2 /**********************************************************************
3 Copyright (C) FrontAccounting, LLC.
4 Released under the terms of the GNU General Public License, GPL,
5 as published by the Free Software Foundation, either version 3
6 of the License, or (at your option) any later version.
7 This program is distributed in the hope that it will be useful,
8 but WITHOUT ANY WARRANTY; without even the implied warranty of
9 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
10 See the License here <http://www.gnu.org/licenses/gpl-3.0.html>.
11 ***********************************************************************/
12 function output_html($text)
14 global $before_box, $Ajax, $messages;
15 // Fatal errors are not send to error_handler,
16 // so we must check the output
17 if ($text && preg_match('/\bFatal error(<.*?>)?:(.*)/i', $text, $m)) {
18 $Ajax->aCommands = array(); // Don't update page via ajax on errors
19 $text = preg_replace('/\bFatal error(<.*?>)?:(.*)/i','', $text);
20 $messages[] = array(E_ERROR, $m[2], null, null);
23 return in_ajax() ? fmt_errors() : ($before_box.fmt_errors().$text);
25 //----------------------------------------------------------------------------------------
32 //----------------------------------------------------------------------------------------
38 header("HTTP/1.1 401 Authorization Required");
39 echo "<center><br><br><font size='5' color='red'><b>" . _("Incorrect Password") . "<b></font><br><br>";
40 echo "<b>" . _("The user and password combination is not valid for the system.") . "<b><br><br>";
42 echo _("If you are not an authorized user, please contact your system administrator to obtain an account to enable you to use the system.");
43 echo "<br><a href='$path_to_root/index.php'>" . _("Try again") . "</a>";
50 //----------------------------------------------------------------------------------------
52 function check_page_security($page_security)
58 if (!$_SESSION["wa_current_user"]->check_user_access())
60 // notification after upgrade from pre-2.2 version
61 $msg = $_SESSION["wa_current_user"]->old_db ?
62 _("Security settings have not been defined for your user account.")
63 . "<br>" . _("Please contact your system administrator.")
64 : _("Please remove \$security_groups and \$security_headings arrays from config.php file!");
65 } elseif (!$_SESSION['SysPrefs']->db_ok && !$_SESSION["wa_current_user"]->can_access('SA_SOFTWAREUPGRADE')) {
66 $msg = _('Access to application has been blocked until database upgrade is completed by system administrator.');
76 if (!$_SESSION["wa_current_user"]->can_access_page($page_security))
79 echo "<center><br><br><br><b>";
80 echo _("The security settings on your account do not permit you to access this function");
82 echo "<br><br><br><br></center>";
86 if (!$_SESSION['SysPrefs']->db_ok
87 && !in_array($page_security, array('SA_SOFTWAREUPGRADE', 'SA_OPEN', 'SA_BACKUP')))
89 display_error(_('System is blocked after source upgrade until database is updated on System/Software Upgrade page'));
96 Helper function for setting page security level depeding on
97 GET start variable and/or some value stored in session variable.
98 Before the call $page_security should be set to default page_security value.
100 function set_page_security($value=null, $trans = array(), $gtrans = array())
102 global $page_security;
104 // first check is this is not start page call
105 foreach($gtrans as $key => $area)
106 if (isset($_GET[$key])) {
107 $page_security = $area;
111 // then check session value
112 if (isset($trans[$value])) {
113 $page_security = $trans[$value];
118 //-----------------------------------------------------------------------------
119 // Removing magic quotes from nested arrays/variables
121 function strip_quotes($data)
123 if(get_magic_quotes_gpc()) {
124 if(is_array($data)) {
125 foreach($data as $k => $v) {
126 $data[$k] = strip_quotes($data[$k]);
129 return stripslashes($data);
134 //============================================================================
137 function login_timeout()
139 // skip timeout on logout page
140 if ($_SESSION["wa_current_user"]->logged) {
141 $tout = $_SESSION["wa_current_user"]->timeout;
142 if ($tout && (time() > $_SESSION["wa_current_user"]->last_act + $tout))
144 $_SESSION["wa_current_user"]->logged = false;
146 $_SESSION["wa_current_user"]->last_act = time();
149 //============================================================================
150 if (!isset($path_to_root))
155 // Prevent register_globals vulnerability
156 if (isset($_GET['path_to_root']) || isset($_POST['path_to_root']))
157 die("Restricted access");
159 include_once($path_to_root . "/includes/current_user.inc");
160 include_once($path_to_root . "/frontaccounting.php");
161 include_once($path_to_root . "/admin/db/security_db.inc");
162 include_once($path_to_root . "/includes/lang/language.php");
163 include_once($path_to_root . "/config_db.php");
164 include_once($path_to_root . "/includes/ajax.inc");
165 include_once($path_to_root . "/includes/ui/ui_msgs.inc");
166 include_once($path_to_root . "/includes/prefs/sysprefs.inc");
169 Uncomment the setting below when using FA on shared hosting
170 to avoid unexpeced session timeouts.
171 Make sure this directory exists and is writable!
173 //ini_set('session.save_path', dirname(__FILE__).'/../tmp/');
175 ini_set('session.gc_maxlifetime', 36000); // 10hrs
177 session_name('FA'.md5(dirname(__FILE__)));
178 //include_once($path_to_root.'/modules/www_statistics/includes/db_sessions.inc');
181 // this is to fix the "back-do-you-want-to-refresh" issue - thanx PHPFreaks
182 header("Cache-control: private");
184 include_once($path_to_root . "/config.php");
187 // Page Initialisation
188 if (!isset($_SESSION['language']) || !method_exists($_SESSION['language'], 'set_language'))
190 $l = array_search_value($dflt_lang, $installed_languages, 'code');
191 $_SESSION['language'] = new language($l['name'], $l['code'], $l['encoding'],
192 (isset($l['rtl']) && $l['rtl'] === true) ? 'rtl' : 'ltr');
195 $_SESSION['language']->set_language($_SESSION['language']->code);
197 // include $Hooks object if locale file exists
198 if (file_exists($path_to_root . "/lang/".$_SESSION['language']->code."/locale.inc"))
200 include_once($path_to_root . "/lang/".$_SESSION['language']->code."/locale.inc");
201 $Hooks = new Hooks();
204 include_once($path_to_root . "/includes/access_levels.inc");
205 include_once($path_to_root . "/version.php");
206 include_once($path_to_root . "/includes/main.inc");
208 // Ajax communication object
211 // js/php validation rules container
213 // bindings for editors
215 // page help. Currently help for function keys.
218 $Refs = new references();
220 // intercept all output to destroy it in case of ajax call
221 register_shutdown_function('end_flush');
222 ob_start('output_html',0);
224 // colect all error msgs
225 set_error_handler('error_handler' /*, errtypes */);
227 if (!isset($_SESSION["wa_current_user"]))
228 $_SESSION["wa_current_user"] = new current_user();
230 // logout.php is the only page we should have always
231 // accessable regardless of access level and current login status.
232 if (strstr($_SERVER['PHP_SELF'], 'logout.php') == false){
236 if (!$_SESSION["wa_current_user"]->logged_in())
239 if (!isset($_POST["user_name_entry_field"]) or $_POST["user_name_entry_field"] == "")
241 // strip ajax marker from uri, to force synchronous page reload
242 $_SESSION['timeout'] = array( 'uri'=>preg_replace('/JsHttpRequest=(?:(\d+)-)?([^&]+)/s',
243 '', @$_SERVER['REQUEST_URI']),
246 include($path_to_root . "/access/login.php");
248 $Ajax->activate('_page_body');
252 $succeed = isset($db_connections[$_POST["company_login_name"]]) &&
253 $_SESSION["wa_current_user"]->login($_POST["company_login_name"],
254 $_POST["user_name_entry_field"], md5($_POST["password"]));
255 // select full vs fallback ui mode on login
256 $_SESSION["wa_current_user"]->ui_mode = $_POST['ui_mode'];
259 // Incorrect password
262 $lang = &$_SESSION['language'];
263 $lang->set_language($_SESSION['language']->code);
266 set_global_connection();
268 if (!$_SESSION["wa_current_user"]->old_db)
269 include_once($path_to_root . '/company/'.user_company().'/installed_extensions.php');
271 if (!isset($_SESSION["App"])) {
272 $_SESSION["App"] = new front_accounting();
273 $_SESSION["App"]->init();
277 $SysPrefs = &$_SESSION['SysPrefs'];
279 // POST vars cleanup needed for direct reuse.
280 // We quote all values later with db_escape() before db update.
281 $_POST = strip_quotes($_POST);
283 // GET cleanup against XSS. (NB in FA those are mainly numeric transaction numbers)
284 foreach($_GET as $name => $value) {
285 // $value = @html_entity_decode($value, ENT_QUOTES, $_SESSION['language']->encoding);
286 $_GET[$name] = @htmlspecialchars($value, ENT_QUOTES, $_SESSION['language']->encoding);
289 foreach($_POST as $name => $value) {
290 // $value = @html_entity_decode($value, ENT_QUOTES, $_SESSION['language']->encoding);
291 $_POST[$name] = @htmlspecialchars($value, ENT_QUOTES, $_SESSION['language']->encoding);