Просмотр файла vavok-1.5.3/adminpanel/process.php

Размер файла: 5.14Kb
  1. <?php
  2. // (c) vavok.net
  3.  
  4. require_once"../include/startup.php";
  5.  
  6. if (isset($_GET['action'])) {$action = check($_GET['action']);}
  7.  
  8. if (!$users->is_reg()) {
  9. redirect_to(BASEDIR . "pages/error.php?isset=nologin");
  10. }
  11.  
  12. // add to admin chat
  13. if ($action == "acadd") {
  14.  
  15. if (!$users->is_reg() || !$users->check_permissions('adminchat')) {
  16. redirect_to(BASEDIR . "pages/input.php?action=exit");
  17. }
  18.  
  19. $brow = check($users->user_browser());
  20. $msg = check(wordwrap($_POST['msg'], 150, ' ', 1));
  21. $msg = substr($msg, 0, 1200);
  22. $msg = check($msg);
  23.  
  24. $msg = antiword($msg);
  25. $msg = smiles($msg);
  26. $msg = no_br($msg, '<br />');
  27.  
  28. $text = $msg . '|' . $users->show_username() . '|' . date_fixed(time(), "d.m.y") . '|' . date_fixed(time(), "H:i") . '|' . $brow . '|' . $users->find_ip() . '|';
  29. $text = no_br($text);
  30.  
  31. $fp = fopen("../used/adminchat.dat", "a+");
  32. flock ($fp, LOCK_EX);
  33. fputs($fp, "$text\r\n");
  34. flock ($fp, LOCK_UN);
  35. fclose($fp);
  36.  
  37. $file = file("../used/adminchat.dat");
  38. $i = count($file);
  39. if ($i >= 300) {
  40. $fp = fopen("../used/adminchat.dat", "w");
  41. flock ($fp, LOCK_EX);
  42. unset($file[0]);
  43. unset($file[1]);
  44. fputs($fp, implode("", $file));
  45. flock ($fp, LOCK_UN);
  46. fclose($fp);
  47. }
  48. header("Location: adminchat.php?isset=addon");
  49. exit;
  50. }
  51. // empty admin chat
  52. if ($action == "acdel") {
  53. if ($_SESSION['permissions'] == 101 || $_SESSION['permissions'] == 102) {
  54. clear_files("../used/adminchat.dat");
  55.  
  56. header ("Location: adminchat.php?isset=mp_admindelchat");
  57. exit;
  58. }
  59. }
  60.  
  61. if ($action == "delmail" && $_SESSION['permissions'] == 101) {
  62. $users_id = check($_GET['users']);
  63. //$users_id = $users->getidfromnick($users);
  64. if ($users_id != "") {
  65.  
  66. $fields = array('subscri', 'newscod');
  67. $values = array('', '');
  68. $db->update('vavok_profil', $fields, $values, "uid='" . $users_id . "'");
  69.  
  70. $db->delete('subs', "user_id='" . $users_id . "'");
  71.  
  72. header ("Location: subscribe.php?start=$start&isset=mp_delsubmail");
  73. exit;
  74. } else {
  75. header ("Location: subscribe.php?start=$start&isset=mp_nodelsubmail");
  76. exit;
  77. }
  78. }
  79.  
  80. if ($action == "delallsub" && $_SESSION['permissions'] == 101) {
  81. $sql = "TRUNCATE TABLE subs";
  82. $db->query($sql);
  83. header ("Location: subscribe.php?isset=mp_delsuball");
  84. exit;
  85. }
  86.  
  87.  
  88. if ($action == "zaban" && ($_SESSION['permissions'] == 101 or $_SESSION['permissions'] == 102)) {
  89. $ips = check($_POST['ips']);
  90. if (!empty($ips)) {
  91.  
  92. $fp = fopen("../used/ban.dat", "a+");
  93. flock ($fp, LOCK_EX);
  94. fputs($fp, "|$ips|\r\n");
  95. fflush ($fp);
  96. flock ($fp, LOCK_UN);
  97. fclose($fp);
  98. }
  99. header ("Location: ban.php");
  100. exit;
  101. }
  102.  
  103. if ($action == "razban" && ($_SESSION['permissions'] == 101 or $_SESSION['permissions'] == 102)) {
  104.  
  105. if (isset($_POST['id'])) {$id = check($_POST['id']);} else {$id = check($_GET['id']);}
  106.  
  107. if (!empty($id)) {
  108.  
  109. $file = file("../used/ban.dat");
  110. $fp = fopen("../used/ban.dat", "w");
  111. flock ($fp, LOCK_EX);
  112. for ($i = 0;$i < sizeof($file);$i++) {
  113. if ($i == $id) {
  114. unset($file[$i]);
  115. }
  116. }
  117. fputs($fp, implode("", $file));
  118. flock ($fp, LOCK_UN);
  119. fclose($fp);
  120.  
  121. }
  122.  
  123. redirect_to("ban.php");
  124.  
  125. }
  126.  
  127. if ($action == "delallip" && ($_SESSION['permissions'] == 101 or $_SESSION['permissions'] == 102)) {
  128.  
  129. clear_files("../used/ban.dat");
  130.  
  131. redirect_to("ban.php");
  132.  
  133. }
  134.  
  135. if ($action == "delbw" && $_SESSION['permissions'] == 101) {
  136. $stroka = check($_GET['stroka']);
  137. $file = file('../used/antiword.dat');
  138. $filestr = explode("|", $file[0]);
  139. unset($filestr[$stroka]);
  140. $str = implode("|", $filestr);
  141. $fp = fopen('../used/antiword.dat', 'w');
  142. fputs($fp, $str);
  143. fclose($fp);
  144. header ("Location: antiword.php?isset=delok");
  145. exit;
  146. }
  147. if ($action == "addbw" && $_SESSION['permissions'] == 101 && $_POST['slovo'] != '') {
  148. $slovo = check($_POST['slovo']);
  149. $fp = fopen(BASEDIR . "used/antiword.dat", "a+");
  150. $text = preg_replace ("|[\r\n]+|si", "", $slovo);
  151. fputs($fp, $text . '|');
  152. fclose($fp);
  153. header ("Location: antiword.php?isset=ok");
  154. exit;
  155. }
  156.  
  157. if ($action == "delerlog" && ($_SESSION['permissions'] == 101 or $_SESSION['permissions'] == 102)) {
  158. clear_files("../used/datalog/error401.dat");
  159. clear_files("../used/datalog/error402.dat");
  160. clear_files("../used/datalog/error403.dat");
  161. clear_files("../used/datalog/error404.dat");
  162. clear_files("../used/datalog/error406.dat");
  163. clear_files("../used/datalog/error500.dat");
  164. clear_files("../used/datalog/error502.dat");
  165. clear_files("../used/datalog/dberror.dat");
  166. clear_files("../used/datalog/error.dat");
  167. clear_files("../used/datalog/ban.dat");
  168.  
  169. redirect_to("logfiles.php?isset=mp_dellogs");
  170. }
  171.  
  172. if ($action == "delerid" && !empty($_GET['err']) && ($_SESSION['permissions'] == 101 or $_SESSION['permissions'] == 102)) {
  173.  
  174. $err = check($_GET['err']);
  175. clear_files("../used/datalog/" . $err . ".dat");
  176.  
  177. header ("Location: logfiles.php?isset=mp_dellogs");
  178. exit;
  179. }
  180.  
  181. ?>