aboutsummaryrefslogtreecommitdiffstats
path: root/packages/dspam/www/dspam-settings-spwd.php
diff options
context:
space:
mode:
authorDaniel Stefan Haischt <dsh@pfsense.org>2006-07-15 22:16:04 +0000
committerDaniel Stefan Haischt <dsh@pfsense.org>2006-07-15 22:16:04 +0000
commit3eab27426aa39497d87a9fb768fd860f924e10be (patch)
tree729d886e70f6cd07f138bd72cf6308a1908ec9db /packages/dspam/www/dspam-settings-spwd.php
parent5ea99d5d96bb72340cdb7d24e1258cb07b5cdfa1 (diff)
downloadpfsense-packages-3eab27426aa39497d87a9fb768fd860f924e10be.tar.gz
pfsense-packages-3eab27426aa39497d87a9fb768fd860f924e10be.tar.bz2
pfsense-packages-3eab27426aa39497d87a9fb768fd860f924e10be.zip
- initial version of the DSPAM package
Diffstat (limited to 'packages/dspam/www/dspam-settings-spwd.php')
-rw-r--r--packages/dspam/www/dspam-settings-spwd.php197
1 files changed, 197 insertions, 0 deletions
diff --git a/packages/dspam/www/dspam-settings-spwd.php b/packages/dspam/www/dspam-settings-spwd.php
new file mode 100644
index 00000000..7912b0f6
--- /dev/null
+++ b/packages/dspam/www/dspam-settings-spwd.php
@@ -0,0 +1,197 @@
+<?php
+/* $Id$ */
+/*
+ dspam-settings-overr.php
+
+ Copyright (C) 2006 Daniel S. Haischt.
+ All rights reserved.
+
+ Redistribution and use in source and binary forms, with or without
+ modification, are permitted provided that the following conditions are met:
+
+ 1. Redistributions of source code must retain the above copyright notice,
+ this list of conditions and the following disclaimer.
+
+ 2. Redistributions in binary form must reproduce the above copyright
+ notice, this list of conditions and the following disclaimer in the
+ documentation and/or other materials provided with the distribution.
+
+ THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
+ INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
+ AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
+ AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
+ OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ POSSIBILITY OF SUCH DAMAGE.
+*/
+
+$pgtitle = array(gettext("Services"),
+ gettext("DSPAM"),
+ gettext("Advanced Settings"),
+ gettext("Edit Server Password"));
+
+require("guiconfig.inc");
+include("/usr/local/pkg/dspam.inc");
+
+if (isDSPAMAdmin($HTTP_SERVER_VARS['AUTH_USER'])) {
+
+/*
+ The following code presumes, that the following XML structure exists or
+ if it does not exist, it will be created.
+
+ <server-pwd>
+ <value>foo</value>
+ <descr>foo desc</descr>
+ </server-pwd>
+ <server-pwd>
+ <value>bar</value>
+ <descr>bar desc</descr>
+ </server-pwd>
+*/
+
+if (!is_array($config['installedpackages']['dspam']['config'][0]['server-pwd'])) {
+ $config['installedpackages']['dspam']['config'][0]['server-pwd'] = array();
+}
+
+$t_spwds = &$config['installedpackages']['dspam']['config'][0]['server-pwd'];
+
+/* ID is only set if the user wants to edit an existing entry */
+$id = $_GET['id'];
+$sectionid = $_GET['sectionid'];
+if (isset($_POST['id']))
+ $id = $_POST['id'];
+if (isset($_POST['sectionid']))
+ $sectionid = $_POST['sectionid'];
+
+if (isset($id) && $t_spwds[$id]) {
+ $pconfig['value'] = $t_spwds[$id]['value'];
+ $pconfig['descr'] = $t_spwds[$id]['descr'];
+} else {
+ $pconfig['value'] = $_GET['pwdvalue'];
+ $pconfig['descr'] = $_GET['descr'];
+}
+
+if ($_POST) {
+
+ unset($input_errors);
+ $pconfig = $_POST;
+
+ /* input validation */
+ $reqdfields = explode(" ", "pwdvalue");
+ $reqdfieldsn = explode(",", "Server Password Value");
+
+ do_input_validation($_POST, $reqdfields, $reqdfieldsn, &$input_errors);
+
+ /* check for overlaps */
+ foreach ($t_spwds as $spwd) {
+ if (isset($id) && ($t_spwds[$id]) && ($t_spwds[$id] === $spwd)) {
+ continue;
+ }
+ if ($spwd['value'] == $_POST['pwdvalue']) {
+ $input_errors[] = gettext("This password value already exists.");
+ break;
+ }
+ }
+
+ /* if this is an AJAX caller then handle via JSON */
+ if(isAjax() && is_array($input_errors)) {
+ input_errors2Ajax($input_errors);
+ exit;
+ }
+
+ if (!$input_errors) {
+ $pwd = array();
+ $pwd['value'] = $_POST['pwdvalue'];
+ $pwd['descr'] = $_POST['descr'];
+
+ if (isset($id) && $t_spwds[$id])
+ $t_spwds[$id] = $pwd;
+ else
+ $t_spwds[] = $pwd;
+
+ write_config();
+
+ $retval = 0;
+ config_lock();
+ $retval = dspam_configure();
+ config_unlock();
+
+ $savemsg = get_std_save_message($retval);
+
+ isset($sectionid) ? $header = "dspam-settings.php?sectionid={$sectionid}" : $header = "dspam-settings.php";
+ pfSenseHeader($header);
+ exit;
+ }
+}
+
+/* if ajax is calling, give them an update message */
+if(isAjax())
+ print_info_box_np($savemsg);
+
+include("head.inc");
+/* put your custom HTML head content here */
+/* using some of the $pfSenseHead function calls */
+echo $pfSenseHead->getHTML();
+
+?>
+
+<body link="#0000CC" vlink="#0000CC" alink="#0000CC">
+<?php include("fbegin.inc"); ?>
+<?php if ($input_errors) print_input_errors($input_errors); ?>
+ <form action="dspam-settings-spwd.php" method="post" name="iform" id="iform">
+ <div name="inputerrors" id="inputerrors"></div>
+ <table width="100%" border="0" cellpadding="6" cellspacing="0">
+ <tr>
+ <td width="22%" valign="top" class="vncellreq"><?=gettext("Server Password Value");?></td>
+ <td width="78%" class="vtable">
+ <input name="pwdvalue" type="text" class="formfld unknown" id="pwdvalue" size="30" value="<?=htmlspecialchars($pconfig['value']);?>">
+ </td>
+ </tr>
+ <tr>
+ <td width="22%" valign="top" class="vncell"><?=gettext("Description");?></td>
+ <td width="78%" class="vtable">
+ <input name="descr" type="text" class="formfld unknown" id="descr" size="40" value="<?=htmlspecialchars($pconfig['descr']);?>">
+ <br> <span class="vexpl"><?=gettext("You may enter a description here
+ for your reference (not parsed).");?></span></td>
+ </tr>
+ <tr>
+ <td width="22%" valign="top">&nbsp;</td>
+ <td width="78%">
+ <input id="submit" name="Submit" type="submit" class="formbtn" value="<?=gettext("Save");?>"> <input id="cancelbutton" class="formbtn" type="button" value="<?=gettext("Cancel");?>" onclick="history.back()">
+ <?php if (isset($id) && $t_spwds[$id]): ?>
+ <input name="id" type="hidden" value="<?=$id;?>">
+ <?php endif; ?>
+ <?php if (isset($sectionid)): ?>
+ <input name="sectionid" type="hidden" value="<?=$sectionid;?>">
+ <?php endif; ?>
+ </td>
+ </tr>
+ </table>
+</form>
+<?
+ } else {
+?>
+<?php
+ $input_errors[] = "Access to this particular site was denied. You need DSPAM admin access rights to be able to view it.";
+
+ include("head.inc");
+ echo $pfSenseHead->getHTML();
+?>
+<?php include("fbegin.inc");?>
+<?php if ($input_errors) print_input_errors($input_errors);?>
+<?php if ($savemsg) print_info_box($savemsg);?>
+ <body link="#000000" vlink="#000000" alink="#000000">
+ <table width="100%" border="0" cellpadding="6" cellspacing="0">
+ <tr>
+ <td valign="top" class="listtopic">Access denied for: <?=$HTTP_SERVER_VARS['AUTH_USER']?></td>
+ </tr>
+ </table>
+<?php
+ } // end of access denied code
+?>
+<?php include("fend.inc"); ?>
+</body>
+</html>