Kyberia v2.3 - 1st revision from SVN (Without patches of kyberia.sk team)
[mirrors/Kyberia-bloodline.git] / inc / eventz / send.inc
1 <?php
2 // [multimail buless send capatibility]
3 function send() {
4 global $db;
5 if (empty($_SESSION['user_id']) || empty($_SESSION['user_name'])) {
6 global $error;
7 $error="Ak sa toto stane a citas tuto spravu chod navstivit buglist....ak robis picoviny a vidis tuto spravu tak ti uz ani buglist nepomoze a chod sa odjebat hackere:-)";
8 return false;
9 }
10
11 $user_id=mysql_real_escape_string($_SESSION['user_id']);
12 $user_name=mysql_real_escape_string($_SESSION['user_name']);
13 $mail_name=mysql_real_escape_string($_POST['mail_to']);
14
15 if (!$mail_name) {
16 global $error;
17 $error="Posta sa len tak nikomu neposiela.Co takto zadat aspon adresata??hm??";
18 return false;}
19 $mail_to=explode(";",$mail_name);
20 $mail_text=$_POST['mail_text'];
21 $nohtml=$_POST['nohtml'];
22
23 if (count($mail_to)==1) {
24 $q="select user_id from users where login='".$mail_name."'";
25 $result=$db->query($q);
26 $result->next();
27 $to=$result->getRecord();
28 if (!$to['user_id']) {
29 global $error;
30 $error="Dana osobka ktorej by si chcel poslat spravicku si bud zmenila nick alebo robis preklepy.";
31 return false;
32 }
33 // fuck off toth
34 elseif ($user_id == 1859269 && $to['user_id'] == 2334) {
35 global $error;
36 $error = 'fuck you!';
37 return false;
38 }
39 else {
40 $mail_to_id[]=$to['user_id'];
41 }
42 }
43
44 elseif (count($mail_to)>1) {
45 foreach ($mail_to as $mail_to_exploded) {
46 $q="select user_id from users where login='$mail_to_exploded'";
47 $result=$db->query($q);
48 $result->next();
49 $to=$result->getRecord();
50 if (!$to['user_id']) {
51 global $error;
52 $error="Pravdepodobne si osobka $mail_to_exploded zmenila nick alebo mas niekde preklep. Skus to opravit a potom try again:-]";
53 return false; }
54 // fuck off toth
55 elseif ($user_id == 1859269 && $to['user_id'] == 2334) {
56 global $error;
57 $error = 'fuck you!';
58 return false;
59 }
60 else {$mail_to_id[]=$to['user_id'];}
61 }
62 }
63
64 if (empty($mail_text)) {
65 global $error;
66 $error="Prilis kratka sprava. Syr vesela krava, student prava a ci
67 dobra trava?";
68 return false;
69 }
70
71 if ($mail_to_id) {
72
73 $mail_text=nodes::processContent($mail_text);
74 global $htmlparse;
75 if ($htmlparse) {
76 $error=$htmlparse;
77 return false;
78 }
79 foreach ($mail_to_id as $mail_to_id_send) {
80 $q="insert into mail set
81 mail_user='$user_id',mail_read='no',
82 mail_from='$user_id',mail_text='$mail_text',mail_to='$mail_to_id_send',mail_timestamp=NOW()";
83 $result=$db->query($q);
84 $duplicate_id=$db->getLastInsertId();
85 $q="insert into mail set mail_duplicate_id='$duplicate_id',
86 mail_read='no',mail_user='$mail_to_id_send',mail_from='$user_id',mail_text='$mail_text',
87 mail_to='$mail_to_id_send',mail_timestamp=NOW()";
88 $result=$db->query($q);
89 $db->query("update users set user_mail=user_mail+1,
90 user_mail_name='$user_name', user_mail_id = '".mysql_real_escape_string($_SESSION['user_id'])."' where user_id='$mail_to_id_send'");
91 }
92 return true;
93
94 }
95
96 else {
97 global $error;
98 $error="user $mail_to does not exist";
99 return false;
100 }
101 }
102
103
104 ?>
This page took 0.308842 seconds and 4 git commands to generate.