Copyright (C) 2005 James Grant Copyright (C) 2007 David Grant This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, version 2. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; see the file COPYING. If not, write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */ ?> 1) { echo "DATABASE ERROR: More than one user for account $accounts_id conference {$_SESSION['conferenceid']}"; exit; } $uid = mysql_fetch_assoc($q); $id = $uid['id']; $u = user_load($id); $_SESSION['name']="{$u['firstname']} {$u['lastname']}"; $_SESSION['username']=$u['username']; $_SESSION['email']=$u['email']; $_SESSION['users_id']=$u['id']; $_SESSION['accounts_id']=$u['accounts_id']; $_SESSION['roles']=array_keys($u['roles']); $_SESSION['superuser'] = ($a['superuser'] == 'yes') ? 'yes' : 'no'; /* Load the password expiry for each user role, and * find the longest expiry, which is the one we'll use * for this user to determine if the passwd has * expired. */ $longest_expiry = 0; foreach(array_keys($u['roles']) as $r) { $e = $config["{$r}_password_expiry_days"]; if($e == 0) { /* Catch a never expire case. */ $longest_expiry = 0; break; } else if($e > $longest_expiry) { $longest_expiry = $e; } } if($u['passwordset'] == '0000-00-00') { /* Force the password to expire */ $_SESSION['password_expired'] = true; } else if($longest_expiry == 0) { /* Never expires */ unset($_SESSION['password_expired']); } else { /* Check expiry */ $expires = date('Y-m-d', strtotime("{$u['passwordset']} +$longest_expiry days")); $now = date('Y-m-d'); if($now > $expires) { $_SESSION['password_expired'] = true; } else { unset($_SESSION['password_expired']); } } /* If password_expired == true, the main page (or any * other user page) will catch this and require * them to set a password */ /* Call login functions for each role */ foreach(array_keys($u['roles']) as $r) { if(is_callable("user_{$r}_login")) { call_user_func_array("user_{$r}_login", array($u)); } } // mysql_query("UPDATE accounts SET lastlogin=NOW() // WHERE id={$u['id']}"); /* Setup multirole so a multirole user can switch if they want to * without logging in/out */ /* if(count($u['roes']) > 1) { $_SESSION['multirole'] = true; } else { $_SESSION['multirole'] = false; } */ /* See if there is a redirect, and do that instead of * taking them to their main page */ /* if($redirect != '') { switch($redirect) { case 'roleadd': if(!user_valid_role($multirole_data)) $multirole_data = ''; header("location: user_multirole.php?action=add&role=$multirole_data"); exit; case 'roleattached': message_push(happy(i18n('The %1 role has been attached to your account', array($roles[$role]['name'])))); message_push(notice(i18n('Use the [Switch Roles] link in the upper right to change roles while you are logged in'))); header("location: {$role}_main.php"); exit; } } */ /* Is there a saved requesT_uri from a failed login attempt?, if so * take them there */ if(array_key_exists('request_uri', $_SESSION)) { header("location: {$_SESSION['request_uri']}"); unset($_SESSION['request_uri']); exit; } header("location: user_main.php"); exit; } else if($_GET['action']=='logout') { /* Session keys to skip on logout */ $skip = array('debug', 'lang', 'messages'); /* Do these explicitly because i'm paranoid */ unset($_SESSION['name']); unset($_SESSION['username']); unset($_SESSION['email']); unset($_SESSION['users_id']); unset($_SESSION['accounts_id']); unset($_SESSION['roles']); unset($_SESSION['superuser']); /* Take care of anything else */ $keys = array_diff(array_keys($_SESSION), $skip); foreach($keys as $k) unset($_SESSION[$k]); message_push(notice(i18n("You have been successfully logged out"))); header("Location: user_login.php{$redirect_url}"); exit; } else if($_GET['action']=='recover') { send_header("Password Recovery", array("Login" => "user_login.php?role=$role")); $recover_link = "user_login.php?role=$role&action=recover"; ?>


:
:
:
" />



firstname, $fn)!=0 || strcasecmp($r->lastname, $ln)!=0) { message_push(error(i18n("The name you entered does not match the one in your account"))); header("Location: user_login.php?role=$role"); exit; } /* Reset the password, and force it to expire */ $password = user_set_password($r->id, NULL); /* volunteer_recover_password, judge_recover_password, student_recover_password, committee_recover_password */ email_send("{$role}_recover_password", $email, array("FAIRNAME"=>i18n($config['fairname'])), array( "PASSWORD"=>$password, "EMAIL"=>$email) ); message_push(notice(i18n("Your password has been sent to your email address"))); header("Location: user_login.php?role=$role"); exit; } else { message_push(error(i18n("Could not find your email address for recovery"))); header("Location: user_login.php?role=$role"); exit; } } message_push(error(i18n("Email address error"))); header("Location: user_login.php?role=$role"); exit; } else { send_header("Login", array()); $recover_link = "user_login.php?role=$role&action=recover"; $new_link = "user_new.php?role=$role"; ?>
">
:
:
/>

click here to recover it")?>.


click here.
"); break; case 'closed': echo i18n("Registration for the %1 %2 is now closed", array( $config['FAIRYEAR'], $config['fairname']), array("Fair year","Fair name") ); break; case 'notpermitted': default: break; } } send_footer(); ?>