dolibarr 21.0.3
security2.lib.php
Go to the documentation of this file.
1<?php
2/* Copyright (C) 2008-2011 Laurent Destailleur <eldy@users.sourceforge.net>
3 * Copyright (C) 2008-2017 Regis Houssin <regis.houssin@inodbox.com>
4 * Copyright (C) 2024 MDW <mdeweerd@users.noreply.github.com>
5 * Copyright (C) 2024 Frédéric France <frederic.france@free.fr>
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 3 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License
18 * along with this program. If not, see <https://www.gnu.org/licenses/>.
19 * or see https://www.gnu.org/
20 */
21
37function dol_getwebuser($mode)
38{
39 $t = '?';
40 if ($mode == 'user') {
41 $t = getenv('APACHE_RUN_USER'); // $_ENV['APACHE_RUN_USER'] is empty
42 }
43 if ($mode == 'group') {
44 $t = getenv('APACHE_RUN_GROUP');
45 }
46 return $t;
47}
48
59function checkLoginPassEntity($usertotest, $passwordtotest, $entitytotest, $authmode, $context = '')
60{
61 global $conf, $langs;
62
63 // Check parameters
64 if ($entitytotest == '') {
65 $entitytotest = 1;
66 }
67
68 dol_syslog("checkLoginPassEntity usertotest=".$usertotest." entitytotest=".$entitytotest." authmode=".implode(',', $authmode));
69 $login = '';
70
71 // Validation of login/pass/entity with standard modules
72 if (empty($login)) {
73 $test = true;
74 foreach ($authmode as $mode) {
75 if ($test && $mode && !$login) {
76 // Validation of login/pass/entity for mode $mode
77 $mode = trim($mode);
78 $authfile = 'functions_'.$mode.'.php';
79 $fullauthfile = '';
80
81 $dirlogin = array_merge(array("/core/login"), (array) $conf->modules_parts['login']);
82 foreach ($dirlogin as $reldir) {
83 $dir = dol_buildpath($reldir, 0);
84 $newdir = dol_osencode($dir);
85
86 // Check if file found (do not use dol_is_file to avoid loading files.lib.php)
87 $tmpnewauthfile = $newdir.(preg_match('/\/$/', $newdir) ? '' : '/').$authfile;
88 if (is_file($tmpnewauthfile)) {
89 $fullauthfile = $tmpnewauthfile;
90 }
91 }
92
93 $result = false;
94 if ($fullauthfile) {
95 $result = include_once $fullauthfile;
96 }
97 if ($fullauthfile && $result) {
98 // Call function to check user/password
99 $function = 'check_user_password_'.$mode;
100 $login = call_user_func($function, $usertotest, $passwordtotest, $entitytotest, $context);
101 if ($login && $login != '--bad-login-validity--') {
102 // Login is successful with this method
103 $test = false; // To stop once at first login success
104 $conf->authmode = $mode; // This properties is defined only when logged to say what mode was successfully used
105 /*$dol_tz = GETPOST('tz');
106 $dol_dst = GETPOST('dst');
107 $dol_screenwidth = GETPOST('screenwidth');
108 $dol_screenheight = GETPOST('screenheight');*/
109 }
110 } else {
111 dol_syslog("Authentication KO - failed to load file '".$authfile."'", LOG_ERR);
112 sleep(1);
113 // Load translation files required by the page
114 $langs->loadLangs(array('other', 'main', 'errors'));
115
116 $_SESSION["dol_loginmesg"] = (empty($_SESSION["dol_loginmesg"]) ? '' : $_SESSION["dol_loginmesg"].', ').$langs->transnoentitiesnoconv("ErrorFailedToLoadLoginFileForMode", $mode);
117 }
118 }
119 }
120 }
121
122 return $login;
123}
124
125
126if (!function_exists('dol_loginfunction')) {
136 function dol_loginfunction($langs, $conf, $mysoc)
137 {
138 global $dolibarr_main_demo, $dolibarr_main_force_https;
139 global $db, $hookmanager;
140
141 $langs->loadLangs(array("main", "other", "help", "admin"));
142
143 // Instantiate hooks of thirdparty module only if not already define
144 $hookmanager->initHooks(array('mainloginpage'));
145
146 $main_authentication = $conf->file->main_authentication;
147
148 $session_name = session_name(); // Get current session name
149
150 $dol_url_root = DOL_URL_ROOT;
151
152 // Title
153 $appli = constant('DOL_APPLICATION_TITLE');
154 $title = $appli.(getDolGlobalString('MAIN_OPTIMIZEFORTEXTBROWSER') ? '' : ' '.constant('DOL_VERSION'));
155
156 $customapplication = getDolGlobalString('MAIN_APPLICATION_TITLE');
157 if ($customapplication) {
158 if (preg_match('/^\+/', $customapplication)) {
159 $title .= $customapplication;
160 } else {
161 $title = $customapplication;
162 }
163 }
164 $titletruedolibarrversion = constant('DOL_VERSION'); // $title used by login template after the @ to inform of true Dolibarr version
165
166 // Note: $conf->css looks like '/theme/eldy/style.css.php'
167 /*
168 $conf->css = "/theme/".(GETPOST('theme','aZ09')?GETPOST('theme','aZ09'):$conf->theme)."/style.css.php";
169 $themepath=dol_buildpath($conf->css,1);
170 if (!empty($conf->modules_parts['theme'])) // Using this feature slow down application
171 {
172 foreach($conf->modules_parts['theme'] as $reldir)
173 {
174 if (file_exists(dol_buildpath($reldir.$conf->css, 0)))
175 {
176 $themepath=dol_buildpath($reldir.$conf->css, 1);
177 break;
178 }
179 }
180 }
181 $conf_css = $themepath."?lang=".$langs->defaultlang;
182 */
183
184 // Select templates dir
185 $template_dir = '';
186 if (!empty($conf->modules_parts['tpl'])) { // Using this feature slow down application
187 $dirtpls = array_merge($conf->modules_parts['tpl'], array('/core/tpl/'));
188 foreach ($dirtpls as $reldir) {
189 $tmp = dol_buildpath($reldir.'login.tpl.php');
190 if (file_exists($tmp)) {
191 $template_dir = preg_replace('/login\.tpl\.php$/', '', $tmp);
192 break;
193 }
194 }
195 } else {
196 $template_dir = DOL_DOCUMENT_ROOT."/core/tpl/";
197 }
198
199 // Set cookie for timeout management. We set it as a cookie so we will be able to use it to set timeout on next page before the session start
200 // and the conf file is loaded.
201 $prefix = dol_getprefix('');
202 $sessiontimeout = 'DOLSESSTIMEOUT_'.$prefix;
203
204 if (getDolGlobalString('MAIN_SESSION_TIMEOUT')) {
205 if (session_status() != PHP_SESSION_ACTIVE) {
206 if (PHP_VERSION_ID < 70300) {
207 session_set_cookie_params(0, '/', null, !(empty($dolibarr_main_force_https) && isHTTPS() === false), true); // Add tag secure and httponly on session cookie (same as setting session.cookie_httponly into php.ini). Must be called before the session_start.
208 } else {
209 // Only available for php >= 7.3
210 $sessioncookieparams = array(
211 'lifetime' => 0,
212 'path' => '/',
213 //'domain' => '.mywebsite.com', // the dot at the beginning allows compatibility with subdomains
214 'secure' => !(empty($dolibarr_main_force_https) && isHTTPS() === false),
215 'httponly' => true,
216 'samesite' => 'Lax' // None || Lax || Strict
217 );
218 session_set_cookie_params($sessioncookieparams);
219 }
220
221 setcookie($sessiontimeout, getDolGlobalString('MAIN_SESSION_TIMEOUT'), 0, "/", '', !empty($dolibarr_main_force_https), true);
222 }
223 }
224
225 if (GETPOST('urlfrom', 'alpha')) {
226 $_SESSION["urlfrom"] = GETPOST('urlfrom', 'alpha');
227 } else {
228 unset($_SESSION["urlfrom"]);
229 }
230
231 if (!GETPOST("username", 'alpha')) {
232 $focus_element = 'username';
233 } else {
234 $focus_element = 'password';
235 }
236
237 $demologin = '';
238 $demopassword = '';
239 if (!empty($dolibarr_main_demo)) {
240 $tab = explode(',', $dolibarr_main_demo);
241 $demologin = $tab[0];
242 $demopassword = $tab[1];
243 }
244
245 // Execute hook getLoginPageOptions (for table)
246 $parameters = array('entity' => GETPOSTINT('entity'), 'switchentity' => GETPOSTINT('switchentity'));
247 $reshook = $hookmanager->executeHooks('getLoginPageOptions', $parameters); // Note that $action and $object may have been modified by some hooks.
248 $morelogincontent = $hookmanager->resPrint;
249
250 // Execute hook getLoginPageExtraOptions (eg for js)
251 $parameters = array('entity' => GETPOSTINT('entity'), 'switchentity' => GETPOSTINT('switchentity'));
252 $reshook = $hookmanager->executeHooks('getLoginPageExtraOptions', $parameters); // Note that $action and $object may have been modified by some hooks.
253 $moreloginextracontent = $hookmanager->resPrint;
254
255 //Redirect after connection
256 $parameters = array('entity' => GETPOSTINT('entity'), 'switchentity' => GETPOSTINT('switchentity'));
257 $reshook = $hookmanager->executeHooks('redirectAfterConnection', $parameters); // Note that $action and $object may have been modified by some hooks.
258 $php_self = $hookmanager->resPrint;
259
260 // Login
261 $login = (!empty($hookmanager->resArray['username']) ? $hookmanager->resArray['username'] : (GETPOST("username", "alpha") ? GETPOST("username", "alpha") : $demologin));
262 $password = $demopassword;
263
264 // Show logo (search in order: small company logo, large company logo, theme logo, common logo)
265 $width = 0;
266 $urllogo = DOL_URL_ROOT.'/theme/common/login_logo.png';
267
268 if (!empty($mysoc->logo_small) && is_readable($conf->mycompany->dir_output.'/logos/thumbs/'.$mysoc->logo_small)) {
269 $urllogo = DOL_URL_ROOT.'/viewimage.php?cache=1&amp;modulepart=mycompany&amp;file='.urlencode('logos/thumbs/'.$mysoc->logo_small);
270 } elseif (!empty($mysoc->logo) && is_readable($conf->mycompany->dir_output.'/logos/'.$mysoc->logo)) {
271 $urllogo = DOL_URL_ROOT.'/viewimage.php?cache=1&amp;modulepart=mycompany&amp;file='.urlencode('logos/'.$mysoc->logo);
272 $width = 128;
273 } elseif (!empty($mysoc->logo_squarred_small) && is_readable($conf->mycompany->dir_output.'/logos/thumbs/'.$mysoc->logo_squarred_small)) {
274 $urllogo = DOL_URL_ROOT.'/viewimage.php?cache=1&amp;modulepart=mycompany&amp;file='.urlencode('logos/thumbs/'.$mysoc->logo_squarred_small);
275 } elseif (is_readable(DOL_DOCUMENT_ROOT.'/theme/dolibarr_logo.svg')) {
276 $urllogo = DOL_URL_ROOT.'/theme/dolibarr_logo.svg';
277 }
278
279 // Security graphical code
280 $captcha = '';
281 if (getDolGlobalString('MAIN_SECURITY_ENABLECAPTCHA')) {
282 $captcha = getDolGlobalString('MAIN_SECURITY_ENABLECAPTCHA_HANDLER', 'standard');
283 }
284
285 // Extra link
286 $forgetpasslink = 0;
287 $helpcenterlink = 0;
288 if (!getDolGlobalString('MAIN_SECURITY_DISABLEFORGETPASSLINK') || getDolGlobalString('MAIN_HELPCENTER_LINKTOUSE')) {
289 if (!getDolGlobalString('MAIN_SECURITY_DISABLEFORGETPASSLINK')) {
290 $forgetpasslink = 1;
291 }
292
293 if (getDolGlobalString('MAIN_HELPCENTER_LINKTOUSE')) {
294 $helpcenterlink = 1;
295 }
296 }
297
298 // Home message
299 $main_home = '';
300 if (getDolGlobalString('MAIN_HOME')) {
301 $substitutionarray = getCommonSubstitutionArray($langs);
302 complete_substitutions_array($substitutionarray, $langs);
303 $texttoshow = make_substitutions(getDolGlobalString('MAIN_HOME'), $substitutionarray, $langs);
304
305 $main_home = dol_htmlcleanlastbr($texttoshow);
306 }
307
308 // Google AD
309 $main_google_ad_client = ((getDolGlobalString('MAIN_GOOGLE_AD_CLIENT') && getDolGlobalString('MAIN_GOOGLE_AD_SLOT')) ? 1 : 0);
310
311 // Set jquery theme
312 $dol_loginmesg = (!empty($_SESSION["dol_loginmesg"]) ? $_SESSION["dol_loginmesg"] : '');
313
314 $favicon = DOL_URL_ROOT.'/theme/dolibarr_256x256_color.png';
315 if (!empty($mysoc->logo_squarred_mini)) {
316 $favicon = DOL_URL_ROOT.'/viewimage.php?cache=1&modulepart=mycompany&file='.urlencode('logos/thumbs/'.$mysoc->logo_squarred_mini);
317 }
318 if (getDolGlobalString('MAIN_FAVICON_URL')) {
319 $favicon = getDolGlobalString('MAIN_FAVICON_URL');
320 }
321
322 $jquerytheme = 'base';
323 if (getDolGlobalString('MAIN_USE_JQUERY_THEME')) {
324 $jquerytheme = getDolGlobalString('MAIN_USE_JQUERY_THEME');
325 }
326
327 // Set dol_hide_topmenu, dol_hide_leftmenu, dol_optimize_smallscreen, dol_no_mouse_hover
328 $dol_hide_topmenu = GETPOSTINT('dol_hide_topmenu');
329 $dol_hide_leftmenu = GETPOSTINT('dol_hide_leftmenu');
330 $dol_optimize_smallscreen = GETPOSTINT('dol_optimize_smallscreen');
331 $dol_no_mouse_hover = GETPOSTINT('dol_no_mouse_hover');
332 $dol_use_jmobile = GETPOSTINT('dol_use_jmobile');
333
334 // Include login page template
335 include $template_dir.'login.tpl.php';
336
337 // Global html output events ($mesgs, $errors, $warnings)
339
340 $_SESSION["dol_loginmesg"] = '';
341 }
342}
343
352function makesalt($type = CRYPT_SALT_LENGTH)
353{
354 dol_syslog("makesalt type=".$type);
355 switch ($type) {
356 case 12: // 8 + 4
357 $saltlen = 8;
358 $saltprefix = '$1$';
359 $saltsuffix = '$';
360 break;
361 case 8: // 8 (For compatibility, do not use this)
362 $saltlen = 8;
363 $saltprefix = '$1$';
364 $saltsuffix = '$';
365 break;
366 case 2: // 2
367 default: // by default, fall back on Standard DES (should work everywhere)
368 $saltlen = 2;
369 $saltprefix = '';
370 $saltsuffix = '';
371 break;
372 }
373 $salt = '';
374 while (dol_strlen($salt) < $saltlen) {
375 $salt .= chr(mt_rand(64, 126));
376 }
377
378 $result = $saltprefix.$salt.$saltsuffix;
379 dol_syslog("makesalt return=".$result);
380 return $result;
381}
382
389function encodedecode_dbpassconf($level = 0)
390{
391 dol_syslog("encodedecode_dbpassconf level=".$level, LOG_DEBUG);
392 $config = '';
393 $passwd = '';
394 $passwd_crypted = '';
395
396 if ($fp = fopen(DOL_DOCUMENT_ROOT.'/conf/conf.php', 'r')) {
397 while (!feof($fp)) {
398 $buffer = fgets($fp, 4096);
399
400 $lineofpass = 0;
401
402 $reg = array();
403 $mode = '';
404 if (preg_match('/^[^#]*dolibarr_main_db_encrypted_pass[\s]*=[\s]*(.*)/i', $buffer, $reg)) { // Old way to save encrypted value
405 $val = trim($reg[1]); // This also remove CR/LF
406 $val = preg_replace('/^["\']/', '', $val);
407 $val = preg_replace('/["\'][\s;]*$/', '', $val);
408 if (!empty($val)) {
409 $passwd_crypted = $val;
410 // method dol_encode/dol_decode
411 $val = dol_decode($val);
412 //$val = dolEncrypt($val);
413 $passwd = $val;
414 $lineofpass = 1;
415 }
416 } elseif (preg_match('/^[^#]*dolibarr_main_db_pass[\s]*=[\s]*(.*)/i', $buffer, $reg)) {
417 $val = trim($reg[1]); // This also remove CR/LF
418 $val = preg_replace('/^["\']/', '', $val);
419 $val = preg_replace('/["\'][\s;]*$/', '', $val);
420 if (preg_match('/crypted:/i', $buffer)) {
421 // method dol_encode/dol_decode
422 $mode = 'crypted:';
423 $val = preg_replace('/crypted:/i', '', $val);
424 $passwd_crypted = $val;
425 $val = dol_decode($val);
426 $passwd = $val;
427 } elseif (preg_match('/^dolcrypt:([^:]+):(.*)$/i', $buffer, $reg)) {
428 // method dolEncrypt/dolDecrypt
429 $mode = 'dolcrypt:';
430 $val = preg_replace('/crypted:([^:]+):/i', '', $val);
431 $passwd_crypted = $val;
432 $val = dolDecrypt($buffer);
433 $passwd = $val;
434 } else {
435 $passwd = $val;
436 $mode = 'crypted:';
437 $val = dol_encode($val);
438 $passwd_crypted = $val;
439 // TODO replace with dolEncrypt()
440 // ...
441 }
442 $lineofpass = 1;
443 }
444
445 // Output line
446 if ($lineofpass) {
447 // Add value at end of file
448 if ($level == 0) {
449 $config .= '$dolibarr_main_db_pass=\''.$passwd.'\';'."\n";
450 }
451 if ($level == 1) {
452 $config .= '$dolibarr_main_db_pass=\''.$mode.$passwd_crypted.'\';'."\n";
453 }
454
455 //print 'passwd = '.$passwd.' - passwd_crypted = '.$passwd_crypted;
456 //exit;
457 } else {
458 $config .= $buffer;
459 }
460 }
461 fclose($fp);
462
463 // Write new conf file
464 $file = DOL_DOCUMENT_ROOT.'/conf/conf.php';
465 if ($fp = @fopen($file, 'w')) {
466 fwrite($fp, $config);
467 fflush($fp);
468 fclose($fp);
469 clearstatcache();
470
471 // It's config file, so we set read permission for creator only.
472 // Should set permission to web user and groups for users used by batch
473 //dolChmod($file, '0600');
474
475 return 1;
476 } else {
477 dol_syslog("encodedecode_dbpassconf Failed to open conf.php file for writing", LOG_WARNING);
478 return -1;
479 }
480 } else {
481 dol_syslog("encodedecode_dbpassconf Failed to read conf.php", LOG_ERR);
482 return -2;
483 }
484}
485
495function getRandomPassword($generic = false, $replaceambiguouschars = null, $length = 32)
496{
497 global $db, $conf, $langs, $user;
498
499 $generated_password = '';
500 if ($generic) {
501 $lowercase = "qwertyuiopasdfghjklzxcvbnm";
502 $uppercase = "ASDFGHJKLZXCVBNMQWERTYUIOP";
503 $numbers = "1234567890";
504 $randomCode = "";
505 $nbofchar = round($length / 3);
506 $nbofcharlast = ($length - 2 * $nbofchar);
507 //var_dump($nbofchar.'-'.$nbofcharlast);
508 if (function_exists('random_int')) { // Cryptographic random
509 $max = strlen($lowercase) - 1;
510 for ($x = 0; $x < $nbofchar; $x++) {
511 $tmp = random_int(0, $max);
512 $randomCode .= $lowercase[$tmp];
513 }
514 $max = strlen($uppercase) - 1;
515 for ($x = 0; $x < $nbofchar; $x++) {
516 $tmp = random_int(0, $max);
517 $randomCode .= $uppercase[$tmp];
518 }
519 $max = strlen($numbers) - 1;
520 for ($x = 0; $x < $nbofcharlast; $x++) {
521 $tmp = random_int(0, $max);
522 $randomCode .= $numbers[$tmp];
523 }
524
525 $generated_password = str_shuffle($randomCode);
526 } else {
527 // Old platform, non cryptographic random
528 $max = strlen($lowercase) - 1;
529 for ($x = 0; $x < $nbofchar; $x++) {
530 $tmp = mt_rand(0, $max);
531 $randomCode .= $lowercase[$tmp];
532 }
533 $max = strlen($uppercase) - 1;
534 for ($x = 0; $x < $nbofchar; $x++) {
535 $tmp = mt_rand(0, $max);
536 $randomCode .= $uppercase[$tmp];
537 }
538 $max = strlen($numbers) - 1;
539 for ($x = 0; $x < $nbofcharlast; $x++) {
540 $tmp = mt_rand(0, $max);
541 $randomCode .= $numbers[$tmp];
542 }
543
544 $generated_password = str_shuffle($randomCode);
545 }
546 } elseif (getDolGlobalString('USER_PASSWORD_GENERATED')) {
547 $nomclass = "modGeneratePass".ucfirst($conf->global->USER_PASSWORD_GENERATED);
548 $nomfichier = $nomclass.".class.php";
549 //print DOL_DOCUMENT_ROOT."/core/modules/security/generate/".$nomclass;
550 require_once DOL_DOCUMENT_ROOT."/core/modules/security/generate/".$nomfichier;
551 $genhandler = new $nomclass($db, $conf, $langs, $user);
552 '@phan-var-force ModeleGenPassword $genhandler';
553 $generated_password = $genhandler->getNewGeneratedPassword();
554 unset($genhandler);
555 }
556
557 // Do we have to discard some alphabetic characters ?
558 if (is_array($replaceambiguouschars) && count($replaceambiguouschars) > 0) {
559 $numbers = "ABCDEF";
560 $max = strlen($numbers) - 1;
561 if (function_exists('random_int')) { // Cryptographic random
562 $tmp = random_int(0, $max);
563 $generated_password = str_replace($replaceambiguouschars, $numbers[$tmp], $generated_password);
564 } else {
565 $tmp = mt_rand(0, $max);
566 $generated_password = str_replace($replaceambiguouschars, $numbers[$tmp], $generated_password);
567 }
568 }
569
570 return $generated_password;
571}
572
582function dolJSToSetRandomPassword($htmlname, $htmlnameofbutton = 'generate_token', $generic = 1)
583{
584 global $conf;
585
586 $out = '';
587
588 if (!empty($conf->use_javascript_ajax)) {
589 $out .= "\n".'<!-- Js code to suggest a security key -->';
590 $out .= '<script nonce="'.getNonce().'" type="text/javascript">';
591 $out .= 'jQuery(document).ready(function () {
592 jQuery("#'.dol_escape_js($htmlnameofbutton).'").click(function() {
593 var currenttoken = jQuery("meta[name=anti-csrf-currenttoken]").attr("content");
594 console.log("We click on the button '.dol_escape_js($htmlnameofbutton).' to suggest a key. anti-csrf-currenttoken is "+currenttoken+". We will fill '.dol_escape_js($htmlname).'");
595 jQuery.get( "'.DOL_URL_ROOT.'/core/ajax/security.php", {
596 action: \'getrandompassword\',
597 generic: '.($generic ? '1' : '0').',
598 token: currenttoken
599 },
600 function(result) {
601 if (jQuery("input#'.dol_escape_js($htmlname).'").attr("type") == "password") {
602 jQuery("input#'.dol_escape_js($htmlname).'").attr("type", "text");
603 }
604 jQuery("#'.dol_escape_js($htmlname).'").val(result);
605 });
606 });
607 });'."\n";
608 $out .= '</script>';
609 }
610
611 return $out;
612}
GETPOSTINT($paramname, $method=0)
Return the value of a $_GET or $_POST supervariable, converted into integer.
dol_osencode($str)
Return a string encoded into OS filesystem encoding.
isHTTPS()
Return if we are using a HTTPS connection Check HTTPS (no way to be modified by user but may be empty...
dol_strlen($string, $stringencoding='UTF-8')
Make a strlen call.
dol_escape_js($stringtoescape, $mode=0, $noescapebackslashn=0)
Returns text escaped for inclusion into javascript code.
dol_htmlcleanlastbr($stringtodecode)
This function remove all ending and br at end.
dol_htmloutput_events($disabledoutputofmessages=0)
Print formatted messages to output (Used to show messages on html output).
complete_substitutions_array(&$substitutionarray, $outputlangs, $object=null, $parameters=null, $callfunc="completesubstitutionarray")
Complete the $substitutionarray with more entries coming from external module that had set the "subst...
make_substitutions($text, $substitutionarray, $outputlangs=null, $converttextinhtmlifnecessary=0)
Make substitution into a text string, replacing keys with vals from $substitutionarray (oldval=>newva...
GETPOST($paramname, $check='alphanohtml', $method=0, $filter=null, $options=null, $noreplace=0)
Return value of a param into GET or POST supervariable.
dol_buildpath($path, $type=0, $returnemptyifnotfound=0)
Return path of url or filesystem.
getCommonSubstitutionArray($outputlangs, $onlykey=0, $exclude=null, $object=null, $include=null)
Return array of possible common substitutions.
getDolGlobalString($key, $default='')
Return a Dolibarr global constant string value.
dol_syslog($message, $level=LOG_INFO, $ident=0, $suffixinfilename='', $restricttologhandler='', $logcontext=null)
Write log message into outputs.
conf($dolibarr_main_document_root)
Load conf file (file must exists)
Definition inc.php:420
global $conf
The following vars must be defined: $type2label $form $conf, $lang, The following vars may also be de...
Definition member.php:79
$context
@method int call_trigger(string $triggerName, User $user)
Definition logout.php:42
dolJSToSetRandomPassword($htmlname, $htmlnameofbutton='generate_token', $generic=1)
Output javascript to autoset a generated password using default module into a HTML element.
dol_getwebuser($mode)
Return user/group account of web server.
encodedecode_dbpassconf($level=0)
Encode or decode database password in config file.
checkLoginPassEntity($usertotest, $passwordtotest, $entitytotest, $authmode, $context='')
Return a login if login/pass was successful.
getRandomPassword($generic=false, $replaceambiguouschars=null, $length=32)
Return a generated password using default module.
if(!function_exists( 'dol_loginfunction')) makesalt($type=CRYPT_SALT_LENGTH)
Initialise the salt for the crypt function.
dol_encode($chain, $key='1')
Encode a string with base 64 algorithm + specific delta change.
dol_decode($chain, $key='1')
Decode a base 64 encoded + specific delta change.
dolDecrypt($chain, $key='')
Decode a string with a symmetric encryption.