当前位置: 首页>>代码示例>>PHP>>正文


PHP Logout函数代码示例

本文整理汇总了PHP中Logout函数的典型用法代码示例。如果您正苦于以下问题:PHP Logout函数的具体用法?PHP Logout怎么用?PHP Logout使用的例子?那么, 这里精选的函数代码示例或许可以为您提供帮助。


在下文中一共展示了Logout函数的13个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的PHP代码示例。

示例1: Error

function Error($text)
{
    global $GlobalUser;
    if (!$GlobalUser) {
        $GlobalUser = array();
        $GlobalUser['player_id'] = 0;
    }
    $text = str_replace('\\"', """, $text);
    $text = str_replace('\'', "’", $text);
    $text = str_replace('\\`', "‘", $text);
    $now = time();
    $error = array(null, $GlobalUser['player_id'], $_SERVER['REMOTE_ADDR'], $_SERVER['HTTP_USER_AGENT'], $_SERVER['REQUEST_URI'], $text, $now);
    $id = AddDBRow($error, 'errors');
    Logout($_GET['session']);
    // Завершить сессию.
    ob_clean();
    // Отменить предыдущий HTML.
    PageHeader("error", true, false);
    echo "<center><font size=\"3\"><b>\n";
    echo "<br /><br />\n";
    echo "<font color=\"#FF0000\">Произошла ошибка</font> - {$text}\n";
    echo "<br /><br />\n";
    echo BackTrace() . "<br /><br />\n";
    echo "Аварийное завершение программы.<br/><br/>Обратитесь в Службу поддержки или на форум, в раздел \"Ошибки\".\n";
    echo "<br /><br />\n";
    echo "Error-ID: {$id}</b></font></center>\n";
    //PageFooter ();
    ob_end_flush();
    exit;
}
开发者ID:Ansty93,项目名称:ogame-opensource,代码行数:30,代码来源:debug.php

示例2: FacebookLogin

function FacebookLogin($url)
{
    Logout();
    global $facebook;
    try {
        // Proceed knowing you have a logged in user who's authenticated.
        $user_profile = $facebook->api('/me');
        $facebookId = $user_profile['id'];
    } catch (FacebookApiException $e) {
        error_log($e);
        $user = null;
    }
    $loginInfo = DBFacebookUserLogin($facebookId);
    if ($loginInfo['ErrorCode'] == 0) {
        $_SESSION['UserID'] = $loginInfo['UserID'];
        $_SESSION['Email'] = $loginInfo['Email'];
        $_SESSION['UserName'] = $loginInfo['UserName'];
        $_SESSION['UserLevel'] = $loginInfo['UserLevel'];
        $_SESSION['IsFacebookUser'] = 1;
        $result['ResultCode'] = 0;
        $result['ResultMessage'] = 'Login Successful';
        header('Location: ' . $url);
    } else {
        $result['ResultCode'] = $loginInfo['ErrorCode'];
        $result['ResultMessage'] = $loginInfo['ErrorMessage'];
        FacebookSignUp($url);
    }
    //header('Location: ../#!/');
}
开发者ID:byunghoon,项目名称:uwksa-web,代码行数:29,代码来源:user.php

示例3: Login

 function Login($username, $password)
 {
     $this->ulogin->Authenticate($username, $password);
     if ($this->ulogin->IsAuthSuccess()) {
         $user = $this->userDataAccessor->GetUserById($username);
         if ($user->userName == $username) {
             $_SESSION['HR'] = $user->isHR;
         } else {
             Logout();
             return false;
         }
         $_SESSION['uid'] = $this->ulogin->Uid();
         $_SESSION['loggedIn'] = true;
         return true;
     } else {
         return false;
     }
 }
开发者ID:paul-hudlow,项目名称:ksu-6623-project,代码行数:18,代码来源:LoginModule.php

示例4: switch

}
switch ($action) {
    case 'login':
        if ($zbp->user->ID > 0 && GetVars('redirect', 'GET')) {
            Redirect(GetVars('redirect', 'GET'));
        }
        if ($zbp->CheckRights('admin')) {
            Redirect('cmd.php?act=admin');
        }
        if ($zbp->user->ID == 0 && GetVars('redirect', 'GET')) {
            setcookie("redirect", GetVars('redirect', 'GET'), 0, $zbp->cookiespath);
        }
        Redirect('login.php');
        break;
    case 'logout':
        Logout();
        Redirect('../');
        break;
    case 'admin':
        Redirect('admin/?act=admin');
        break;
    case 'verify':
        if (VerifyLogin()) {
            if ($zbp->user->ID > 0 && GetVars('redirect', 'COOKIE')) {
                Redirect(GetVars('redirect', 'COOKIE'));
            }
            Redirect('admin/?act=admin');
        } else {
            Redirect('../');
        }
        break;
开发者ID:jdjjdkdkdm,项目名称:zblogphp,代码行数:31,代码来源:cmd.php

示例5: GetPlanet

<?php

// Выход
$aktplanet = GetPlanet($GlobalUser['aktplanet']);
UpdatePlanetActivity($aktplanet['planet_id']);
UpdateLastClick($GlobalUser['player_id']);
Logout($_GET['session']);
?>

<html>
 <head>
 <meta http-equiv="content-type" content="text/html; charset=UTF-8" />
 <link rel="stylesheet" type="text/css" href="<?php 
echo hostname();
?>
evolution/formate.css" />
  <meta http-equiv="refresh" content="3;URL=index.php" />
  <title>Logout</title>

</head>

<body topmargin='0' leftmargin='0' marginwidth='0' marginheight='0' >
<center>
До скорого!!<br />
<p>
             </p>
</center>
</body>
</html>
开发者ID:Ansty93,项目名称:ogame-opensource,代码行数:29,代码来源:logout.php

示例6: is_not_banned


//.........这里部分代码省略.........
                        }
                    }
                }
            }
            $smcFunc['db_free_result']($request);
        }
        // Mark the cannot_access and cannot_post bans as being 'hit'.
        if (isset($_SESSION['ban']['cannot_access']) || isset($_SESSION['ban']['cannot_post']) || isset($_SESSION['ban']['cannot_login'])) {
            log_ban(array_merge(isset($_SESSION['ban']['cannot_access']) ? $_SESSION['ban']['cannot_access']['ids'] : array(), isset($_SESSION['ban']['cannot_post']) ? $_SESSION['ban']['cannot_post']['ids'] : array(), isset($_SESSION['ban']['cannot_login']) ? $_SESSION['ban']['cannot_login']['ids'] : array()));
        }
        // If for whatever reason the is_activated flag seems wrong, do a little work to clear it up.
        if ($user_info['id'] && ($user_settings['is_activated'] >= 10 && !$flag_is_activated || $user_settings['is_activated'] < 10 && $flag_is_activated)) {
            require_once $sourcedir . '/ManageBans.php';
            updateBanMembers();
        }
    }
    // Hey, I know you! You're ehm...
    if (!isset($_SESSION['ban']['cannot_access']) && !empty($_COOKIE[$cookiename . '_'])) {
        $bans = explode(',', $_COOKIE[$cookiename . '_']);
        foreach ($bans as $key => $value) {
            $bans[$key] = (int) $value;
        }
        $request = $smcFunc['db_query']('', '
			SELECT bi.id_ban, bg.reason
			FROM {db_prefix}ban_items AS bi
				INNER JOIN {db_prefix}ban_groups AS bg ON (bg.id_ban_group = bi.id_ban_group)
			WHERE bi.id_ban IN ({array_int:ban_list})
				AND (bg.expire_time IS NULL OR bg.expire_time > {int:current_time})
				AND bg.cannot_access = {int:cannot_access}
			LIMIT ' . count($bans), array('cannot_access' => 1, 'ban_list' => $bans, 'current_time' => time()));
        while ($row = $smcFunc['db_fetch_assoc']($request)) {
            $_SESSION['ban']['cannot_access']['ids'][] = $row['id_ban'];
            $_SESSION['ban']['cannot_access']['reason'] = $row['reason'];
        }
        $smcFunc['db_free_result']($request);
        // My mistake. Next time better.
        if (!isset($_SESSION['ban']['cannot_access'])) {
            require_once $sourcedir . '/Subs-Auth.php';
            $cookie_url = url_parts(!empty($modSettings['localCookies']), !empty($modSettings['globalCookies']));
            setcookie($cookiename . '_', '', time() - 3600, $cookie_url[1], $cookie_url[0], 0);
        }
    }
    // If you're fully banned, it's end of the story for you.
    if (isset($_SESSION['ban']['cannot_access'])) {
        // We don't wanna see you!
        if (!$user_info['is_guest']) {
            $smcFunc['db_query']('', '
				DELETE FROM {db_prefix}log_online
				WHERE id_member = {int:current_member}', array('current_member' => $user_info['id']));
        }
        // 'Log' the user out.  Can't have any funny business... (save the name!)
        $old_name = isset($user_info['name']) && $user_info['name'] != '' ? $user_info['name'] : $txt['guest_title'];
        $user_info['name'] = '';
        $user_info['username'] = '';
        $user_info['is_guest'] = true;
        $user_info['is_admin'] = false;
        $user_info['permissions'] = array();
        $user_info['id'] = 0;
        $context['user'] = array('id' => 0, 'username' => '', 'name' => $txt['guest_title'], 'is_guest' => true, 'is_logged' => false, 'is_admin' => false, 'is_mod' => false, 'can_mod' => false, 'language' => $user_info['language']);
        // A goodbye present.
        require_once $sourcedir . '/Subs-Auth.php';
        $cookie_url = url_parts(!empty($modSettings['localCookies']), !empty($modSettings['globalCookies']));
        setcookie($cookiename . '_', implode(',', $_SESSION['ban']['cannot_access']['ids']), time() + 3153600, $cookie_url[1], $cookie_url[0], 0);
        // Don't scare anyone, now.
        $_GET['action'] = '';
        $_GET['board'] = '';
        $_GET['topic'] = '';
        writeLog(true);
        // You banned, sucka!
        fatal_error(sprintf($txt['your_ban'], $old_name) . (empty($_SESSION['ban']['cannot_access']['reason']) ? '' : '<br />' . $_SESSION['ban']['cannot_access']['reason']) . '<br />' . (!empty($_SESSION['ban']['expire_time']) ? sprintf($txt['your_ban_expires'], timeformat($_SESSION['ban']['expire_time'], false)) : $txt['your_ban_expires_never']), 'user');
        // If we get here, something's gone wrong.... but let's try anyway.
        trigger_error('Hacking attempt...', E_USER_ERROR);
    } elseif (isset($_SESSION['ban']['cannot_login']) && !$user_info['is_guest']) {
        // We don't wanna see you!
        $smcFunc['db_query']('', '
			DELETE FROM {db_prefix}log_online
			WHERE id_member = {int:current_member}', array('current_member' => $user_info['id']));
        // 'Log' the user out.  Can't have any funny business... (save the name!)
        $old_name = isset($user_info['name']) && $user_info['name'] != '' ? $user_info['name'] : $txt['guest_title'];
        $user_info['name'] = '';
        $user_info['username'] = '';
        $user_info['is_guest'] = true;
        $user_info['is_admin'] = false;
        $user_info['permissions'] = array();
        $user_info['id'] = 0;
        $context['user'] = array('id' => 0, 'username' => '', 'name' => $txt['guest_title'], 'is_guest' => true, 'is_logged' => false, 'is_admin' => false, 'is_mod' => false, 'can_mod' => false, 'language' => $user_info['language']);
        // SMF's Wipe 'n Clean(r) erases all traces.
        $_GET['action'] = '';
        $_GET['board'] = '';
        $_GET['topic'] = '';
        writeLog(true);
        require_once $sourcedir . '/LogInOut.php';
        Logout(true, false);
        fatal_error(sprintf($txt['your_ban'], $old_name) . (empty($_SESSION['ban']['cannot_login']['reason']) ? '' : '<br />' . $_SESSION['ban']['cannot_login']['reason']) . '<br />' . (!empty($_SESSION['ban']['expire_time']) ? sprintf($txt['your_ban_expires'], timeformat($_SESSION['ban']['expire_time'], false)) : $txt['your_ban_expires_never']) . '<br />' . $txt['ban_continue_browse'], 'user');
    }
    // Fix up the banning permissions.
    if (isset($user_info['permissions'])) {
        banPermissions();
    }
}
开发者ID:abdulhadikaryana,项目名称:kebudayaan,代码行数:101,代码来源:Security.php

示例7: Pad_Logout

function Pad_Logout()
{
    Logout();
    Redirect('?mod=pad');
    die;
}
开发者ID:zblogcn,项目名称:zblogphp,代码行数:6,代码来源:include.php

示例8: loca

             if (strlen($_POST['newpass1']) < 8) {
                 $OptionsError = loca("OPTIONS_ERR_PASS_8");
             } else {
                 if ($GlobalUser['password'] !== md5($_POST['db_password'] . $db_secret)) {
                     $OptionsError = loca("OPTIONS_ERR_OLDPASS");
                 }
             }
         }
     }
     if ($OptionsError === "") {
         $md5 = md5($_POST['newpass1'] . $db_secret);
         $query = "UPDATE " . $db_prefix . "users SET password = '" . $md5 . "' WHERE player_id = " . intval($GlobalUser['player_id']);
         dbquery($query);
         $OptionsError = loca("OPTIONS_MSG_PASS");
         // TODO: OPTIONS_MSG_UNSAFE, OPTIONS_MSG_SIMPLE
         Logout($GlobalUser['session']);
     }
 } else {
     if ($_POST['db_email'] !== $GlobalUser['pemail'] && $_POST['db_email'] !== "") {
         // Сменить адрес
         $email = $_POST['db_email'];
         if ($GlobalUser['password'] !== md5($_POST['db_password'] . $db_secret)) {
             $OptionsError = loca("OPTIONS_ERR_NEEDPASS");
         } else {
             if (!isValidEmail($email)) {
                 $OptionsError = loca("OPTIONS_ERR_EMAIL");
             } else {
                 if (IsEmailExist($email)) {
                     $OptionsError = loca("OPTIONS_ERR_EMAILUSED");
                 }
             }
开发者ID:vksavochkin,项目名称:ogame-opensource,代码行数:31,代码来源:options.php

示例9: Logout

    } else {
        return "";
    }
}
function Logout()
{
    // destroy the session
    session_destroy();
    return "Cierre De Sesion Existoso";
}
$possible_url = array("session", "login", "logout");
$value = "An error has occurred";
if (isset($_GET["action"]) && in_array($_GET["action"], $possible_url)) {
    switch ($_GET["action"]) {
        case "session":
            $value = session();
            break;
        case "logout":
            $value = Logout();
            break;
        case "login":
            if (isset($_GET["id"])) {
                $value = DoLogin($_GET["id"]);
            } else {
                $value = "Missing argument";
            }
            break;
    }
}
//return JSON array
exit(json_encode($value));
开发者ID:josuesilva24,项目名称:MyGymPatner,代码行数:31,代码来源:api.php

示例10: Change_PWUN_response

function Change_PWUN_response($PWUN, $msg)
{
    //**********************************
    //Update $USERNAME or $HASHWORD. Default $page = changepw or changeun
    global $_, $ONESCRIPT, $USERNAME, $HASHWORD, $EX, $message, $page, $ONESCRIPT_file, $ONESCRIPT_file_backup, $CONFIG_FILE, $CONFIG_FILE_backup, $VALID_CONFIG_FILE;
    // trim white-space from input values
    $current_pass = trim($_POST['password']);
    $new_pwun = trim($_POST['new1']);
    $confirm_pwun = trim($_POST['new2']);
    $error_msg = $EX . '<b>' . hsc($msg) . '</b> ';
    //If all fields are blank, do nothing.
    if ($current_pass == "" && $new_pwun == "" && $confirm_pwun == "") {
        return;
    } elseif ($current_pass == "" || $new_pwun == "" || $confirm_pwun == "") {
        $message .= $error_msg . hsc($_['change_pw_07']) . '<br>';
    } elseif ($new_pwun != $confirm_pwun) {
        $message .= $error_msg . hsc($_['change_pw_04']) . '<br>';
    } elseif (hashit($current_pass) != $HASHWORD) {
        $message .= $error_msg . '<br>' . hsc($_['change_pw_03']) . '<br>';
        Logout();
    } else {
        if ($PWUN == "pw") {
            $search_for = '$HASHWORD ';
            //include space after $HASHWORD
            $replace_with = '$HASHWORD = "' . hashit($new_pwun) . '";';
            $success_msg = '<b>' . hsc($_['change_pw_01']) . '</b>';
        } else {
            //$PWUN = "un"
            $search_for = '$USERNAME ';
            //include space after $USERNAME
            $replace_with = '$USERNAME = "' . $new_pwun . '";';
            $success_msg = '<b>' . hsc($_['change_un_01']) . '</b>';
        }
        //If specified & it exists, update external config file.
        if ($VALID_CONFIG_FILE) {
            $message .= $_['change_pw_05'] . ' ' . $_['change_pw_06'] . '. . . ';
            $updated = Update_config($search_for, $replace_with, $CONFIG_FILE, $CONFIG_FILE_backup);
        } else {
            //Update OneFileCMS
            $message .= $_['change_pw_05'] . ' OneFileCMS . . . ';
            $updated = Update_config($search_for, $replace_with, $ONESCRIPT_file, $ONESCRIPT_file_backup);
        }
        if ($updated === false) {
            $message .= $error_msg . '<br>';
        } else {
            $message .= $success_msg . '<br>';
        }
        $page = "admin";
        //Return to Admin page.
    }
}
开发者ID:arribanz,项目名称:live,代码行数:51,代码来源:ofc.php

示例11: TestIfIsToReject

 private function TestIfIsToReject($Status)
 {
     if ($Status == 'Rejected ' or $Status == 'Banned') {
         //LogStr("Force Logout GAMEOVER", "Login");
         Logout();
         die(" You can't use this site anymore");
     }
 }
开发者ID:gpuenteallott,项目名称:rox,代码行数:8,代码来源:searchmembers.model.php

示例12: is_not_banned


//.........这里部分代码省略.........
            $ban_query[] = "('" . addslashes($user_info['email']) . "' LIKE bi.email_address)";
        }
        // How about this user?
        if (!$user_info['is_guest'] && !empty($ID_MEMBER)) {
            $ban_query[] = "bi.ID_MEMBER = {$ID_MEMBER}";
        }
        // Check the ban, if there's information.
        if (!empty($ban_query)) {
            $restrictions = array('cannot_access', 'cannot_login', 'cannot_post', 'cannot_register');
            $request = db_query("\n\t\t\t\tSELECT bi.ID_BAN, bi.email_address, bi.ID_MEMBER, bg.cannot_access, bg.cannot_register,\n\t\t\t\t\tbg.cannot_post, bg.cannot_login, bg.reason\n\t\t\t\tFROM ({$db_prefix}ban_groups AS bg, {$db_prefix}ban_items AS bi)\n\t\t\t\tWHERE bg.ID_BAN_GROUP = bi.ID_BAN_GROUP\n\t\t\t\t\tAND (bg.expire_time IS NULL OR bg.expire_time > " . time() . ")\n\t\t\t\t\tAND (" . implode(' OR ', $ban_query) . ')', __FILE__, __LINE__);
            // Store every type of ban that applies to you in your session.
            while ($row = mysql_fetch_assoc($request)) {
                foreach ($restrictions as $restriction) {
                    if (!empty($row[$restriction])) {
                        $_SESSION['ban'][$restriction]['reason'] = $row['reason'];
                        $_SESSION['ban'][$restriction]['ids'][] = $row['ID_BAN'];
                        if (!$user_info['is_guest'] && $restriction == 'cannot_access' && ($row['ID_MEMBER'] == $ID_MEMBER || $row['email_address'] == $user_info['email'])) {
                            $flag_is_activated = true;
                        }
                    }
                }
            }
            mysql_free_result($request);
        }
        // Mark the cannot_access and cannot_post bans as being 'hit'.
        if (isset($_SESSION['ban']['cannot_access']) || isset($_SESSION['ban']['cannot_post'])) {
            log_ban(array_merge(isset($_SESSION['ban']['cannot_access']) ? $_SESSION['ban']['cannot_access']['ids'] : array(), isset($_SESSION['ban']['cannot_post']) ? $_SESSION['ban']['cannot_post']['ids'] : array()));
        }
        // If for whatever reason the is_activated flag seems wrong, do a little work to clear it up.
        if ($ID_MEMBER && ($user_settings['is_activated'] >= 10 && !$flag_is_activated || $user_settings['is_activated'] < 10 && $flag_is_activated)) {
            require_once $sourcedir . '/ManageBans.php';
            updateBanMembers();
        }
    }
    // Hey, I know you! You're ehm...
    if (!isset($_SESSION['ban']['cannot_access']) && !empty($_COOKIE[$cookiename . '_'])) {
        $bans = explode(',', $_COOKIE[$cookiename . '_']);
        foreach ($bans as $key => $value) {
            $bans[$key] = (int) $value;
        }
        $request = db_query("\n\t\t\tSELECT bi.ID_BAN, bg.reason\n\t\t\tFROM ({$db_prefix}ban_items AS bi, {$db_prefix}ban_groups AS bg)\n\t\t\tWHERE bg.ID_BAN_GROUP = bi.ID_BAN_GROUP\n\t\t\t\tAND (bg.expire_time IS NULL OR bg.expire_time > " . time() . ")\n\t\t\t\tAND bg.cannot_access = 1\n\t\t\t\tAND bi.ID_BAN IN (" . implode(', ', $bans) . ")\n\t\t\tLIMIT " . count($bans), __FILE__, __LINE__);
        while ($row = mysql_fetch_assoc($request)) {
            $_SESSION['ban']['cannot_access']['ids'][] = $row['ID_BAN'];
            $_SESSION['ban']['cannot_access']['reason'] = $row['reason'];
        }
        mysql_free_result($request);
        // My mistake. Next time better.
        if (!isset($_SESSION['ban']['cannot_access'])) {
            require_once $sourcedir . '/Subs-Auth.php';
            $cookie_url = url_parts(!empty($modSettings['localCookies']), !empty($modSettings['globalCookies']));
            setcookie($cookiename . '_', '', time() - 3600, $cookie_url[1], $cookie_url[0], 0);
        }
    }
    // If you're fully banned, it's end of the story for you.
    if (isset($_SESSION['ban']['cannot_access'])) {
        // We don't wanna see you!
        if (!$user_info['is_guest']) {
            db_query("\n\t\t\t\tDELETE FROM {$db_prefix}log_online\n\t\t\t\tWHERE ID_MEMBER = {$ID_MEMBER}\n\t\t\t\tLIMIT 1", __FILE__, __LINE__);
        }
        // 'Log' the user out.  Can't have any funny business... (save the name!)
        $old_name = isset($user_info['name']) && $user_info['name'] != '' ? $user_info['name'] : $txt[28];
        $user_info['name'] = '';
        $user_info['username'] = '';
        $user_info['is_guest'] = true;
        $user_info['is_admin'] = false;
        $user_info['permissions'] = array();
        $ID_MEMBER = 0;
        $context['user'] = array('id' => 0, 'username' => '', 'name' => $txt[28], 'is_guest' => true, 'is_logged' => false, 'is_admin' => false, 'is_mod' => false, 'language' => $user_info['language']);
        // A goodbye present.
        require_once $sourcedir . '/Subs-Auth.php';
        $cookie_url = url_parts(!empty($modSettings['localCookies']), !empty($modSettings['globalCookies']));
        setcookie($cookiename . '_', implode(',', $_SESSION['ban']['cannot_access']['ids']), time() + 3153600, $cookie_url[1], $cookie_url[0], 0);
        // Don't scare anyone, now.
        $_GET['action'] = '';
        $_GET['board'] = '';
        $_GET['topic'] = '';
        writeLog(true);
        // You banned, sucka!
        fatal_error(sprintf($txt[430], $old_name) . (empty($_SESSION['ban']['cannot_access']['reason']) ? '' : '<br />' . $_SESSION['ban']['cannot_access']['reason']));
        // If we get here, something's gone wrong.... but let's try anyway.
        trigger_error('Hacking attempt...', E_USER_ERROR);
    } elseif (isset($_SESSION['ban']['cannot_login']) && !$user_info['is_guest']) {
        // !!! Why doesn't this use the function made for logging bans?
        db_query("\n\t\t\tUPDATE {$db_prefix}ban_items\n\t\t\tSET hits = hits + 1\n\t\t\tWHERE ID_BAN IN (" . implode(', ', $_SESSION['ban']['cannot_login']['ids']) . ')', __FILE__, __LINE__);
        // Log this ban.
        db_query("\n\t\t\tINSERT INTO {$db_prefix}log_banned\n\t\t\t\t(ID_MEMBER, ip, email, logTime)\n\t\t\tVALUES ({$ID_MEMBER}, SUBSTRING('{$user_info['ip']}', 1, 16), SUBSTRING('{$user_info['email']}', 1, 255), " . time() . ')', __FILE__, __LINE__);
        // SMF's Wipe 'n Clean(r) erases all traces.
        $_GET['action'] = '';
        $_GET['board'] = '';
        $_GET['topic'] = '';
        writeLog(true);
        // Logged in, but not for long...
        require_once $sourcedir . '/LogInOut.php';
        Logout(true);
    }
    // Fix up the banning permissions.
    if (isset($user_info['permissions'])) {
        banPermissions();
    }
}
开发者ID:alencarmo,项目名称:OCF,代码行数:101,代码来源:Security.php

示例13: Logout

$this->head();
?>
</head>
<body>
    <?php 
$this->beginBody();
?>
    <div class="wrap">
        <?php 
NavBar::begin(['brandLabel' => 'My Company', 'brandUrl' => Yii::$app->homeUrl, 'options' => ['class' => 'navbar-inverse navbar-fixed-top']]);
$menuItems = [['label' => Yii::t('app', 'Home'), 'url' => ['/site/index']], ['label' => Yii::t('app', 'About'), 'url' => ['/site/about']], ['label' => Yii::t('app', 'Contact'), 'url' => ['/site/contact']]];
if (Yii::$app->user->isGuest) {
    $menuItems[] = ['label' => Yii::t('app', 'Signup'), 'url' => ['/site/signup']];
    $menuItems[] = ['label' => Yii::t('app', 'Login'), 'url' => ['/site/login']];
} else {
    $menuItems[] = ['label' => Yii::t('app', Logout(' . Yii::$app->user->identity->username . ')), 'url' => ['/site/logout'], 'linkOptions' => ['data-method' => 'post']];
}
echo Nav::widget(['options' => ['class' => 'navbar-nav navbar-right'], 'items' => $menuItems]);
NavBar::end();
?>

        <div class="container">
        <?php 
echo Breadcrumbs::widget(['links' => isset($this->params['breadcrumbs']) ? $this->params['breadcrumbs'] : []]);
?>
        <?php 
echo Alert::widget();
?>
        <?php 
echo $content;
?>
开发者ID:adzadzadz,项目名称:yii2-strepz,代码行数:31,代码来源:main.php


注:本文中的Logout函数示例由纯净天空整理自Github/MSDocs等开源代码及文档管理平台,相关代码片段筛选自各路编程大神贡献的开源项目,源码版权归原作者所有,传播和使用请参考对应项目的License;未经允许,请勿转载。