BioTorrents.de’s version of Gazelle
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

autoenable.class.php 15KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499
  1. <?php
  2. # todo: Check strict equality gently
  3. class AutoEnable
  4. {
  5. // Constants for database values
  6. const APPROVED = 1;
  7. const DENIED = 2;
  8. const DISCARDED = 3;
  9. // Cache key to store the number of enable requests
  10. const CACHE_KEY_NAME = 'num_enable_requests';
  11. // The default request rejected message
  12. const REJECTED_MESSAGE = <<<EOT
  13. <p>
  14. Your request to re-enable your account has been rejected.
  15. </p>
  16. <p>
  17. This may be because a request is already pending for your username,
  18. or because a recent request was denied.
  19. </p>
  20. EOT;
  21. // The default request received message
  22. const RECEIVED_MESSAGE = <<<EOT
  23. <p>
  24. Your request to re-enable your account has been received.
  25. </p>
  26. <p>
  27. Most requests are responded to within minutes.
  28. Remember to check your spam folder.
  29. </p>
  30. EOT;
  31. /**
  32. * Handle a new enable request
  33. *
  34. * @param string $Username The user's username
  35. * @param string $Email The user's email address
  36. * @return string The output
  37. */
  38. public static function new_request($Username, $Email)
  39. {
  40. if (empty($Username)) {
  41. header('Location: login.php');
  42. error();
  43. }
  44. // Get the user's ID
  45. G::$DB->query("
  46. SELECT
  47. um.`ID`,
  48. ui.`BanReason`
  49. FROM
  50. `users_main` AS um
  51. JOIN `users_info` ui ON
  52. ui.`UserID` = um.`ID`
  53. WHERE
  54. um.`Username` = '$Username'
  55. AND um.`Enabled` = '2'
  56. ");
  57. if (G::$DB->has_results()) {
  58. // Make sure the user can make another request
  59. list($UserID, $BanReason) = G::$DB->next_record();
  60. G::$DB->query("
  61. SELECT
  62. 1
  63. FROM
  64. `users_enable_requests`
  65. WHERE
  66. `UserID` = '$UserID' AND(
  67. (
  68. `Timestamp` > NOW() - INTERVAL 1 WEEK
  69. AND `HandledTimestamp` IS NULL)
  70. OR(
  71. `Timestamp` > NOW() - INTERVAL 2 MONTH
  72. AND Outcome = '".self::DENIED."')
  73. )
  74. ");
  75. }
  76. $IP = $_SERVER['REMOTE_ADDR'];
  77. if (G::$DB->has_results() || !isset($UserID)) {
  78. // User already has/had a pending activation request or username is invalid
  79. $Output = sprintf(self::REJECTED_MESSAGE, DISABLED_CHAN, BOT_SERVER);
  80. if (isset($UserID)) {
  81. Tools::update_user_notes(
  82. $UserID,
  83. sqltime() . " - Enable request rejected from $IP\n\n"
  84. );
  85. }
  86. } else {
  87. // New disable activation request
  88. $UserAgent = db_string($_SERVER['HTTP_USER_AGENT']);
  89. G::$DB->query(
  90. "
  91. INSERT INTO `users_enable_requests`(
  92. `UserID`,
  93. `Email`,
  94. `IP`,
  95. `UserAgent`,
  96. `Timestamp`
  97. )
  98. VALUES(?, ?, ?, ?, NOW())",
  99. $UserID,
  100. Crypto::encrypt($Email),
  101. Crypto::encrypt($IP),
  102. $UserAgent
  103. );
  104. $RequestID = G::$DB->inserted_id();
  105. // Cache the number of requests for the modbar
  106. G::$Cache->increment_value(self::CACHE_KEY_NAME);
  107. setcookie('username', '', time() - 60 * 60, '/', '', false);
  108. $Output = self::RECEIVED_MESSAGE;
  109. Tools::update_user_notes(
  110. $UserID,
  111. sqltime() . " - Enable request " . G::$DB->inserted_id() . " received from $IP\n\n"
  112. );
  113. if ($BanReason === 3) {
  114. self::handle_requests(
  115. [$RequestID],
  116. self::APPROVED,
  117. 'Automatically approved (inactivity)'
  118. );
  119. }
  120. }
  121. return $Output;
  122. }
  123. /*
  124. * Handle requests
  125. *
  126. * @param int|int[] $IDs An array of IDs, or a single ID
  127. * @param int $Status The status to mark the requests as
  128. * @param string $Comment The staff member comment
  129. */
  130. public static function handle_requests($IDs, $Status, $Comment)
  131. {
  132. # Error checking
  133. if ($Status !== self::APPROVED && $Status !== self::DENIED && $Status !== self::DISCARDED) {
  134. error(404);
  135. }
  136. $ENV = ENV::go();
  137. $UserInfo = [];
  138. $IDs = (!is_array($IDs)) ? [$IDs] : $IDs;
  139. if (count($IDs) === 0) {
  140. error(404);
  141. }
  142. foreach ($IDs as $ID) {
  143. if (!is_number($ID)) {
  144. error(404);
  145. }
  146. }
  147. G::$DB->query("
  148. SELECT
  149. `Email`,
  150. `ID`,
  151. `UserID`
  152. FROM
  153. `users_enable_requests`
  154. WHERE
  155. `ID` IN(".implode(',', $IDs).")
  156. AND `Outcome` IS NULL
  157. ");
  158. $Results = G::$DB->to_array(false, MYSQLI_NUM);
  159. if ($Status !== self::DISCARDED) {
  160. // Prepare email
  161. require_once SERVER_ROOT.'/classes/templates.class.php';
  162. $TPL = new TEMPLATE;
  163. if ($Status === self::APPROVED) {
  164. $TPL->open(SERVER_ROOT.'/templates/enable_request_accepted.tpl');
  165. $TPL->set('SITE_DOMAIN', SITE_DOMAIN);
  166. } else {
  167. $TPL->open(SERVER_ROOT.'/templates/enable_request_denied.tpl');
  168. }
  169. $TPL->set('SITE_NAME', $ENV->SITE_NAME);
  170. foreach ($Results as $Result) {
  171. list($Email, $ID, $UserID) = $Result;
  172. $Email = Crypto::decrypt($Email);
  173. $UserInfo[] = array($ID, $UserID);
  174. if ($Status === self::APPROVED) {
  175. // Generate token
  176. $Token = db_string(Users::make_secret());
  177. G::$DB->query("
  178. UPDATE
  179. `users_enable_requests`
  180. SET
  181. `Token` = ?
  182. WHERE
  183. `ID` = ?,
  184. $Token,
  185. $ID
  186. ");
  187. $TPL->set('TOKEN', $Token);
  188. }
  189. // Send email
  190. $Subject = "Your enable request for $ENV->SITE_NAME has been ";
  191. $Subject .= ($Status === self::APPROVED) ? 'approved' : 'denied';
  192. Misc::send_email($Email, $Subject, $TPL->get(), 'noreply');
  193. }
  194. } else {
  195. foreach ($Results as $Result) {
  196. list(, $ID, $UserID) = $Result;
  197. $UserInfo[] = array($ID, $UserID);
  198. }
  199. }
  200. // User notes stuff
  201. $StaffID = G::$LoggedUser['ID'] ?? 0;
  202. G::$DB->query("
  203. SELECT
  204. `Username`
  205. FROM
  206. `users_main`
  207. WHERE
  208. `ID` = ?,
  209. $StaffID
  210. ");
  211. if (G::$DB->has_results()) {
  212. list($StaffUser) = G::$DB->next_record();
  213. } else {
  214. $StaffUser = "System";
  215. $StaffID = 0;
  216. }
  217. foreach ($UserInfo as $User) {
  218. list($ID, $UserID) = $User;
  219. $BaseComment = sqltime()." - Enable request $ID ".strtolower(self::get_outcome_string($Status)).' by [user]'.$StaffUser.'[/user]';
  220. $BaseComment .= (!empty($Comment)) ? "\nReason: $Comment\n\n" : "\n\n";
  221. Tools::update_user_notes($UserID, $BaseComment);
  222. }
  223. // Update database values and decrement cache
  224. G::$DB->query("
  225. UPDATE
  226. `users_enable_requests`
  227. SET
  228. `HandledTimestamp` = NOW(), `CheckedBy` = ?, `Outcome` = ?
  229. WHERE
  230. `ID` IN(".implode(',', $IDs)."),
  231. $StaffID,
  232. $Status
  233. ");
  234. G::$Cache->decrement_value(self::CACHE_KEY_NAME, count($IDs));
  235. }
  236. /**
  237. * Unresolve a discarded request
  238. *
  239. * @param int $ID The request ID
  240. */
  241. public static function unresolve_request($ID)
  242. {
  243. $ID = (int) $ID;
  244. if (empty($ID)) {
  245. error(404);
  246. }
  247. G::$DB->query("
  248. SELECT
  249. `UserID`
  250. FROM
  251. `users_enable_requests`
  252. WHERE
  253. `Outcome` = '" . self::DISCARDED . "' AND `ID` = '$ID'
  254. ");
  255. if (!G::$DB->has_results()) {
  256. error(404);
  257. } else {
  258. list($UserID) = G::$DB->next_record();
  259. }
  260. G::$DB->query("
  261. SELECT
  262. `Username`
  263. FROM
  264. `users_main`
  265. WHERE
  266. `ID` = '".G::$LoggedUser['ID']."'
  267. ");
  268. list($StaffUser) = G::$DB->next_record();
  269. Tools::update_user_notes($UserID, sqltime()." - Enable request $ID unresolved by [user]".$StaffUser.'[/user]'."\n\n");
  270. G::$DB->query("
  271. UPDATE
  272. `users_enable_requests`
  273. SET
  274. `Outcome` = NULL,
  275. `HandledTimestamp` = NULL,
  276. `CheckedBy` = NULL
  277. WHERE
  278. `ID` = '$ID'
  279. ");
  280. G::$Cache->increment_value(self::CACHE_KEY_NAME);
  281. }
  282. /**
  283. * Get the corresponding outcome string for a numerical value
  284. *
  285. * @param int $Outcome The outcome integer
  286. * @return string The formatted output string
  287. */
  288. public static function get_outcome_string($Outcome)
  289. {
  290. if ($Outcome === self::APPROVED) {
  291. $String = 'Approved';
  292. } elseif ($Outcome === self::DENIED) {
  293. $String = 'Rejected';
  294. } elseif ($Outcome === self::DISCARDED) {
  295. $String = 'Discarded';
  296. } else {
  297. $String = '---';
  298. }
  299. return $String;
  300. }
  301. /**
  302. * Handle a user's request to enable an account
  303. *
  304. * @param string $Token The token
  305. * @return string The error output, or an empty string
  306. */
  307. public static function handle_token($Token)
  308. {
  309. $Token = db_string($Token);
  310. G::$DB->query("
  311. SELECT
  312. uer.`UserID`,
  313. uer.`HandledTimestamp`,
  314. um.`torrent_pass`,
  315. um.`Visible`,
  316. um.`IP`
  317. FROM
  318. `users_enable_requests` AS uer
  319. LEFT JOIN `users_main` AS um
  320. ON
  321. uer.`UserID` = um.`ID`
  322. WHERE
  323. `Token` = '$Token'
  324. ");
  325. if (G::$DB->has_results()) {
  326. list($UserID, $Timestamp, $TorrentPass, $Visible, $IP) = G::$DB->next_record();
  327. G::$DB->query("
  328. UPDATE
  329. `users_enable_requests`
  330. SET
  331. `Token` = NULL
  332. WHERE
  333. `Token` = '$Token'
  334. ");
  335. if ($Timestamp < time_minus(3600 * 48)) {
  336. // Old request
  337. Tools::update_user_notes($UserID, sqltime()." - Tried to use an expired enable token from ".$_SERVER['REMOTE_ADDR']."\n\n");
  338. $Err = "Token has expired. Please visit ".DISABLED_CHAN." on ".BOT_SERVER." to discuss this with staff.";
  339. } else {
  340. // Good request, decrement cache value and enable account
  341. G::$Cache->decrement_value(AutoEnable::CACHE_KEY_NAME);
  342. $VisibleTrIP = ($Visible && Crypto::decrypt($IP) !== '127.0.0.1') ? '1' : '0';
  343. Tracker::update_tracker('add_user', array('id' => $UserID, 'passkey' => $TorrentPass, 'visible' => $VisibleTrIP));
  344. G::$DB->query("
  345. UPDATE
  346. `users_main`
  347. SET
  348. `Enabled` = '1',
  349. `can_leech` = '1'
  350. WHERE
  351. `ID` = '$UserID'
  352. ");
  353. G::$DB->query("
  354. UPDATE
  355. `users_info`
  356. SET
  357. `BanReason` = '0'
  358. WHERE
  359. `UserID` = '$UserID'
  360. ");
  361. G::$Cache->delete_value("user_info_$UserID");
  362. $Err = "Your account has been enabled. You may now log in.";
  363. }
  364. } else {
  365. $Err = "Invalid token.";
  366. }
  367. return $Err;
  368. }
  369. /**
  370. * Build the search query, from the searchbox inputs
  371. *
  372. * @param int $UserID The user ID
  373. * @param string $IP The IP
  374. * @param string $SubmittedTimestamp The timestamp representing when the request was submitted
  375. * @param int $HandledUserID The ID of the user that handled the request
  376. * @param string $HandledTimestamp The timestamp representing when the request was handled
  377. * @param int $OutcomeSearch The outcome of the request
  378. * @param boolean $Checked Should checked requests be included?
  379. * @return array The WHERE conditions for the query
  380. */
  381. public static function build_search_query($Username, $IP, $SubmittedBetween, $SubmittedTimestamp1, $SubmittedTimestamp2, $HandledUsername, $HandledBetween, $HandledTimestamp1, $HandledTimestamp2, $OutcomeSearch, $Checked)
  382. {
  383. $Where = [];
  384. if (!empty($Username)) {
  385. $Where[] = "um1.`Username` = '$Username'";
  386. }
  387. if (!empty($IP)) {
  388. // todo: Make this work with encrypted IPs
  389. $Where[] = "uer.`IP` = '$IP'";
  390. }
  391. if (!empty($SubmittedTimestamp1)) {
  392. switch ($SubmittedBetween) {
  393. case 'on':
  394. $Where[] = "DATE(uer.`Timestamp`) = DATE('$SubmittedTimestamp1')";
  395. break;
  396. case 'before':
  397. $Where[] = "DATE(uer.`Timestamp`) < DATE('$SubmittedTimestamp1')";
  398. break;
  399. case 'after':
  400. $Where[] = "DATE(uer.`Timestamp`) > DATE('$SubmittedTimestamp1')";
  401. break;
  402. case 'between':
  403. if (!empty($SubmittedTimestamp2)) {
  404. $Where[] = "DATE(uer.`Timestamp`) BETWEEN DATE('$SubmittedTimestamp1') AND DATE('$SubmittedTimestamp2')";
  405. }
  406. break;
  407. default:
  408. break;
  409. }
  410. }
  411. if (!empty($HandledTimestamp1)) {
  412. switch ($HandledBetween) {
  413. case 'on':
  414. $Where[] = "DATE(uer.`HandledTimestamp`) = DATE('$HandledTimestamp1')";
  415. break;
  416. case 'before':
  417. $Where[] = "DATE(uer.`HandledTimestamp`) < DATE('$HandledTimestamp1')";
  418. break;
  419. case 'after':
  420. $Where[] = "DATE(uer.`HandledTimestamp`) > DATE('$HandledTimestamp1')";
  421. break;
  422. case 'between':
  423. if (!empty($HandledTimestamp2)) {
  424. $Where[] = "DATE(uer.`HandledTimestamp`) BETWEEN DATE('$HandledTimestamp1') AND DATE('$HandledTimestamp2')";
  425. }
  426. break;
  427. default:
  428. break;
  429. }
  430. }
  431. if (!empty($HandledUsername)) {
  432. $Where[] = "um2.`Username` = '$HandledUsername'";
  433. }
  434. if (!empty($OutcomeSearch)) {
  435. $Where[] = "uer.`Outcome` = '$OutcomeSearch'";
  436. }
  437. if ($Checked) {
  438. // This is to skip the if statement in enable_requests.php
  439. $Where[] = "(uer.`Outcome` IS NULL OR uer.`Outcome` IS NOT NULL)";
  440. }
  441. return $Where;
  442. }
  443. }