|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* Postfix Admin
|
|
|
|
*
|
|
|
|
* LICENSE
|
|
|
|
* This source file is subject to the GPL license that is bundled with
|
|
|
|
* this package in the file LICENSE.TXT.
|
|
|
|
*
|
|
|
|
* Further details on the project are available at :
|
|
|
|
* http://www.postfixadmin.com or http://postfixadmin.sf.net
|
|
|
|
*
|
|
|
|
* @version $Id$
|
|
|
|
* @license GNU GPL v2 or later.
|
|
|
|
*
|
|
|
|
* File: edit-admin.php
|
|
|
|
* Edits a normal administrator's details.
|
|
|
|
*
|
|
|
|
* Template File: admin_edit-admin.tpl
|
|
|
|
*
|
|
|
|
* Template Variables:
|
|
|
|
*
|
|
|
|
* tAllDomains
|
|
|
|
* tDomains
|
|
|
|
* tActive
|
|
|
|
* tSadmin
|
|
|
|
*
|
|
|
|
* Form POST \ GET Variables:
|
|
|
|
*
|
|
|
|
* fDescription
|
|
|
|
* fAliases
|
|
|
|
* fMailboxes
|
|
|
|
* fMaxquota
|
|
|
|
* fActive
|
|
|
|
*/
|
|
|
|
|
|
|
|
require_once('common.php');
|
|
|
|
|
|
|
|
authentication_require_role('global-admin');
|
|
|
|
|
|
|
|
$error = 1;
|
|
|
|
if(isset($_GET['username'])) {
|
|
|
|
$username = escape_string ($_GET['username']);
|
|
|
|
$result = db_query("SELECT * FROM $table_admin WHERE username = '$username'");
|
|
|
|
if($result['rows'] == 1) {
|
|
|
|
$admin_details = db_array($result['result']);
|
|
|
|
$error = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if($error == 1){
|
|
|
|
flash_error($PALANG['pAdminEdit_admin_result_error']);
|
|
|
|
header("Location: list-admin.php");
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
// we aren't ensuring the password is longer than x characters, should we?
|
|
|
|
if ($_SERVER['REQUEST_METHOD'] == "POST")
|
|
|
|
{
|
|
|
|
$fPassword = '';
|
|
|
|
$fPassword2 = '';
|
|
|
|
if(isset ($_POST['fPassword'])) $fPassword = escape_string ($_POST['fPassword']);
|
|
|
|
if(isset ($_POST['fPassword2'])) $fPassword2 = escape_string ($_POST['fPassword2']);
|
|
|
|
|
|
|
|
|
|
|
|
$fActive=(isset($_POST['fActive'])) ? escape_string ($_POST['fActive']) : FALSE;
|
|
|
|
$fSadmin=(isset($_POST['fSadmin'])) ? escape_string ($_POST['fSadmin']) : FALSE;
|
|
|
|
|
|
|
|
$fDomains = false;
|
|
|
|
if (isset ($_POST['fDomains'])) $fDomains = $_POST['fDomains'];
|
|
|
|
|
|
|
|
$tAllDomains = list_domains ();
|
|
|
|
|
|
|
|
// has the password changed?
|
|
|
|
$originalPassword = $admin_details['password'];
|
|
|
|
if($fPassword != '') {
|
|
|
|
if($fPassword != $originalPassword) {
|
|
|
|
// if it has, ensure both fields are the same...
|
|
|
|
if ($fPassword == $fPassword2)
|
|
|
|
{
|
|
|
|
if(strlen($fPassword) >= $CONF['min_password_length']) {
|
|
|
|
$fPassword = pacrypt($fPassword);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$error = 1;
|
|
|
|
flash_error(sprintf($PALANG['pPasswordTooShort'], $CONF['min_password_length']));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$error = 1;
|
|
|
|
$pAdminEdit_admin_password_text = $PALANG['pAdminEdit_admin_password_text_error'];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
$fDomains = array();
|
|
|
|
if (array_key_exists('fDomains', $_POST)) $fDomains = escape_string ($_POST['fDomains']);
|
|
|
|
if ($error != 1)
|
|
|
|
{
|
|
|
|
if ($fActive == "on") {
|
|
|
|
$sqlActive = db_get_boolean(True);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$sqlActive = db_get_boolean(False);
|
|
|
|
}
|
|
|
|
|
|
|
|
$password_query = '';
|
|
|
|
if ($fPassword != '') { # do not change password to empty one
|
|
|
|
$password_query = ", password='$fPassword'";
|
|
|
|
}
|
|
|
|
$result = db_query ("UPDATE $table_admin SET modified=NOW(),active='$sqlActive' $password_query WHERE username='$username'");
|
|
|
|
|
|
|
|
if ($fSadmin == "on") $fSadmin = 'ALL';
|
|
|
|
|
|
|
|
// delete everything, and put it back later on..
|
|
|
|
db_query("DELETE FROM $table_domain_admins WHERE username = '$username'");
|
|
|
|
if($fSadmin == 'ALL') {
|
|
|
|
$fDomains = array('ALL');
|
|
|
|
}
|
|
|
|
|
|
|
|
foreach($fDomains as $domain)
|
|
|
|
{
|
|
|
|
$result = db_query ("INSERT INTO $table_domain_admins (username,domain,created) VALUES ('$username','$domain',NOW())");
|
|
|
|
}
|
|
|
|
flash_info($PALANG['pAdminEdit_admin_result_success']);
|
|
|
|
header("Location: list-admin.php");
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
flash_error($PALANG['pAdminEdit_admin_result_error']);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (isset($_GET['username'])) $username = escape_string ($_GET['username']);
|
|
|
|
|
|
|
|
$tAllDomains = list_domains();
|
|
|
|
$tDomains = list_domains_for_admin ($username);
|
|
|
|
$tActive = '';
|
|
|
|
$tPassword = $admin_details['password'];
|
|
|
|
|
|
|
|
if($admin_details['active'] == 't' || $admin_details['active'] == 1) {
|
|
|
|
$tActive = $admin_details['active'];
|
|
|
|
}
|
|
|
|
$tSadmin = '0';
|
|
|
|
$result = db_query ("SELECT * FROM $table_domain_admins WHERE username='$username'");
|
|
|
|
// could/should be multiple matches to query;
|
|
|
|
if ($result['rows'] >= 1) {
|
|
|
|
$result = $result['result'];
|
|
|
|
while($row = db_array($result)) {
|
|
|
|
if ($row['domain'] == 'ALL') {
|
|
|
|
$tSadmin = '1';
|
|
|
|
$tDomains = array(); /* empty the list, they're an admin */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
include ("templates/header.tpl");
|
|
|
|
include ("templates/menu.tpl");
|
|
|
|
include ("templates/admin_edit-admin.tpl");
|
|
|
|
include ("templates/footer.tpl");
|
|
|
|
|
|
|
|
/* vim: set expandtab softtabstop=3 tabstop=3 shiftwidth=3: */
|
|
|
|
?>
|