summary | shortlog | log | commit | commitdiff | tree
raw | patch | inline | side by side (parent: 4b9d41c)
raw | patch | inline | side by side (parent: 4b9d41c)
author | cajus <cajus@594d385d-05f5-0310-b6e9-bd551577e9d8> | |
Thu, 24 Jul 2008 11:28:06 +0000 (11:28 +0000) | ||
committer | cajus <cajus@594d385d-05f5-0310-b6e9-bd551577e9d8> | |
Thu, 24 Jul 2008 11:28:06 +0000 (11:28 +0000) |
git-svn-id: https://oss.gonicus.de/repositories/gosa/trunk@12008 594d385d-05f5-0310-b6e9-bd551577e9d8
gosa-core/html/password.php | patch | blob | history |
index 837b70fc27942afc3b52d3c8ade23f21bb130703..a8b5b5db990a19834b4d4d3cba4ad172cd9389e5 100644 (file)
/* Parse configuration file */
$config= new config(CONFIG_DIR."/".CONFIG_FILE, $BASE_DIR);
-session::set('DEBUGLEVEL',$config->data['MAIN']['DEBUGLEVEL']);
+session::set('DEBUGLEVEL', $config->get_cfg_value("debuglevel"));
if ($_SERVER["REQUEST_METHOD"] != "POST"){
@DEBUG (DEBUG_CONFIG, __LINE__, __FUNCTION__, __FILE__, $config->data, "config");
}
/* Set template compile directory */
-if (isset ($config->data['MAIN']['COMPILE'])){
- $smarty->compile_dir= $config->data['MAIN']['COMPILE'];
-} else {
- $smarty->compile_dir= '/var/spool/gosa';
-}
+$smarty->compile_dir= $config->get_cfg_value("compile", '/var/spool/gosa');
/* Check for compile directory */
if (!(is_dir($smarty->compile_dir) && is_writable($smarty->compile_dir))){
clean_smarty_compile_dir($smarty->compile_dir);
/* Language setup */
-if ($config->data['MAIN']['LANG'] == ""){
+if ($config->get_cfg_value("lang") == ""){
$lang= get_browser_language();
} else {
- $lang= $config->data['MAIN']['LANG'];
+ $lang= $config->get_cfg_value("lang");
}
$lang.=".UTF-8";
putenv("LANGUAGE=");
}
/* If SSL is forced, just forward to the SSL enabled site */
-if ($config->data['MAIN']['FORCESSL'] == 'true' && $ssl != ''){
+if ($config->get_cfg_value("forcessl") == 'true' && $ssl != ''){
header ("Location: $ssl");
exit;
}
/* Check for selected password method */
-$method= $config->current['HASH'];
+$method= $config->get_cfg_value("hash", "crypt/md5");
if (isset($_GET['method'])){
$method= validate($_GET['method']);
$tmp = new passwordMethod($config);
}
/* Password policy fulfilled? */
- if (isset($config->data['MAIN']['PWDIFFER'])){
- $l= $config->data['MAIN']['PWDIFFER'];
+ if ($config->get_cfg_value("pwdiffer") != ""){
+ $l= $config->get_cfg_value("pwdiffer");
if (substr($_POST['current_password'], 0, $l) == substr($_POST['new_password'], 0, $l)){
$message[]= _("The password used as new and current are too similar.");
}
}
- if (isset($config->data['MAIN']['PWMINLEN'])){
- if (strlen($_POST['new_password']) < $config->data['MAIN']['PWMINLEN']){
+ if ($config->get_cfg_value("pwminlen") != ""){
+ if (strlen($_POST['new_password']) < $config->get_cfg_value("pwminlen")){
$message[]= _("The password used as new is to short.");
}
}
/* Passed quality check, just try to change the password now */
$output= "";
- if (isset($config->data['MAIN']['EXTERNALPWDHOOK'])){
- exec($config->data['MAIN']['EXTERNALPWDHOOK']." ".$ui->username." ".
+ if ($config->get_cfg_value("externalpwdhook") != ""){
+ exec($config->get_cfg_value("externalpwdhook")." ".$ui->username." ".
$_POST['current_password']." ".$_POST['new_password'], $resarr);
if(count($resarr) > 0) {
$output= join('\n', $resarr);
$smarty->assign ('password_img', get_template_path('images/password.png'));
/* Displasy SSL mode warning? */
-if ($ssl != "" && $config->data['MAIN']['WARNSSL'] == 'true'){
+if ($ssl != "" && $conifg->get_cfg_value("warnssl") == 'true'){
$smarty->assign ("ssl", "<b>"._("Warning").":</b> "._("Session will not be encrypted.")." <a style=\"color:red;\" href=\"".htmlentities($ssl)."\"><b>"._("Enter SSL session")."</b></a>!");
} else {
$smarty->assign ("ssl", "");