572
hesk/submit_ticket.php
Normal file
572
hesk/submit_ticket.php
Normal file
@@ -0,0 +1,572 @@
|
||||
<?php
|
||||
/**
|
||||
*
|
||||
* This file is part of HESK - PHP Help Desk Software.
|
||||
*
|
||||
* (c) Copyright Klemen Stirn. All rights reserved.
|
||||
* https://www.hesk.com
|
||||
*
|
||||
* For the full copyright and license agreement information visit
|
||||
* https://www.hesk.com/eula.php
|
||||
*
|
||||
*/
|
||||
|
||||
define('IN_SCRIPT',1);
|
||||
define('HESK_PATH','./');
|
||||
|
||||
// Get all the required files and functions
|
||||
require(HESK_PATH . 'hesk_settings.inc.php');
|
||||
// TODO pull this from settings
|
||||
define('TEMPLATE_PATH', HESK_PATH . "theme/{$hesk_settings['site_theme']}/");
|
||||
require(HESK_PATH . 'inc/common.inc.php');
|
||||
|
||||
// Are we in maintenance mode?
|
||||
hesk_check_maintenance();
|
||||
|
||||
// Are we in "Knowledgebase only" mode?
|
||||
hesk_check_kb_only();
|
||||
|
||||
hesk_load_database_functions();
|
||||
require(HESK_PATH . 'inc/email_functions.inc.php');
|
||||
require(HESK_PATH . 'inc/posting_functions.inc.php');
|
||||
|
||||
// We only allow POST requests to this file
|
||||
if ( $_SERVER['REQUEST_METHOD'] != 'POST' )
|
||||
{
|
||||
header('Location: index.php?a=add');
|
||||
exit();
|
||||
}
|
||||
|
||||
// Check for POST requests larger than what the server can handle
|
||||
if ( empty($_POST) && ! empty($_SERVER['CONTENT_LENGTH']) )
|
||||
{
|
||||
hesk_error($hesklang['maxpost']);
|
||||
}
|
||||
|
||||
// Try to detect some simple SPAM bots
|
||||
if ( ! isset($_POST['hx']) || $_POST['hx'] != 3 || ! isset($_POST['hy']) || $_POST['hy'] != '' || isset($_POST['phone']) )
|
||||
{
|
||||
header('HTTP/1.1 403 Forbidden');
|
||||
exit();
|
||||
}
|
||||
|
||||
// Block obvious spammers trying to inject email headers
|
||||
if ( preg_match("/\n|\r|\t|%0A|%0D|%08|%09/", hesk_POST('name') . hesk_POST('subject') ) )
|
||||
{
|
||||
header('HTTP/1.1 403 Forbidden');
|
||||
exit();
|
||||
}
|
||||
|
||||
hesk_session_start();
|
||||
|
||||
// A security check - not needed here, but uncomment if you require it
|
||||
# hesk_token_check();
|
||||
|
||||
// Prevent submitting multiple tickets by reloading submit_ticket.php page
|
||||
if (isset($_SESSION['already_submitted']))
|
||||
{
|
||||
hesk_forceStop();
|
||||
}
|
||||
|
||||
// Connect to database
|
||||
hesk_dbConnect();
|
||||
|
||||
$hesk_error_buffer = array();
|
||||
|
||||
// Check anti-SPAM question
|
||||
if ($hesk_settings['question_use'])
|
||||
{
|
||||
$question = hesk_input( hesk_POST('question') );
|
||||
|
||||
if ( strlen($question) == 0)
|
||||
{
|
||||
$hesk_error_buffer['question'] = $hesklang['q_miss'];
|
||||
}
|
||||
elseif (hesk_mb_strtolower($question) != hesk_mb_strtolower($hesk_settings['question_ans']))
|
||||
{
|
||||
$hesk_error_buffer['question'] = $hesklang['q_wrng'];
|
||||
}
|
||||
else
|
||||
{
|
||||
$_SESSION['c_question'] = $question;
|
||||
}
|
||||
}
|
||||
|
||||
// Check anti-SPAM image
|
||||
if ($hesk_settings['secimg_use'] && ! isset($_SESSION['img_verified']))
|
||||
{
|
||||
// Using reCAPTCHA?
|
||||
if ($hesk_settings['recaptcha_use'])
|
||||
{
|
||||
require(HESK_PATH . 'inc/recaptcha/recaptchalib_v2.php');
|
||||
|
||||
$resp = null;
|
||||
$reCaptcha = new ReCaptcha($hesk_settings['recaptcha_private_key']);
|
||||
|
||||
// Was there a reCAPTCHA response?
|
||||
if ( isset($_POST["g-recaptcha-response"]) )
|
||||
{
|
||||
$resp = $reCaptcha->verifyResponse(hesk_getClientIP(), hesk_POST("g-recaptcha-response") );
|
||||
}
|
||||
|
||||
if ($resp != null && $resp->success)
|
||||
{
|
||||
$_SESSION['img_verified']=true;
|
||||
}
|
||||
else
|
||||
{
|
||||
$hesk_error_buffer['mysecnum']=$hesklang['recaptcha_error'];
|
||||
}
|
||||
}
|
||||
// Using PHP generated image
|
||||
else
|
||||
{
|
||||
$mysecnum = intval( hesk_POST('mysecnum', 0) );
|
||||
|
||||
if ( empty($mysecnum) )
|
||||
{
|
||||
$hesk_error_buffer['mysecnum']=$hesklang['sec_miss'];
|
||||
}
|
||||
else
|
||||
{
|
||||
require(HESK_PATH . 'inc/secimg.inc.php');
|
||||
$sc = new PJ_SecurityImage($hesk_settings['secimg_sum']);
|
||||
if ( isset($_SESSION['checksum']) && $sc->checkCode($mysecnum, $_SESSION['checksum']) )
|
||||
{
|
||||
$_SESSION['img_verified']=true;
|
||||
}
|
||||
else
|
||||
{
|
||||
$hesk_error_buffer['mysecnum']=$hesklang['sec_wrng'];
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
$tmpvar['name'] = hesk_input( hesk_POST('name') ) or $hesk_error_buffer['name']=$hesklang['enter_your_name'];
|
||||
|
||||
$email_available = true;
|
||||
|
||||
if ($hesk_settings['require_email'])
|
||||
{
|
||||
$tmpvar['email'] = hesk_validateEmail( hesk_POST('email'), 'ERR', 0) or $hesk_error_buffer['email']=$hesklang['enter_valid_email'];
|
||||
}
|
||||
else
|
||||
{
|
||||
$tmpvar['email'] = hesk_validateEmail( hesk_POST('email'), 'ERR', 0);
|
||||
|
||||
// Not required, but must be valid if it is entered
|
||||
if ($tmpvar['email'] == '')
|
||||
{
|
||||
$email_available = false;
|
||||
|
||||
if (strlen(hesk_POST('email')))
|
||||
{
|
||||
$hesk_error_buffer['email'] = $hesklang['not_valid_email'];
|
||||
}
|
||||
|
||||
// No need to confirm the email
|
||||
$hesk_settings['confirm_email'] = 0;
|
||||
$_POST['email2'] = '';
|
||||
$_SESSION['c_email'] = '';
|
||||
$_SESSION['c_email2'] = '';
|
||||
}
|
||||
}
|
||||
|
||||
if ($hesk_settings['confirm_email'])
|
||||
{
|
||||
$tmpvar['email2'] = hesk_validateEmail( hesk_POST('email2'), 'ERR', 0) or $hesk_error_buffer['email2']=$hesklang['confemail2'];
|
||||
|
||||
// Anything entered as email confirmation?
|
||||
if ($tmpvar['email2'] != '')
|
||||
{
|
||||
// Do we have multiple emails?
|
||||
if ($hesk_settings['multi_eml'] && count( array_diff( explode(',', strtolower($tmpvar['email']) ), explode(',', strtolower($tmpvar['email2']) ) ) ) == 0)
|
||||
{
|
||||
$_SESSION['c_email2'] = hesk_POST('email2');
|
||||
}
|
||||
// Single email address match
|
||||
elseif ( ! $hesk_settings['multi_eml'] && strtolower($tmpvar['email']) == strtolower($tmpvar['email2']) )
|
||||
{
|
||||
$_SESSION['c_email2'] = hesk_POST('email2');
|
||||
}
|
||||
else
|
||||
{
|
||||
// Invalid match
|
||||
$tmpvar['email2'] = '';
|
||||
$_POST['email2'] = '';
|
||||
$_SESSION['c_email2'] = '';
|
||||
$_SESSION['isnotice'][] = 'email';
|
||||
$hesk_error_buffer['email2']=$hesklang['confemaile'];
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
$_SESSION['c_email2'] = hesk_POST('email2');
|
||||
}
|
||||
}
|
||||
|
||||
$tmpvar['category'] = intval( hesk_POST('category') ) or $hesk_error_buffer['category']=$hesklang['sel_app_cat'];
|
||||
|
||||
// Do we allow customer to select priority?
|
||||
if ($hesk_settings['cust_urgency'])
|
||||
{
|
||||
$valid_priorities = array(
|
||||
'high' => 1,
|
||||
'medium' => 2,
|
||||
'low' => 3
|
||||
);
|
||||
$tmpvar['priority'] = hesk_POST('priority');
|
||||
|
||||
// 0 is an invalid option, so we'll set it to that to let the if block below process normally
|
||||
$tmpvar['priority'] = key_exists($tmpvar['priority'], $valid_priorities) ?
|
||||
$valid_priorities[$tmpvar['priority']] :
|
||||
0;
|
||||
|
||||
// We don't allow customers select "Critical". If priority is not valid set it to "low".
|
||||
if ($tmpvar['priority'] < 1 || $tmpvar['priority'] > 3)
|
||||
{
|
||||
// If we are showing "Click to select" priority needs to be selected
|
||||
if ($hesk_settings['select_pri'])
|
||||
{
|
||||
$tmpvar['priority'] = -1;
|
||||
$hesk_error_buffer['priority'] = $hesklang['select_priority'];
|
||||
}
|
||||
else
|
||||
{
|
||||
$tmpvar['priority'] = 3;
|
||||
}
|
||||
}
|
||||
}
|
||||
// Priority will be selected based on the category selected
|
||||
else
|
||||
{
|
||||
$res = hesk_dbQuery("SELECT `priority` FROM `".hesk_dbEscape($hesk_settings['db_pfix'])."categories` WHERE `id`=".intval($tmpvar['category']));
|
||||
if ( hesk_dbNumRows($res) == 1 )
|
||||
{
|
||||
$tmpvar['priority'] = intval( hesk_dbResult($res) );
|
||||
}
|
||||
else
|
||||
{
|
||||
$tmpvar['priority'] = 3;
|
||||
}
|
||||
}
|
||||
|
||||
if ($hesk_settings['require_subject'] == -1)
|
||||
{
|
||||
$tmpvar['subject'] = '';
|
||||
}
|
||||
else
|
||||
{
|
||||
$tmpvar['subject'] = hesk_input( hesk_POST('subject') );
|
||||
|
||||
if ($hesk_settings['require_subject'] == 1 && $tmpvar['subject'] == '')
|
||||
{
|
||||
$hesk_error_buffer['subject'] = $hesklang['enter_ticket_subject'];
|
||||
}
|
||||
}
|
||||
|
||||
if ($hesk_settings['require_message'] == -1)
|
||||
{
|
||||
$tmpvar['message'] = '';
|
||||
}
|
||||
else
|
||||
{
|
||||
$tmpvar['message'] = hesk_input( hesk_POST('message') );
|
||||
|
||||
if ($hesk_settings['require_message'] == 1 && $tmpvar['message'] == '')
|
||||
{
|
||||
$hesk_error_buffer['message'] = $hesklang['enter_message'];
|
||||
}
|
||||
}
|
||||
|
||||
// Is category a valid choice?
|
||||
if ($tmpvar['category'])
|
||||
{
|
||||
hesk_verifyCategory();
|
||||
|
||||
// Is auto-assign of tickets disabled in this category?
|
||||
if ( empty($hesk_settings['category_data'][$tmpvar['category']]['autoassign']) )
|
||||
{
|
||||
$hesk_settings['autoassign'] = false;
|
||||
}
|
||||
}
|
||||
|
||||
// Custom fields
|
||||
foreach ($hesk_settings['custom_fields'] as $k=>$v)
|
||||
{
|
||||
if ($v['use']==1 && hesk_is_custom_field_in_category($k, $tmpvar['category']) )
|
||||
{
|
||||
if ($v['type'] == 'checkbox')
|
||||
{
|
||||
$tmpvar[$k]='';
|
||||
|
||||
if (isset($_POST[$k]) && is_array($_POST[$k]))
|
||||
{
|
||||
foreach ($_POST[$k] as $myCB)
|
||||
{
|
||||
$tmpvar[$k] .= ( is_array($myCB) ? '' : hesk_input($myCB) ) . '<br />';;
|
||||
}
|
||||
$tmpvar[$k]=substr($tmpvar[$k],0,-6);
|
||||
}
|
||||
else
|
||||
{
|
||||
if ($v['req'])
|
||||
{
|
||||
$hesk_error_buffer[$k]=$hesklang['fill_all'].': '.$v['name'];
|
||||
}
|
||||
$_POST[$k] = '';
|
||||
}
|
||||
|
||||
$_SESSION["c_$k"]=hesk_POST_array($k);
|
||||
|
||||
}
|
||||
elseif ($v['type'] == 'date')
|
||||
{
|
||||
$tmpvar[$k] = hesk_POST($k);
|
||||
$_SESSION["c_$k"] = '';
|
||||
|
||||
if (preg_match("/^[0-9]{2}\/[0-9]{2}\/[0-9]{4}$/", $tmpvar[$k]))
|
||||
{
|
||||
$date = strtotime($tmpvar[$k] . ' t00:00:00 UTC');
|
||||
$dmin = strlen($v['value']['dmin']) ? strtotime($v['value']['dmin'] . ' t00:00:00 UTC') : false;
|
||||
$dmax = strlen($v['value']['dmax']) ? strtotime($v['value']['dmax'] . ' t00:00:00 UTC') : false;
|
||||
|
||||
$_SESSION["c_$k"] = $tmpvar[$k];
|
||||
|
||||
if ($dmin && $dmin > $date)
|
||||
{
|
||||
$hesk_error_buffer[$k] = sprintf($hesklang['d_emin'], $v['name'], hesk_custom_date_display_format($dmin, $v['value']['date_format']));
|
||||
}
|
||||
elseif ($dmax && $dmax < $date)
|
||||
{
|
||||
$hesk_error_buffer[$k] = sprintf($hesklang['d_emax'], $v['name'], hesk_custom_date_display_format($dmax, $v['value']['date_format']));
|
||||
}
|
||||
else
|
||||
{
|
||||
$tmpvar[$k] = $date;
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
if ($v['req'])
|
||||
{
|
||||
$hesk_error_buffer[$k]=$hesklang['fill_all'].': '.$v['name'];
|
||||
}
|
||||
}
|
||||
}
|
||||
elseif ($v['type'] == 'email')
|
||||
{
|
||||
$tmp = $hesk_settings['multi_eml'];
|
||||
$hesk_settings['multi_eml'] = $v['value']['multiple'];
|
||||
$tmpvar[$k] = hesk_validateEmail( hesk_POST($k), 'ERR', 0);
|
||||
$hesk_settings['multi_eml'] = $tmp;
|
||||
|
||||
if ($tmpvar[$k] != '')
|
||||
{
|
||||
$_SESSION["c_$k"] = hesk_input($tmpvar[$k]);
|
||||
}
|
||||
else
|
||||
{
|
||||
$_SESSION["c_$k"] = '';
|
||||
|
||||
if ($v['req'])
|
||||
{
|
||||
$hesk_error_buffer[$k] = $v['value']['multiple'] ? sprintf($hesklang['cf_noem'], $v['name']) : sprintf($hesklang['cf_noe'], $v['name']);
|
||||
}
|
||||
}
|
||||
}
|
||||
elseif ($v['req'])
|
||||
{
|
||||
$tmpvar[$k]=hesk_makeURL(nl2br(hesk_input( hesk_POST($k) )));
|
||||
if ($tmpvar[$k] == '')
|
||||
{
|
||||
$hesk_error_buffer[$k]=$hesklang['fill_all'].': '.$v['name'];
|
||||
}
|
||||
$_SESSION["c_$k"]=hesk_POST($k);
|
||||
}
|
||||
else
|
||||
{
|
||||
$tmpvar[$k]=hesk_makeURL(nl2br(hesk_input( hesk_POST($k) )));
|
||||
$_SESSION["c_$k"]=hesk_POST($k);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
$tmpvar[$k] = '';
|
||||
}
|
||||
}
|
||||
|
||||
// Check bans
|
||||
if ($email_available && ! isset($hesk_error_buffer['email']) && hesk_isBannedEmail($tmpvar['email']) || hesk_isBannedIP(hesk_getClientIP()) )
|
||||
{
|
||||
hesk_error($hesklang['baned_e']);
|
||||
}
|
||||
|
||||
// Check maximum open tickets limit
|
||||
$below_limit = true;
|
||||
if ($email_available && $hesk_settings['max_open'] && ! isset($hesk_error_buffer['email']) )
|
||||
{
|
||||
$res = hesk_dbQuery("SELECT COUNT(*) FROM `".hesk_dbEscape($hesk_settings['db_pfix'])."tickets` WHERE `status` IN ('0', '1', '2', '4', '5') AND " . hesk_dbFormatEmail($tmpvar['email']));
|
||||
$num = hesk_dbResult($res);
|
||||
|
||||
if ($num >= $hesk_settings['max_open'])
|
||||
{
|
||||
$hesk_error_buffer = array( 'max_open' => sprintf($hesklang['maxopen'], $num, $hesk_settings['max_open']) );
|
||||
$below_limit = false;
|
||||
}
|
||||
}
|
||||
|
||||
// If we reached max tickets let's save some resources
|
||||
if ($below_limit)
|
||||
{
|
||||
// Generate tracking ID
|
||||
$tmpvar['trackid'] = hesk_createID();
|
||||
|
||||
// Attachments
|
||||
if ($hesk_settings['attachments']['use'])
|
||||
{
|
||||
require_once(HESK_PATH . 'inc/attachments.inc.php');
|
||||
|
||||
$attachments = array();
|
||||
$trackingID = $tmpvar['trackid'];
|
||||
|
||||
for ($i = 1; $i <= $hesk_settings['attachments']['max_number']; $i++)
|
||||
{
|
||||
$att = hesk_uploadFile($i);
|
||||
if ($att !== false && ! empty($att) )
|
||||
{
|
||||
$attachments[$i] = $att;
|
||||
}
|
||||
}
|
||||
}
|
||||
$tmpvar['attachments'] = '';
|
||||
}
|
||||
|
||||
// If we have any errors lets store info in session to avoid re-typing everything
|
||||
if (count($hesk_error_buffer))
|
||||
{
|
||||
$_SESSION['iserror'] = array_keys($hesk_error_buffer);
|
||||
|
||||
$_SESSION['c_name'] = hesk_POST('name');
|
||||
$_SESSION['c_email'] = hesk_POST('email');
|
||||
$_SESSION['c_priority'] = hesk_POST('priority');
|
||||
$_SESSION['c_subject'] = hesk_POST('subject');
|
||||
$_SESSION['c_message'] = hesk_POST('message');
|
||||
|
||||
$tmp = '';
|
||||
foreach ($hesk_error_buffer as $error)
|
||||
{
|
||||
$tmp .= "<li>$error</li>\n";
|
||||
}
|
||||
|
||||
// Remove any successfully uploaded attachments
|
||||
if ($below_limit && $hesk_settings['attachments']['use'])
|
||||
{
|
||||
hesk_removeAttachments($attachments);
|
||||
}
|
||||
|
||||
$hesk_error_buffer = $hesklang['pcer'] . '<br /><br /><ul>' . $tmp . '</ul>';
|
||||
hesk_process_messages($hesk_error_buffer, 'index.php?a=add&category='.$tmpvar['category']);
|
||||
}
|
||||
|
||||
$tmpvar['message']=hesk_makeURL($tmpvar['message']);
|
||||
$tmpvar['message']=nl2br($tmpvar['message']);
|
||||
|
||||
// Track suggested knowledgebase articles
|
||||
if ($hesk_settings['kb_enable'] && $hesk_settings['kb_recommendanswers'] && isset($_POST['suggested']) && is_array($_POST['suggested']) )
|
||||
{
|
||||
$tmpvar['articles'] = implode(',', array_unique( array_map('intval', $_POST['suggested']) ) );
|
||||
}
|
||||
|
||||
// All good now, continue with ticket creation
|
||||
$tmpvar['owner'] = 0;
|
||||
$tmpvar['history'] = sprintf($hesklang['thist15'], hesk_date(), $hesklang['customer']);
|
||||
|
||||
// Auto assign tickets if aplicable
|
||||
$autoassign_owner = hesk_autoAssignTicket($tmpvar['category']);
|
||||
if ($autoassign_owner)
|
||||
{
|
||||
$tmpvar['owner'] = $autoassign_owner['id'];
|
||||
$tmpvar['history'] .= sprintf($hesklang['thist10'], hesk_date(), $autoassign_owner['name'].' ('.$autoassign_owner['user'].')');
|
||||
$tmpvar['assignedby'] = -1;
|
||||
}
|
||||
|
||||
// Insert attachments
|
||||
if ($hesk_settings['attachments']['use'] && ! empty($attachments) )
|
||||
{
|
||||
foreach ($attachments as $myatt)
|
||||
{
|
||||
hesk_dbQuery("INSERT INTO `".hesk_dbEscape($hesk_settings['db_pfix'])."attachments` (`ticket_id`,`saved_name`,`real_name`,`size`) VALUES ('".hesk_dbEscape($tmpvar['trackid'])."','".hesk_dbEscape($myatt['saved_name'])."','".hesk_dbEscape($myatt['real_name'])."','".intval($myatt['size'])."')");
|
||||
$tmpvar['attachments'] .= hesk_dbInsertID() . '#' . $myatt['real_name'] .',';
|
||||
}
|
||||
}
|
||||
|
||||
// Insert ticket to database
|
||||
$ticket = hesk_newTicket($tmpvar);
|
||||
|
||||
// Notify the customer
|
||||
if ($hesk_settings['notify_new'] && $email_available)
|
||||
{
|
||||
hesk_notifyCustomer();
|
||||
}
|
||||
|
||||
// Need to notify staff?
|
||||
// --> From autoassign?
|
||||
if ($tmpvar['owner'] && $autoassign_owner['notify_assigned'])
|
||||
{
|
||||
hesk_notifyAssignedStaff($autoassign_owner, 'ticket_assigned_to_you');
|
||||
}
|
||||
// --> No autoassign, find and notify appropriate staff
|
||||
elseif ( ! $tmpvar['owner'] )
|
||||
{
|
||||
hesk_notifyStaff('new_ticket_staff', " `notify_new_unassigned` = '1' ");
|
||||
}
|
||||
|
||||
// Next ticket show suggested articles again
|
||||
$_SESSION['ARTICLES_SUGGESTED']=false;
|
||||
$_SESSION['already_submitted']=1;
|
||||
|
||||
// Need email to view ticket? If yes, remember it by default
|
||||
if ($hesk_settings['email_view_ticket'])
|
||||
{
|
||||
hesk_setcookie('hesk_myemail', $tmpvar['email'], strtotime('+1 year'));
|
||||
}
|
||||
|
||||
// Unset temporary variables
|
||||
unset($tmpvar);
|
||||
hesk_cleanSessionVars('tmpvar');
|
||||
hesk_cleanSessionVars('c_category');
|
||||
hesk_cleanSessionVars('c_priority');
|
||||
hesk_cleanSessionVars('c_subject');
|
||||
hesk_cleanSessionVars('c_message');
|
||||
hesk_cleanSessionVars('c_question');
|
||||
hesk_cleanSessionVars('img_verified');
|
||||
|
||||
$messages = hesk_get_messages();
|
||||
|
||||
$hesk_settings['render_template'](TEMPLATE_PATH . 'customer/create-ticket/create-ticket-confirmation.php', array(
|
||||
'trackingId' => $ticket['trackid'],
|
||||
'emailProvided' => $email_available,
|
||||
'messages' => $messages
|
||||
));
|
||||
|
||||
exit();
|
||||
|
||||
|
||||
function hesk_forceStop()
|
||||
{
|
||||
global $hesklang;
|
||||
?>
|
||||
<html>
|
||||
<head>
|
||||
<meta http-equiv="Refresh" content="0; url=index.php?a=add" />
|
||||
</head>
|
||||
<body>
|
||||
<p><a href="index.php?a=add"><?php echo $hesklang['c2c']; ?></a>.</p>
|
||||
</body>
|
||||
</html>
|
||||
<?php
|
||||
exit();
|
||||
} // END hesk_forceStop()
|
||||
?>
|
||||
Reference in New Issue
Block a user