@@ -151,6 +151,9 @@ |
||
| 151 | 151 | } |
| 152 | 152 | |
| 153 | 153 | |
| 154 | + /** |
|
| 155 | + * @param integer $user_id |
|
| 156 | + */ |
|
| 154 | 157 | public function __construct($user_id) { |
| 155 | 158 | $this->user_change($user_id); |
| 156 | 159 | } |
@@ -122,8 +122,8 @@ discard block |
||
| 122 | 122 | |
| 123 | 123 | $update_cache = false; |
| 124 | 124 | |
| 125 | - if(!empty($this->to_write)) { |
|
| 126 | - foreach($this->to_write as $key => $cork) { |
|
| 125 | + if (!empty($this->to_write)) { |
|
| 126 | + foreach ($this->to_write as $key => $cork) { |
|
| 127 | 127 | $value = is_array($this->data[$key]) ? serialize($this->data[$key]) : $this->data[$key]; // Сериализация для массивов при сохранении в БД |
| 128 | 128 | $this->to_write[$key] = "({$this->user_id}, '" . db_escape($key) . "', '" . db_escape($value) . "')"; |
| 129 | 129 | } |
@@ -134,18 +134,18 @@ discard block |
||
| 134 | 134 | $update_cache = true; |
| 135 | 135 | } |
| 136 | 136 | |
| 137 | - if(!empty($this->to_delete)) { |
|
| 138 | - foreach($this->to_delete as $key => &$value) { |
|
| 139 | - $value = is_string($key) ? "'". db_escape($key) . "'" : $key; |
|
| 137 | + if (!empty($this->to_delete)) { |
|
| 138 | + foreach ($this->to_delete as $key => &$value) { |
|
| 139 | + $value = is_string($key) ? "'" . db_escape($key) . "'" : $key; |
|
| 140 | 140 | } |
| 141 | 141 | |
| 142 | - doquery("DELETE FROM {{player_options}} WHERE `player_id` = {$this->user_id} AND `option_id` IN (". implode(',', $this->to_delete) . ") "); |
|
| 142 | + doquery("DELETE FROM {{player_options}} WHERE `player_id` = {$this->user_id} AND `option_id` IN (" . implode(',', $this->to_delete) . ") "); |
|
| 143 | 143 | |
| 144 | 144 | $this->to_delete = array(); |
| 145 | 145 | $update_cache = true; |
| 146 | 146 | } |
| 147 | 147 | |
| 148 | - if($update_cache) { |
|
| 148 | + if ($update_cache) { |
|
| 149 | 149 | global $sn_cache; |
| 150 | 150 | |
| 151 | 151 | $field_name = $this->cached_name(); |
@@ -172,7 +172,7 @@ discard block |
||
| 172 | 172 | protected function load() { |
| 173 | 173 | global $sn_cache; |
| 174 | 174 | |
| 175 | - if($this->loaded) { |
|
| 175 | + if ($this->loaded) { |
|
| 176 | 176 | return; |
| 177 | 177 | } |
| 178 | 178 | |
@@ -180,7 +180,7 @@ discard block |
||
| 180 | 180 | $this->to_write = array(); |
| 181 | 181 | $this->to_delete = array(); |
| 182 | 182 | |
| 183 | - if(!$this->user_id) { |
|
| 183 | + if (!$this->user_id) { |
|
| 184 | 184 | $this->loaded = true; |
| 185 | 185 | return; |
| 186 | 186 | } |
@@ -188,13 +188,13 @@ discard block |
||
| 188 | 188 | $field_name = $this->cached_name(); |
| 189 | 189 | $a_data = $sn_cache->$field_name; |
| 190 | 190 | |
| 191 | - if(!empty($a_data)) { |
|
| 191 | + if (!empty($a_data)) { |
|
| 192 | 192 | $this->data = array_replace_recursive($this->data, $a_data); |
| 193 | 193 | return; |
| 194 | 194 | } |
| 195 | 195 | |
| 196 | 196 | $query = doquery("SELECT * FROM `{{player_options}}` WHERE `player_id` = {$this->user_id} FOR UPDATE"); |
| 197 | - while($row = db_fetch($query)) { |
|
| 197 | + while ($row = db_fetch($query)) { |
|
| 198 | 198 | // $this->data[$row['option_id']] = $row['value']; |
| 199 | 199 | $this->data[$row['option_id']] = is_string($row['value']) && ($temp = unserialize($row['value'])) !== false ? $temp : $row['value']; // Десериализация |
| 200 | 200 | } |
@@ -35,7 +35,7 @@ discard block |
||
| 35 | 35 | */ |
| 36 | 36 | // OK 4.9 |
| 37 | 37 | public function __construct($filename = __FILE__) { |
| 38 | - if($this->provider_id == ACCOUNT_PROVIDER_NONE) { |
|
| 38 | + if ($this->provider_id == ACCOUNT_PROVIDER_NONE) { |
|
| 39 | 39 | die('У всех провайдеров должен быть $provider_id!'); |
| 40 | 40 | } |
| 41 | 41 | |
@@ -133,7 +133,7 @@ discard block |
||
| 133 | 133 | // OK 4.6 |
| 134 | 134 | public function player_name_suggest() { |
| 135 | 135 | $name = ''; |
| 136 | - if(is_object($this->account) && !empty($this->account->account_email)) { |
|
| 136 | + if (is_object($this->account) && !empty($this->account->account_email)) { |
|
| 137 | 137 | list($name) = explode('@', $this->account->account_email); |
| 138 | 138 | } |
| 139 | 139 | |
@@ -239,7 +239,7 @@ |
||
| 239 | 239 | |
| 240 | 240 | $factory = $this->values[$id]; |
| 241 | 241 | |
| 242 | - $extended = function ($c) use ($callable, $factory) { |
|
| 242 | + $extended = function($c) use ($callable, $factory) { |
|
| 243 | 243 | return $callable($factory($c), $c); |
| 244 | 244 | }; |
| 245 | 245 | |
@@ -31,8 +31,7 @@ discard block |
||
| 31 | 31 | * |
| 32 | 32 | * @author Fabien Potencier |
| 33 | 33 | */ |
| 34 | -class Container implements \ArrayAccess |
|
| 35 | -{ |
|
| 34 | +class Container implements \ArrayAccess { |
|
| 36 | 35 | private $values = array(); |
| 37 | 36 | private $factories; |
| 38 | 37 | private $protected; |
@@ -47,8 +46,7 @@ discard block |
||
| 47 | 46 | * |
| 48 | 47 | * @param array $values The parameters or objects. |
| 49 | 48 | */ |
| 50 | - public function __construct(array $values = array()) |
|
| 51 | - { |
|
| 49 | + public function __construct(array $values = array()) { |
|
| 52 | 50 | $this->factories = new \SplObjectStorage(); |
| 53 | 51 | $this->protected = new \SplObjectStorage(); |
| 54 | 52 | |
@@ -71,8 +69,7 @@ discard block |
||
| 71 | 69 | * |
| 72 | 70 | * @throws \RuntimeException Prevent override of a frozen service |
| 73 | 71 | */ |
| 74 | - public function offsetSet($id, $value) |
|
| 75 | - { |
|
| 72 | + public function offsetSet($id, $value) { |
|
| 76 | 73 | if (isset($this->frozen[$id])) { |
| 77 | 74 | throw new \RuntimeException(sprintf('Cannot override frozen service "%s".', $id)); |
| 78 | 75 | } |
@@ -90,8 +87,7 @@ discard block |
||
| 90 | 87 | * |
| 91 | 88 | * @throws \InvalidArgumentException if the identifier is not defined |
| 92 | 89 | */ |
| 93 | - public function offsetGet($id) |
|
| 94 | - { |
|
| 90 | + public function offsetGet($id) { |
|
| 95 | 91 | if (!isset($this->keys[$id])) { |
| 96 | 92 | throw new \InvalidArgumentException(sprintf('Identifier "%s" is not defined.', $id)); |
| 97 | 93 | } |
@@ -125,8 +121,7 @@ discard block |
||
| 125 | 121 | * |
| 126 | 122 | * @return bool |
| 127 | 123 | */ |
| 128 | - public function offsetExists($id) |
|
| 129 | - { |
|
| 124 | + public function offsetExists($id) { |
|
| 130 | 125 | return isset($this->keys[$id]); |
| 131 | 126 | } |
| 132 | 127 | |
@@ -135,8 +130,7 @@ discard block |
||
| 135 | 130 | * |
| 136 | 131 | * @param string $id The unique identifier for the parameter or object |
| 137 | 132 | */ |
| 138 | - public function offsetUnset($id) |
|
| 139 | - { |
|
| 133 | + public function offsetUnset($id) { |
|
| 140 | 134 | if (isset($this->keys[$id])) { |
| 141 | 135 | if (is_object($this->values[$id])) { |
| 142 | 136 | unset($this->factories[$this->values[$id]], $this->protected[$this->values[$id]]); |
@@ -155,8 +149,7 @@ discard block |
||
| 155 | 149 | * |
| 156 | 150 | * @throws \InvalidArgumentException Service definition has to be a closure of an invokable object |
| 157 | 151 | */ |
| 158 | - public function factory($callable) |
|
| 159 | - { |
|
| 152 | + public function factory($callable) { |
|
| 160 | 153 | if (!method_exists($callable, '__invoke')) { |
| 161 | 154 | throw new \InvalidArgumentException('Service definition is not a Closure or invokable object.'); |
| 162 | 155 | } |
@@ -177,8 +170,7 @@ discard block |
||
| 177 | 170 | * |
| 178 | 171 | * @throws \InvalidArgumentException Service definition has to be a closure of an invokable object |
| 179 | 172 | */ |
| 180 | - public function protect($callable) |
|
| 181 | - { |
|
| 173 | + public function protect($callable) { |
|
| 182 | 174 | if (!method_exists($callable, '__invoke')) { |
| 183 | 175 | throw new \InvalidArgumentException('Callable is not a Closure or invokable object.'); |
| 184 | 176 | } |
@@ -197,8 +189,7 @@ discard block |
||
| 197 | 189 | * |
| 198 | 190 | * @throws \InvalidArgumentException if the identifier is not defined |
| 199 | 191 | */ |
| 200 | - public function raw($id) |
|
| 201 | - { |
|
| 192 | + public function raw($id) { |
|
| 202 | 193 | if (!isset($this->keys[$id])) { |
| 203 | 194 | throw new \InvalidArgumentException(sprintf('Identifier "%s" is not defined.', $id)); |
| 204 | 195 | } |
@@ -223,8 +214,7 @@ discard block |
||
| 223 | 214 | * |
| 224 | 215 | * @throws \InvalidArgumentException if the identifier is not defined or not a service definition |
| 225 | 216 | */ |
| 226 | - public function extend($id, $callable) |
|
| 227 | - { |
|
| 217 | + public function extend($id, $callable) { |
|
| 228 | 218 | if (!isset($this->keys[$id])) { |
| 229 | 219 | throw new \InvalidArgumentException(sprintf('Identifier "%s" is not defined.', $id)); |
| 230 | 220 | } |
@@ -256,8 +246,7 @@ discard block |
||
| 256 | 246 | * |
| 257 | 247 | * @return array An array of value names |
| 258 | 248 | */ |
| 259 | - public function keys() |
|
| 260 | - { |
|
| 249 | + public function keys() { |
|
| 261 | 250 | return array_keys($this->values); |
| 262 | 251 | } |
| 263 | 252 | |
@@ -269,8 +258,7 @@ discard block |
||
| 269 | 258 | * |
| 270 | 259 | * @return static |
| 271 | 260 | */ |
| 272 | - public function register(ServiceProviderInterface $provider, array $values = array()) |
|
| 273 | - { |
|
| 261 | + public function register(ServiceProviderInterface $provider, array $values = array()) { |
|
| 274 | 262 | $provider->register($this); |
| 275 | 263 | |
| 276 | 264 | foreach ($values as $key => $value) { |
@@ -19,7 +19,7 @@ discard block |
||
| 19 | 19 | protected static $is_init = false; |
| 20 | 20 | |
| 21 | 21 | protected static function init() { |
| 22 | - if(!empty(static::$db)) { |
|
| 22 | + if (!empty(static::$db)) { |
|
| 23 | 23 | return; |
| 24 | 24 | } |
| 25 | 25 | static::$db = classSupernova::$db; |
@@ -66,12 +66,12 @@ discard block |
||
| 66 | 66 | $provider_id_safe = intval($provider_id_unsafe); |
| 67 | 67 | !is_array($account_list) ? $account_list = array($account_list) : false; |
| 68 | 68 | |
| 69 | - foreach($account_list as $provider_account_id_unsafe) { |
|
| 69 | + foreach ($account_list as $provider_account_id_unsafe) { |
|
| 70 | 70 | $provider_account_id_safe = intval($provider_account_id_unsafe); |
| 71 | 71 | |
| 72 | 72 | // TODO - Здесь могут отсутствовать аккаунты - проверять провайдером |
| 73 | 73 | $query = static::$db->doquery("SELECT `user_id` FROM {{account_translate}} WHERE `provider_id` = {$provider_id_safe} AND `provider_account_id` = {$provider_account_id_safe} FOR UPDATE"); |
| 74 | - while($row = static::$db->db_fetch($query)) { |
|
| 74 | + while ($row = static::$db->db_fetch($query)) { |
|
| 75 | 75 | $account_translation[$row['user_id']][$provider_id_unsafe][$provider_account_id_unsafe] = true; |
| 76 | 76 | } |
| 77 | 77 | } |
@@ -91,7 +91,7 @@ discard block |
||
| 91 | 91 | "SELECT * FROM {{account_translate}} WHERE `user_id` = {$user_id_safe} " . |
| 92 | 92 | ($provider_id_unsafe ? "AND `provider_id` = {$provider_id_safe} " : '') . |
| 93 | 93 | "ORDER BY `timestamp` FOR UPDATE"); |
| 94 | - while($row = static::$db->db_fetch($query)) { |
|
| 94 | + while ($row = static::$db->db_fetch($query)) { |
|
| 95 | 95 | $account_translation[$row['user_id']][$row['provider_id']][$row['provider_account_id']] = $row; |
| 96 | 96 | } |
| 97 | 97 | |
@@ -147,7 +147,7 @@ discard block |
||
| 147 | 147 | |
| 148 | 148 | public function unset_by_prefix($prefix_unset = '') { |
| 149 | 149 | static $array_clear; |
| 150 | - !$array_clear ? $array_clear = function (&$v, $k, $p) { |
|
| 150 | + !$array_clear ? $array_clear = function(&$v, $k, $p) { |
|
| 151 | 151 | strpos($k, $p) === 0 ? $v = null : false; |
| 152 | 152 | } : false; |
| 153 | 153 | |
@@ -202,7 +202,7 @@ discard block |
||
| 202 | 202 | if ($this->$name[0] === null) { |
| 203 | 203 | for ($i = count($name) - 1; $i > 0; $i--) { |
| 204 | 204 | $cName = "{$name[$i]}_COUNT"; |
| 205 | - $cName1 = "{$name[$i-1]}_COUNT"; |
|
| 205 | + $cName1 = "{$name[$i - 1]}_COUNT"; |
|
| 206 | 206 | if ($this->$cName1 == null || $i == 1) { |
| 207 | 207 | $this->$cName++; |
| 208 | 208 | } |
@@ -247,7 +247,7 @@ discard block |
||
| 247 | 247 | |
| 248 | 248 | for ($i = 1; $i < count($name); $i++) { |
| 249 | 249 | $cName = "{$name[$i]}_COUNT"; |
| 250 | - $cName1 = "{$name[$i-1]}_COUNT"; |
|
| 250 | + $cName1 = "{$name[$i - 1]}_COUNT"; |
|
| 251 | 251 | |
| 252 | 252 | if ($i == 1 || $this->$cName1 === null) { |
| 253 | 253 | $this->$cName--; |
@@ -32,8 +32,7 @@ |
||
| 32 | 32 | * @author Fabien Potencier |
| 33 | 33 | * @author Dominik Zogg |
| 34 | 34 | */ |
| 35 | -interface ServiceProviderInterface |
|
| 36 | -{ |
|
| 35 | +interface ServiceProviderInterface { |
|
| 37 | 36 | /** |
| 38 | 37 | * Registers services on the given container. |
| 39 | 38 | * |
@@ -138,7 +138,6 @@ discard block |
||
| 138 | 138 | * Попытка залогиниться с использованием метода $method |
| 139 | 139 | * @version 4.5 |
| 140 | 140 | * |
| 141 | - * @param string $method_name |
|
| 142 | 141 | */ |
| 143 | 142 | public function login() { |
| 144 | 143 | // TODO Проверяем поддерживаемость метода |
@@ -163,7 +162,7 @@ discard block |
||
| 163 | 162 | * |
| 164 | 163 | * @param $old_password_unsafe |
| 165 | 164 | * @param $new_password_unsafe |
| 166 | - * @param null $salt_unsafe |
|
| 165 | + * @param string $salt_unsafe |
|
| 167 | 166 | * |
| 168 | 167 | * @return array|bool|resource |
| 169 | 168 | */ |
@@ -176,6 +175,9 @@ discard block |
||
| 176 | 175 | return $result; |
| 177 | 176 | } |
| 178 | 177 | |
| 178 | + /** |
|
| 179 | + * @param Account $account_to_impersonate |
|
| 180 | + */ |
|
| 179 | 181 | public function impersonate($account_to_impersonate) { |
| 180 | 182 | $this->cookie_set($account_to_impersonate); |
| 181 | 183 | } |
@@ -662,6 +664,10 @@ discard block |
||
| 662 | 664 | protected function make_random_password() { |
| 663 | 665 | return core_auth::make_random_password(); |
| 664 | 666 | } |
| 667 | + |
|
| 668 | + /** |
|
| 669 | + * @param string $message |
|
| 670 | + */ |
|
| 665 | 671 | protected function flog($message, $die = false) { |
| 666 | 672 | if(!defined('DEBUG_AUTH') || !DEBUG_AUTH) { |
| 667 | 673 | return; |
@@ -96,12 +96,12 @@ discard block |
||
| 96 | 96 | $this->prepare(); |
| 97 | 97 | |
| 98 | 98 | $this->manifest['active'] = false; |
| 99 | - if(!empty($this->config) && is_array($this->config['db'])) { |
|
| 99 | + if (!empty($this->config) && is_array($this->config['db'])) { |
|
| 100 | 100 | // БД, отличная от стандартной |
| 101 | 101 | $this->db = new db_mysql(); |
| 102 | 102 | |
| 103 | 103 | $this->db->sn_db_connect($this->config['db']); |
| 104 | - if($this->manifest['active'] = $this->db->connected) { |
|
| 104 | + if ($this->manifest['active'] = $this->db->connected) { |
|
| 105 | 105 | $this->provider_id = ACCOUNT_PROVIDER_CENTRAL; |
| 106 | 106 | |
| 107 | 107 | $this->domain = $this->config['domain']; |
@@ -115,7 +115,7 @@ discard block |
||
| 115 | 115 | } |
| 116 | 116 | |
| 117 | 117 | // Fallback to local DB |
| 118 | - if(!$this->manifest['active']) { |
|
| 118 | + if (!$this->manifest['active']) { |
|
| 119 | 119 | $this->db = classSupernova::$db; |
| 120 | 120 | |
| 121 | 121 | $this->provider_id = ACCOUNT_PROVIDER_LOCAL; |
@@ -169,7 +169,7 @@ discard block |
||
| 169 | 169 | */ |
| 170 | 170 | public function password_change($old_password_unsafe, $new_password_unsafe, $salt_unsafe = null) { |
| 171 | 171 | $result = parent::password_change($old_password_unsafe, $new_password_unsafe, $salt_unsafe); |
| 172 | - if($result) { |
|
| 172 | + if ($result) { |
|
| 173 | 173 | $this->cookie_set(); |
| 174 | 174 | } |
| 175 | 175 | |
@@ -198,12 +198,12 @@ discard block |
||
| 198 | 198 | protected function password_reset_send_code() { |
| 199 | 199 | global $lang, $config; |
| 200 | 200 | |
| 201 | - if(!$this->is_password_reset) { |
|
| 201 | + if (!$this->is_password_reset) { |
|
| 202 | 202 | return $this->account_login_status; |
| 203 | 203 | } |
| 204 | 204 | |
| 205 | 205 | // Проверяем поддержку сброса пароля |
| 206 | - if(!$this->is_feature_supported(AUTH_FEATURE_PASSWORD_RESET)) { |
|
| 206 | + if (!$this->is_feature_supported(AUTH_FEATURE_PASSWORD_RESET)) { |
|
| 207 | 207 | return $this->account_login_status; |
| 208 | 208 | } |
| 209 | 209 | |
@@ -213,7 +213,7 @@ discard block |
||
| 213 | 213 | unset($this->account); |
| 214 | 214 | $this->account = new Account($this->db); |
| 215 | 215 | |
| 216 | - if(!$this->account->db_get_by_email($email_unsafe)) { |
|
| 216 | + if (!$this->account->db_get_by_email($email_unsafe)) { |
|
| 217 | 217 | throw new Exception(PASSWORD_RESTORE_ERROR_EMAIL_NOT_EXISTS, ERR_ERROR); |
| 218 | 218 | // return $this->account_login_status; |
| 219 | 219 | } |
@@ -223,14 +223,14 @@ discard block |
||
| 223 | 223 | |
| 224 | 224 | // TODO - Проверять уровень доступа аккаунта! |
| 225 | 225 | // Аккаунты с АУТЛЕВЕЛ больше 0 - НЕ СБРАСЫВАЮТ ПАРОЛИ! |
| 226 | - foreach($user_list as $user_id => $user_data) { |
|
| 227 | - if($user_data['authlevel'] > AUTH_LEVEL_REGISTERED) { |
|
| 226 | + foreach ($user_list as $user_id => $user_data) { |
|
| 227 | + if ($user_data['authlevel'] > AUTH_LEVEL_REGISTERED) { |
|
| 228 | 228 | throw new Exception(PASSWORD_RESTORE_ERROR_ADMIN_ACCOUNT, ERR_ERROR); |
| 229 | 229 | } |
| 230 | 230 | } |
| 231 | 231 | |
| 232 | 232 | $confirmation = $this->confirmation->db_confirmation_get_latest_by_type_and_email(CONFIRM_PASSWORD_RESET, $email_unsafe); // OK 4.5 |
| 233 | - if(isset($confirmation['create_time']) && SN_TIME_NOW - strtotime($confirmation['create_time']) < PERIOD_MINUTE_10) { |
|
| 233 | + if (isset($confirmation['create_time']) && SN_TIME_NOW - strtotime($confirmation['create_time']) < PERIOD_MINUTE_10) { |
|
| 234 | 234 | throw new Exception(PASSWORD_RESTORE_ERROR_TOO_OFTEN, ERR_ERROR); |
| 235 | 235 | } |
| 236 | 236 | |
@@ -241,7 +241,7 @@ discard block |
||
| 241 | 241 | $confirm_code_unsafe = $this->confirmation->db_confirmation_get_unique_code_by_type_and_email(CONFIRM_PASSWORD_RESET, $email_unsafe); // OK 4.5 |
| 242 | 242 | sn_db_transaction_commit(); |
| 243 | 243 | |
| 244 | - if(!is_email($email_unsafe)) { |
|
| 244 | + if (!is_email($email_unsafe)) { |
|
| 245 | 245 | classSupernova::$debug->error("Email is invalid: '{$email_unsafe}'", 'Invalid email for password restoration'); |
| 246 | 246 | } |
| 247 | 247 | |
@@ -251,7 +251,7 @@ discard block |
||
| 251 | 251 | ); |
| 252 | 252 | |
| 253 | 253 | $result = $result ? PASSWORD_RESTORE_SUCCESS_CODE_SENT : PASSWORD_RESTORE_ERROR_SENDING; |
| 254 | - } catch(Exception $e) { |
|
| 254 | + } catch (Exception $e) { |
|
| 255 | 255 | sn_db_transaction_rollback(); |
| 256 | 256 | $result = $e->getMessage(); |
| 257 | 257 | } |
@@ -266,46 +266,46 @@ discard block |
||
| 266 | 266 | protected function password_reset_confirm() { |
| 267 | 267 | global $lang, $config; |
| 268 | 268 | |
| 269 | - if(!$this->is_password_reset_confirm) { |
|
| 269 | + if (!$this->is_password_reset_confirm) { |
|
| 270 | 270 | return $this->account_login_status; |
| 271 | 271 | } |
| 272 | 272 | |
| 273 | - if($this->account_login_status != LOGIN_UNDEFINED) { |
|
| 273 | + if ($this->account_login_status != LOGIN_UNDEFINED) { |
|
| 274 | 274 | return $this->account_login_status; |
| 275 | 275 | } |
| 276 | 276 | |
| 277 | 277 | // Проверяем поддержку сброса пароля |
| 278 | - if(!$this->is_feature_supported(AUTH_FEATURE_PASSWORD_RESET)) { |
|
| 278 | + if (!$this->is_feature_supported(AUTH_FEATURE_PASSWORD_RESET)) { |
|
| 279 | 279 | return $this->account_login_status; |
| 280 | 280 | } |
| 281 | 281 | |
| 282 | 282 | try { |
| 283 | 283 | $code_unsafe = sys_get_param_str_unsafe('password_reset_code'); |
| 284 | - if(empty($code_unsafe)) { |
|
| 284 | + if (empty($code_unsafe)) { |
|
| 285 | 285 | throw new Exception(PASSWORD_RESTORE_ERROR_CODE_EMPTY, ERR_ERROR); |
| 286 | 286 | } |
| 287 | 287 | |
| 288 | 288 | sn_db_transaction_start(); |
| 289 | 289 | $confirmation = $this->confirmation->db_confirmation_get_by_type_and_code(CONFIRM_PASSWORD_RESET, $code_unsafe); // OK 4.5 |
| 290 | 290 | |
| 291 | - if(empty($confirmation)) { |
|
| 291 | + if (empty($confirmation)) { |
|
| 292 | 292 | throw new Exception(PASSWORD_RESTORE_ERROR_CODE_WRONG, ERR_ERROR); |
| 293 | 293 | } |
| 294 | 294 | |
| 295 | - if(SN_TIME_NOW - strtotime($confirmation['create_time']) > AUTH_PASSWORD_RESET_CONFIRMATION_EXPIRE) { |
|
| 295 | + if (SN_TIME_NOW - strtotime($confirmation['create_time']) > AUTH_PASSWORD_RESET_CONFIRMATION_EXPIRE) { |
|
| 296 | 296 | throw new Exception(PASSWORD_RESTORE_ERROR_CODE_TOO_OLD, ERR_ERROR); |
| 297 | 297 | } |
| 298 | 298 | |
| 299 | 299 | unset($this->account); |
| 300 | 300 | $this->account = new Account($this->db); |
| 301 | 301 | |
| 302 | - if(!$this->account->db_get_by_email($confirmation['email'])) { |
|
| 302 | + if (!$this->account->db_get_by_email($confirmation['email'])) { |
|
| 303 | 303 | throw new Exception(PASSWORD_RESTORE_ERROR_CODE_OK_BUT_NO_ACCOUNT_FOR_EMAIL, ERR_ERROR); |
| 304 | 304 | } |
| 305 | 305 | |
| 306 | 306 | $new_password_unsafe = $this->make_random_password(); |
| 307 | 307 | $salt_unsafe = $this->password_salt_generate(); |
| 308 | - if(!$this->account->db_set_password($new_password_unsafe, $salt_unsafe)) { |
|
| 308 | + if (!$this->account->db_set_password($new_password_unsafe, $salt_unsafe)) { |
|
| 309 | 309 | // Ошибка смены пароля |
| 310 | 310 | throw new Exception(AUTH_ERROR_INTERNAL_PASSWORD_CHANGE_ON_RESTORE, ERR_ERROR); |
| 311 | 311 | } |
@@ -315,7 +315,7 @@ discard block |
||
| 315 | 315 | $this->cookie_set(); |
| 316 | 316 | $this->login_cookie(); |
| 317 | 317 | |
| 318 | - if($this->account_login_status == LOGIN_SUCCESS) { |
|
| 318 | + if ($this->account_login_status == LOGIN_SUCCESS) { |
|
| 319 | 319 | // TODO - НЕ ОБЯЗАТЕЛЬНО ОТПРАВЛЯТЬ ЧЕРЕЗ ЕМЕЙЛ! ЕСЛИ ЭТО ФЕЙСБУЧЕК ИЛИ ВКШЕЧКА - МОЖНО ЧЕРЕЗ ЛС ПИСАТЬ!! |
| 320 | 320 | $message_header = sprintf($lang['log_lost_email_title'], $config->game_name); |
| 321 | 321 | $message = sprintf($lang['log_lost_email_pass'], $config->game_name, $this->account->account_name, $new_password_unsafe); |
@@ -323,7 +323,7 @@ discard block |
||
| 323 | 323 | |
| 324 | 324 | // $users_translated = classSupernova::$auth->db_translate_get_users_from_account_list($this->provider_id, $this->account->account_id); // OK 4.5 |
| 325 | 325 | $users_translated = PlayerToAccountTranslate::db_translate_get_users_from_account_list($this->provider_id, $this->account->account_id); // OK 4.5 |
| 326 | - if(!empty($users_translated)) { |
|
| 326 | + if (!empty($users_translated)) { |
|
| 327 | 327 | // Отправляем в лички письмо о сбросе пароля |
| 328 | 328 | |
| 329 | 329 | // ПО ОПРЕДЕЛЕНИЮ в $users_translated только |
@@ -335,7 +335,7 @@ discard block |
||
| 335 | 335 | $message = HelperString::nl2br($message) . '<br><br>'; |
| 336 | 336 | // msg_send_simple_message($found_provider->data[F_USER_ID], 0, SN_TIME_NOW, MSG_TYPE_ADMIN, $lang['sys_administration'], $lang['sys_login_register_message_title'], $message); |
| 337 | 337 | |
| 338 | - foreach($users_translated as $user_id => $providers_list) { |
|
| 338 | + foreach ($users_translated as $user_id => $providers_list) { |
|
| 339 | 339 | msg_send_simple_message($user_id, 0, SN_TIME_NOW, MSG_TYPE_ADMIN, $lang['sys_administration'], $lang['sys_login_register_message_title'], $message); |
| 340 | 340 | } |
| 341 | 341 | } else { |
@@ -388,7 +388,7 @@ discard block |
||
| 388 | 388 | $this->flog('Регистрация: начинаем. Провайдер ' . $this->provider_id); |
| 389 | 389 | |
| 390 | 390 | try { |
| 391 | - if(!$this->is_register) { |
|
| 391 | + if (!$this->is_register) { |
|
| 392 | 392 | $this->flog('Регистрация: не выставлен флаг регистрации - пропускаем'); |
| 393 | 393 | throw new Exception(LOGIN_UNDEFINED, ERR_ERROR); |
| 394 | 394 | } |
@@ -400,8 +400,8 @@ discard block |
||
| 400 | 400 | // $this->account_check_duplicate_name_or_email($this->input_login_unsafe, $this->input_email_unsafe); |
| 401 | 401 | |
| 402 | 402 | $this->account->db_get_by_name_or_email($this->input_login_unsafe, $this->input_email_unsafe); |
| 403 | - if($this->account->is_exists) { |
|
| 404 | - if($this->account->account_email == $this->input_email_unsafe) { |
|
| 403 | + if ($this->account->is_exists) { |
|
| 404 | + if ($this->account->account_email == $this->input_email_unsafe) { |
|
| 405 | 405 | throw new Exception(REGISTER_ERROR_EMAIL_EXISTS, ERR_ERROR); |
| 406 | 406 | } else { |
| 407 | 407 | throw new Exception(REGISTER_ERROR_ACCOUNT_NAME_EXISTS, ERR_ERROR); |
@@ -440,7 +440,7 @@ discard block |
||
| 440 | 440 | // А вот это пока не нужно. Трансляцией аккаунтов в юзеров и созданием новых юзеров для новозашедших аккаунтов занимается Auth |
| 441 | 441 | // $this->register_account(); |
| 442 | 442 | sn_db_transaction_commit(); |
| 443 | - } catch(Exception $e) { |
|
| 443 | + } catch (Exception $e) { |
|
| 444 | 444 | sn_db_transaction_rollback(); |
| 445 | 445 | $this->account_login_status == LOGIN_UNDEFINED ? $this->account_login_status = $e->getMessage() : false; |
| 446 | 446 | } |
@@ -455,7 +455,7 @@ discard block |
||
| 455 | 455 | * @return int Результат попытки |
| 456 | 456 | */ |
| 457 | 457 | protected function login_cookie() { |
| 458 | - if($this->account_login_status != LOGIN_UNDEFINED) { |
|
| 458 | + if ($this->account_login_status != LOGIN_UNDEFINED) { |
|
| 459 | 459 | return $this->account_login_status; |
| 460 | 460 | } |
| 461 | 461 | |
@@ -481,7 +481,7 @@ discard block |
||
| 481 | 481 | // $this->cookie_clear(); |
| 482 | 482 | // } |
| 483 | 483 | |
| 484 | - if($this->account->cookieLogin($rememberMe)) { |
|
| 484 | + if ($this->account->cookieLogin($rememberMe)) { |
|
| 485 | 485 | $this->account_login_status = LOGIN_SUCCESS; |
| 486 | 486 | $this->remember_me = intval($rememberMe); |
| 487 | 487 | } |
@@ -498,13 +498,13 @@ discard block |
||
| 498 | 498 | protected function login_username() { |
| 499 | 499 | // TODO - Логин по старым именам |
| 500 | 500 | try { |
| 501 | - if(!$this->is_login) { |
|
| 501 | + if (!$this->is_login) { |
|
| 502 | 502 | $this->flog('Логин: не выставлен флаг входа в игру - это не логин'); |
| 503 | 503 | throw new Exception(LOGIN_UNDEFINED, ERR_ERROR); |
| 504 | 504 | } |
| 505 | 505 | |
| 506 | 506 | // TODO Пустое имя аккаунта |
| 507 | - if(!$this->input_login_unsafe) { |
|
| 507 | + if (!$this->input_login_unsafe) { |
|
| 508 | 508 | throw new Exception(LOGIN_UNDEFINED, ERR_ERROR); |
| 509 | 509 | } |
| 510 | 510 | |
@@ -514,11 +514,11 @@ discard block |
||
| 514 | 514 | // if(empty($account)) { |
| 515 | 515 | // throw new Exception(LOGIN_ERROR_USERNAME, ERR_ERROR); |
| 516 | 516 | // } |
| 517 | - if(!$this->account->db_get_by_name($this->input_login_unsafe) && !$this->account->db_get_by_email($this->input_login_unsafe)) { |
|
| 517 | + if (!$this->account->db_get_by_name($this->input_login_unsafe) && !$this->account->db_get_by_email($this->input_login_unsafe)) { |
|
| 518 | 518 | throw new Exception(LOGIN_ERROR_USERNAME, ERR_ERROR); |
| 519 | 519 | } |
| 520 | 520 | |
| 521 | - if(!$this->account->password_check($this->input_login_password_raw)) { |
|
| 521 | + if (!$this->account->password_check($this->input_login_password_raw)) { |
|
| 522 | 522 | throw new Exception(LOGIN_ERROR_PASSWORD, ERR_ERROR); |
| 523 | 523 | } |
| 524 | 524 | |
@@ -526,7 +526,7 @@ discard block |
||
| 526 | 526 | |
| 527 | 527 | $this->cookie_set(); |
| 528 | 528 | $this->account_login_status = LOGIN_SUCCESS; |
| 529 | - } catch(Exception $e) { |
|
| 529 | + } catch (Exception $e) { |
|
| 530 | 530 | $this->account_login_status == LOGIN_UNDEFINED ? $this->account_login_status = $e->getMessage() : false; |
| 531 | 531 | } |
| 532 | 532 | |
@@ -547,11 +547,11 @@ discard block |
||
| 547 | 547 | protected function cookie_set($account_to_impersonate = null) { |
| 548 | 548 | $this_account = is_object($account_to_impersonate) ? $account_to_impersonate : $this->account; |
| 549 | 549 | |
| 550 | - if(!is_object($this_account) || !$this_account->is_exists) { |
|
| 550 | + if (!is_object($this_account) || !$this_account->is_exists) { |
|
| 551 | 551 | throw new Exception(LOGIN_ERROR_NO_ACCOUNT_FOR_COOKIE_SET, ERR_ERROR); |
| 552 | 552 | } |
| 553 | 553 | |
| 554 | - if(is_object($account_to_impersonate) && $account_to_impersonate->is_exists) { |
|
| 554 | + if (is_object($account_to_impersonate) && $account_to_impersonate->is_exists) { |
|
| 555 | 555 | sn_setcookie($this->cookie_name_impersonate, $_COOKIE[$this->cookie_name], SN_TIME_NOW + PERIOD_YEAR, $this->sn_root_path, $this->domain); |
| 556 | 556 | } |
| 557 | 557 | |
@@ -588,10 +588,10 @@ discard block |
||
| 588 | 588 | protected function login_validate_input() { |
| 589 | 589 | // Проверяем, что бы в начале и конце не было пустых символов |
| 590 | 590 | // TODO - при копировании Эксель -> Опера - в конце образуются пустые места. Это не должно быть проблемой! Вынести проверку пароля в регистрацию! |
| 591 | - if($this->input_login_password_raw != trim($this->input_login_password_raw)) { |
|
| 591 | + if ($this->input_login_password_raw != trim($this->input_login_password_raw)) { |
|
| 592 | 592 | throw new Exception(LOGIN_ERROR_PASSWORD_TRIMMED, ERR_ERROR); |
| 593 | 593 | } |
| 594 | - if(!$this->input_login_password_raw) { |
|
| 594 | + if (!$this->input_login_password_raw) { |
|
| 595 | 595 | throw new Exception(LOGIN_ERROR_PASSWORD_EMPTY, ERR_ERROR); |
| 596 | 596 | } |
| 597 | 597 | } |
@@ -606,37 +606,37 @@ discard block |
||
| 606 | 606 | $this->login_validate_input(); |
| 607 | 607 | |
| 608 | 608 | // Если нет имени пользователя - NO GO! |
| 609 | - if(!$this->input_login_unsafe) { |
|
| 609 | + if (!$this->input_login_unsafe) { |
|
| 610 | 610 | throw new Exception(LOGIN_ERROR_USERNAME_EMPTY, ERR_ERROR); |
| 611 | 611 | } |
| 612 | 612 | // Если логин имеет запрещенные символы - NO GO! |
| 613 | - if(strpbrk($this->input_login_unsafe, LOGIN_REGISTER_CHARACTERS_PROHIBITED)) { |
|
| 613 | + if (strpbrk($this->input_login_unsafe, LOGIN_REGISTER_CHARACTERS_PROHIBITED)) { |
|
| 614 | 614 | throw new Exception(LOGIN_ERROR_USERNAME_RESTRICTED_CHARACTERS, ERR_ERROR); |
| 615 | 615 | } |
| 616 | 616 | // Если логин меньше минимальной длины - NO GO! |
| 617 | - if(strlen($this->input_login_unsafe) < LOGIN_LENGTH_MIN) { |
|
| 617 | + if (strlen($this->input_login_unsafe) < LOGIN_LENGTH_MIN) { |
|
| 618 | 618 | throw new Exception(REGISTER_ERROR_USERNAME_SHORT, ERR_ERROR); |
| 619 | 619 | } |
| 620 | 620 | // Если пароль меньше минимальной длины - NO GO! |
| 621 | - if(strlen($this->input_login_password_raw) < PASSWORD_LENGTH_MIN) { |
|
| 621 | + if (strlen($this->input_login_password_raw) < PASSWORD_LENGTH_MIN) { |
|
| 622 | 622 | throw new Exception(REGISTER_ERROR_PASSWORD_INSECURE, ERR_ERROR); |
| 623 | 623 | } |
| 624 | 624 | // Если пароль имеет пробельные символы в начале или конце - NO GO! |
| 625 | - if($this->input_login_password_raw != trim($this->input_login_password_raw)) { |
|
| 625 | + if ($this->input_login_password_raw != trim($this->input_login_password_raw)) { |
|
| 626 | 626 | throw new Exception(LOGIN_ERROR_PASSWORD_TRIMMED, ERR_ERROR); |
| 627 | 627 | } |
| 628 | 628 | // Если пароль не совпадает с подтверждением - NO GO! То, что у пароля нет пробельных символов в начале/конце - мы уже проверили выше |
| 629 | 629 | //Если они есть у повтора - значит пароль и повтор не совпадут |
| 630 | - if($this->input_login_password_raw <> $this->input_login_password_raw_repeat) { |
|
| 630 | + if ($this->input_login_password_raw <> $this->input_login_password_raw_repeat) { |
|
| 631 | 631 | throw new Exception(REGISTER_ERROR_PASSWORD_DIFFERENT, ERR_ERROR); |
| 632 | 632 | } |
| 633 | 633 | // Если нет емейла - NO GO! |
| 634 | 634 | // TODO - регистрация без емейла |
| 635 | - if(!$this->input_email_unsafe) { |
|
| 635 | + if (!$this->input_email_unsafe) { |
|
| 636 | 636 | throw new Exception(REGISTER_ERROR_EMAIL_EMPTY, ERR_ERROR); |
| 637 | 637 | } |
| 638 | 638 | // Если емейл не является емейлом - NO GO! |
| 639 | - if(!is_email($this->input_email_unsafe)) { |
|
| 639 | + if (!is_email($this->input_email_unsafe)) { |
|
| 640 | 640 | throw new Exception(REGISTER_ERROR_EMAIL_WRONG, ERR_ERROR); |
| 641 | 641 | } |
| 642 | 642 | } |
@@ -667,7 +667,7 @@ discard block |
||
| 667 | 667 | return core_auth::make_random_password(); |
| 668 | 668 | } |
| 669 | 669 | protected function flog($message, $die = false) { |
| 670 | - if(!defined('DEBUG_AUTH') || !DEBUG_AUTH) { |
|
| 670 | + if (!defined('DEBUG_AUTH') || !DEBUG_AUTH) { |
|
| 671 | 671 | return; |
| 672 | 672 | } |
| 673 | 673 | list($called, $caller) = debug_backtrace(false); |
@@ -681,7 +681,7 @@ discard block |
||
| 681 | 681 | $_SERVER['SERVER_NAME'] == 'localhost' ? print("<div class='debug'>$message - $caller_name\r\n</div>") : false; |
| 682 | 682 | |
| 683 | 683 | classSupernova::log_file("$message - $caller_name"); |
| 684 | - if($die) { |
|
| 684 | + if ($die) { |
|
| 685 | 685 | $die && die("<div class='negative'>СТОП! Функция {$caller_name} при вызове в " . get_called_class() . " (располагается в " . get_class() . "). СООБЩИТЕ АДМИНИСТРАЦИИ!</div>"); |
| 686 | 686 | } |
| 687 | 687 | } |
@@ -829,10 +829,17 @@ |
||
| 829 | 829 | |
| 830 | 830 | // OK v4.5 |
| 831 | 831 | // TODO - REMEMBER_ME |
| 832 | + |
|
| 833 | + /** |
|
| 834 | + * @param integer $period |
|
| 835 | + */ |
|
| 832 | 836 | protected static function cookie_set($value, $impersonate = false, $period = null) { |
| 833 | 837 | sn_setcookie($impersonate ? SN_COOKIE_U_I : SN_COOKIE_U, $value, $period === null ? SN_TIME_NOW + PERIOD_YEAR : $period, SN_ROOT_RELATIVE); |
| 834 | 838 | } |
| 835 | 839 | |
| 840 | + /** |
|
| 841 | + * @param string $message |
|
| 842 | + */ |
|
| 836 | 843 | protected static function flog($message, $die = false) { |
| 837 | 844 | if(!defined('DEBUG_AUTH') || !DEBUG_AUTH) { |
| 838 | 845 | return; |
@@ -205,18 +205,18 @@ discard block |
||
| 205 | 205 | // TODO Хотя тут может получится вечный цикл - ПОДУМАТЬ |
| 206 | 206 | // TODO Тут же можно пробовать провести попытку слияния аккаунтов - хотя это и очень небезопасно |
| 207 | 207 | |
| 208 | - if(sys_get_param('login_player_register_logout')) { |
|
| 208 | + if (sys_get_param('login_player_register_logout')) { |
|
| 209 | 209 | $this->logout(); |
| 210 | 210 | } |
| 211 | 211 | |
| 212 | 212 | $original_suggest = ''; |
| 213 | 213 | // Смотрим - есть ли у нас данные от пользователя |
| 214 | - if(($player_name_submitted = sys_get_param('submit_player_name'))) { |
|
| 214 | + if (($player_name_submitted = sys_get_param('submit_player_name'))) { |
|
| 215 | 215 | // Попытка регистрации нового игрока из данных, введенных пользователем |
| 216 | 216 | $this->player_suggested_name = sys_get_param_str_unsafe('player_suggested_name'); |
| 217 | 217 | } else { |
| 218 | - foreach($this->providers_authorised as $provider) { |
|
| 219 | - if($this->player_suggested_name = $provider->player_name_suggest()) { // OK 4.5 |
|
| 218 | + foreach ($this->providers_authorised as $provider) { |
|
| 219 | + if ($this->player_suggested_name = $provider->player_name_suggest()) { // OK 4.5 |
|
| 220 | 220 | $original_suggest = $provider->player_name_suggest(); |
| 221 | 221 | break; |
| 222 | 222 | } |
@@ -224,7 +224,7 @@ discard block |
||
| 224 | 224 | } |
| 225 | 225 | |
| 226 | 226 | // Если у нас провайдеры не дают имени и пользователь не дал свой вариант - это у нас первый логин в игру |
| 227 | - if(!$this->player_suggested_name) { |
|
| 227 | + if (!$this->player_suggested_name) { |
|
| 228 | 228 | $max_user_id = db_player_get_max_id(); // 4.5 |
| 229 | 229 | // TODO - предлагать имя игрока по локали |
| 230 | 230 | |
@@ -233,15 +233,15 @@ discard block |
||
| 233 | 233 | sn_db_transaction_rollback(); |
| 234 | 234 | $this->player_suggested_name = 'Emperor ' . mt_rand($max_user_id + 1, $max_user_id + 1000); |
| 235 | 235 | sn_db_transaction_start(); |
| 236 | - } while(db_player_name_exists($this->player_suggested_name)); |
|
| 236 | + } while (db_player_name_exists($this->player_suggested_name)); |
|
| 237 | 237 | |
| 238 | 238 | } |
| 239 | 239 | |
| 240 | - if($player_name_submitted) { |
|
| 240 | + if ($player_name_submitted) { |
|
| 241 | 241 | $this->register_player_db_create($this->player_suggested_name); // OK 4.5 |
| 242 | - if($this->register_status == LOGIN_SUCCESS) { |
|
| 242 | + if ($this->register_status == LOGIN_SUCCESS) { |
|
| 243 | 243 | sys_redirect(SN_ROOT_VIRTUAL . 'overview.php'); |
| 244 | - } elseif($this->register_status == REGISTER_ERROR_PLAYER_NAME_EXISTS && $original_suggest == $this->player_suggested_name) { |
|
| 244 | + } elseif ($this->register_status == REGISTER_ERROR_PLAYER_NAME_EXISTS && $original_suggest == $this->player_suggested_name) { |
|
| 245 | 245 | // self::$player_suggested_name .= ' ' . $this->account->account_id; |
| 246 | 246 | } |
| 247 | 247 | // if(self::$login_status != LOGIN_SUCCESS) { |
@@ -265,7 +265,7 @@ discard block |
||
| 265 | 265 | : false |
| 266 | 266 | ); |
| 267 | 267 | |
| 268 | - if($this->register_status == LOGIN_ERROR_USERNAME_RESTRICTED_CHARACTERS) { |
|
| 268 | + if ($this->register_status == LOGIN_ERROR_USERNAME_RESTRICTED_CHARACTERS) { |
|
| 269 | 269 | $prohibited_characters = array_map(function($value) { |
| 270 | 270 | return "'" . htmlentities($value, ENT_QUOTES, 'UTF-8') . "'"; |
| 271 | 271 | }, str_split(LOGIN_REGISTER_CHARACTERS_PROHIBITED)); |
@@ -297,27 +297,27 @@ discard block |
||
| 297 | 297 | global $sn_module_list, $lang; |
| 298 | 298 | |
| 299 | 299 | // !self::$is_init ? self::init() : false; |
| 300 | - if(empty($sn_module_list['auth'])) { |
|
| 300 | + if (empty($sn_module_list['auth'])) { |
|
| 301 | 301 | die('{Не обнаружено ни одного провайдера авторизации в core_auth::login()!}'); |
| 302 | 302 | } |
| 303 | 303 | |
| 304 | 304 | !empty($_POST) ? self::flog(dump($_POST, '$_POST')) : false; |
| 305 | 305 | !empty($_GET) ? self::flog(dump($_GET, '$_GET')) : false; |
| 306 | - !empty($_COOKIE) ? self::flog(dump($_COOKIE,'$_COOKIE')) : false; |
|
| 306 | + !empty($_COOKIE) ? self::flog(dump($_COOKIE, '$_COOKIE')) : false; |
|
| 307 | 307 | |
| 308 | 308 | $this->auth_reset(); // OK v4.5 |
| 309 | 309 | |
| 310 | 310 | $this->providers = array(); |
| 311 | - foreach($sn_module_list['auth'] as $module_name => $module) { |
|
| 311 | + foreach ($sn_module_list['auth'] as $module_name => $module) { |
|
| 312 | 312 | $this->providers[$module->provider_id] = $module; |
| 313 | 313 | } |
| 314 | 314 | |
| 315 | 315 | // $this->providers = array_reverse($this->providers, true); // НИНАДА! СН-аккаунт должен всегда авторизироваться первым! |
| 316 | 316 | //pdump($this->providers); |
| 317 | - foreach($this->providers as $provider_id => $provider) { |
|
| 317 | + foreach ($this->providers as $provider_id => $provider) { |
|
| 318 | 318 | $login_status = $provider->login(); // OK v4.5 |
| 319 | 319 | self::flog(($provider->manifest['name'] . '->' . 'login_try - ') . (empty($provider->account->account_id) ? $lang['sys_login_messages'][$provider->account_login_status] : dump($provider))); |
| 320 | - if($login_status == LOGIN_SUCCESS && is_object($provider->account) && $provider->account instanceof Account && $provider->account->account_id) { |
|
| 320 | + if ($login_status == LOGIN_SUCCESS && is_object($provider->account) && $provider->account instanceof Account && $provider->account->account_id) { |
|
| 321 | 321 | $this->providers_authorised[$provider_id] = &$this->providers[$provider_id]; |
| 322 | 322 | |
| 323 | 323 | $this->user_id_to_provider = array_replace_recursive( |
@@ -325,20 +325,20 @@ discard block |
||
| 325 | 325 | // static::db_translate_get_users_from_account_list($provider_id, $provider->account->account_id) // OK 4.5 |
| 326 | 326 | PlayerToAccountTranslate::db_translate_get_users_from_account_list($provider_id, $provider->account->account_id) // OK 4.5 |
| 327 | 327 | ); |
| 328 | - } elseif($login_status != LOGIN_UNDEFINED) { |
|
| 328 | + } elseif ($login_status != LOGIN_UNDEFINED) { |
|
| 329 | 329 | $this->provider_error_list[$provider_id] = $login_status; |
| 330 | 330 | } |
| 331 | 331 | } |
| 332 | 332 | |
| 333 | - if(empty($this->providers_authorised)) { |
|
| 333 | + if (empty($this->providers_authorised)) { |
|
| 334 | 334 | // Ни один аккаунт не авторизирован |
| 335 | 335 | // Проверяем - есть ли у нас ошибки в аккаунтах? |
| 336 | - if(!empty($this->provider_error_list)) { |
|
| 336 | + if (!empty($this->provider_error_list)) { |
|
| 337 | 337 | // Если есть - выводим их |
| 338 | 338 | self::$login_status = reset($this->provider_error_list); |
| 339 | 339 | $providerError = $this->providers[key($this->provider_error_list)]->account_login_message; |
| 340 | 340 | |
| 341 | - if(!empty($providerError)) { |
|
| 341 | + if (!empty($providerError)) { |
|
| 342 | 342 | self::$login_message = $providerError; |
| 343 | 343 | } |
| 344 | 344 | } |
@@ -353,12 +353,12 @@ discard block |
||
| 353 | 353 | // В self::$accessible_user_row_list - список доступных игроков для данных аккаунтов с соответствующими записями из таблицы `users` |
| 354 | 354 | |
| 355 | 355 | // Остались ли у нас в списке доступные игроки? |
| 356 | - if(empty($this->accessible_user_row_list)) { |
|
| 356 | + if (empty($this->accessible_user_row_list)) { |
|
| 357 | 357 | // Нет ни одного игрока ни на одном авторизированном аккаунте |
| 358 | 358 | // Надо регать нового игрока |
| 359 | 359 | |
| 360 | 360 | // Сейчас происходит процесс регистрации игрока? |
| 361 | - if(!$this->is_player_register) { |
|
| 361 | + if (!$this->is_player_register) { |
|
| 362 | 362 | // Нет - отправляем на процесс регистрации |
| 363 | 363 | $partner_id = sys_get_param_int('id_ref', sys_get_param_int('partner_id')); |
| 364 | 364 | sys_redirect(SN_ROOT_VIRTUAL . 'index.php?page=player_register&player_register=1' . ($partner_id ? '&id_ref=' . $partner_id : '')); |
@@ -367,7 +367,7 @@ discard block |
||
| 367 | 367 | // Да, есть доступные игроки, которые так же прописаны в базе |
| 368 | 368 | $this->get_active_user(); // 4.5 |
| 369 | 369 | |
| 370 | - if($this->is_impersonating = !empty($_COOKIE[SN_COOKIE_U_I]) ? $_COOKIE[SN_COOKIE_U_I] : 0) { |
|
| 370 | + if ($this->is_impersonating = !empty($_COOKIE[SN_COOKIE_U_I]) ? $_COOKIE[SN_COOKIE_U_I] : 0) { |
|
| 371 | 371 | $a_user = db_user_by_id($this->is_impersonating); |
| 372 | 372 | $this->impersonator_username = $a_user['username']; |
| 373 | 373 | } |
@@ -375,9 +375,9 @@ discard block |
||
| 375 | 375 | |
| 376 | 376 | //Прописываем текущего игрока на все авторизированные аккаунты |
| 377 | 377 | // TODO - ИЛИ ВСЕХ ИГРОКОВ?? |
| 378 | - if(empty($this->is_impersonating)) { |
|
| 379 | - foreach($this->providers_authorised as $provider_id => $provider) { |
|
| 380 | - if(empty($this->user_id_to_provider[self::$user['id']][$provider_id])) { |
|
| 378 | + if (empty($this->is_impersonating)) { |
|
| 379 | + foreach ($this->providers_authorised as $provider_id => $provider) { |
|
| 380 | + if (empty($this->user_id_to_provider[self::$user['id']][$provider_id])) { |
|
| 381 | 381 | // self::db_translate_register_user($provider_id, $provider->account->account_id, self::$user['id']); |
| 382 | 382 | PlayerToAccountTranslate::db_translate_register_user($provider_id, $provider->account->account_id, self::$user['id']); |
| 383 | 383 | $this->user_id_to_provider[self::$user['id']][$provider_id][$provider->account->account_id] = true; |
@@ -387,9 +387,9 @@ discard block |
||
| 387 | 387 | } |
| 388 | 388 | } |
| 389 | 389 | |
| 390 | - if(empty(self::$user['id'])) { |
|
| 390 | + if (empty(self::$user['id'])) { |
|
| 391 | 391 | self::cookie_set(''); // OK 4.5 |
| 392 | - } elseif(self::$user['id'] != $_COOKIE[SN_COOKIE_U]) { |
|
| 392 | + } elseif (self::$user['id'] != $_COOKIE[SN_COOKIE_U]) { |
|
| 393 | 393 | self::cookie_set(self::$user['id']); // OK 4.5 |
| 394 | 394 | } |
| 395 | 395 | |
@@ -408,21 +408,21 @@ discard block |
||
| 408 | 408 | */ |
| 409 | 409 | // OK v4.7 |
| 410 | 410 | public function logout($redirect = true) { |
| 411 | - if(!empty($_COOKIE[SN_COOKIE_U_I])) { |
|
| 411 | + if (!empty($_COOKIE[SN_COOKIE_U_I])) { |
|
| 412 | 412 | self::cookie_set($_COOKIE[SN_COOKIE_U_I]); |
| 413 | 413 | self::cookie_set(0, true); |
| 414 | 414 | self::$main_provider->logout(); |
| 415 | 415 | } else { |
| 416 | - foreach($this->providers as $provider_name => $provider) { |
|
| 416 | + foreach ($this->providers as $provider_name => $provider) { |
|
| 417 | 417 | $provider->logout(); |
| 418 | 418 | } |
| 419 | 419 | |
| 420 | 420 | self::cookie_set(0); |
| 421 | 421 | } |
| 422 | 422 | |
| 423 | - if($redirect === true) { |
|
| 423 | + if ($redirect === true) { |
|
| 424 | 424 | sys_redirect(SN_ROOT_RELATIVE . (empty($_COOKIE[SN_COOKIE_U]) ? 'login.php' : 'admin/overview.php')); |
| 425 | - } elseif($redirect !== false) { |
|
| 425 | + } elseif ($redirect !== false) { |
|
| 426 | 426 | sys_redirect($redirect); |
| 427 | 427 | } |
| 428 | 428 | } |
@@ -433,15 +433,15 @@ discard block |
||
| 433 | 433 | * @param $user_selected |
| 434 | 434 | */ |
| 435 | 435 | public function impersonate($user_selected) { |
| 436 | - if($_COOKIE[SN_COOKIE_U_I]) { |
|
| 436 | + if ($_COOKIE[SN_COOKIE_U_I]) { |
|
| 437 | 437 | die('You already impersonating someone. Go back to living other\'s life! Or clear your cookies and try again'); // TODO: Log it |
| 438 | 438 | } |
| 439 | 439 | |
| 440 | - if($this->auth_level_max_local < AUTH_LEVEL_ADMINISTRATOR) { |
|
| 440 | + if ($this->auth_level_max_local < AUTH_LEVEL_ADMINISTRATOR) { |
|
| 441 | 441 | die('You can\'t impersonate - too low level'); // TODO: Log it |
| 442 | 442 | } |
| 443 | 443 | |
| 444 | - if($this->auth_level_max_local <= $user_selected['authlevel']) { |
|
| 444 | + if ($this->auth_level_max_local <= $user_selected['authlevel']) { |
|
| 445 | 445 | die('You can\'t impersonate this account - level is greater or equal to yours'); // TODO: Log it |
| 446 | 446 | } |
| 447 | 447 | |
@@ -449,7 +449,7 @@ discard block |
||
| 449 | 449 | $account_translate = reset($account_translate[$user_selected['id']][self::$main_provider->provider_id]); |
| 450 | 450 | $account_to_impersonate = new Account(self::$main_provider->db); |
| 451 | 451 | $account_to_impersonate->db_get_by_id($account_translate['provider_account_id']); |
| 452 | - if(!$account_to_impersonate->is_exists) { |
|
| 452 | + if (!$account_to_impersonate->is_exists) { |
|
| 453 | 453 | die('Какая-то ошибка - не могу найти аккаунт для имперсонации'); // TODO: Log it |
| 454 | 454 | } |
| 455 | 455 | self::$main_provider->impersonate($account_to_impersonate); |
@@ -475,12 +475,12 @@ discard block |
||
| 475 | 475 | public function password_check($password_unsafe) { |
| 476 | 476 | $result = false; |
| 477 | 477 | |
| 478 | - if(empty($this->providers_authorised)) { |
|
| 478 | + if (empty($this->providers_authorised)) { |
|
| 479 | 479 | // TODO - такого быть не может! |
| 480 | 480 | self::flog("password_check: Не найдено ни одного авторизированного провайдера в self::\$providers_authorised", true); |
| 481 | 481 | } else { |
| 482 | - foreach($this->providers_authorised as $provider_id => $provider) { |
|
| 483 | - if($provider->is_feature_supported(AUTH_FEATURE_HAS_PASSWORD)) { |
|
| 482 | + foreach ($this->providers_authorised as $provider_id => $provider) { |
|
| 483 | + if ($provider->is_feature_supported(AUTH_FEATURE_HAS_PASSWORD)) { |
|
| 484 | 484 | $result = $result || $provider->password_check($password_unsafe); |
| 485 | 485 | } |
| 486 | 486 | } |
@@ -501,7 +501,7 @@ discard block |
||
| 501 | 501 | public function password_change($old_password_unsafe, $new_password_unsafe) { |
| 502 | 502 | global $lang; |
| 503 | 503 | |
| 504 | - if(empty($this->providers_authorised)) { |
|
| 504 | + if (empty($this->providers_authorised)) { |
|
| 505 | 505 | // TODO - такого быть не может! |
| 506 | 506 | self::flog("Не найдено ни одного авторизированного провайдера в self::\$providers_authorised", true); |
| 507 | 507 | return false; |
@@ -514,8 +514,8 @@ discard block |
||
| 514 | 514 | $salt_unsafe = self::password_salt_generate(); |
| 515 | 515 | |
| 516 | 516 | $providers_changed_password = array(); |
| 517 | - foreach($this->providers_authorised as $provider_id => $provider) { |
|
| 518 | - if( |
|
| 517 | + foreach ($this->providers_authorised as $provider_id => $provider) { |
|
| 518 | + if ( |
|
| 519 | 519 | !$provider->is_feature_supported(AUTH_FEATURE_PASSWORD_CHANGE) |
| 520 | 520 | || !$provider->password_change($old_password_unsafe, $new_password_unsafe, $salt_unsafe) |
| 521 | 521 | ) { |
@@ -527,7 +527,7 @@ discard block |
||
| 527 | 527 | $account_translation = PlayerToAccountTranslate::db_translate_get_users_from_account_list($provider_id, $provider->account->account_id); |
| 528 | 528 | |
| 529 | 529 | // Рассылаем уведомления о смене пароля в ЛС |
| 530 | - foreach($account_translation as $user_id => $provider_info) { |
|
| 530 | + foreach ($account_translation as $user_id => $provider_info) { |
|
| 531 | 531 | // TODO - УКазывать тип аккаунта, на котором сменён пароль |
| 532 | 532 | msg_send_simple_message($user_id, 0, SN_TIME_NOW, MSG_TYPE_ADMIN, |
| 533 | 533 | $lang['sys_administration'], $lang['sys_login_register_message_title'], |
@@ -574,7 +574,7 @@ discard block |
||
| 574 | 574 | sn_db_transaction_start(); |
| 575 | 575 | // Проверить наличие такого имени в истории имён |
| 576 | 576 | |
| 577 | - if(db_player_name_exists($player_name_unsafe)) { |
|
| 577 | + if (db_player_name_exists($player_name_unsafe)) { |
|
| 578 | 578 | throw new Exception(REGISTER_ERROR_PLAYER_NAME_EXISTS, ERR_ERROR); |
| 579 | 579 | } |
| 580 | 580 | |
@@ -582,11 +582,11 @@ discard block |
||
| 582 | 582 | $player_language = ''; |
| 583 | 583 | $player_email = ''; |
| 584 | 584 | // TODO - порнография - работа должна происходить над списком аккаунтов, а не только на одном аккаунте... |
| 585 | - foreach($this->providers_authorised as $provider) { |
|
| 586 | - if(!$player_language && $provider->account->account_language) { |
|
| 585 | + foreach ($this->providers_authorised as $provider) { |
|
| 586 | + if (!$player_language && $provider->account->account_language) { |
|
| 587 | 587 | $player_language = $provider->account->account_language; |
| 588 | 588 | } |
| 589 | - if(!$player_email && $provider->account->account_email) { |
|
| 589 | + if (!$player_email && $provider->account->account_email) { |
|
| 590 | 590 | $player_email = $provider->account->account_email; |
| 591 | 591 | } |
| 592 | 592 | } |
@@ -602,7 +602,7 @@ discard block |
||
| 602 | 602 | )); |
| 603 | 603 | // Зарегестрировать на него аккаунты из self::$accounts_authorised |
| 604 | 604 | $a_user = self::$user; |
| 605 | - foreach($this->providers_authorised as $provider) { |
|
| 605 | + foreach ($this->providers_authorised as $provider) { |
|
| 606 | 606 | // TODO - порнография. Должен быть отдельный класс трансляторов - в т.ч. и кэширующий транслятор |
| 607 | 607 | // TODO - ну и работа должна происходить над списком аккаунтов, а не только на одном аккаунте... |
| 608 | 608 | // self::db_translate_register_user($provider->provider_id, $provider->account->account_id, $a_user['id']); |
@@ -614,7 +614,7 @@ discard block |
||
| 614 | 614 | |
| 615 | 615 | sn_db_transaction_commit(); |
| 616 | 616 | $this->register_status = LOGIN_SUCCESS; |
| 617 | - } catch(Exception $e) { |
|
| 617 | + } catch (Exception $e) { |
|
| 618 | 618 | sn_db_transaction_rollback(); |
| 619 | 619 | |
| 620 | 620 | // Если старое имя занято |
@@ -633,10 +633,10 @@ discard block |
||
| 633 | 633 | // Пробиваем все ИД игроков по базе - есть ли вообще такие записи |
| 634 | 634 | // Вообще-то это не особо нужно - у нас по определению стоят констраинты |
| 635 | 635 | // Зато так мы узнаем максимальный authlevel, проверим права имперсонейта и вытащим все записи юзеров |
| 636 | - foreach($this->user_id_to_provider as $user_id => $cork) { |
|
| 636 | + foreach ($this->user_id_to_provider as $user_id => $cork) { |
|
| 637 | 637 | $user = db_user_by_id($user_id); |
| 638 | 638 | // Если записи игрока в БД не существует? |
| 639 | - if(empty($user['id'])) { |
|
| 639 | + if (empty($user['id'])) { |
|
| 640 | 640 | // Удаляем этого и переходим к следующему |
| 641 | 641 | unset($this->user_id_to_provider[$user_id]); |
| 642 | 642 | // Де-регистрируем игрока из таблицы трансляции игроков |
@@ -657,7 +657,7 @@ discard block |
||
| 657 | 657 | // OK v4.5 |
| 658 | 658 | protected function get_active_user() { |
| 659 | 659 | // Проверяем куку "текущего игрока" из браузера |
| 660 | - if( |
|
| 660 | + if ( |
|
| 661 | 661 | // Кука не пустая |
| 662 | 662 | ($_COOKIE[SN_COOKIE_U] = trim($_COOKIE[SN_COOKIE_U])) && !empty($_COOKIE[SN_COOKIE_U]) |
| 663 | 663 | // И в куке находится ID |
@@ -682,7 +682,7 @@ discard block |
||
| 682 | 682 | } |
| 683 | 683 | |
| 684 | 684 | // В куке нет валидного ИД записи игрока, доступной с текущих аккаунтов |
| 685 | - if(empty(self::$user['id'])) { |
|
| 685 | + if (empty(self::$user['id'])) { |
|
| 686 | 686 | // Берем первого из доступных |
| 687 | 687 | // TODO - default_user |
| 688 | 688 | self::$user = reset($this->accessible_user_row_list); |
@@ -706,7 +706,7 @@ discard block |
||
| 706 | 706 | |
| 707 | 707 | $result = array(); |
| 708 | 708 | |
| 709 | - if($user_id && empty($this->is_impersonating)) { |
|
| 709 | + if ($user_id && empty($this->is_impersonating)) { |
|
| 710 | 710 | // self::db_counter_insert(); |
| 711 | 711 | self::$device->db_counter_insert($user_id); |
| 712 | 712 | |
@@ -714,12 +714,12 @@ discard block |
||
| 714 | 714 | |
| 715 | 715 | sys_user_options_unpack($user); |
| 716 | 716 | |
| 717 | - if($user['banaday'] && $user['banaday'] <= SN_TIME_NOW) { |
|
| 717 | + if ($user['banaday'] && $user['banaday'] <= SN_TIME_NOW) { |
|
| 718 | 718 | $user['banaday'] = 0; |
| 719 | 719 | $user['vacation'] = SN_TIME_NOW; |
| 720 | 720 | } |
| 721 | 721 | |
| 722 | - $user['user_lastip'] = self::$device->ip_v4_string;// $ip['ip']; |
|
| 722 | + $user['user_lastip'] = self::$device->ip_v4_string; // $ip['ip']; |
|
| 723 | 723 | $user['user_proxy'] = self::$device->ip_v4_proxy_chain; //$ip['proxy_chain']; |
| 724 | 724 | |
| 725 | 725 | $result[F_BANNED_STATUS] = $user['banaday']; |
@@ -733,13 +733,13 @@ discard block |
||
| 733 | 733 | ); |
| 734 | 734 | } |
| 735 | 735 | |
| 736 | - if($extra = $config->security_ban_extra) { |
|
| 736 | + if ($extra = $config->security_ban_extra) { |
|
| 737 | 737 | $extra = explode(',', $extra); |
| 738 | - array_walk($extra,'trim'); |
|
| 738 | + array_walk($extra, 'trim'); |
|
| 739 | 739 | in_array(self::$device->device_id, $extra) and die(); |
| 740 | 740 | } |
| 741 | 741 | |
| 742 | - if(self::$login_message) { |
|
| 742 | + if (self::$login_message) { |
|
| 743 | 743 | $result[F_LOGIN_MESSAGE] = self::$login_message; |
| 744 | 744 | } |
| 745 | 745 | |
@@ -775,21 +775,21 @@ discard block |
||
| 775 | 775 | protected function register_player_name_validate($player_name_unsafe) { |
| 776 | 776 | // TODO - переделать под RAW-строки |
| 777 | 777 | // Если имя игрока пустое - NO GO! |
| 778 | - if(trim($player_name_unsafe) == '') { |
|
| 778 | + if (trim($player_name_unsafe) == '') { |
|
| 779 | 779 | throw new Exception(REGISTER_ERROR_PLAYER_NAME_EMPTY, ERR_ERROR); |
| 780 | 780 | } |
| 781 | 781 | // Проверяем, что бы в начале и конце не было пустых символов |
| 782 | - if($player_name_unsafe != trim($player_name_unsafe)) { |
|
| 782 | + if ($player_name_unsafe != trim($player_name_unsafe)) { |
|
| 783 | 783 | throw new Exception(REGISTER_ERROR_PLAYER_NAME_TRIMMED, ERR_ERROR); |
| 784 | 784 | } |
| 785 | 785 | // Если логин имеет запрещенные символы - NO GO! |
| 786 | - if(strpbrk($player_name_unsafe, LOGIN_REGISTER_CHARACTERS_PROHIBITED)) { |
|
| 786 | + if (strpbrk($player_name_unsafe, LOGIN_REGISTER_CHARACTERS_PROHIBITED)) { |
|
| 787 | 787 | // TODO - выдавать в сообщение об ошибке список запрещенных символов |
| 788 | 788 | // TODO - заранее извещать игрока, какие символы являются запрещенными |
| 789 | 789 | throw new Exception(REGISTER_ERROR_PLAYER_NAME_RESTRICTED_CHARACTERS, ERR_ERROR); |
| 790 | 790 | } |
| 791 | 791 | // Если логин меньше минимальной длины - NO GO! |
| 792 | - if(strlen($player_name_unsafe) < LOGIN_LENGTH_MIN) { |
|
| 792 | + if (strlen($player_name_unsafe) < LOGIN_LENGTH_MIN) { |
|
| 793 | 793 | // TODO - выдавать в сообщение об ошибке минимальную длину имени игрока |
| 794 | 794 | // TODO - заранее извещать игрока, какая минимальная и максимальная длина имени |
| 795 | 795 | throw new Exception(REGISTER_ERROR_PLAYER_NAME_SHORT, ERR_ERROR); |
@@ -847,7 +847,7 @@ discard block |
||
| 847 | 847 | } |
| 848 | 848 | |
| 849 | 849 | protected static function flog($message, $die = false) { |
| 850 | - if(!defined('DEBUG_AUTH') || !DEBUG_AUTH) { |
|
| 850 | + if (!defined('DEBUG_AUTH') || !DEBUG_AUTH) { |
|
| 851 | 851 | return; |
| 852 | 852 | } |
| 853 | 853 | list($called, $caller) = debug_backtrace(false); |
@@ -860,7 +860,7 @@ discard block |
||
| 860 | 860 | $_SERVER['SERVER_NAME'] == 'localhost' ? print("<div class='debug'>$message - $caller_name\r\n</div>") : false; |
| 861 | 861 | |
| 862 | 862 | classSupernova::log_file("$message - $caller_name"); |
| 863 | - if($die) { |
|
| 863 | + if ($die) { |
|
| 864 | 864 | $die && die("<div class='negative'>СТОП! Функция {$caller_name} при вызове в " . get_called_class() . " (располагается в " . get_class() . "). СООБЩИТЕ АДМИНИСТРАЦИИ!</div>"); |
| 865 | 865 | } |
| 866 | 866 | } |
@@ -180,6 +180,9 @@ discard block |
||
| 180 | 180 | } |
| 181 | 181 | |
| 182 | 182 | |
| 183 | + /** |
|
| 184 | + * @param string $query |
|
| 185 | + */ |
|
| 183 | 186 | function security_watch_user_queries($query) { |
| 184 | 187 | // TODO Заменить это на новый логгер |
| 185 | 188 | global $config, $is_watching, $user, $debug; |
@@ -202,6 +205,9 @@ discard block |
||
| 202 | 205 | } |
| 203 | 206 | |
| 204 | 207 | |
| 208 | + /** |
|
| 209 | + * @param string $query |
|
| 210 | + */ |
|
| 205 | 211 | function security_query_check_bad_words($query) { |
| 206 | 212 | global $user, $dm_change_legit, $mm_change_legit; |
| 207 | 213 | |
@@ -64,7 +64,7 @@ discard block |
||
| 64 | 64 | } |
| 65 | 65 | |
| 66 | 66 | public function schema() { |
| 67 | - if(!isset(self::$schema)) { |
|
| 67 | + if (!isset(self::$schema)) { |
|
| 68 | 68 | self::$schema = new \DBAL\Schema($this); |
| 69 | 69 | } |
| 70 | 70 | |
@@ -82,23 +82,23 @@ discard block |
||
| 82 | 82 | function sn_db_connect($external_db_settings = null) { |
| 83 | 83 | $this->db_disconnect(); |
| 84 | 84 | |
| 85 | - if(!empty($external_db_settings) && is_array($external_db_settings)) { |
|
| 85 | + if (!empty($external_db_settings) && is_array($external_db_settings)) { |
|
| 86 | 86 | $this->dbsettings = $external_db_settings; |
| 87 | 87 | } |
| 88 | 88 | |
| 89 | - if(empty($this->dbsettings)) { |
|
| 89 | + if (empty($this->dbsettings)) { |
|
| 90 | 90 | $this->load_db_settings(); |
| 91 | 91 | } |
| 92 | 92 | |
| 93 | 93 | // TODO - фатальные (?) ошибки на каждом шагу. Хотя - скорее Эксепшны |
| 94 | - if(!empty($this->dbsettings)) { |
|
| 94 | + if (!empty($this->dbsettings)) { |
|
| 95 | 95 | $driver_name = empty($this->dbsettings['sn_driver']) ? 'db_mysql_v5' : $this->dbsettings['sn_driver']; |
| 96 | 96 | $this->driver = new $driver_name(); |
| 97 | 97 | $this->db_prefix = $this->dbsettings['prefix']; |
| 98 | 98 | |
| 99 | 99 | $this->connected = $this->connected || $this->driver_connect(); |
| 100 | 100 | |
| 101 | - if($this->connected && empty($this->schema()->getSnTables())) { |
|
| 101 | + if ($this->connected && empty($this->schema()->getSnTables())) { |
|
| 102 | 102 | die('DB error - cannot find any table. Halting...'); |
| 103 | 103 | } |
| 104 | 104 | } else { |
@@ -111,11 +111,11 @@ discard block |
||
| 111 | 111 | function driver_connect() { |
| 112 | 112 | global $debug; |
| 113 | 113 | |
| 114 | - if(!is_object($this->driver)) { |
|
| 114 | + if (!is_object($this->driver)) { |
|
| 115 | 115 | $debug->error_fatal('DB Error - No driver for MySQL found!'); |
| 116 | 116 | } |
| 117 | 117 | |
| 118 | - if(!method_exists($this->driver, 'mysql_connect')) { |
|
| 118 | + if (!method_exists($this->driver, 'mysql_connect')) { |
|
| 119 | 119 | $debug->error_fatal('DB Error - WRONG MySQL driver!'); |
| 120 | 120 | } |
| 121 | 121 | |
@@ -123,7 +123,7 @@ discard block |
||
| 123 | 123 | } |
| 124 | 124 | |
| 125 | 125 | function db_disconnect() { |
| 126 | - if($this->connected) { |
|
| 126 | + if ($this->connected) { |
|
| 127 | 127 | $this->connected = !$this->driver_disconnect(); |
| 128 | 128 | $this->connected = false; |
| 129 | 129 | } |
@@ -146,7 +146,7 @@ discard block |
||
| 146 | 146 | return false; |
| 147 | 147 | } |
| 148 | 148 | |
| 149 | - if(!$alreadyHandled) { |
|
| 149 | + if (!$alreadyHandled) { |
|
| 150 | 150 | print(SN_TIME_SQL . '<br />Server is busy. Please try again in several minutes...<br />Сервер занят. Попробуйте снова через несколько минут...<br />Server zanyat. Poprobujte snova cherez neskolko minut...'); |
| 151 | 151 | $alreadyHandled = true; |
| 152 | 152 | } |
@@ -157,11 +157,11 @@ discard block |
||
| 157 | 157 | function doquery($query, $table = '', $fetch = false, $skip_query_check = false) { |
| 158 | 158 | global $numqueries, $debug, $config; |
| 159 | 159 | |
| 160 | - if(!is_string($table)) { |
|
| 160 | + if (!is_string($table)) { |
|
| 161 | 161 | $fetch = $table; |
| 162 | 162 | } |
| 163 | 163 | |
| 164 | - if(!$this->connected) { |
|
| 164 | + if (!$this->connected) { |
|
| 165 | 165 | $this->sn_db_connect(); |
| 166 | 166 | } |
| 167 | 167 | |
@@ -170,30 +170,30 @@ discard block |
||
| 170 | 170 | $skip_query_check or $this->security_query_check_bad_words($query); |
| 171 | 171 | |
| 172 | 172 | $sql = $query; |
| 173 | - if(strpos($sql, '{{') !== false) { |
|
| 174 | - foreach($this->schema()->getSnTables() as $tableName) { |
|
| 173 | + if (strpos($sql, '{{') !== false) { |
|
| 174 | + foreach ($this->schema()->getSnTables() as $tableName) { |
|
| 175 | 175 | $sql = str_replace("{{{$tableName}}}", $this->db_prefix . $tableName, $sql); |
| 176 | 176 | } |
| 177 | 177 | } |
| 178 | 178 | |
| 179 | - if($config->debug) { |
|
| 179 | + if ($config->debug) { |
|
| 180 | 180 | $numqueries++; |
| 181 | 181 | $arr = debug_backtrace(); |
| 182 | - $file = end(explode('/',$arr[0]['file'])); |
|
| 182 | + $file = end(explode('/', $arr[0]['file'])); |
|
| 183 | 183 | $line = $arr[0]['line']; |
| 184 | 184 | $debug->add("<tr><th>Query $numqueries: </th><th>$query</th><th>$file($line)</th><th>$table</th><th>$fetch</th></tr>"); |
| 185 | 185 | } |
| 186 | 186 | |
| 187 | - if(defined('DEBUG_SQL_COMMENT')) { |
|
| 187 | + if (defined('DEBUG_SQL_COMMENT')) { |
|
| 188 | 188 | $backtrace = debug_backtrace(); |
| 189 | 189 | $sql_comment = $debug->compact_backtrace($backtrace, defined('DEBUG_SQL_COMMENT_LONG')); |
| 190 | 190 | |
| 191 | 191 | $sql_commented = '/* ' . implode("<br />", $sql_comment) . '<br /> */ ' . preg_replace("/\s+/", ' ', $sql); |
| 192 | - if(defined('DEBUG_SQL_ONLINE')) { |
|
| 192 | + if (defined('DEBUG_SQL_ONLINE')) { |
|
| 193 | 193 | $debug->warning($sql_commented, 'SQL Debug', LOG_DEBUG_SQL); |
| 194 | 194 | } |
| 195 | 195 | |
| 196 | - if(defined('DEBUG_SQL_ERROR')) { |
|
| 196 | + if (defined('DEBUG_SQL_ERROR')) { |
|
| 197 | 197 | array_unshift($sql_comment, preg_replace("/\s+/", ' ', $sql)); |
| 198 | 198 | $debug->add_to_array($sql_comment); |
| 199 | 199 | // $debug->add_to_array($sql_comment . preg_replace("/\s+/", ' ', $sql)); |
@@ -202,7 +202,7 @@ discard block |
||
| 202 | 202 | } |
| 203 | 203 | |
| 204 | 204 | set_error_handler([$this, 'handlerQueryWarning']); |
| 205 | - $sqlquery = $this->db_sql_query($sql) or $debug->error(db_error()."<br />$sql<br />",'SQL Error'); |
|
| 205 | + $sqlquery = $this->db_sql_query($sql) or $debug->error(db_error() . "<br />$sql<br />", 'SQL Error'); |
|
| 206 | 206 | restore_error_handler(); |
| 207 | 207 | |
| 208 | 208 | return $fetch ? $this->db_fetch($sqlquery) : $sqlquery; |
@@ -222,16 +222,16 @@ discard block |
||
| 222 | 222 | // TODO Заменить это на новый логгер |
| 223 | 223 | global $config, $is_watching, $user, $debug; |
| 224 | 224 | |
| 225 | - if(!$is_watching && $config->game_watchlist_array && in_array($user['id'], $config->game_watchlist_array)) |
|
| 225 | + if (!$is_watching && $config->game_watchlist_array && in_array($user['id'], $config->game_watchlist_array)) |
|
| 226 | 226 | { |
| 227 | - if(!preg_match('/^(select|commit|rollback|start transaction)/i', $query)) { |
|
| 227 | + if (!preg_match('/^(select|commit|rollback|start transaction)/i', $query)) { |
|
| 228 | 228 | $is_watching = true; |
| 229 | 229 | $msg = "\$query = \"{$query}\"\n\r"; |
| 230 | - if(!empty($_POST)) { |
|
| 231 | - $msg .= "\n\r" . dump($_POST,'$_POST'); |
|
| 230 | + if (!empty($_POST)) { |
|
| 231 | + $msg .= "\n\r" . dump($_POST, '$_POST'); |
|
| 232 | 232 | } |
| 233 | - if(!empty($_GET)) { |
|
| 234 | - $msg .= "\n\r" . dump($_GET,'$_GET'); |
|
| 233 | + if (!empty($_GET)) { |
|
| 234 | + $msg .= "\n\r" . dump($_GET, '$_GET'); |
|
| 235 | 235 | } |
| 236 | 236 | $debug->warning($msg, "Watching user {$user['id']}", 399, array('base_dump' => true)); |
| 237 | 237 | $is_watching = false; |
@@ -243,7 +243,7 @@ discard block |
||
| 243 | 243 | function security_query_check_bad_words($query) { |
| 244 | 244 | global $user, $dm_change_legit, $mm_change_legit; |
| 245 | 245 | |
| 246 | - switch(true) { |
|
| 246 | + switch (true) { |
|
| 247 | 247 | case stripos($query, 'RUNCATE TABL') != false: |
| 248 | 248 | case stripos($query, 'ROP TABL') != false: |
| 249 | 249 | case stripos($query, 'ENAME TABL') != false: |
@@ -254,33 +254,33 @@ discard block |
||
| 254 | 254 | case stripos($query, 'RPG_POINTS') != false && stripos(trim($query), 'UPDATE ') === 0 && !$dm_change_legit: |
| 255 | 255 | case stripos($query, 'METAMATTER') != false && stripos(trim($query), 'UPDATE ') === 0 && !$mm_change_legit: |
| 256 | 256 | case stripos($query, 'AUTHLEVEL') != false && $user['authlevel'] < 3 && stripos($query, 'SELECT') !== 0: |
| 257 | - $report = "Hacking attempt (".date("d.m.Y H:i:s")." - [".time()."]):\n"; |
|
| 257 | + $report = "Hacking attempt (" . date("d.m.Y H:i:s") . " - [" . time() . "]):\n"; |
|
| 258 | 258 | $report .= ">Database Inforamation\n"; |
| 259 | - $report .= "\tID - ".$user['id']."\n"; |
|
| 260 | - $report .= "\tUser - ".$user['username']."\n"; |
|
| 261 | - $report .= "\tAuth level - ".$user['authlevel']."\n"; |
|
| 262 | - $report .= "\tAdmin Notes - ".$user['adminNotes']."\n"; |
|
| 263 | - $report .= "\tCurrent Planet - ".$user['current_planet']."\n"; |
|
| 264 | - $report .= "\tUser IP - ".$user['user_lastip']."\n"; |
|
| 265 | - $report .= "\tUser IP at Reg - ".$user['ip_at_reg']."\n"; |
|
| 266 | - $report .= "\tUser Agent- ".$_SERVER['HTTP_USER_AGENT']."\n"; |
|
| 267 | - $report .= "\tCurrent Page - ".$user['current_page']."\n"; |
|
| 268 | - $report .= "\tRegister Time - ".$user['register_time']."\n"; |
|
| 259 | + $report .= "\tID - " . $user['id'] . "\n"; |
|
| 260 | + $report .= "\tUser - " . $user['username'] . "\n"; |
|
| 261 | + $report .= "\tAuth level - " . $user['authlevel'] . "\n"; |
|
| 262 | + $report .= "\tAdmin Notes - " . $user['adminNotes'] . "\n"; |
|
| 263 | + $report .= "\tCurrent Planet - " . $user['current_planet'] . "\n"; |
|
| 264 | + $report .= "\tUser IP - " . $user['user_lastip'] . "\n"; |
|
| 265 | + $report .= "\tUser IP at Reg - " . $user['ip_at_reg'] . "\n"; |
|
| 266 | + $report .= "\tUser Agent- " . $_SERVER['HTTP_USER_AGENT'] . "\n"; |
|
| 267 | + $report .= "\tCurrent Page - " . $user['current_page'] . "\n"; |
|
| 268 | + $report .= "\tRegister Time - " . $user['register_time'] . "\n"; |
|
| 269 | 269 | $report .= "\n"; |
| 270 | 270 | |
| 271 | 271 | $report .= ">Query Information\n"; |
| 272 | - $report .= "\tQuery - ".$query."\n"; |
|
| 272 | + $report .= "\tQuery - " . $query . "\n"; |
|
| 273 | 273 | $report .= "\n"; |
| 274 | 274 | |
| 275 | 275 | $report .= ">\$_SERVER Information\n"; |
| 276 | - $report .= "\tIP - ".$_SERVER['REMOTE_ADDR']."\n"; |
|
| 277 | - $report .= "\tHost Name - ".$_SERVER['HTTP_HOST']."\n"; |
|
| 278 | - $report .= "\tUser Agent - ".$_SERVER['HTTP_USER_AGENT']."\n"; |
|
| 279 | - $report .= "\tRequest Method - ".$_SERVER['REQUEST_METHOD']."\n"; |
|
| 280 | - $report .= "\tCame From - ".$_SERVER['HTTP_REFERER']."\n"; |
|
| 281 | - $report .= "\tPage is - ".$_SERVER['SCRIPT_NAME']."\n"; |
|
| 282 | - $report .= "\tUses Port - ".$_SERVER['REMOTE_PORT']."\n"; |
|
| 283 | - $report .= "\tServer Protocol - ".$_SERVER['SERVER_PROTOCOL']."\n"; |
|
| 276 | + $report .= "\tIP - " . $_SERVER['REMOTE_ADDR'] . "\n"; |
|
| 277 | + $report .= "\tHost Name - " . $_SERVER['HTTP_HOST'] . "\n"; |
|
| 278 | + $report .= "\tUser Agent - " . $_SERVER['HTTP_USER_AGENT'] . "\n"; |
|
| 279 | + $report .= "\tRequest Method - " . $_SERVER['REQUEST_METHOD'] . "\n"; |
|
| 280 | + $report .= "\tCame From - " . $_SERVER['HTTP_REFERER'] . "\n"; |
|
| 281 | + $report .= "\tPage is - " . $_SERVER['SCRIPT_NAME'] . "\n"; |
|
| 282 | + $report .= "\tUses Port - " . $_SERVER['REMOTE_PORT'] . "\n"; |
|
| 283 | + $report .= "\tServer Protocol - " . $_SERVER['SERVER_PROTOCOL'] . "\n"; |
|
| 284 | 284 | |
| 285 | 285 | $report .= "\n--------------------------------------------------------------------------------------------------\n"; |
| 286 | 286 | |
@@ -311,7 +311,7 @@ discard block |
||
| 311 | 311 | |
| 312 | 312 | $prefixedTableName_safe = $this->db_escape($this->db_prefix . $tableName_unsafe); |
| 313 | 313 | $q1 = $this->db_sql_query("SHOW FULL COLUMNS FROM `{$prefixedTableName_safe}`;"); |
| 314 | - while($r1 = db_fetch($q1)) { |
|
| 314 | + while ($r1 = db_fetch($q1)) { |
|
| 315 | 315 | $result[$r1['Field']] = $r1; |
| 316 | 316 | } |
| 317 | 317 | return $result; |
@@ -327,7 +327,7 @@ discard block |
||
| 327 | 327 | |
| 328 | 328 | $prefixedTableName_safe = $this->db_escape($this->db_prefix . $tableName_unsafe); |
| 329 | 329 | $q1 = $this->db_sql_query("SHOW INDEX FROM {$prefixedTableName_safe};"); |
| 330 | - while($r1 = db_fetch($q1)) { |
|
| 330 | + while ($r1 = db_fetch($q1)) { |
|
| 331 | 331 | $indexName = $r1['Key_name']; |
| 332 | 332 | |
| 333 | 333 | $result[$indexName]['name'] = $r1['Key_name']; |
@@ -352,8 +352,8 @@ discard block |
||
| 352 | 352 | |
| 353 | 353 | $prefixedTableName_safe = $this->db_escape($this->db_prefix . $tableName_unsafe); |
| 354 | 354 | |
| 355 | - $q1 = $this->db_sql_query("SELECT * FROM `information_schema`.`KEY_COLUMN_USAGE` WHERE `TABLE_SCHEMA` = '" . db_escape(classSupernova::$db_name). "' AND `TABLE_NAME` = '{$prefixedTableName_safe}' AND `REFERENCED_TABLE_NAME` IS NOT NULL;"); |
|
| 356 | - while($r1 = db_fetch($q1)) { |
|
| 355 | + $q1 = $this->db_sql_query("SELECT * FROM `information_schema`.`KEY_COLUMN_USAGE` WHERE `TABLE_SCHEMA` = '" . db_escape(classSupernova::$db_name) . "' AND `TABLE_NAME` = '{$prefixedTableName_safe}' AND `REFERENCED_TABLE_NAME` IS NOT NULL;"); |
|
| 356 | + while ($r1 = db_fetch($q1)) { |
|
| 357 | 357 | $indexName = $r1['CONSTRAINT_NAME']; |
| 358 | 358 | |
| 359 | 359 | $table_referenced = str_replace($this->db_prefix, '', $r1['REFERENCED_TABLE_NAME']); |