-
Notifications
You must be signed in to change notification settings - Fork 0
/
server.php
99 lines (62 loc) · 2.58 KB
/
server.php
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
<?php
session_start();
error_reporting(E_ERROR | E_PARSE);
// Initialising variables
$username = "";
$email = "";
$password_1 = "";
$password_2 = "";
$errors = array();
// Connect to database
$db = mysqli_connect('localhost','root','','practice') or die("could not connect to database");
// Register users
$username = mysqli_real_escape_string($db, $_POST['username']);
$email = mysqli_real_escape_string($db, $_POST['email']);
$password_1 = mysqli_real_escape_string($db, $_POST['password_1']);
$password_2 = mysqli_real_escape_string($db, $_POST['password_2']);
// Form validation
if (empty($username)) {array_push($errors, "Username is required");}
if (empty($email)) {array_push($errors, "Email is required");}
if (empty($password_1)) {array_push($errors, "Password is required");}
if ($password_1 != $password_2) {array_push($errors, "Passwords do not match");}
// Check db fpr existing user with same username
$user_check_query = "SELECT * FROM user WHERE username= '$username' or email = '$email' LIMIT 1";
$results = mysqli_query($db, $user_check_query);
$user = mysqli_fetch_assoc($results);
if($user) {
if($user['username'] === $username){array_push($errors, "Username already exists");}
if($user['email'] === $email){array_push($errors, "Email already exists");}
}
// Register user if no error
if(count($errors) == 0){
$password = password_hash($password_1, PASSWORD_DEFAULT); // This encrypts the password
$query = "INSERT INTO user (username, email, password) VALUES ('$username', '$email', '$password')";
mysqli_query($db, $query);
$_SESSION['username'] = $username;
$_SESSION['success'] = "You are now logged in";
header('location: index.php');
}
// Login User
if(isset($_POST['login_user'])){
$username = mysqli_real_escape_string($db, $_POST['username']);
$password = mysqli_real_escape_string($db, $_POST['password_1']);
if(empty($username)){
array_push($errors, "Username is required");
}
if(empty($password)){
array_push($errors, "Password is required");
}
if(count($errors) == 0) {
$password = password_hash($password_1, PASSWORD_DEFAULT);
$query = "SELECT * FROM user WHERE username='$username' AND password='$password'";
$results = mysqli_query($db, $query);
if(mysqli_num_rows($results)) {
$_SESSION['username'] = $username;
$_SESSION['success'] = "Logged in successfully";
header("location : index.php");
}else {
array_push($errors, "Wrong username/password combination. Please try again. ");
}
}
}
?>