acctfuncs.inc.php 30.4 KB
Newer Older
1
<?php
2

3
4
5
6
7
8
9
/**
 * Determine if an HTTP request variable is set
 *
 * @param string $name The request variable to test for
 *
 * @return string Return the value of the request variable, otherwise blank
 */
Dan McGee's avatar
Dan McGee committed
10
11
12
13
14
15
16
function in_request($name) {
	if (isset($_REQUEST[$name])) {
		return $_REQUEST[$name];
	}
	return "";
}

17
18
19
20
21
22
23
/**
 * Format the PGP key fingerprint
 *
 * @param string $fingerprint An unformatted PGP key fingerprint
 *
 * @return string PGP fingerprint with spaces every 4 characters
 */
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
function html_format_pgp_fingerprint($fingerprint) {
	if (strlen($fingerprint) != 40 || !ctype_xdigit($fingerprint)) {
		return $fingerprint;
	}

	return htmlspecialchars(substr($fingerprint, 0, 4) . " " .
		substr($fingerprint, 4, 4) . " " .
		substr($fingerprint, 8, 4) . " " .
		substr($fingerprint, 12, 4) . " " .
		substr($fingerprint, 16, 4) . "  " .
		substr($fingerprint, 20, 4) . " " .
		substr($fingerprint, 24, 4) . " " .
		substr($fingerprint, 28, 4) . " " .
		substr($fingerprint, 32, 4) . " " .
		substr($fingerprint, 36, 4) . " ", ENT_QUOTES);
}

41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
/**
 * Loads the account editing form, with any values that are already saved
 *
 * @global array $SUPPORTED_LANGS Languages that are supported by the AUR
 * @param string $UTYPE User type of the account accessing the form
 * @param string $A Form to use, either UpdateAccount or NewAccount
 * @param string $U The username to display
 * @param string $T The account type of the displayed user
 * @param string $S Whether the displayed user has a suspended account
 * @param string $E The e-mail address of the displayed user
 * @param string $P The password value of the displayed user
 * @param string $C The confirmed password value of the displayed user
 * @param string $R The real name of the displayed user
 * @param string $L The language preference of the displayed user
 * @param string $I The IRC nickname of the displayed user
 * @param string $K The PGP key fingerprint of the displayed user
57
 * @param string $J The inactivity status of the displayed user
58
59
60
61
 * @param string $UID The user ID of the displayed user
 *
 * @return void
 */
eric's avatar
eric committed
62
function display_account_form($UTYPE,$A,$U="",$T="",$S="",
63
		$E="",$P="",$C="",$R="",$L="",$I="",$K="",$J="", $UID=0) {
64
65
	global $SUPPORTED_LANGS;

66
	include("account_edit_form.php");
67
	return;
68
}
69

70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
/**
 * Process information given to new/edit account form
 *
 * @global array $SUPPORTED_LANGS Languages that are supported by the AUR
 * @param string $UTYPE The account type of the user modifying the account
 * @param string $TYPE Either "edit" for editing or "new" for registering an account
 * @param string $A Form to use, either UpdateAccount or NewAccount
 * @param string $U The username for the account
 * @param string $T The account type for the user
 * @param string $S Whether or not the account is suspended
 * @param string $E The e-mail address for the user
 * @param string $P The password for the user
 * @param string $C The confirmed password for the user
 * @param string $R The real name of the user
 * @param string $L The language preference of the user
 * @param string $I The IRC nickname of the user
 * @param string $K The PGP fingerprint of the user
87
 * @param string $J The inactivity status of the user
88
89
90
91
 * @param string $UID The user ID of the modified account
 *
 * @return string|void Return void if successful, otherwise return error
 */
eric's avatar
eric committed
92
function process_account_form($UTYPE,$TYPE,$A,$U="",$T="",$S="",$E="",
93
			$P="",$C="",$R="",$L="",$I="",$K="",$J="",$UID=0) {
94
	global $SUPPORTED_LANGS, $AUR_LOCATION;
95

96
97
98
99
100
101
102
103
104
	$error = '';

	if (is_ipbanned()) {
		$error = __('Account registration has been disabled ' .
					'for your IP address, probably due ' .
					'to sustained spam attacks. Sorry for the ' .
					'inconvenience.');
	}

105
	$dbh = DB::connect();
106

107
	if(isset($_COOKIE['AURSID'])) {
108
		$editor_user = uid_from_sid($_COOKIE['AURSID']);
109
110
	}
	else {
111
		$editor_user = null;
112
	}
113
114

	if (empty($E) || empty($U)) {
115
116
		$error = __("Missing a required field.");
	}
117

118
119
	if ($TYPE != "new" && !$UID) {
		$error = __("Missing User ID");
120
	}
121

122
  if (!$error && !valid_username($U) && !user_is_privileged($editor_user))
123
	$error = __("The username is invalid.") . "<ul>\n"
124
			."<li>" . __("It must be between %s and %s characters long",
125
126
			USERNAME_MIN_LEN,  USERNAME_MAX_LEN )
			. "</li>"
127
			. "<li>" . __("Start and end with a letter or number") . "</li>"
128
			. "<li>" . __("Can contain only one period, underscore or hyphen.")
129
130
			. "</li>\n</ul>";

131
132
133
	if (!$error && $P && $C && ($P != $C)) {
		$error = __("Password fields do not match.");
	}
134
	if (!$error && $P != '' && !good_passwd($P))
135
		$error = __("Your password must be at least %s characters.",PASSWD_MIN_LEN);
136

137
138
139
	if (!$error && !valid_email($E)) {
		$error = __("The email address is invalid.");
	}
140
141
142
143
144

	if (!$error && $K != '' && !valid_pgp_fingerprint($K)) {
		$error = __("The PGP key fingerprint is invalid.");
	}

145
146
	if (($UTYPE == "User" && $T > 1) || ($UTYPE == "Trusted User" && $T > 2)) {
		$error = __("Cannot increase account permissions.");
eric's avatar
eric committed
147
	}
148
149
150
151
	if (!$error && !array_key_exists($L, $SUPPORTED_LANGS)) {
		$error = __("Language is not currently supported.");
	}
	if (!$error) {
152
153
154
155
		/*
		 * Check whether the user name is available.
		 * TODO: Fix race condition.
		 */
156
		$q = "SELECT COUNT(*) AS CNT FROM Users ";
canyonknight's avatar
canyonknight committed
157
		$q.= "WHERE Username = " . $dbh->quote($U);
eric's avatar
eric committed
158
159
160
		if ($TYPE == "edit") {
			$q.= " AND ID != ".intval($UID);
		}
canyonknight's avatar
canyonknight committed
161
162
163
164
165
		$result = $dbh->query($q);
		$row = $result->fetch(PDO::FETCH_NUM);

		if ($row[0]) {
			$error = __("The username, %s%s%s, is already in use.",
Lukas Fleischer's avatar
Lukas Fleischer committed
166
				"<strong>", htmlspecialchars($U,ENT_QUOTES), "</strong>");
167
168
169
		}
	}
	if (!$error) {
170
171
172
173
		/*
		 * Check whether the e-mail address is available.
		 * TODO: Fix race condition.
		 */
174
		$q = "SELECT COUNT(*) AS CNT FROM Users ";
canyonknight's avatar
canyonknight committed
175
		$q.= "WHERE Email = " . $dbh->quote($E);
eric's avatar
eric committed
176
177
178
		if ($TYPE == "edit") {
			$q.= " AND ID != ".intval($UID);
		}
canyonknight's avatar
canyonknight committed
179
180
181
182
183
		$result = $dbh->query($q);
		$row = $result->fetch(PDO::FETCH_NUM);

		if ($row[0]) {
			$error = __("The address, %s%s%s, is already in use.",
Lukas Fleischer's avatar
Lukas Fleischer committed
184
					"<strong>", htmlspecialchars($E,ENT_QUOTES), "</strong>");
185
186
187
		}
	}
	if ($error) {
188
		print "<ul class='errorlist'><li>".$error."</li></ul>\n";
eric's avatar
eric committed
189
		display_account_form($UTYPE, $A, $U, $T, $S, $E, "", "",
190
				$R, $L, $I, $K, $J, $UID);
191
192
	} else {
		if ($TYPE == "new") {
193
			/* Create an unprivileged user. */
Denis's avatar
Denis committed
194
			$salt = generate_salt();
195
196
197
198
199
200
201
			if (empty($P)) {
				$send_resetkey = true;
				$email = $E;
			} else {
				$send_resetkey = false;
				$P = salted_hash($P, $salt);
			}
canyonknight's avatar
canyonknight committed
202
203
204
205
206
207
208
209
210
			$U = $dbh->quote($U);
			$E = $dbh->quote($E);
			$P = $dbh->quote($P);
			$salt = $dbh->quote($salt);
			$R = $dbh->quote($R);
			$L = $dbh->quote($L);
			$I = $dbh->quote($I);
			$K = $dbh->quote(str_replace(" ", "", $K));
			$q = "INSERT INTO Users (AccountTypeID, Suspended, ";
211
212
213
214
			$q.= "InactivityTS, Username, Email, Passwd, Salt, ";
			$q.= "RealName, LangPreference, IRCNick, PGPKey) ";
			$q.= "VALUES (1, 0, 0, $U, $E, $P, $salt, $R, $L, ";
			$q.= "$I, $K)";
canyonknight's avatar
canyonknight committed
215
			$result = $dbh->exec($q);
216
			if (!$result) {
canyonknight's avatar
canyonknight committed
217
				print __("Error trying to create account, %s%s%s.",
Lukas Fleischer's avatar
Lukas Fleischer committed
218
						"<strong>", htmlspecialchars($U,ENT_QUOTES), "</strong>");
219
			} else {
220
				print __("The account, %s%s%s, has been successfully created.",
Lukas Fleischer's avatar
Lukas Fleischer committed
221
						"<strong>", htmlspecialchars($U,ENT_QUOTES), "</strong>");
222
				print "<p>\n";
223
				if ($send_resetkey) {
224
					$subject = 'Welcome to the Arch User Repository';
225
226
227
228
229
230
231
232
233
					$body = __('Welcome to %s! In order ' .
						'to set an initial password ' .
						'for your new account, ' .
						'please click the link ' .
						'below. If the link does ' .
						'not work try copying and ' .
						'pasting it into your ' .
						'browser.',
						$AUR_LOCATION);
234
					send_resetkey($email, $subject, $body);
235
236
237
238
					print __("A password reset key has been sent to your e-mail address.");
				} else {
					print __("Click on the Login link above to use your account.");
				}
239
240
241
242
				print "</p>\n";
			}

		} else {
243
			/* Modify an existing account. */
244
245
246
247
248
249
250
251
252
253
254
255
			$q = "SELECT InactivityTS FROM Users WHERE ";
			$q.= "ID = " . intval($UID);
			$result = $dbh->query($q);
			$row = $result->fetch(PDO::FETCH_NUM);
			if ($row[0] && $J) {
				$inactivity_ts = $row[0];
			} elseif ($J) {
				$inactivity_ts = time();
			} else {
				$inactivity_ts = 0;
			}

256
			$q = "UPDATE Users SET ";
canyonknight's avatar
canyonknight committed
257
			$q.= "Username = " . $dbh->quote($U);
eric's avatar
eric committed
258
259
260
261
			if ($T) {
				$q.= ", AccountTypeID = ".intval($T);
			}
			if ($S) {
262
				/* Ensure suspended users can't keep an active session */
263
				delete_user_sessions($UID);
eric's avatar
eric committed
264
265
266
267
				$q.= ", Suspended = 1";
			} else {
				$q.= ", Suspended = 0";
			}
canyonknight's avatar
canyonknight committed
268
			$q.= ", Email = " . $dbh->quote($E);
eric's avatar
eric committed
269
			if ($P) {
Denis's avatar
Denis committed
270
271
272
				$salt = generate_salt();
				$hash = salted_hash($P, $salt);
				$q .= ", Passwd = '$hash', Salt = '$salt'";
eric's avatar
eric committed
273
			}
canyonknight's avatar
canyonknight committed
274
275
276
277
			$q.= ", RealName = " . $dbh->quote($R);
			$q.= ", LangPreference = " . $dbh->quote($L);
			$q.= ", IRCNick = " . $dbh->quote($I);
			$q.= ", PGPKey = " . $dbh->quote(str_replace(" ", "", $K));
278
			$q.= ", InactivityTS = " . $inactivity_ts;
279
			$q.= " WHERE ID = ".intval($UID);
canyonknight's avatar
canyonknight committed
280
			$result = $dbh->exec($q);
281
			if (!$result) {
282
				print __("No changes were made to the account, %s%s%s.",
Lukas Fleischer's avatar
Lukas Fleischer committed
283
						"<strong>", htmlspecialchars($U,ENT_QUOTES), "</strong>");
284
			} else {
285
				print __("The account, %s%s%s, has been successfully modified.",
Lukas Fleischer's avatar
Lukas Fleischer committed
286
						"<strong>", htmlspecialchars($U,ENT_QUOTES), "</strong>");
287
288
289
290
291
292
			}
		}
	}
	return;
}

293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
/**
 * Display the search results page
 *
 * @param string $UTYPE User type of the account accessing the form
 * @param string $O The offset for the results page
 * @param string $SB The column to sort the results page by
 * @param string $U The username search criteria
 * @param string $T The account type search criteria
 * @param string $S Whether the account is suspended search criteria
 * @param string $E The e-mail address search criteria
 * @param string $R The real name search criteria
 * @param string $I The IRC nickname search criteria
 * @param string $K The PGP key fingerprint search criteria
 *
 * @return void
 */
eric's avatar
eric committed
309
function search_results_page($UTYPE,$O=0,$SB="",$U="",$T="",
310
		$S="",$E="",$R="",$I="",$K="") {
311
312
313
314
315
316
317
318
319
320
321
322

	$HITS_PER_PAGE = 50;
	if ($O) {
		$OFFSET = intval($O);
	} else {
		$OFFSET = 0;
	}
	if ($OFFSET < 0) {
		$OFFSET = 0;
	}
	$search_vars = array();

323
	$dbh = DB::connect();
canyonknight's avatar
canyonknight committed
324

325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
	$q = "SELECT Users.*, AccountTypes.AccountType ";
	$q.= "FROM Users, AccountTypes ";
	$q.= "WHERE AccountTypes.ID = Users.AccountTypeID ";
	if ($T == "u") {
		$q.= "AND AccountTypes.ID = 1 ";
		$search_vars[] = "T";
	} elseif ($T == "t") {
		$q.= "AND AccountTypes.ID = 2 ";
		$search_vars[] = "T";
	} elseif ($T == "d") {
		$q.= "AND AccountTypes.ID = 3 ";
		$search_vars[] = "T";
	}
	if ($S) {
		$q.= "AND Users.Suspended = 1 ";
		$search_vars[] = "S";
	}
	if ($U) {
canyonknight's avatar
canyonknight committed
343
344
		$U = "%" . addcslashes($U, '%_') . "%";
		$q.= "AND Username LIKE " . $dbh->quote($U) . " ";
345
346
347
		$search_vars[] = "U";
	}
	if ($E) {
canyonknight's avatar
canyonknight committed
348
349
		$E = "%" . addcslashes($E, '%_') . "%";
		$q.= "AND Email LIKE " . $dbh->quote($E) . " ";
350
351
352
		$search_vars[] = "E";
	}
	if ($R) {
canyonknight's avatar
canyonknight committed
353
354
		$R = "%" . addcslashes($R, '%_') . "%";
		$q.= "AND RealName LIKE " . $dbh->quote($R) . " ";
355
356
357
		$search_vars[] = "R";
	}
	if ($I) {
canyonknight's avatar
canyonknight committed
358
359
		$I = "%" . addcslashes($I, '%_') . "%";
		$q.= "AND IRCNick LIKE " . $dbh->quote($I) . " ";
360
361
		$search_vars[] = "I";
	}
362
	if ($K) {
canyonknight's avatar
canyonknight committed
363
364
		$K = "%" . addcslashes(str_replace(" ", "", $K), '%_') . "%";
		$q.= "AND PGPKey LIKE " . $dbh->quote($K) . " ";
365
366
		$search_vars[] = "K";
	}
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
	switch ($SB) {
		case 't':
			$q.= "ORDER BY AccountTypeID, Username ";
			break;
		case 'r':
			$q.= "ORDER BY RealName, AccountTypeID ";
			break;
		case 'i':
			$q.= "ORDER BY IRCNick, AccountTypeID ";
			break;
		default:
			$q.= "ORDER BY Username, AccountTypeID ";
			break;
	}
	$search_vars[] = "SB";
382
	$q.= "LIMIT " . $HITS_PER_PAGE . " OFFSET " . $OFFSET;
383

384
	$dbh = DB::connect();
385

canyonknight's avatar
canyonknight committed
386
	$result = $dbh->query($q);
387

canyonknight's avatar
canyonknight committed
388
	while ($row = $result->fetch(PDO::FETCH_ASSOC)) {
389
390
391
		$userinfo[] = $row;
	}

392
	include("account_search_results.php");
393
394
395
	return;
}

396
397
398
399
400
401
402
/**
 * Attempt to login and generate a session
 *
 * @global int $MAX_SESSIONS_PER_USER Maximum sessions a single user may have open
 * @global int $PERSISTENT_COOKIE_TIMEOUT Time until cookie expires
 *
 * @return array Session ID for user, error message if applicable
403
 */
404
function try_login() {
405
	global $MAX_SESSIONS_PER_USER, $PERSISTENT_COOKIE_TIMEOUT;
406

Loui Chang's avatar
Loui Chang committed
407
	$login_error = "";
408
409
410
411
	$new_sid = "";
	$userID = null;

	if ( isset($_REQUEST['user']) || isset($_REQUEST['passwd']) ) {
412
413
414
415
416
417
418
		if (is_ipbanned()) {
			$login_error = __('The login form is currently disabled ' .
							'for your IP address, probably due ' .
							'to sustained spam attacks. Sorry for the ' .
							'inconvenience.');
			return array('SID' => '', 'error' => $login_error);
		}
419
		$dbh = DB::connect();
420
		$userID = valid_user($_REQUEST['user']);
421

422
		if ( user_suspended($userID) ) {
423
			$login_error = __('Account suspended');
424
425
		}
		elseif ( $userID && isset($_REQUEST['passwd'])
426
		  && valid_passwd($userID, $_REQUEST['passwd']) ) {
427
428
429
430

			$logged_in = 0;
			$num_tries = 0;

431
			/* Generate a session ID and store it. */
432
			while (!$logged_in && $num_tries < 5) {
433
				if ($MAX_SESSIONS_PER_USER) {
434
435
436
437
					/*
					 * Delete all user sessions except the
					 * last ($MAX_SESSIONS_PER_USER - 1).
					 */
438
439
					$q = "DELETE s.* FROM Sessions s ";
					$q.= "LEFT JOIN (SELECT SessionID FROM Sessions ";
440
					$q.= "WHERE UsersId = " . $userID . " ";
441
442
443
					$q.= "ORDER BY LastUpdateTS DESC ";
					$q.= "LIMIT " . ($MAX_SESSIONS_PER_USER - 1) . ") q ";
					$q.= "ON s.SessionID = q.SessionID ";
444
					$q.= "WHERE s.UsersId = " . $userID . " ";
445
					$q.= "AND q.SessionID IS NULL;";
canyonknight's avatar
canyonknight committed
446
					$dbh->query($q);
447
448
				}

449
450
				$new_sid = new_sid();
				$q = "INSERT INTO Sessions (UsersID, SessionID, LastUpdateTS)"
451
				  ." VALUES (" . $userID . ", '" . $new_sid . "', UNIX_TIMESTAMP())";
canyonknight's avatar
canyonknight committed
452
				$result = $dbh->exec($q);
453

454
				/* Query will fail if $new_sid is not unique. */
455
456
457
458
				if ($result) {
					$logged_in = 1;
					break;
				}
459

460
				$num_tries++;
461
			}
462

463
			if ($logged_in) {
Lukas Fleischer's avatar
Lukas Fleischer committed
464
465
				$q = "UPDATE Users SET LastLogin = UNIX_TIMESTAMP(), ";
				$q.= "LastLoginIPAddress = " . $dbh->quote(ip2long($_SERVER['REMOTE_ADDR'])) . " ";
466
				$q.= "WHERE ID = '$userID'";
canyonknight's avatar
canyonknight committed
467
				$dbh->exec($q);
468

469
				/* Set the SID cookie. */
Dan McGee's avatar
Dan McGee committed
470
471
				if (isset($_POST['remember_me']) &&
					$_POST['remember_me'] == "on") {
472
					/* Set cookies for 30 days. */
473
					$cookie_time = time() + $PERSISTENT_COOKIE_TIMEOUT;
474

475
					/* Set session for 30 days. */
476
477
					$q = "UPDATE Sessions SET LastUpdateTS = $cookie_time ";
					$q.= "WHERE SessionID = '$new_sid'";
canyonknight's avatar
canyonknight committed
478
					$dbh->exec($q);
479
				}
480
481
				else
					$cookie_time = 0;
482

483
				setcookie("AURSID", $new_sid, $cookie_time, "/", null, !empty($_SERVER['HTTPS']), true);
484
				header("Location: " . get_uri('/'));
485
486
487
488
				$login_error = "";

			}
			else {
489
				$login_error = __('An error occurred trying to generate a user session.');
490
			}
491
492
493
494
495
496
497
498
499
500
		} elseif (passwd_is_empty($userID)) {
			$login_error = __('Your password has been reset. ' .
				'If you just created a new account, please ' .
				'use the link from the confirmation email ' .
				'to set an initial password. Otherwise, ' .
				'please request a reset key on the %s' .
				'Password Reset%s page.', '<a href="' .
				htmlspecialchars(get_uri('/passreset')) . '">',
				'</a>');
		} else {
501
			$login_error = __("Bad username or password.");
502
503
504
505
506
		}
	}
	return array('SID' => $new_sid, 'error' => $login_error);
}

507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
/**
 * Determine if the user is using a banned IP address
 *
 * @return bool True if IP address is banned, otherwise false
 */
function is_ipbanned() {
	$dbh = DB::connect();

	$q = "SELECT * FROM Bans WHERE IPAddress = " . $dbh->quote(ip2long($_SERVER['REMOTE_ADDR']));
	$result = $dbh->query($q);

	if ($result->fetchColumn()) {
		return true;
	} else {
		return false;
	}
}

525
526
527
528
529
/**
 * Validate a username against a collection of rules
 *
 * The username must be longer or equal to USERNAME_MIN_LEN. It must be shorter
 * or equal to USERNAME_MAX_LEN. It must start and end with either a letter or
530
531
 * a number. It can contain one period, hypen, or underscore. Returns boolean
 * of whether name is valid.
532
533
534
 *
 * @param string $user Username to validate
 *
535
 * @return bool True if username meets criteria, otherwise false
536
 */
537
function valid_username($user) {
538
539
540
	if (strlen($user) < USERNAME_MIN_LEN ||
	    strlen($user) > USERNAME_MAX_LEN) {
		return false;
541
	} else if (!preg_match("/^[a-z0-9]+[.\-_]?[a-z0-9]+$/i", $user)) {
542
		return false;
543
	}
544

545
	return true;
546
547
}

548
549
550
551
552
553
/**
 * Determine if a username exists in the database
 *
 * @param string $user Username to check in the database
 *
 * @return string|void Return user ID if in database, otherwise void
554
 */
555
function valid_user($user) {
556
557
	if ($user) {
		$dbh = DB::connect();
558

559
560
		$q = "SELECT ID FROM Users WHERE ";
		$q.= "Username = " . $dbh->quote($user);
canyonknight's avatar
canyonknight committed
561
		$result = $dbh->query($q);
562
		if ($result) {
canyonknight's avatar
canyonknight committed
563
			$row = $result->fetch(PDO::FETCH_NUM);
564
			return $row[0];
565
566
567
568
		}
	}
}

569
570
571
572
573
574
575
/**
 * Determine if a user already has a proposal open about themselves
 *
 * @param string $user Username to checkout for open proposal
 *
 * @return bool True if there is an open proposal about the user, otherwise false
 */
576
function open_user_proposals($user) {
577
	$dbh = DB::connect();
canyonknight's avatar
canyonknight committed
578
579
580
581
	$q = "SELECT * FROM TU_VoteInfo WHERE User = " . $dbh->quote($user) . " ";
	$q.= "AND End > UNIX_TIMESTAMP()";
	$result = $dbh->query($q);
	if ($result->fetchColumn()) {
canyonknight's avatar
canyonknight committed
582
583
584
585
586
587
588
		return true;
	}
	else {
		return false;
	}
}

589
590
591
592
593
594
595
596
597
598
/**
 * Add a new Trusted User proposal to the database
 *
 * @param string $agenda The agenda of the vote
 * @param string $user The use the vote is about
 * @param int $votelength The length of time for the vote to last
 * @param string $submitteruid The user ID of the individual who submitted the proposal
 *
 * @return void
 */
599
function add_tu_proposal($agenda, $user, $votelength, $quorum, $submitteruid) {
600
	$dbh = DB::connect();
canyonknight's avatar
canyonknight committed
601

602
603
604
605
606
	$q = "SELECT COUNT(*) FROM Users WHERE AccountTypeID = 2";
	$result = $dbh->query($q);
	$row = $result->fetch(PDO::FETCH_NUM);
	$active_tus = $row[0];

607
	$q = "INSERT INTO TU_VoteInfo (Agenda, User, Submitted, End, Quorum, ";
608
	$q.= "SubmitterID, ActiveTUs) VALUES ";
canyonknight's avatar
canyonknight committed
609
610
	$q.= "(" . $dbh->quote($agenda) . ", " . $dbh->quote($user) . ", ";
	$q.= "UNIX_TIMESTAMP(), UNIX_TIMESTAMP() + " . $dbh->quote($votelength);
611
612
	$q.= ", " . $dbh->quote($quorum) . ", " . $submitteruid . ", ";
	$q.= $active_tus . ")";
canyonknight's avatar
canyonknight committed
613
	$result = $dbh->exec($q);
canyonknight's avatar
canyonknight committed
614
615
}

616
617
618
619
620
621
622
623
/**
 * Add a reset key to the database for a specified user
 *
 * @param string $resetkey A password reset key to be stored in database
 * @param string $uid The user ID to store the reset key for
 *
 * @return void
 */
624
function create_resetkey($resetkey, $uid) {
625
	$dbh = DB::connect();
canyonknight's avatar
canyonknight committed
626
627
628
	$q = "UPDATE Users ";
	$q.= "SET ResetKey = '" . $resetkey . "' ";
	$q.= "WHERE ID = " . $uid;
canyonknight's avatar
canyonknight committed
629
	$dbh->exec($q);
canyonknight's avatar
canyonknight committed
630
631
}

632
633
634
635
/**
 * Send a reset key to a specific e-mail address
 *
 * @param string $email E-mail address of the user resetting their password
636
 * @param string $subject Subject of the email
637
638
639
640
 * @param string $body Body of the email
 *
 * @return void
 */
641
function send_resetkey($email, $subject, $body) {
642
643
644
	global $AUR_LOCATION;

	$uid = uid_from_email($email);
645
	if ($uid != null) {
646
647
648
649
		/*
		 * We (ab)use new_sid() to get a random 32 characters long
		 * string.
		 */
650
651
		$resetkey = new_sid();
		create_resetkey($resetkey, $uid);
652
		/* Send e-mail with confirmation link. */
653
654
655
656
		$body = wordwrap($body, 70);
		$body .=  "\n\n".
			  "{$AUR_LOCATION}/" . get_uri('/passreset/') . "?".
		          "resetkey={$resetkey}";
657
		$headers = "MIME-Version: 1.0\r\n" .
Lukas Fleischer's avatar
Lukas Fleischer committed
658
			   "Content-type: text/plain; charset=UTF-8\r\n" .
659
660
			   "Reply-to: noreply@aur.archlinux.org\r\n" .
			   "From: notify@aur.achlinux.org\r\n" .
661
662
			   "X-Mailer: PHP\r\n" .
			   "X-MimeOLE: Produced By AUR";
663
		@mail($email, $subject, $body, $headers);
664
665
666
	}
}

667
668
669
670
671
672
673
674
675
676
/**
 * Change a user's password in the database if reset key and e-mail are correct
 *
 * @param string $hash New MD5 hash of a user's password
 * @param string $salt New salt for the user's password
 * @param string $resetkey Code e-mailed to a user to reset a password
 * @param string $email E-mail address of the user resetting their password
 *
 * @return string|void Redirect page if successful, otherwise return error message
 */
677
function password_reset($hash, $salt, $resetkey, $email) {
678
	$dbh = DB::connect();
canyonknight's avatar
canyonknight committed
679
680
681
682
683
	$q = "UPDATE Users ";
	$q.= "SET Passwd = '$hash', ";
	$q.= "Salt = '$salt', ";
	$q.= "ResetKey = '' ";
	$q.= "WHERE ResetKey != '' ";
canyonknight's avatar
canyonknight committed
684
685
686
	$q.= "AND ResetKey = " . $dbh->quote($resetkey) . " ";
	$q.= "AND Email = " . $dbh->quote($email);
	$result = $dbh->exec($q);
canyonknight's avatar
canyonknight committed
687

canyonknight's avatar
canyonknight committed
688
	if (!$result) {
canyonknight's avatar
canyonknight committed
689
690
691
		$error = __('Invalid e-mail and reset key combination.');
		return $error;
	} else {
692
		header('Location: ' . get_uri('/passreset/') . '?step=complete');
canyonknight's avatar
canyonknight committed
693
694
695
696
		exit();
	}
}

697
698
699
700
701
702
703
/**
 * Determine if the password is longer than the minimum length
 *
 * @param string $passwd The password to check
 *
 * @return bool True if longer than minimum length, otherwise false
 */
704
function good_passwd($passwd) {
705
706
707
708
709
710
	if ( strlen($passwd) >= PASSWD_MIN_LEN ) {
		return true;
	}
	return false;
}

711
712
713
714
715
716
717
/**
 * Determine if the password is correct and salt it if it hasn't been already
 *
 * @param string $userID The user ID to check the password against
 * @param string $passwd The password the visitor sent
 *
 * @return bool True if password was correct and properly salted, otherwise false
718
 */
719
function valid_passwd($userID, $passwd) {
720
	$dbh = DB::connect();
721
	if ( strlen($passwd) > 0 ) {
722
		/* Get salt for this user. */
Denis's avatar
Denis committed
723
724
		$salt = get_salt($userID);
		if ($salt) {
canyonknight's avatar
canyonknight committed
725
726
727
728
			$q = "SELECT ID FROM Users ";
			$q.= "WHERE ID = " . $userID . " ";
			$q.= "AND Passwd = " . $dbh->quote(salted_hash($passwd, $salt));
			$result = $dbh->query($q);
729
			if ($result) {
canyonknight's avatar
canyonknight committed
730
731
				$row = $result->fetch(PDO::FETCH_NUM);
				if ($row[0]) {
732
733
					return true;
				}
Denis's avatar
Denis committed
734
735
			}
		} else {
736
			/* Check password without using salt. */
canyonknight's avatar
canyonknight committed
737
738
739
740
			$q = "SELECT ID FROM Users ";
			$q.= "WHERE ID = " . $userID . " ";
			$q.= "AND Passwd = " . $dbh->quote(md5($passwd));
			$result = $dbh->query($q);
741
			if ($result) {
canyonknight's avatar
canyonknight committed
742
743
				$row = $result->fetch(PDO::FETCH_NUM);
				if ($row[0]) {
744
					/* Password correct, but salt it first! */
745
746
747
748
749
750
					if (!save_salt($userID, $passwd)) {
						trigger_error("Unable to salt user's password;" .
							" ID " . $userID, E_USER_WARNING);
						return false;
					}
					return true;
Denis's avatar
Denis committed
751
752
				}
			}
753
754
755
756
757
		}
	}
	return false;
}

758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
/**
 * Determine if a user's password is empty
 *
 * @param string $uid The user ID to check for an empty password
 *
 * @return bool True if the user's password is empty, otherwise false
 */
function passwd_is_empty($uid) {
	$dbh = DB::connect();

	$q = "SELECT * FROM Users WHERE ID = " . $dbh->quote($uid) . " ";
	$q .= "AND Passwd = " . $dbh->quote('');
	$result = $dbh->query($q);

	if ($result->fetchColumn()) {
		return true;
	} else {
		return false;
	}
}

779
780
781
782
783
784
/**
 * Determine if the PGP key fingerprint is valid (must be 40 hexadecimal digits)
 *
 * @param string $fingerprint PGP fingerprint to check if valid
 *
 * @return bool True if the fingerprint is 40 hexadecimal digits, otherwise false
785
 */
786
function valid_pgp_fingerprint($fingerprint) {
787
788
789
790
	$fingerprint = str_replace(" ", "", $fingerprint);
	return (strlen($fingerprint) == 40 && ctype_xdigit($fingerprint));
}

791
792
793
794
795
796
/**
 * Determine if the user account has been suspended
 *
 * @param string $id The ID of user to check if suspended
 *
 * @return bool True if the user is suspended, otherwise false
797
 */
798
function user_suspended($id) {
799
	$dbh = DB::connect();
elij's avatar
elij committed
800
801
802
	if (!$id) {
		return false;
	}
803
	$q = "SELECT Suspended FROM Users WHERE ID = " . $id;
canyonknight's avatar
canyonknight committed
804
	$result = $dbh->query($q);
805
	if ($result) {
canyonknight's avatar
canyonknight committed
806
		$row = $result->fetch(PDO::FETCH_NUM);
807
		if ($row[0]) {
808
809
			return true;
		}
810
811
812
813
	}
	return false;
}

814
815
816
817
818
819
/**
 * Delete a specified user account from the database
 *
 * @param int $id The user ID of the account to be deleted
 *
 * @return void
820
 */
821
function user_delete($id) {
822
	$dbh = DB::connect();
823
	$q = "DELETE FROM Users WHERE ID = " . $id;
canyonknight's avatar
canyonknight committed
824
	$dbh->query($q);
825
826
827
	return;
}

828
829
830
831
832
833
/**
 * Determine if a user is either a Trusted User or Developer
 *
 * @param string $id The ID of the user to check if privileged
 *
 * @return int|string Return  0 if un-privileged, "2" if Trusted User, "3" if Developer
834
 */
835
function user_is_privileged($id) {
836
	$dbh = DB::connect();
837
	$q = "SELECT AccountTypeID FROM Users WHERE ID = " . $id;
canyonknight's avatar
canyonknight committed
838
	$result = $dbh->query($q);
839
	if ($result) {
canyonknight's avatar
canyonknight committed
840
		$row = $result->fetch(PDO::FETCH_NUM);
841
842
		if($row[0] > 1) {
			return $row[0];
843
		}
844
	}
845
846
847
848
	return 0;

}

849
850
851
852
853
854
855
/**
 * Remove the session from the database on logout
 *
 * @param string $sid User's session ID
 *
 * @return void
 */
856
function delete_session_id($sid) {
857
	$dbh = DB::connect();
canyonknight's avatar
canyonknight committed
858

canyonknight's avatar
canyonknight committed
859
860
	$q = "DELETE FROM Sessions WHERE SessionID = " . $dbh->quote($sid);
	$dbh->query($q);
canyonknight's avatar
canyonknight committed
861
862
}

863
864
865
866
867
868
869
/**
 * Remove all sessions belonging to a particular user
 *
 * @param int $uid ID of user to remove all sessions for
 *
 * @return void
 */
870
function delete_user_sessions($uid) {
871
	$dbh = DB::connect();
872
873
874
875
876

	$q = "DELETE FROM Sessions WHERE UsersID = " . intval($uid);
	$dbh->exec($q);
}

877
878
879
880
881
882
883
/**
 * Remove sessions from the database that have exceed the timeout
 *
 * @global int $LOGIN_TIMEOUT Time until session expires
 *
 * @return void
 */
884
function clear_expired_sessions() {
885
886
	global $LOGIN_TIMEOUT;

887
	$dbh = DB::connect();
canyonknight's avatar
canyonknight committed
888

889
	$q = "DELETE FROM Sessions WHERE LastUpdateTS < (UNIX_TIMESTAMP() - $LOGIN_TIMEOUT)";
canyonknight's avatar
canyonknight committed
890
	$dbh->query($q);
891
892
893

	return;
}
894

895
896
897
898
899
900
901
902
/**
 * Get account details for a specific user
 *
 * @param string $uid The User ID of account to get information for
 * @param string $username The username of the account to get for
 *
 * @return array Account details for the specified user
 */
903
function account_details($uid, $username) {
904
	$dbh = DB::connect();
canyonknight's avatar
canyonknight committed
905
906
907
908
909
910
	$q = "SELECT Users.*, AccountTypes.AccountType ";
	$q.= "FROM Users, AccountTypes ";
	$q.= "WHERE AccountTypes.ID = Users.AccountTypeID ";
	if (!empty($uid)) {
		$q.= "AND Users.ID = ".intval($uid);
	} else {
canyonknight's avatar
canyonknight committed
911
		$q.= "AND Users.Username = " . $dbh->quote($username);
canyonknight's avatar
canyonknight committed
912
	}
canyonknight's avatar
canyonknight committed
913
	$result = $dbh->query($q);
canyonknight's avatar
canyonknight committed
914
915

	if ($result) {
canyonknight's avatar
canyonknight committed
916
		$row = $result->fetch(PDO::FETCH_ASSOC);
canyonknight's avatar
canyonknight committed
917
918
919
920
921
	}

	return $row;
}

922
923
924
925
926
927
928
929
/**
 * Determine if a user has already voted on a specific proposal
 *
 * @param string $voteid The ID of the Trusted User proposal
 * @param string $uid The ID to check if the user already voted
 *
 * @return bool True if the user has already voted, otherwise false
 */
930
function tu_voted($voteid, $uid) {
931
	$dbh = DB::connect();
932

canyonknight's avatar
canyonknight committed
933
934
935
936
	$q = "SELECT COUNT(*) FROM TU_Votes ";
	$q.= "WHERE VoteID = " . intval($voteid) . " AND UserID = " . intval($uid);
	$result = $dbh->query($q);
	if ($result->fetchColumn() > 0) {
937
938
939
940
941
942
943
		return true;
	}
	else {
		return false;
	}
}

944
945
946
947
948
949
950
/**
 * Get all current Trusted User proposals from the database
 *
 * @param string $order Ascending or descending order for the proposal listing
 *
 * @return array The details for all current Trusted User proposals
 */
951
function current_proposal_list($order) {
952
	$dbh = DB::connect();
953
954

	$q = "SELECT * FROM TU_VoteInfo WHERE End > " . time() . " ORDER BY Submitted " . $order;
canyonknight's avatar
canyonknight committed
955
	$result = $dbh->query($q);
956

957
	$details = array();
canyonknight's avatar
canyonknight committed
958
	while ($row = $result->fetch(PDO::FETCH_ASSOC)) {
959
960
961
962
963
964
		$details[] = $row;
	}

	return $details;
}

965
966
967
968
969
970
971
972
/**
 * Get a subset of all past Trusted User proposals from the database
 *
 * @param string $order Ascending or descending order for the proposal listing
 * @param string $lim The number of proposals to list with the offset
 *
 * @return array The details for the subset of past Trusted User proposals
 */
973
function past_proposal_list($order, $lim) {
974
	$dbh = DB::connect();
975
976

	$q = "SELECT * FROM TU_VoteInfo WHERE End < " . time() . " ORDER BY Submitted " . $order . $lim;
canyonknight's avatar
canyonknight committed
977
	$result = $dbh->query($q);
978

979
	$details = array();
canyonknight's avatar
canyonknight committed
980
	while ($row = $result->fetch(PDO::FETCH_ASSOC)) {
981
982
983
984
985
986
		$details[] = $row;
	}

	return $details;
}

Lukas Fleischer's avatar
Lukas Fleischer committed
987
988
989
990
991
992
993
994
/**
 * Get the vote ID of the last vote of all Trusted Users
 *
 * @return array The vote ID of the last vote of each Trusted User
 */
function last_votes_list() {
	$dbh = DB::connect();

995
	$q = "SELECT UserID, MAX(VoteID) AS LastVote FROM TU_Votes, ";
996
997
998
	$q .= "TU_VoteInfo, Users WHERE TU_VoteInfo.ID = TU_Votes.VoteID AND ";
	$q .= "TU_VoteInfo.End < UNIX_TIMESTAMP() AND ";
	$q .= "Users.ID = TU_Votes.UserID AND Users.AccountTypeID = 2 ";
999
	$q .= "GROUP BY UserID ORDER BY LastVote DESC, UserName ASC";
Lukas Fleischer's avatar
Lukas Fleischer committed
1000
	$result = $dbh->query($q);
For faster browsing, not all history is shown. View entire blame