|
|
@ -32,6 +32,7 @@ |
|
|
|
| | |
|
|
|
+-------------------------------------------------------------------------+ |
|
|
|
| Author: Thomas Bruederli <roundcube@gmail.com> | |
|
|
|
| Author: Aleksander Machniak <alec@alec.pl> | |
|
|
|
+-------------------------------------------------------------------------+ |
|
|
|
*/ |
|
|
|
|
|
|
@ -49,34 +50,36 @@ ob_start(); |
|
|
|
|
|
|
|
// check if config files had errors
|
|
|
|
if ($err_str = $RCMAIL->config->get_error()) { |
|
|
|
rcmail::raise_error(array( |
|
|
|
'code' => 601, |
|
|
|
'type' => 'php', |
|
|
|
'message' => $err_str), false, true); |
|
|
|
rcmail::raise_error(array( |
|
|
|
'code' => 601, |
|
|
|
'type' => 'php', |
|
|
|
'message' => $err_str), false, true); |
|
|
|
} |
|
|
|
|
|
|
|
// check DB connections and exit on failure
|
|
|
|
if ($err_str = $RCMAIL->db->is_error()) { |
|
|
|
rcmail::raise_error(array( |
|
|
|
'code' => 603, |
|
|
|
'type' => 'db', |
|
|
|
'message' => $err_str), FALSE, TRUE); |
|
|
|
rcmail::raise_error(array( |
|
|
|
'code' => 603, |
|
|
|
'type' => 'db', |
|
|
|
'message' => $err_str), FALSE, TRUE); |
|
|
|
} |
|
|
|
|
|
|
|
// error steps
|
|
|
|
if ($RCMAIL->action == 'error' && !empty($_GET['_code'])) { |
|
|
|
rcmail::raise_error(array('code' => hexdec($_GET['_code'])), FALSE, TRUE); |
|
|
|
rcmail::raise_error(array('code' => hexdec($_GET['_code'])), FALSE, TRUE); |
|
|
|
} |
|
|
|
|
|
|
|
// check if https is required (for login) and redirect if necessary
|
|
|
|
if (empty($_SESSION['user_id']) && ($force_https = $RCMAIL->config->get('force_https', false))) { |
|
|
|
$https_port = is_bool($force_https) ? 443 : $force_https; |
|
|
|
if (!rcube_utils::https_check($https_port)) { |
|
|
|
$host = preg_replace('/:[0-9]+$/', '', $_SERVER['HTTP_HOST']); |
|
|
|
$host .= ($https_port != 443 ? ':' . $https_port : ''); |
|
|
|
header('Location: https://' . $host . $_SERVER['REQUEST_URI']); |
|
|
|
exit; |
|
|
|
} |
|
|
|
$https_port = is_bool($force_https) ? 443 : $force_https; |
|
|
|
|
|
|
|
if (!rcube_utils::https_check($https_port)) { |
|
|
|
$host = preg_replace('/:[0-9]+$/', '', $_SERVER['HTTP_HOST']); |
|
|
|
$host .= ($https_port != 443 ? ':' . $https_port : ''); |
|
|
|
|
|
|
|
header('Location: https://' . $host . $_SERVER['REQUEST_URI']); |
|
|
|
exit; |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
// trigger startup plugin hook
|
|
|
@ -86,165 +89,176 @@ $RCMAIL->action = $startup['action']; |
|
|
|
|
|
|
|
// try to log in
|
|
|
|
if ($RCMAIL->task == 'login' && $RCMAIL->action == 'login') { |
|
|
|
$request_valid = $_SESSION['temp'] && $RCMAIL->check_request(rcube_utils::INPUT_POST, 'login'); |
|
|
|
|
|
|
|
// purge the session in case of new login when a session already exists
|
|
|
|
$RCMAIL->kill_session(); |
|
|
|
|
|
|
|
$auth = $RCMAIL->plugins->exec_hook('authenticate', array( |
|
|
|
'host' => $RCMAIL->autoselect_host(), |
|
|
|
'user' => trim(rcube_utils::get_input_value('_user', rcube_utils::INPUT_POST)), |
|
|
|
'pass' => rcube_utils::get_input_value('_pass', rcube_utils::INPUT_POST, true, |
|
|
|
$RCMAIL->config->get('password_charset', 'ISO-8859-1')), |
|
|
|
'cookiecheck' => true, |
|
|
|
'valid' => $request_valid, |
|
|
|
)); |
|
|
|
|
|
|
|
// Login
|
|
|
|
if ($auth['valid'] && !$auth['abort'] && |
|
|
|
$RCMAIL->login($auth['user'], $auth['pass'], $auth['host'], $auth['cookiecheck']) |
|
|
|
) { |
|
|
|
// create new session ID, don't destroy the current session
|
|
|
|
// it was destroyed already by $RCMAIL->kill_session() above
|
|
|
|
$RCMAIL->session->remove('temp'); |
|
|
|
$RCMAIL->session->regenerate_id(false); |
|
|
|
|
|
|
|
// send auth cookie if necessary
|
|
|
|
$RCMAIL->session->set_auth_cookie(); |
|
|
|
|
|
|
|
// log successful login
|
|
|
|
$RCMAIL->log_login(); |
|
|
|
|
|
|
|
// restore original request parameters
|
|
|
|
$query = array(); |
|
|
|
if ($url = rcube_utils::get_input_value('_url', rcube_utils::INPUT_POST)) { |
|
|
|
parse_str($url, $query); |
|
|
|
|
|
|
|
// prevent endless looping on login page
|
|
|
|
if ($query['_task'] == 'login') |
|
|
|
unset($query['_task']); |
|
|
|
|
|
|
|
// prevent redirect to compose with specified ID (#1488226)
|
|
|
|
if ($query['_action'] == 'compose' && !empty($query['_id'])) |
|
|
|
$query = array(); |
|
|
|
} |
|
|
|
$request_valid = $_SESSION['temp'] && $RCMAIL->check_request(rcube_utils::INPUT_POST, 'login'); |
|
|
|
|
|
|
|
// allow plugins to control the redirect url after login success
|
|
|
|
$redir = $RCMAIL->plugins->exec_hook('login_after', $query + array('_task' => 'mail')); |
|
|
|
unset($redir['abort'], $redir['_err']); |
|
|
|
// purge the session in case of new login when a session already exists
|
|
|
|
$RCMAIL->kill_session(); |
|
|
|
|
|
|
|
// send redirect
|
|
|
|
$OUTPUT->redirect($redir); |
|
|
|
} |
|
|
|
else { |
|
|
|
if (!$auth['valid']) { |
|
|
|
$error_code = RCMAIL::ERROR_INVALID_REQUEST; |
|
|
|
$auth = $RCMAIL->plugins->exec_hook('authenticate', array( |
|
|
|
'host' => $RCMAIL->autoselect_host(), |
|
|
|
'user' => trim(rcube_utils::get_input_value('_user', rcube_utils::INPUT_POST)), |
|
|
|
'pass' => rcube_utils::get_input_value('_pass', rcube_utils::INPUT_POST, true, |
|
|
|
$RCMAIL->config->get('password_charset', 'ISO-8859-1')), |
|
|
|
'cookiecheck' => true, |
|
|
|
'valid' => $request_valid, |
|
|
|
)); |
|
|
|
|
|
|
|
// Login
|
|
|
|
if ($auth['valid'] && !$auth['abort'] |
|
|
|
&& $RCMAIL->login($auth['user'], $auth['pass'], $auth['host'], $auth['cookiecheck']) |
|
|
|
) { |
|
|
|
// create new session ID, don't destroy the current session
|
|
|
|
// it was destroyed already by $RCMAIL->kill_session() above
|
|
|
|
$RCMAIL->session->remove('temp'); |
|
|
|
$RCMAIL->session->regenerate_id(false); |
|
|
|
|
|
|
|
// send auth cookie if necessary
|
|
|
|
$RCMAIL->session->set_auth_cookie(); |
|
|
|
|
|
|
|
// log successful login
|
|
|
|
$RCMAIL->log_login(); |
|
|
|
|
|
|
|
// restore original request parameters
|
|
|
|
$query = array(); |
|
|
|
if ($url = rcube_utils::get_input_value('_url', rcube_utils::INPUT_POST)) { |
|
|
|
parse_str($url, $query); |
|
|
|
|
|
|
|
// prevent endless looping on login page
|
|
|
|
if ($query['_task'] == 'login') { |
|
|
|
unset($query['_task']); |
|
|
|
} |
|
|
|
|
|
|
|
// prevent redirect to compose with specified ID (#1488226)
|
|
|
|
if ($query['_action'] == 'compose' && !empty($query['_id'])) { |
|
|
|
$query = array(); |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
// allow plugins to control the redirect url after login success
|
|
|
|
$redir = $RCMAIL->plugins->exec_hook('login_after', $query + array('_task' => 'mail')); |
|
|
|
unset($redir['abort'], $redir['_err']); |
|
|
|
|
|
|
|
// send redirect
|
|
|
|
$OUTPUT->redirect($redir); |
|
|
|
} |
|
|
|
else { |
|
|
|
$error_code = $auth['error'] ? $auth['error'] : $RCMAIL->login_error(); |
|
|
|
} |
|
|
|
if (!$auth['valid']) { |
|
|
|
$error_code = RCMAIL::ERROR_INVALID_REQUEST; |
|
|
|
} |
|
|
|
else { |
|
|
|
$error_code = $auth['error'] ? $auth['error'] : $RCMAIL->login_error(); |
|
|
|
} |
|
|
|
|
|
|
|
$error_labels = array( |
|
|
|
RCMAIL::ERROR_STORAGE => 'storageerror', |
|
|
|
RCMAIL::ERROR_COOKIES_DISABLED => 'cookiesdisabled', |
|
|
|
RCMAIL::ERROR_INVALID_REQUEST => 'invalidrequest', |
|
|
|
RCMAIL::ERROR_INVALID_HOST => 'invalidhost', |
|
|
|
); |
|
|
|
$error_labels = array( |
|
|
|
RCMAIL::ERROR_STORAGE => 'storageerror', |
|
|
|
RCMAIL::ERROR_COOKIES_DISABLED => 'cookiesdisabled', |
|
|
|
RCMAIL::ERROR_INVALID_REQUEST => 'invalidrequest', |
|
|
|
RCMAIL::ERROR_INVALID_HOST => 'invalidhost', |
|
|
|
); |
|
|
|
|
|
|
|
$error_message = $error_labels[$error_code] ? $error_labels[$error_code] : 'loginfailed'; |
|
|
|
$error_message = $error_labels[$error_code] ? $error_labels[$error_code] : 'loginfailed'; |
|
|
|
|
|
|
|
// log failed login
|
|
|
|
$RCMAIL->log_login($auth['user'], true, $error_code); |
|
|
|
$OUTPUT->show_message($error_message, 'warning'); |
|
|
|
|
|
|
|
$OUTPUT->show_message($error_message, 'warning'); |
|
|
|
$RCMAIL->plugins->exec_hook('login_failed', array( |
|
|
|
'code' => $error_code, 'host' => $auth['host'], 'user' => $auth['user'])); |
|
|
|
$RCMAIL->kill_session(); |
|
|
|
} |
|
|
|
// log failed login
|
|
|
|
$RCMAIL->log_login($auth['user'], true, $error_code); |
|
|
|
|
|
|
|
$RCMAIL->plugins->exec_hook('login_failed', array( |
|
|
|
'code' => $error_code, 'host' => $auth['host'], 'user' => $auth['user'])); |
|
|
|
|
|
|
|
$RCMAIL->kill_session(); |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
// end session (after optional referer check)
|
|
|
|
else if ($RCMAIL->task == 'logout' && isset($_SESSION['user_id']) && (!$RCMAIL->config->get('referer_check') || rcube_utils::check_referer())) { |
|
|
|
$userdata = array( |
|
|
|
'user' => $_SESSION['username'], |
|
|
|
'host' => $_SESSION['storage_host'], |
|
|
|
'lang' => $RCMAIL->user->language, |
|
|
|
); |
|
|
|
$OUTPUT->show_message('loggedout'); |
|
|
|
$RCMAIL->logout_actions(); |
|
|
|
$RCMAIL->kill_session(); |
|
|
|
$RCMAIL->plugins->exec_hook('logout_after', $userdata); |
|
|
|
else if ($RCMAIL->task == 'logout' && isset($_SESSION['user_id']) |
|
|
|
&& (!$RCMAIL->config->get('referer_check') || rcube_utils::check_referer()) |
|
|
|
) { |
|
|
|
$userdata = array( |
|
|
|
'user' => $_SESSION['username'], |
|
|
|
'host' => $_SESSION['storage_host'], |
|
|
|
'lang' => $RCMAIL->user->language, |
|
|
|
); |
|
|
|
|
|
|
|
$OUTPUT->show_message('loggedout'); |
|
|
|
|
|
|
|
$RCMAIL->logout_actions(); |
|
|
|
$RCMAIL->kill_session(); |
|
|
|
$RCMAIL->plugins->exec_hook('logout_after', $userdata); |
|
|
|
} |
|
|
|
|
|
|
|
// check session and auth cookie
|
|
|
|
else if ($RCMAIL->task != 'login' && $_SESSION['user_id'] && $RCMAIL->action != 'send') { |
|
|
|
if (!$RCMAIL->session->check_auth()) { |
|
|
|
$RCMAIL->kill_session(); |
|
|
|
$session_error = true; |
|
|
|
} |
|
|
|
if (!$RCMAIL->session->check_auth()) { |
|
|
|
$RCMAIL->kill_session(); |
|
|
|
$session_error = true; |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
// not logged in -> show login page
|
|
|
|
if (empty($RCMAIL->user->ID)) { |
|
|
|
// log session failures
|
|
|
|
$task = rcube_utils::get_input_value('_task', rcube_utils::INPUT_GPC); |
|
|
|
if ($task && !in_array($task, array('login','logout')) && !$session_error && ($sess_id = $_COOKIE[ini_get('session.name')])) { |
|
|
|
$RCMAIL->session->log("Aborted session " . $sess_id . "; no valid session data found"); |
|
|
|
$session_error = true; |
|
|
|
} |
|
|
|
|
|
|
|
// check if installer is still active
|
|
|
|
if ($RCMAIL->config->get('enable_installer') && is_readable('./installer/index.php')) { |
|
|
|
$OUTPUT->add_footer(html::div(array('style' => "background:#ef9398; border:2px solid #dc5757; padding:0.5em; margin:2em auto; width:50em"), |
|
|
|
html::tag('h2', array('style' => "margin-top:0.2em"), "Installer script is still accessible") . |
|
|
|
html::p(null, "The install script of your Roundcube installation is still stored in its default location!") . |
|
|
|
html::p(null, "Please <b>remove</b> the whole <tt>installer</tt> folder from the Roundcube directory because .
|
|
|
|
these files may expose sensitive configuration data like server passwords and encryption keys |
|
|
|
to the public. Make sure you cannot access the <a href=\"./installer/\">installer script</a> from your browser.") |
|
|
|
) |
|
|
|
); |
|
|
|
} |
|
|
|
// log session failures
|
|
|
|
$task = rcube_utils::get_input_value('_task', rcube_utils::INPUT_GPC); |
|
|
|
|
|
|
|
if ($task && !in_array($task, array('login','logout')) |
|
|
|
&& !$session_error && ($sess_id = $_COOKIE[ini_get('session.name')]) |
|
|
|
) { |
|
|
|
$RCMAIL->session->log("Aborted session $sess_id; no valid session data found"); |
|
|
|
$session_error = true; |
|
|
|
} |
|
|
|
|
|
|
|
// check if installer is still active
|
|
|
|
if ($RCMAIL->config->get('enable_installer') && is_readable('./installer/index.php')) { |
|
|
|
$OUTPUT->add_footer(html::div(array('style' => "background:#ef9398; border:2px solid #dc5757; padding:0.5em; margin:2em auto; width:50em"), |
|
|
|
html::tag('h2', array('style' => "margin-top:0.2em"), "Installer script is still accessible") . |
|
|
|
html::p(null, "The install script of your Roundcube installation is still stored in its default location!") . |
|
|
|
html::p(null, "Please <b>remove</b> the whole <tt>installer</tt> folder from the Roundcube directory because .
|
|
|
|
these files may expose sensitive configuration data like server passwords and encryption keys |
|
|
|
to the public. Make sure you cannot access the <a href=\"./installer/\">installer script</a> from your browser.") |
|
|
|
)); |
|
|
|
} |
|
|
|
|
|
|
|
if ($session_error || $_REQUEST['_err'] == 'session') { |
|
|
|
$OUTPUT->show_message('sessionerror', 'error', null, true, -1); |
|
|
|
} |
|
|
|
|
|
|
|
if ($session_error || $_REQUEST['_err'] == 'session') { |
|
|
|
$OUTPUT->show_message('sessionerror', 'error', null, true, -1); |
|
|
|
} |
|
|
|
if ($OUTPUT->ajax_call || !empty($_REQUEST['_framed'])) { |
|
|
|
$OUTPUT->command('session_error', $RCMAIL->url(array('_err' => 'session'))); |
|
|
|
$OUTPUT->send('iframe'); |
|
|
|
} |
|
|
|
|
|
|
|
if ($OUTPUT->ajax_call || !empty($_REQUEST['_framed'])) { |
|
|
|
$OUTPUT->command('session_error', $RCMAIL->url(array('_err' => 'session'))); |
|
|
|
$OUTPUT->send('iframe'); |
|
|
|
} |
|
|
|
$plugin = $RCMAIL->plugins->exec_hook('unauthenticated', array('task' => 'login', 'error' => $session_error)); |
|
|
|
|
|
|
|
$plugin = $RCMAIL->plugins->exec_hook('unauthenticated', array('task' => 'login', 'error' => $session_error)); |
|
|
|
$RCMAIL->set_task($plugin['task']); |
|
|
|
|
|
|
|
$RCMAIL->set_task($plugin['task']); |
|
|
|
$OUTPUT->send($plugin['task']); |
|
|
|
$OUTPUT->send($plugin['task']); |
|
|
|
} |
|
|
|
// CSRF prevention
|
|
|
|
else { |
|
|
|
// don't check for valid request tokens in these actions
|
|
|
|
$request_check_whitelist = array('login'=>1, 'spell'=>1, 'spell_html'=>1); |
|
|
|
|
|
|
|
if (!$request_check_whitelist[$RCMAIL->action]) { |
|
|
|
// check client X-header to verify request origin
|
|
|
|
if ($OUTPUT->ajax_call) { |
|
|
|
if (rcube_utils::request_header('X-Roundcube-Request') != $RCMAIL->get_request_token()) { |
|
|
|
header('HTTP/1.1 403 Forbidden'); |
|
|
|
die("Invalid Request"); |
|
|
|
} |
|
|
|
} |
|
|
|
// check request token in POST form submissions
|
|
|
|
else if (!empty($_POST) && !$RCMAIL->check_request()) { |
|
|
|
$OUTPUT->show_message('invalidrequest', 'error'); |
|
|
|
$OUTPUT->send($RCMAIL->task); |
|
|
|
// don't check for valid request tokens in these actions
|
|
|
|
$request_check_whitelist = array('login'=>1, 'spell'=>1, 'spell_html'=>1); |
|
|
|
|
|
|
|
if (!$request_check_whitelist[$RCMAIL->action]) { |
|
|
|
// check client X-header to verify request origin
|
|
|
|
if ($OUTPUT->ajax_call) { |
|
|
|
if (rcube_utils::request_header('X-Roundcube-Request') != $RCMAIL->get_request_token()) { |
|
|
|
header('HTTP/1.1 403 Forbidden'); |
|
|
|
die("Invalid Request"); |
|
|
|
} |
|
|
|
} |
|
|
|
// check request token in POST form submissions
|
|
|
|
else if (!empty($_POST) && !$RCMAIL->check_request()) { |
|
|
|
$OUTPUT->show_message('invalidrequest', 'error'); |
|
|
|
$OUTPUT->send($RCMAIL->task); |
|
|
|
} |
|
|
|
|
|
|
|
// check referer if configured
|
|
|
|
if ($RCMAIL->config->get('referer_check') && !rcube_utils::check_referer()) { |
|
|
|
raise_error(array( |
|
|
|
'code' => 403, 'type' => 'php', |
|
|
|
'message' => "Referer check failed"), true, true); |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
// check referer if configured
|
|
|
|
if ($RCMAIL->config->get('referer_check') && !rcube_utils::check_referer()) { |
|
|
|
raise_error(array( |
|
|
|
'code' => 403, 'type' => 'php', |
|
|
|
'message' => "Referer check failed"), true, true); |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
// we're ready, user is authenticated and the request is safe
|
|
|
@ -254,58 +268,57 @@ $RCMAIL->action = $plugin['action']; |
|
|
|
|
|
|
|
// handle special actions
|
|
|
|
if ($RCMAIL->action == 'keep-alive') { |
|
|
|
$OUTPUT->reset(); |
|
|
|
$RCMAIL->plugins->exec_hook('keep_alive', array()); |
|
|
|
$OUTPUT->send(); |
|
|
|
$OUTPUT->reset(); |
|
|
|
$RCMAIL->plugins->exec_hook('keep_alive', array()); |
|
|
|
$OUTPUT->send(); |
|
|
|
} |
|
|
|
else if ($RCMAIL->action == 'save-pref') { |
|
|
|
include INSTALL_PATH . 'program/steps/utils/save_pref.inc'; |
|
|
|
include INSTALL_PATH . 'program/steps/utils/save_pref.inc'; |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
// include task specific functions
|
|
|
|
if (is_file($incfile = INSTALL_PATH . 'program/steps/'.$RCMAIL->task.'/func.inc')) |
|
|
|
include_once $incfile; |
|
|
|
if (is_file($incfile = INSTALL_PATH . 'program/steps/'.$RCMAIL->task.'/func.inc')) { |
|
|
|
include_once $incfile; |
|
|
|
} |
|
|
|
|
|
|
|
// allow 5 "redirects" to another action
|
|
|
|
$redirects = 0; $incstep = null; |
|
|
|
while ($redirects < 5) { |
|
|
|
// execute a plugin action
|
|
|
|
if ($RCMAIL->plugins->is_plugin_task($RCMAIL->task)) { |
|
|
|
if (!$RCMAIL->action) $RCMAIL->action = 'index'; |
|
|
|
$RCMAIL->plugins->exec_action($RCMAIL->task.'.'.$RCMAIL->action); |
|
|
|
break; |
|
|
|
} |
|
|
|
else if (preg_match('/^plugin\./', $RCMAIL->action)) { |
|
|
|
$RCMAIL->plugins->exec_action($RCMAIL->action); |
|
|
|
break; |
|
|
|
} |
|
|
|
// try to include the step file
|
|
|
|
else if (($stepfile = $RCMAIL->get_action_file()) |
|
|
|
&& is_file($incfile = INSTALL_PATH . 'program/steps/'.$RCMAIL->task.'/'.$stepfile) |
|
|
|
) { |
|
|
|
// include action file only once (in case it don't exit)
|
|
|
|
include_once $incfile; |
|
|
|
$redirects++; |
|
|
|
} |
|
|
|
else { |
|
|
|
break; |
|
|
|
} |
|
|
|
// execute a plugin action
|
|
|
|
if ($RCMAIL->plugins->is_plugin_task($RCMAIL->task)) { |
|
|
|
if (!$RCMAIL->action) $RCMAIL->action = 'index'; |
|
|
|
$RCMAIL->plugins->exec_action($RCMAIL->task.'.'.$RCMAIL->action); |
|
|
|
break; |
|
|
|
} |
|
|
|
else if (preg_match('/^plugin\./', $RCMAIL->action)) { |
|
|
|
$RCMAIL->plugins->exec_action($RCMAIL->action); |
|
|
|
break; |
|
|
|
} |
|
|
|
// try to include the step file
|
|
|
|
else if (($stepfile = $RCMAIL->get_action_file()) |
|
|
|
&& is_file($incfile = INSTALL_PATH . 'program/steps/'.$RCMAIL->task.'/'.$stepfile) |
|
|
|
) { |
|
|
|
// include action file only once (in case it don't exit)
|
|
|
|
include_once $incfile; |
|
|
|
$redirects++; |
|
|
|
} |
|
|
|
else { |
|
|
|
break; |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
if ($RCMAIL->action == 'refresh') { |
|
|
|
$RCMAIL->plugins->exec_hook('refresh', array('last' => intval(rcube_utils::get_input_value('_last', rcube_utils::INPUT_GPC)))); |
|
|
|
$RCMAIL->plugins->exec_hook('refresh', array('last' => intval(rcube_utils::get_input_value('_last', rcube_utils::INPUT_GPC)))); |
|
|
|
} |
|
|
|
|
|
|
|
// parse main template (default)
|
|
|
|
$OUTPUT->send($RCMAIL->task); |
|
|
|
|
|
|
|
|
|
|
|
// if we arrive here, something went wrong
|
|
|
|
rcmail::raise_error(array( |
|
|
|
'code' => 404, |
|
|
|
'type' => 'php', |
|
|
|
'line' => __LINE__, |
|
|
|
'file' => __FILE__, |
|
|
|
'message' => "Invalid request"), true, true); |
|
|
|
|
|
|
|
'code' => 404, |
|
|
|
'type' => 'php', |
|
|
|
'line' => __LINE__, |
|
|
|
'file' => __FILE__, |
|
|
|
'message' => "Invalid request"), true, true); |