
|
|
|
if (!$aData['email'] = $this->getUserEmail($username, true)) { |
|
|
|
|
|
|
922
|
|
|
$this->setErrorMessage("Please check your mail account to finish your password reset"); |
|
923
|
|
|
return false; |
|
924
|
|
|
} |
|
925
|
|
View Code Duplication |
if (!$aData['token'] = $this->token->createToken('password_reset', $this->getUserId($username, true))) { |
|
|
|
|
|
|
926
|
|
|
$this->setErrorMessage('Unable to setup token for password reset'); |
|
927
|
|
|
return false; |
|
928
|
|
|
} |
|
929
|
|
|
$aData['username'] = $this->getUserName($this->getUserId($username, true)); |
|
930
|
|
|
$aData['subject'] = 'Password Reset Request'; |
|
931
|
|
|
if ($_SERVER['REMOTE_ADDR'] !== $this->getUserIp($this->getUserId($username, true))) { |
|
932
|
|
|
$this->log->log("warn", "$username requested password reset, saved IP is [".$this->getUserIp($this->getUserId($username, true))."]"); |
|
933
|
|
|
} else { |
|
934
|
|
|
$this->log->log("info", "$username requested password reset, saved IP is [".$this->getUserIp($this->getUserId($username, true))."]"); |
|
935
|
|
|
} |
|
936
|
|
View Code Duplication |
if ($this->mail->sendMail('password/reset', $aData)) { |
|
|
|
|
|
|
937
|
|
|
return true; |
|
938
|
|
|
} else { |
|
939
|
|
|
$this->setErrorMessage('Unable to send mail to your address'); |
|
940
|
|
|
return false; |
|
941
|
|
|
} |
|
942
|
|
|
return false; |
|
|
|
|
|
|
943
|
|
|
} |
|
944
|
|
|
|
|
945
|
|
|
/** |
|
946
|
|
|
* Check if a user is authenticated and allowed to login |
|
947
|
|
|
* Checks the $_SESSION for existing data |
|
948
|
|
|
* Destroys the session if account is now locked |
|
949
|
|
|
* @param none |
|
950
|
|
|
* @return bool |
|
951
|
|
|
**/ |
|
952
|
|
|
public function isAuthenticated($logout=true) { |
|
953
|
|
|
$this->debug->append("STA " . __METHOD__, 4); |
|
954
|
|
|
if ( @$_SESSION['AUTHENTICATED'] == true && |
|
955
|
|
|
!$this->isLocked($_SESSION['USERDATA']['id']) && |
|
956
|
|
|
$this->getUserIp($_SESSION['USERDATA']['id']) == $_SERVER['REMOTE_ADDR'] && |
|
957
|
|
|
( ! $this->config['protect_session_state'] || |
|
958
|
|
|
( |
|
959
|
|
|
$this->config['protect_session_state'] && $_SESSION['STATE'] == md5($_SESSION['USERDATA']['username'].$_SESSION['USERDATA']['id'].@$_SERVER['HTTP_USER_AGENT']) |
|
960
|
|
|
) |
|
961
|
|
|
) |
|
962
|
|
|
) return true; |
|
963
|
|
|
// Catchall |
|
964
|
|
|
$this->log->log('warn', 'Forcing logout, user is locked or IP changed mid session [hijack attempt?]'); |
|
965
|
|
|
if ($logout == true) $this->logoutUser(); |
|
|
|
|
|
|
966
|
|
|
return false; |
|
967
|
|
|
} |
|
968
|
|
|
|
|
969
|
|
|
/** |
|
970
|
|
|
* Convenience function to get IP address, no params is the same as REMOTE_ADDR |
|
971
|
|
|
* @param trustremote bool must be FALSE to checkcloudflare, checkclient or checkforwarded |
|
972
|
|
|
* @param checkcloudflare bool check HTTP_CF_CONNECTING_IP for a valid ip first |
|
973
|
|
|
* @param checkclient bool check HTTP_CLIENT_IP for a valid ip first |
|
974
|
|
|
* @param checkforwarded bool check HTTP_X_FORWARDED_FOR for a valid ip first |
|
975
|
|
|
* @return string IP address |
|
976
|
|
|
*/ |
|
977
|
|
|
public function getCurrentIP($trustremote=false, $checkcloudflare=true, $checkclient=false, $checkforwarded=true) { |
|
978
|
|
|
$cf = (isset($_SERVER['HTTP_CF_CONNECTING_IP'])) ? $_SERVER['HTTP_CF_CONNECTING_IP'] : false; |
|
979
|
|
|
$client = (isset($_SERVER['HTTP_CLIENT_IP'])) ? $_SERVER['HTTP_CLIENT_IP'] : false; |
|
980
|
|
|
$fwd = (isset($_SERVER['HTTP_X_FORWARDED_FOR'])) ? $_SERVER['HTTP_X_FORWARDED_FOR'] : false; |
|
981
|
|
|
$remote = (isset($_SERVER['REMOTE_ADDR'])) ? $_SERVER['REMOTE_ADDR'] : @$_SERVER['REMOTE_ADDR']; |
|
982
|
|
|
// shared internet |
|
983
|
|
|
if (!$trustremote && $checkcloudflare && filter_var($cf, FILTER_VALIDATE_IP)) { |
|
984
|
|
|
// cloudflare |
|
985
|
|
|
return $cf; |
|
986
|
|
|
} else if (!$trustremote && $checkclient && filter_var($client, FILTER_VALIDATE_IP)) { |
|
987
|
|
|
return $client; |
|
988
|
|
|
} else if (!$trustremote && $checkforwarded && strpos($fwd, ',') !== false) { |
|
989
|
|
|
// multiple proxies |
|
990
|
|
|
$ips = explode(',', $fwd); |
|
991
|
|
|
return $ips[0]; |
|
992
|
|
|
} else if (!$trustremote && $checkforwarded && filter_var($fwd, FILTER_VALIDATE_IP)) { |
|
993
|
|
|
// single |
|
994
|
|
|
return $fwd; |
|
995
|
|
|
} else { |
|
996
|
|
|
// as usual |
|
997
|
|
|
return $remote; |
|
998
|
|
|
} |
|
999
|
|
|
} |
|
1000
|
|
|
} |
|
1001
|
|
|
|
|
1002
|
|
|
// Make our class available automatically |
|
1003
|
|
|
$user = new User($config); |
|
1004
|
|
|
$user->setDebug($debug); |
|
1005
|
|
|
$user->setLog($log); |
|
1006
|
|
|
$user->setMysql($mysqli); |
|
1007
|
|
|
$user->setSalt($config['SALT']); |
|
1008
|
|
|
$user->setSmarty($smarty); |
|
1009
|
|
|
$user->setMail($mail); |
|
1010
|
|
|
$user->setToken($oToken); |
|
1011
|
|
|
$user->setBitcoin($bitcoin); |
|
1012
|
|
|
$user->setSetting($setting); |
|
1013
|
|
|
$user->setCoinAddress($coin_address); |
|
1014
|
|
|
$user->setErrorCodes($aErrorCodes); |
|
1015
|
|
|
|
Adding a
@returnannotation to a constructor is not recommended, since a constructor does not have a meaningful return value.Please refer to the PHP core documentation on constructors.