X-Git-Url: https://delta.frontaccounting.com/gitweb/?a=blobdiff_plain;f=includes%2Fsession.inc;h=bba6496fddd1dc6a861c9db4b149cf63aabe734b;hb=19ddc3939071044c8e94b628f1d6a039f50cc493;hp=ad3978c27df990184058915412795db7b0a5e936;hpb=d1babda7c01b314d35fb89f2d195553b55936532;p=fa-stable.git diff --git a/includes/session.inc b/includes/session.inc index ad3978c2..bba6496f 100644 --- a/includes/session.inc +++ b/includes/session.inc @@ -148,12 +148,12 @@ function password_reset_fail() { global $path_to_root; - echo "


" . _("Incorrect Email") . "

"; - echo "" . _("The email address does not exist in the system, or is used by more than one user.") . "

"; + echo "


" . _("Incorrect Email") . "

"; + echo "" . _("The email address does not exist in the system, or is used by more than one user.") . "

"; - echo _("Plase try again or contact your system administrator to obtain new password."); - echo "
" . _("Try again") . ""; - echo "
"; + echo _("Plase try again or contact your system administrator to obtain new password."); + echo "
" . _("Try again") . ""; + echo "
"; kill_login(); die(); @@ -163,11 +163,11 @@ function password_reset_success() { global $path_to_root; - echo "


" . _("New password sent") . "

"; - echo "" . _("A new password has been sent to your mailbox.") . "

"; + echo "


" . _("New password sent") . "

"; + echo "" . _("A new password has been sent to your mailbox.") . "

"; - echo "
" . _("Login here") . ""; - echo "
"; + echo "
" . _("Login here") . ""; + echo "
"; kill_login(); die(); @@ -184,6 +184,16 @@ function check_faillog() return false; } + +/* + Ensure file is re-read on next request if php caching is active +*/ +function cache_invalidate($filename) +{ + if (function_exists('opcache_invalidate')) // OpCode extension + opcache_invalidate($filename); +} + /* Simple brute force attack detection is performed before connection to company database is open. Therefore access counters have to be stored in file. Login attempts counter is created for every new user IP, which partialy prevent DOS attacks. @@ -222,6 +232,7 @@ function write_login_filelog($login, $result) if ((!file_exists($filename) && is_writable($path_to_root.'/tmp')) || is_writable($filename)) { file_put_contents($filename, $msg); + cache_invalidate($filename); } } @@ -361,6 +372,7 @@ if (isset($_GET['path_to_root']) || isset($_POST['path_to_root'])) include_once($path_to_root . "/includes/errors.inc"); // colect all error msgs set_error_handler('error_handler' /*, errtypes */); +set_exception_handler('exception_handler'); include_once($path_to_root . "/includes/current_user.inc"); include_once($path_to_root . "/frontaccounting.php"); @@ -408,7 +420,6 @@ if ($SysPrefs->error_logfile != '') { ini_set("log_errors", "On"); } - /* Uncomment the setting below when using FA on shared hosting to avoid unexpeced session timeouts. @@ -476,7 +487,7 @@ if (!defined('FA_LOGOUT_PHP_FILE')){ login_timeout(); if (!$_SESSION["wa_current_user"]->old_db) - include_once($path_to_root . '/company/'.user_company().'/installed_extensions.php'); + include($path_to_root . '/company/'.user_company().'/installed_extensions.php'); install_hooks();