1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195
|
<?php
//require("$dtcshared_path/inc/sql/domain_stats_strings.php");
///////////////////////////////////////////////
// Stats account submition to mysql database //
///////////////////////////////////////////////
//action=add_Stats_login&stats_login=statslogin&stats_password=pass&stats_subdomains=
$txt_dbsql_password_are_made_only_with_standards_chars_and_numbers_and_size = _("Login and Password can only contain standard chars and numbers and must have a length of 4 or more.") . "<br>\n";
if(isset($_REQUEST["action"]) && $_REQUEST["action"] == "add_stats_login"){
checkLoginPassAndDomain($adm_login,$adm_pass,$edit_domain);
if(isset($_REQUEST["stats_subdomain"])){
$stats_subdomain_flag = "yes";
}else{
$stats_subdomain_flag = "no";
}
if(!isDTCPassword($_REQUEST["stats_login"]) || !isDTCPassword($_REQUEST["stats_pass"])){
$submit_err .= $txt_dbsql_password_are_made_only_with_standards_chars_and_numbers_and_size;
$commit_flag = "no";
}
if($commit_flag == "yes"){
$admin_path=getAdminPath($adm_login);
$htaccess="AuthName \"Webstats Login!\" \nAuthType Basic \nAuthUserFile ".$admin_path."/".$edit_domain."/.htpasswd \nrequire valid-user";
$q = "UPDATE $pro_mysql_domain_table SET stats_login='".$_REQUEST["stats_login"]."',stats_pass='".$_REQUEST["stats_pass"]."',stats_subdomain='$stats_subdomain_flag' WHERE name='$edit_domain';";
$r = mysql_query($q)or die("Cannot query $q line ".__LINE__." file ".__FILE__." sql said: ".mysql_error());
// What's commented below is wrong because it shows the password in a "ps" call, so it's now replaced by crypt() and fwrite().
// exec("$conf_htpasswd_path -cb $admin_path/$edit_domain/.htpasswd ".$_REQUEST["stats_login"]." ".$_REQUEST["stats_pass"]."");
$encrypted = crypt($_REQUEST["stats_pass"]);
$fp = fopen("$admin_path/$edit_domain/.htpasswd","wb");
if($fp != NULL){
fwrite($fp,$_REQUEST["stats_login"].":".$encrypted);
fclose($fp);
}
if($stats_subdomain_flag == "yes"){
$q="SELECT subdomain_name,generate_vhost FROM subdomain where domain_name='".$edit_domain."' and generate_vhost='yes';";
$r = mysql_query($q)or die("Cannot query $q line ".__LINE__." file ".__FILE__." sql said: ".mysql_error());
$num_rows = mysql_num_rows($r);
for($i=0;$i<$num_rows;$i++){
$a=mysql_fetch_array($r);
$filename=$admin_path."/".$edit_domain."/subdomains/".$a["subdomain_name"]."/logs/.htaccess";
$handle = fopen($filename, 'w');
if($handle != NULL){
if (fwrite($handle, $htaccess) === FALSE) {
echo "Cannot write to file ($filename)";
exit;
}
fclose($handle);
}else{
echo "Could not open $filename !";
}
}
}else{
$filename=$admin_path."/".$edit_domain."/subdomains/www/logs/.htaccess";
if ( file_exists($filename)){
$handle = fopen($filename,'w');
if($handle != NULL){
if (fwrite($handle, $htaccess) === FALSE) {
echo "Cannot write to file ($filename)";
exit;
}
fclose($handle);
}else{
echo "Could not open file $filename !";
}
}
}
}
}
//action=modify_stats_login_pass&stats_login=statslogin&stats_password=pass&stats_subdomains=
if(isset($_REQUEST["action"]) && $_REQUEST["action"] == "modify_stats_login_pass"){
checkLoginPassAndDomain($adm_login,$adm_pass,$edit_domain);
if(isset($_REQUEST["stats_subdomain"])){
$stats_subdomain_flag = "yes";
}else{
$stats_subdomain_flag = "no";
}
$admin_path=getAdminPath($adm_login);
$htaccess="AuthName \"Webstats Login!\" \nAuthType Basic \nAuthUserFile ".$admin_path."/".$edit_domain."/.htpasswd \nrequire valid-user";
if(!isDTCPassword($_REQUEST["stats_login"]) || !isDTCPassword($_REQUEST["stats_pass"])){
$submit_err .= $txt_dbsql_password_are_made_only_with_standards_chars_and_numbers_and_size;
$commit_flag = "no";
}
if($commit_flag == "yes"){
$q = "UPDATE $pro_mysql_domain_table SET stats_login='".$_REQUEST["stats_login"]."',stats_pass='".$_REQUEST["stats_pass"]."',stats_subdomain='$stats_subdomain_flag' WHERE name='$edit_domain';";
$r = mysql_query($q)or die("Cannot query $q line ".__LINE__." file ".__FILE__." sql said: ".mysql_error());
exec("$conf_htpasswd_path -cb $admin_path/$edit_domain/.htpasswd ".$_REQUEST["stats_login"]." ".$_REQUEST["stats_pass"]."");
if($stats_subdomain_flag == "yes"){
$q="SELECT subdomain_name FROM subdomain where domain_name='".$edit_domain."' and generate_vhost='yes';";
$r = mysql_query($q)or die("Cannot query $q line ".__LINE__." file ".__FILE__." sql said: ".mysql_error());
$num_rows = mysql_num_rows($r);
for($i=0;$i<$num_rows;$i++){
$a=mysql_fetch_array($r);
$filename=$admin_path."/".$edit_domain."/subdomains/".$a["subdomain_name"]."/logs/.htaccess";
$handle = fopen($filename, 'w');
if($handle != NULL){
if (fwrite($handle, $htaccess) === FALSE) {
echo "Cannot write to file ($filename)";
}
fclose($handle);
}else{
echo "Could not open file $filename !";
}
}
}
}else{
$q="SELECT subdomain_name FROM subdomain where domain_name='".$edit_domain."';";
$r = mysql_query($q)or die("Cannot query $q line ".__LINE__." file ".__FILE__." sql said: ".mysql_error());
$num_rows = mysql_num_rows($r);
for($i=0;$i<$num_rows;$i++){
$a=mysql_fetch_array($r);
$filename=$admin_path."/".$edit_domain."/subdomains/".$a["subdomain_name"]."/logs/.htaccess";
if(file_exists($filename)){
unlink($filename);
}
}
}
/* Seems this is not to be done, it's not logic. Can this be checked???
$filename=$admin_path."/".$edit_domain."/subdomains/www/logs/.htaccess";
$handle = fopen($filename,'w') or die("Cannot open file $filename");
if($handle != NULL){
if (fwrite($handle, $htaccess) === FALSE) {
echo "Cannot write to file ($filename)";
// exit;
}
fclose($handle);
}
}else{
echo "Could not open file $filename !";
}
}
*/
}
//action=del_tats_login&stats_login=statslogin&stats_password=pass&stats_subdomains=
if(isset($_REQUEST["action"]) && $_REQUEST["action"] == "del_stats_login"){
checkLoginPassAndDomain($adm_login,$adm_pass,$edit_domain);
if(isset($_REQUEST["stats_subdomain"])){
$stats_subdomain_flag = "yes";
}else{
$stats_subdomain_flag = "no";
}
$admin_path=getAdminPath($adm_login);
if(!isDTCPassword($_REQUEST["stats_login"])){
$submit_err .= $txt_dbsql_password_are_made_only_with_standards_chars_and_numbers_and_size;
$commit_flag = "no";
}
if($commit_flag == "yes"){
$q = "UPDATE $pro_mysql_domain_table SET stats_login='',stats_pass='',stats_subdomain='no' WHERE name='$edit_domain';";
$r = mysql_query($q)or die("Cannot query $q line ".__LINE__." file ".__FILE__." sql said: ".mysql_error());
if($stats_subdomain_flag == "yes"){
$q="SELECT subdomain_name FROM subdomain where domain_name='".$edit_domain."';";
$r = mysql_query($q)or die("Cannot query $q line ".__LINE__." file ".__FILE__." sql said: ".mysql_error());
$num_rows = mysql_num_rows($r);
for($i=0;$i<$num_rows;$i++){
$a=mysql_fetch_array($r);
$filename=$admin_path."/".$edit_domain."/subdomains/".$a["subdomain_name"]."/logs/.htaccess";
if(file_exists($filename)){
unlink($filename);
}
}
}else{
$filename=$admin_path."/".$edit_domain."/subdomains/www/logs/.htaccess";
if(file_exists($filename)){
unlink($filename);
}
}
$htaccess="$admin_path/$edit_domain/.htpasswd";
if(file_exists($htaccess)){
unlink($htaccess);
}
}
}
?>
|