plugins/SpecialAdmin.php
changeset 15 ad5986a53197
parent 9 1e61232606d6
child 19 5d003b6c9e89
equal deleted inserted replaced
14:ce6053bb48d8 15:ad5986a53197
   114     if($cls == 'row2') $cls = 'row1';
   114     if($cls == 'row2') $cls = 'row1';
   115     else $cls = 'row2';
   115     else $cls = 'row2';
   116     echo '<tr><td class="'.$cls.'">';
   116     echo '<tr><td class="'.$cls.'">';
   117     switch($r['action']) {
   117     switch($r['action']) {
   118       case "admin_auth_good": echo 'Successful elevated authentication'; if ( !empty($r['page_text']) ) { $level = $session->userlevel_to_string( intval($r['page_text']) ); echo "<br /><small>Authentication level: $level</small>"; } break;
   118       case "admin_auth_good": echo 'Successful elevated authentication'; if ( !empty($r['page_text']) ) { $level = $session->userlevel_to_string( intval($r['page_text']) ); echo "<br /><small>Authentication level: $level</small>"; } break;
   119       case "admin_auth_bad":  echo 'Failed administration logon'; break;
   119       case "admin_auth_bad":  echo 'Failed elevated authentication'; if ( !empty($r['page_text']) ) { $level = $session->userlevel_to_string( intval($r['page_text']) ); echo "<br /><small>Attempted auth level: $level</small>"; } break;
   120       case "activ_good": echo 'Successful account activation'; break;
   120       case "activ_good": echo 'Successful account activation'; break;
   121       case "auth_good": echo 'Successful regular user logon'; break;
   121       case "auth_good": echo 'Successful regular user logon'; break;
   122       case "activ_bad": echo 'Failed account activation'; break;
   122       case "activ_bad": echo 'Failed account activation'; break;
   123       case "auth_bad": echo 'Failed regular user logon'; break;
   123       case "auth_bad": echo 'Failed regular user logon'; break;
   124       case "sql_inject": echo 'SQL injection attempt<div style="max-width: 90%; clip: rect(0px,auto,auto,0px); overflow: auto; display: block; font-size: smaller;">Offending query: ' . htmlspecialchars($r['page_text']) . '</div>'; break;
   124       case "sql_inject": echo 'SQL injection attempt<div style="max-width: 90%; clip: rect(0px,auto,auto,0px); overflow: auto; display: block; font-size: smaller;">Offending query: ' . htmlspecialchars($r['page_text']) . '</div>'; break;