Cool-Shopping-Site/admin/server/server.php

101 lines
3 KiB
PHP
Raw Normal View History

2024-05-17 20:57:41 +00:00
<?php
session_start();
?>
<?php
// initializing variables
$name = "";
$username = "";
$usn = "";
$email = "";
$errors = array();
$reg_date = date("Y/m/d");
// connect to the database
$db = mysqli_connect('localhost', 'root', '', 'storedatabase');
// REGISTER USER
if (isset($_POST['reg_user'])) {
// receive all input values from the form
$username = mysqli_real_escape_string($db, $_POST['admin_name']);
$email = mysqli_real_escape_string($db, $_POST['admin_email']);
$password_1 = mysqli_real_escape_string($db, $_POST['password_1']);
$password_2 = mysqli_real_escape_string($db, $_POST['password_2']);
// form validation: ensure that the form is correctly filled ...
// by adding (array_push()) corresponding error unto $errors array
if (empty($username)) { array_push($errors, "Username is required"); }
if (empty($email)) { array_push($errors, "Email is required"); }
if (empty($password_1)) { array_push($errors, "Password is required"); }
if ($password_1 != $password_2) {
array_push($errors, "The passwords do not match");
}
// first check the database to make sure
// a user does not already exist with the same username and/or email
$user_check_query = "SELECT * FROM admin_info WHERE admin_name='$username' OR admin_email='$email' LIMIT 1";
$result = mysqli_query($db, $user_check_query);
$user = mysqli_fetch_assoc($result);
if ($user) { // if user exists
if ($user['admin_name'] === $username) {
array_push($errors, "Username already exists");
}
if ($user['admin_email'] === $email) {
array_push($errors, "email already exists");
}
}
// Finally, register user if there are no errors in the form
if (count($errors) == 0) {
$password = md5($password_1);//encrypt the password before saving in the database
$query = "INSERT INTO admin_info (admin_name, admin_email, admin_password)
VALUES('$username', '$email', '$password')";
mysqli_query($db, $query);
$_SESSION['admin_name'] = $username;
$_SESSION['admin_email'] = $email;
$_SESSION['success'] = "You are now logged in";
header('location: ./admin/');
}
}
if (isset($_POST['login_admin'])) {
$admin_username = mysqli_real_escape_string($db, $_POST['admin_username']);
$password = mysqli_real_escape_string($db, $_POST['password']);
if (empty($admin_username)) {
array_push($errors, "Username is required");
}
if (empty($password)) {
array_push($errors, "Password is required");
}
if (count($errors) == 0) {
$password = md5($password);
$query = "SELECT * FROM admin_info WHERE admin_email='$admin_username' AND admin_password='$password'";
$results = mysqli_query($db, $query);
if (mysqli_num_rows($results) == 1) {
$_SESSION['admin_email'] = $email;
$_SESSION['admin_name'] = $admin_username;
$_SESSION['success'] = "You are now logged in";
header('location: ./admin/');
}else {
array_push($errors, "Wrong username/password combination");
}
}
}
?>