6ea91aa28f7672b0ecdbdfe62a697725bd51c2cc
[mirrors/Kyberia-bloodline.git] / wwwroot / inc / eventz / send.inc
1 <?php
2 // [multimail buless send capatibility]
3 function send() {
4 global $db;
5 if (empty($_SESSION['user_id']) || empty($_SESSION['user_name'])) {
6 global $error;
7 $error="Ak sa toto stane a citas tuto spravu chod navstivit buglist....ak robis picoviny a vidis tuto spravu tak ti uz ani buglist nepomoze a chod sa odjebat hackere:-)";
8 return false;
9 }
10
11 $user_id=mysql_real_escape_string($_SESSION['user_id']);
12 $user_name=mysql_real_escape_string($_SESSION['user_name']);
13 $mail_name=mysql_real_escape_string($_POST['mail_to']);
14
15 if (!$mail_name) {
16 global $error;
17 $error="Posta sa len tak nikomu neposiela.Co takto zadat aspon adresata??hm??";
18 return false;}
19 $mail_to=explode(";",$mail_name);
20 $mail_text=$_POST['mail_text'];
21 $nohtml=$_POST['nohtml'];
22
23 if (count($mail_to)==1) {
24 $q="select user_id from users where login='".$mail_name."'";
25 $result=$db->query($q);
26 $result->next();
27 $to=$result->getRecord();
28 if (!$to['user_id']) {
29 global $error;
30 $error="Dana osobka ktorej by si chcel poslat spravicku si bud zmenila nick alebo robis preklepy.";
31 return false;
32 }
33 /* // fuck off toth
34 elseif ($user_id == 1859269 && $to['user_id'] == 2334) {
35 global $error;
36 $error = 'fuck you!';
37 return false;
38 } */
39 else {
40 $mail_to_id[]=$to['user_id'];
41 }
42 }
43
44 elseif (count($mail_to)>1) {
45 foreach ($mail_to as $mail_to_exploded) {
46 $q="select user_id from users where login='$mail_to_exploded'";
47 $result=$db->query($q);
48 $result->next();
49 $to=$result->getRecord();
50 if (!$to['user_id']) {
51 global $error;
52 $error="Pravdepodobne si osobka $mail_to_exploded zmenila nick alebo mas niekde preklep. Skus to opravit a potom try again:-]";
53 return false; }
54 /* // fuck off toth
55 elseif ($user_id == 1859269 && $to['user_id'] == 2334) {
56 global $error;
57 $error = 'fuck you!';
58 return false;
59 } */
60 else {$mail_to_id[]=$to['user_id'];}
61 }
62 }
63
64 if (empty($mail_text)) {
65 global $error;
66 $error="Prilis kratka sprava. Syr vesela krava, student prava a ci
67 dobra trava?";
68 return false;
69 }
70
71 if ($mail_to_id) {
72
73 $mail_text=mysql_real_escape_string(nodes::processContent($mail_text));
74 global $htmlparse;
75 if ($htmlparse) {
76 $error=$htmlparse;
77 return false;
78 }
79 foreach ($mail_to_id as $mail_to_id_send) {
80 $q="insert into mail set
81 mail_user='$user_id',mail_read='no',
82 mail_from='$user_id',mail_text='$mail_text',mail_to='$mail_to_id_send',mail_timestamp=NOW()";
83 $result=$db->query($q);
84 $duplicate_id=$db->getLastInsertId();
85 $q="insert into mail set mail_duplicate_id='$duplicate_id',
86 mail_read='no',mail_user='$mail_to_id_send',mail_from='$user_id',mail_text='$mail_text',
87 mail_to='$mail_to_id_send',mail_timestamp=NOW()";
88 $result=$db->query($q);
89 $db->query("update users set user_mail=user_mail+1,".
90 //"user_mail_name='$user_name',". //Not in DB yet!
91 "user_mail_id='".mysql_real_escape_string($_SESSION['user_id'])."' where user_id='$mail_to_id_send'");
92 }
93 return true;
94
95 }
96
97 else {
98 global $error;
99 $error="user $mail_to does not exist";
100 return false;
101 }
102 }
103
104
105 ?>
This page took 0.298302 seconds and 3 git commands to generate.