)?:(.*)/i', $text, $m)) {
$Ajax->aCommands = array(); // Don't update page via ajax on errors
$text = preg_replace('/\bFatal error(<.*?>)?:(.*)/i','', $text);
$messages[] = array(E_ERROR, $m[2], null, null);
}
$Ajax->run();
return in_ajax() ? fmt_errors() : ($before_box.fmt_errors().$text);
}
if (!isset($path_to_root))
{
$path_to_root = ".";
}
include_once($path_to_root . "/includes/current_user.inc");
/*
// Make sure this directory exists and is writable!
$session_save_path = dirname(__FILE__).'/tmp/';
*/
$session_save_path = session_save_path();
if (strpos($session_save_path, ";") !== false)
$session_save_path = substr($session_save_path, strpos($session_save_path, ";") + 1);
if (isset($session_save_path))
{
session_save_path($session_save_path);
unset($session_save_path);
}
if (!isset($path_to_root) || isset($_GET['path_to_root']) || isset($_POST['path_to_root']))
die("Restricted access");
include_once($path_to_root . "/includes/lang/language.php");
include_once($path_to_root . "/config_db.php");
include_once($path_to_root . "/config.php");
include_once($path_to_root . "/includes/ajax.inc");
$Ajax =& new Ajax();
include_once($path_to_root . "/includes/main.inc");
//----------------------------------------------------------------------------------------
function kill_login()
{
session_unset();
session_destroy();
}
//----------------------------------------------------------------------------------------
function login_fail()
{
echo "
" . _("Incorrect Password") . "
";
echo "" . _("The user and password combination is not valid for the system.") . "
";
echo _("If you are not an authorized user, please contact your system administrator to obtain an account to enable you to use the system.");
echo "
" . _("Back") . "";
echo "";
kill_login();
die();
}
//----------------------------------------------------------------------------------------
function check_page_security($page_security)
{
if (!$_SESSION["wa_current_user"]->check_user_access())
{
echo "
";
echo "" . _("Security settings have not been defined for your user account.");
echo "
" . _("Please contact your system administrator.") . "";
kill_login();
exit;
}
if (!$_SESSION["wa_current_user"]->can_access_page($page_security))
{
page(_("Access denied"));
echo "
";
echo _("The security settings on your account do not permit you to access this function");
echo "";
echo "
";
//echo ''
end_page();
//kill_login();
exit;
}
}
//-----------------------------------------------------------------------------
// Removing magic quotes from nested arrays/variables
//
function strip_quotes($data)
{
if(get_magic_quotes_gpc()) {
if(is_array($data)) {
foreach($data as $k => $v) {
$data[$k] = strip_quotes($data[$k]);
}
} else
return stripslashes($data);
}
return $data;
}
//----------------------------------------------------------------------------------------
if (!isset($_SESSION["wa_current_user"]) ||
(isset($_SESSION["wa_current_user"]) && !$_SESSION["wa_current_user"]->logged_in()))
{
$_SESSION["wa_current_user"] = new current_user();
// Show login screen
if (!isset($_POST["user_name_entry_field"]) or $_POST["user_name_entry_field"] == "")
{
include($path_to_root . "/access/login.php");
$Ajax->redirect($path_to_root . "/access/login.php");
exit;
}
}
include_once($path_to_root . "/includes/ui/ui_msgs.inc");
// intercept all output to destroy it in case of ajax call
register_shutdown_function('ob_end_flush');
ob_start('output_html',0);
// colect all error msgs
set_error_handler('error_handler' /*, errtypes */);
if (isset($_POST["user_name_entry_field"]))
{
$succeed = $_SESSION["wa_current_user"]->login($_POST["company_login_name"],
$_POST["user_name_entry_field"],
md5($_POST["password"]));
if (!$succeed)
{
// Incorrect password
login_fail();
}
}
// Run with debugging messages for the system administrator(s) but not anyone else
/*if (in_array(15, $security_groups[$_SESSION["AccessLevel"]])) {
$debug = 1;
} else {
$debug = 0;
}*/
//----------------------------------------------------------------------------------------
check_page_security($page_security);
// POST vars cleanup needed for direct reuse.
// We quote all values later with db_escape() before db update.
$_POST = strip_quotes($_POST);
?>