@@ -187,7 +187,7 @@ discard block |
||
187 | 187 | // Get the report details. |
188 | 188 | $report = getReportDetails($report_id); |
189 | 189 | |
190 | - if(!$report) |
|
190 | + if (!$report) |
|
191 | 191 | fatal_lang_error('mc_no_modreport_found'); |
192 | 192 | |
193 | 193 | // Build the report data - basic details first, then extra stuff based on the type |
@@ -250,7 +250,7 @@ discard block |
||
250 | 250 | if ($context['report_type'] == 'members') |
251 | 251 | { |
252 | 252 | // Find their ID in the serialized action string... |
253 | - $user_id_length = strlen((string)$context['report']['user']['id']); |
|
253 | + $user_id_length = strlen((string) $context['report']['user']['id']); |
|
254 | 254 | $member = 's:6:"member";s:' . $user_id_length . ':"' . $context['report']['user']['id'] . '";}'; |
255 | 255 | |
256 | 256 | $params = array( |
@@ -529,7 +529,7 @@ discard block |
||
529 | 529 | // What are we gonna do? |
530 | 530 | $action = isset($_GET['ignore']) ? 'ignore' : 'closed'; |
531 | 531 | |
532 | - validateToken('mod-report-'. $action, 'get'); |
|
532 | + validateToken('mod-report-' . $action, 'get'); |
|
533 | 533 | |
534 | 534 | // Are we ignore or "un-ignore"? "un-ignore" that's a funny word! |
535 | 535 | $value = (int) $_GET[$action]; |
@@ -13,8 +13,9 @@ discard block |
||
13 | 13 | * @version 2.1 Beta 3 |
14 | 14 | */ |
15 | 15 | |
16 | -if (!defined('SMF')) |
|
16 | +if (!defined('SMF')) { |
|
17 | 17 | die('No direct access...'); |
18 | +} |
|
18 | 19 | |
19 | 20 | /** |
20 | 21 | * Sets and call a function based on the given subaction. Acts as a dispatcher function. |
@@ -54,8 +55,9 @@ discard block |
||
54 | 55 | ); |
55 | 56 | |
56 | 57 | // This comes under the umbrella of moderating posts. |
57 | - if ($context['report_type'] == 'members' || $user_info['mod_cache']['bq'] == '0=1') |
|
58 | - isAllowedTo('moderate_forum'); |
|
58 | + if ($context['report_type'] == 'members' || $user_info['mod_cache']['bq'] == '0=1') { |
|
59 | + isAllowedTo('moderate_forum'); |
|
60 | + } |
|
59 | 61 | |
60 | 62 | $subActions = array( |
61 | 63 | 'show' => 'ShowReports', |
@@ -70,11 +72,11 @@ discard block |
||
70 | 72 | call_integration_hook('integrate_reported_' . $context['report_type'], array(&$subActions)); |
71 | 73 | |
72 | 74 | // By default we call the open sub-action. |
73 | - if (isset($_REQUEST['sa']) && isset($subActions[$_REQUEST['sa']])) |
|
74 | - $context['sub_action'] = $smcFunc['htmltrim']($smcFunc['htmlspecialchars']($_REQUEST['sa']), ENT_QUOTES); |
|
75 | - |
|
76 | - else |
|
77 | - $context['sub_action'] = 'show'; |
|
75 | + if (isset($_REQUEST['sa']) && isset($subActions[$_REQUEST['sa']])) { |
|
76 | + $context['sub_action'] = $smcFunc['htmltrim']($smcFunc['htmlspecialchars']($_REQUEST['sa']), ENT_QUOTES); |
|
77 | + } else { |
|
78 | + $context['sub_action'] = 'show'; |
|
79 | + } |
|
78 | 80 | |
79 | 81 | // Hi Ho Silver Away! |
80 | 82 | call_helper($subActions[$context['sub_action']]); |
@@ -116,11 +118,13 @@ discard block |
||
116 | 118 | |
117 | 119 | // All the ones to update... |
118 | 120 | $toClose = array(); |
119 | - foreach ($_POST['close'] as $rid) |
|
120 | - $toClose[] = (int) $rid; |
|
121 | + foreach ($_POST['close'] as $rid) { |
|
122 | + $toClose[] = (int) $rid; |
|
123 | + } |
|
121 | 124 | |
122 | - if (!empty($toClose)) |
|
123 | - updateReport('closed', 1, $toClose); |
|
125 | + if (!empty($toClose)) { |
|
126 | + updateReport('closed', 1, $toClose); |
|
127 | + } |
|
124 | 128 | |
125 | 129 | // Set the confirmation message. |
126 | 130 | $_SESSION['rc_confirmation'] = 'close_all'; |
@@ -178,8 +182,9 @@ discard block |
||
178 | 182 | $reportComments = array(); |
179 | 183 | |
180 | 184 | // Have to at least give us something to work with. |
181 | - if (empty($_REQUEST['rid'])) |
|
182 | - fatal_lang_error('mc_reportedp_none_found'); |
|
185 | + if (empty($_REQUEST['rid'])) { |
|
186 | + fatal_lang_error('mc_reportedp_none_found'); |
|
187 | + } |
|
183 | 188 | |
184 | 189 | // Integers only please |
185 | 190 | $report_id = (int) $_REQUEST['rid']; |
@@ -187,8 +192,9 @@ discard block |
||
187 | 192 | // Get the report details. |
188 | 193 | $report = getReportDetails($report_id); |
189 | 194 | |
190 | - if(!$report) |
|
191 | - fatal_lang_error('mc_no_modreport_found'); |
|
195 | + if(!$report) { |
|
196 | + fatal_lang_error('mc_no_modreport_found'); |
|
197 | + } |
|
192 | 198 | |
193 | 199 | // Build the report data - basic details first, then extra stuff based on the type |
194 | 200 | $context['report'] = array( |
@@ -214,8 +220,7 @@ discard block |
||
214 | 220 | 'href' => $scripturl . '?action=profile;u=' . $report['id_user'], |
215 | 221 | ), |
216 | 222 | ); |
217 | - } |
|
218 | - else |
|
223 | + } else |
|
219 | 224 | { |
220 | 225 | $extraDetails = array( |
221 | 226 | 'topic_id' => $report['id_topic'], |
@@ -238,8 +243,9 @@ discard block |
||
238 | 243 | |
239 | 244 | $reportComments = getReportComments($report_id); |
240 | 245 | |
241 | - if (!empty($reportComments)) |
|
242 | - $context['report'] = array_merge($context['report'], $reportComments); |
|
246 | + if (!empty($reportComments)) { |
|
247 | + $context['report'] = array_merge($context['report'], $reportComments); |
|
248 | + } |
|
243 | 249 | |
244 | 250 | // What have the other moderators done to this message? |
245 | 251 | require_once($sourcedir . '/Modlog.php'); |
@@ -260,8 +266,7 @@ discard block |
||
260 | 266 | 1, |
261 | 267 | true, |
262 | 268 | ); |
263 | - } |
|
264 | - else |
|
269 | + } else |
|
265 | 270 | { |
266 | 271 | $params = array( |
267 | 272 | 'lm.id_topic = {int:id_topic} |
@@ -361,16 +366,16 @@ discard block |
||
361 | 366 | createList($listOptions); |
362 | 367 | |
363 | 368 | // Make sure to get the correct tab selected. |
364 | - if ($context['report']['closed']) |
|
365 | - $context[$context['moderation_menu_name']]['current_subsection'] = 'closed'; |
|
369 | + if ($context['report']['closed']) { |
|
370 | + $context[$context['moderation_menu_name']]['current_subsection'] = 'closed'; |
|
371 | + } |
|
366 | 372 | |
367 | 373 | // Finally we are done :P |
368 | 374 | if ($context['report_type'] == 'members') |
369 | 375 | { |
370 | 376 | $context['page_title'] = sprintf($txt['mc_viewmemberreport'], $context['report']['user']['name']); |
371 | 377 | $context['sub_template'] = 'viewmemberreport'; |
372 | - } |
|
373 | - else |
|
378 | + } else |
|
374 | 379 | { |
375 | 380 | $context['page_title'] = sprintf($txt['mc_viewmodreport'], $context['report']['subject'], $context['report']['author']['name']); |
376 | 381 | $context['sub_template'] = 'viewmodreport'; |
@@ -395,8 +400,9 @@ discard block |
||
395 | 400 | $comment = array(); |
396 | 401 | |
397 | 402 | // The report ID is a must. |
398 | - if (empty($_REQUEST['rid'])) |
|
399 | - fatal_lang_error('mc_reportedp_none_found'); |
|
403 | + if (empty($_REQUEST['rid'])) { |
|
404 | + fatal_lang_error('mc_reportedp_none_found'); |
|
405 | + } |
|
400 | 406 | |
401 | 407 | // Integers only please. |
402 | 408 | $report_id = (int) $_REQUEST['rid']; |
@@ -421,8 +427,9 @@ discard block |
||
421 | 427 | checkSession('get'); |
422 | 428 | validateToken('mod-reportC-delete', 'get'); |
423 | 429 | |
424 | - if (empty($_REQUEST['mid'])) |
|
425 | - fatal_lang_error('mc_reportedp_comment_none_found'); |
|
430 | + if (empty($_REQUEST['mid'])) { |
|
431 | + fatal_lang_error('mc_reportedp_comment_none_found'); |
|
432 | + } |
|
426 | 433 | |
427 | 434 | $comment_id = (int) $_REQUEST['mid']; |
428 | 435 | |
@@ -430,15 +437,17 @@ discard block |
||
430 | 437 | $comment = getCommentModDetails($comment_id); |
431 | 438 | |
432 | 439 | // Perhaps somebody else already deleted this fine gem... |
433 | - if (empty($comment)) |
|
434 | - fatal_lang_error('report_action_message_delete_issue'); |
|
440 | + if (empty($comment)) { |
|
441 | + fatal_lang_error('report_action_message_delete_issue'); |
|
442 | + } |
|
435 | 443 | |
436 | 444 | // Can you actually do this? |
437 | 445 | $comment_owner = $user_info['id'] == $comment['id_member']; |
438 | 446 | |
439 | 447 | // Nope! sorry. |
440 | - if (!allowedTo('admin_forum') && !$comment_owner) |
|
441 | - fatal_lang_error('report_action_message_delete_cannot'); |
|
448 | + if (!allowedTo('admin_forum') && !$comment_owner) { |
|
449 | + fatal_lang_error('report_action_message_delete_cannot'); |
|
450 | + } |
|
442 | 451 | |
443 | 452 | // All good! |
444 | 453 | deleteModComment($comment_id); |
@@ -465,11 +474,13 @@ discard block |
||
465 | 474 | checkSession(isset($_REQUEST['save']) ? 'post' : 'get'); |
466 | 475 | |
467 | 476 | // The report ID is a must. |
468 | - if (empty($_REQUEST['rid'])) |
|
469 | - fatal_lang_error('mc_reportedp_none_found'); |
|
477 | + if (empty($_REQUEST['rid'])) { |
|
478 | + fatal_lang_error('mc_reportedp_none_found'); |
|
479 | + } |
|
470 | 480 | |
471 | - if (empty($_REQUEST['mid'])) |
|
472 | - fatal_lang_error('mc_reportedp_comment_none_found'); |
|
481 | + if (empty($_REQUEST['mid'])) { |
|
482 | + fatal_lang_error('mc_reportedp_comment_none_found'); |
|
483 | + } |
|
473 | 484 | |
474 | 485 | // Integers only please. |
475 | 486 | $context['report_id'] = (int) $_REQUEST['rid']; |
@@ -477,8 +488,9 @@ discard block |
||
477 | 488 | |
478 | 489 | $context['comment'] = getCommentModDetails($context['comment_id']); |
479 | 490 | |
480 | - if (empty($context['comment'])) |
|
481 | - fatal_lang_error('mc_reportedp_comment_none_found'); |
|
491 | + if (empty($context['comment'])) { |
|
492 | + fatal_lang_error('mc_reportedp_comment_none_found'); |
|
493 | + } |
|
482 | 494 | |
483 | 495 | // Set up the comforting bits... |
484 | 496 | $context['page_title'] = $txt['mc_reported_posts']; |
@@ -489,15 +501,17 @@ discard block |
||
489 | 501 | validateToken('mod-reportC-edit'); |
490 | 502 | |
491 | 503 | // Make sure there is some data to edit on the DB. |
492 | - if (empty($context['comment'])) |
|
493 | - fatal_lang_error('report_action_message_edit_issue'); |
|
504 | + if (empty($context['comment'])) { |
|
505 | + fatal_lang_error('report_action_message_edit_issue'); |
|
506 | + } |
|
494 | 507 | |
495 | 508 | // Still there, good, now lets see if you can actually edit it... |
496 | 509 | $comment_owner = $user_info['id'] == $context['comment']['id_member']; |
497 | 510 | |
498 | 511 | // So, you aren't neither an admin or the comment owner huh? that's too bad. |
499 | - if (!allowedTo('admin_forum') && !$comment_owner) |
|
500 | - fatal_lang_error('report_action_message_edit_cannot'); |
|
512 | + if (!allowedTo('admin_forum') && !$comment_owner) { |
|
513 | + fatal_lang_error('report_action_message_edit_cannot'); |
|
514 | + } |
|
501 | 515 | |
502 | 516 | // All good! |
503 | 517 | $edited_comment = trim($smcFunc['htmlspecialchars']($_POST['mod_comment'])); |
@@ -523,8 +537,9 @@ discard block |
||
523 | 537 | checkSession('get'); |
524 | 538 | |
525 | 539 | // We need to do something! |
526 | - if (empty($_GET['rid']) && (!isset($_GET['ignore']) || !isset($_GET['closed']))) |
|
527 | - fatal_lang_error('mc_reportedp_none_found'); |
|
540 | + if (empty($_GET['rid']) && (!isset($_GET['ignore']) || !isset($_GET['closed']))) { |
|
541 | + fatal_lang_error('mc_reportedp_none_found'); |
|
542 | + } |
|
528 | 543 | |
529 | 544 | // What are we gonna do? |
530 | 545 | $action = isset($_GET['ignore']) ? 'ignore' : 'closed'; |
@@ -1326,7 +1326,7 @@ discard block |
||
1326 | 1326 | 'class' => 'centercol', |
1327 | 1327 | ), |
1328 | 1328 | 'data' => array( |
1329 | - 'function' => function ($rowData) |
|
1329 | + 'function' => function($rowData) |
|
1330 | 1330 | { |
1331 | 1331 | $isChecked = $rowData['disabled'] ? '' : ' checked'; |
1332 | 1332 | $onClickHandler = $rowData['can_show_register'] ? sprintf(' onclick="document.getElementById(\'reg_%1$s\').disabled = !this.checked;"', $rowData['id']) : ''; |
@@ -1342,7 +1342,7 @@ discard block |
||
1342 | 1342 | 'class' => 'centercol', |
1343 | 1343 | ), |
1344 | 1344 | 'data' => array( |
1345 | - 'function' => function ($rowData) |
|
1345 | + 'function' => function($rowData) |
|
1346 | 1346 | { |
1347 | 1347 | $isChecked = $rowData['on_register'] && !$rowData['disabled'] ? ' checked' : ''; |
1348 | 1348 | $isDisabled = $rowData['can_show_register'] ? '' : ' disabled'; |
@@ -1389,15 +1389,15 @@ discard block |
||
1389 | 1389 | 'value' => $txt['custom_profile_fieldorder'], |
1390 | 1390 | ), |
1391 | 1391 | 'data' => array( |
1392 | - 'function' => function ($rowData) use ($context, $txt, $scripturl) |
|
1392 | + 'function' => function($rowData) use ($context, $txt, $scripturl) |
|
1393 | 1393 | { |
1394 | - $return = '<p class="centertext bold_text">'. $rowData['field_order'] .'<br />'; |
|
1394 | + $return = '<p class="centertext bold_text">' . $rowData['field_order'] . '<br />'; |
|
1395 | 1395 | |
1396 | 1396 | if ($rowData['field_order'] > 1) |
1397 | - $return .= '<a href="' . $scripturl . '?action=admin;area=featuresettings;sa=profileedit;fid=' . $rowData['id_field'] . ';move=up"><span class="toggle_up" title="'. $txt['custom_edit_order_move'] .' '. $txt['custom_edit_order_up'] .'"></span></a>'; |
|
1397 | + $return .= '<a href="' . $scripturl . '?action=admin;area=featuresettings;sa=profileedit;fid=' . $rowData['id_field'] . ';move=up"><span class="toggle_up" title="' . $txt['custom_edit_order_move'] . ' ' . $txt['custom_edit_order_up'] . '"></span></a>'; |
|
1398 | 1398 | |
1399 | 1399 | if ($rowData['field_order'] < $context['custFieldsMaxOrder']) |
1400 | - $return .= '<a href="' . $scripturl . '?action=admin;area=featuresettings;sa=profileedit;fid=' . $rowData['id_field'] . ';move=down"><span class="toggle_down" title="'. $txt['custom_edit_order_move'] .' '. $txt['custom_edit_order_down'] .'"></span></a>'; |
|
1400 | + $return .= '<a href="' . $scripturl . '?action=admin;area=featuresettings;sa=profileedit;fid=' . $rowData['id_field'] . ';move=down"><span class="toggle_down" title="' . $txt['custom_edit_order_move'] . ' ' . $txt['custom_edit_order_down'] . '"></span></a>'; |
|
1401 | 1401 | |
1402 | 1402 | $return .= '</p>'; |
1403 | 1403 | |
@@ -1415,7 +1415,7 @@ discard block |
||
1415 | 1415 | 'value' => $txt['custom_profile_fieldname'], |
1416 | 1416 | ), |
1417 | 1417 | 'data' => array( |
1418 | - 'function' => function ($rowData) use ($scripturl) |
|
1418 | + 'function' => function($rowData) use ($scripturl) |
|
1419 | 1419 | { |
1420 | 1420 | return sprintf('<a href="%1$s?action=admin;area=featuresettings;sa=profileedit;fid=%2$d">%3$s</a><div class="smalltext">%4$s</div>', $scripturl, $rowData['id_field'], $rowData['field_name'], $rowData['field_desc']); |
1421 | 1421 | }, |
@@ -1431,7 +1431,7 @@ discard block |
||
1431 | 1431 | 'value' => $txt['custom_profile_fieldtype'], |
1432 | 1432 | ), |
1433 | 1433 | 'data' => array( |
1434 | - 'function' => function ($rowData) use ($txt) |
|
1434 | + 'function' => function($rowData) use ($txt) |
|
1435 | 1435 | { |
1436 | 1436 | $textKey = sprintf('custom_profile_type_%1$s', $rowData['field_type']); |
1437 | 1437 | return isset($txt[$textKey]) ? $txt[$textKey] : $textKey; |
@@ -1449,7 +1449,7 @@ discard block |
||
1449 | 1449 | 'value' => $txt['custom_profile_active'], |
1450 | 1450 | ), |
1451 | 1451 | 'data' => array( |
1452 | - 'function' => function ($rowData) use ($txt) |
|
1452 | + 'function' => function($rowData) use ($txt) |
|
1453 | 1453 | { |
1454 | 1454 | return $rowData['active'] ? $txt['yes'] : $txt['no']; |
1455 | 1455 | }, |
@@ -1466,7 +1466,7 @@ discard block |
||
1466 | 1466 | 'value' => $txt['custom_profile_placement'], |
1467 | 1467 | ), |
1468 | 1468 | 'data' => array( |
1469 | - 'function' => function ($rowData) |
|
1469 | + 'function' => function($rowData) |
|
1470 | 1470 | { |
1471 | 1471 | global $txt, $context; |
1472 | 1472 | |
@@ -1701,7 +1701,7 @@ discard block |
||
1701 | 1701 | redirectexit('action=admin;area=featuresettings;sa=profile'); // @todo implement an error handler |
1702 | 1702 | |
1703 | 1703 | // All good, proceed. |
1704 | - $smcFunc['db_query']('',' |
|
1704 | + $smcFunc['db_query']('', ' |
|
1705 | 1705 | UPDATE {db_prefix}custom_fields |
1706 | 1706 | SET field_order = {int:old_order} |
1707 | 1707 | WHERE field_order = {int:new_order}', |
@@ -1710,7 +1710,7 @@ discard block |
||
1710 | 1710 | 'old_order' => $context['field']['order'], |
1711 | 1711 | ) |
1712 | 1712 | ); |
1713 | - $smcFunc['db_query']('',' |
|
1713 | + $smcFunc['db_query']('', ' |
|
1714 | 1714 | UPDATE {db_prefix}custom_fields |
1715 | 1715 | SET field_order = {int:new_order} |
1716 | 1716 | WHERE id_field = {int:id_field}', |
@@ -1812,7 +1812,7 @@ discard block |
||
1812 | 1812 | $smcFunc['db_free_result']($request); |
1813 | 1813 | |
1814 | 1814 | $unique = false; |
1815 | - for ($i = 0; !$unique && $i < 9; $i ++) |
|
1815 | + for ($i = 0; !$unique && $i < 9; $i++) |
|
1816 | 1816 | { |
1817 | 1817 | if (!in_array($col_name, $current_fields)) |
1818 | 1818 | $unique = true; |
@@ -1985,7 +1985,7 @@ discard block |
||
1985 | 1985 | ); |
1986 | 1986 | |
1987 | 1987 | // Re-arrange the order. |
1988 | - $smcFunc['db_query']('',' |
|
1988 | + $smcFunc['db_query']('', ' |
|
1989 | 1989 | UPDATE {db_prefix}custom_fields |
1990 | 1990 | SET field_order = field_order - 1 |
1991 | 1991 | WHERE field_order > {int:current_order}', |
@@ -2249,7 +2249,7 @@ discard block |
||
2249 | 2249 | $context['token_check'] = 'noti-admin'; |
2250 | 2250 | |
2251 | 2251 | // Specify our action since we'll want to post back here instead of the profile |
2252 | - $context['action'] = 'action=admin;area=featuresettings;sa=alerts;'. $context['session_var'] .'='. $context['session_id']; |
|
2252 | + $context['action'] = 'action=admin;area=featuresettings;sa=alerts;' . $context['session_var'] . '=' . $context['session_id']; |
|
2253 | 2253 | |
2254 | 2254 | loadTemplate('Profile'); |
2255 | 2255 | loadLanguage('Profile'); |
@@ -14,8 +14,9 @@ discard block |
||
14 | 14 | * @version 2.1 Beta 3 |
15 | 15 | */ |
16 | 16 | |
17 | -if (!defined('SMF')) |
|
17 | +if (!defined('SMF')) { |
|
18 | 18 | die('No direct access...'); |
19 | +} |
|
19 | 20 | |
20 | 21 | /** |
21 | 22 | * This function makes sure the requested subaction does exists, if it doesn't, it sets a default action or. |
@@ -205,16 +206,18 @@ discard block |
||
205 | 206 | { |
206 | 207 | $all_zones = timezone_identifiers_list(); |
207 | 208 | // Make sure we set the value to the same as the printed value. |
208 | - foreach ($all_zones as $zone) |
|
209 | - $config_vars['default_timezone'][2][$zone] = $zone; |
|
209 | + foreach ($all_zones as $zone) { |
|
210 | + $config_vars['default_timezone'][2][$zone] = $zone; |
|
211 | + } |
|
212 | + } else { |
|
213 | + unset($config_vars['default_timezone']); |
|
210 | 214 | } |
211 | - else |
|
212 | - unset($config_vars['default_timezone']); |
|
213 | 215 | |
214 | 216 | call_integration_hook('integrate_modify_basic_settings', array(&$config_vars)); |
215 | 217 | |
216 | - if ($return_config) |
|
217 | - return $config_vars; |
|
218 | + if ($return_config) { |
|
219 | + return $config_vars; |
|
220 | + } |
|
218 | 221 | |
219 | 222 | // Saving? |
220 | 223 | if (isset($_GET['save'])) |
@@ -222,8 +225,9 @@ discard block |
||
222 | 225 | checkSession(); |
223 | 226 | |
224 | 227 | // Prevent absurd boundaries here - make it a day tops. |
225 | - if (isset($_POST['lastActive'])) |
|
226 | - $_POST['lastActive'] = min((int) $_POST['lastActive'], 1440); |
|
228 | + if (isset($_POST['lastActive'])) { |
|
229 | + $_POST['lastActive'] = min((int) $_POST['lastActive'], 1440); |
|
230 | + } |
|
227 | 231 | |
228 | 232 | call_integration_hook('integrate_save_basic_settings'); |
229 | 233 | |
@@ -268,8 +272,9 @@ discard block |
||
268 | 272 | |
269 | 273 | call_integration_hook('integrate_modify_bbc_settings', array(&$config_vars)); |
270 | 274 | |
271 | - if ($return_config) |
|
272 | - return $config_vars; |
|
275 | + if ($return_config) { |
|
276 | + return $config_vars; |
|
277 | + } |
|
273 | 278 | |
274 | 279 | // Setup the template. |
275 | 280 | require_once($sourcedir . '/ManageServer.php'); |
@@ -286,13 +291,15 @@ discard block |
||
286 | 291 | |
287 | 292 | // Clean up the tags. |
288 | 293 | $bbcTags = array(); |
289 | - foreach (parse_bbc(false) as $tag) |
|
290 | - $bbcTags[] = $tag['tag']; |
|
294 | + foreach (parse_bbc(false) as $tag) { |
|
295 | + $bbcTags[] = $tag['tag']; |
|
296 | + } |
|
291 | 297 | |
292 | - if (!isset($_POST['disabledBBC_enabledTags'])) |
|
293 | - $_POST['disabledBBC_enabledTags'] = array(); |
|
294 | - elseif (!is_array($_POST['disabledBBC_enabledTags'])) |
|
295 | - $_POST['disabledBBC_enabledTags'] = array($_POST['disabledBBC_enabledTags']); |
|
298 | + if (!isset($_POST['disabledBBC_enabledTags'])) { |
|
299 | + $_POST['disabledBBC_enabledTags'] = array(); |
|
300 | + } elseif (!is_array($_POST['disabledBBC_enabledTags'])) { |
|
301 | + $_POST['disabledBBC_enabledTags'] = array($_POST['disabledBBC_enabledTags']); |
|
302 | + } |
|
296 | 303 | // Work out what is actually disabled! |
297 | 304 | $_POST['disabledBBC'] = implode(',', array_diff($bbcTags, $_POST['disabledBBC_enabledTags'])); |
298 | 305 | |
@@ -336,8 +343,9 @@ discard block |
||
336 | 343 | |
337 | 344 | call_integration_hook('integrate_layout_settings', array(&$config_vars)); |
338 | 345 | |
339 | - if ($return_config) |
|
340 | - return $config_vars; |
|
346 | + if ($return_config) { |
|
347 | + return $config_vars; |
|
348 | + } |
|
341 | 349 | |
342 | 350 | // Saving? |
343 | 351 | if (isset($_GET['save'])) |
@@ -378,8 +386,9 @@ discard block |
||
378 | 386 | |
379 | 387 | call_integration_hook('integrate_likes_settings', array(&$config_vars)); |
380 | 388 | |
381 | - if ($return_config) |
|
382 | - return $config_vars; |
|
389 | + if ($return_config) { |
|
390 | + return $config_vars; |
|
391 | + } |
|
383 | 392 | |
384 | 393 | // Saving? |
385 | 394 | if (isset($_GET['save'])) |
@@ -417,8 +426,9 @@ discard block |
||
417 | 426 | |
418 | 427 | call_integration_hook('integrate_mentions_settings', array(&$config_vars)); |
419 | 428 | |
420 | - if ($return_config) |
|
421 | - return $config_vars; |
|
429 | + if ($return_config) { |
|
430 | + return $config_vars; |
|
431 | + } |
|
422 | 432 | |
423 | 433 | // Saving? |
424 | 434 | if (isset($_GET['save'])) |
@@ -462,8 +472,8 @@ discard block |
||
462 | 472 | 'enable' => array('check', 'warning_enable'), |
463 | 473 | ); |
464 | 474 | |
465 | - if (!empty($modSettings['warning_settings']) && $currently_enabled) |
|
466 | - $config_vars += array( |
|
475 | + if (!empty($modSettings['warning_settings']) && $currently_enabled) { |
|
476 | + $config_vars += array( |
|
467 | 477 | '', |
468 | 478 | array('int', 'warning_watch', 'subtext' => $txt['setting_warning_watch_note'] . ' ' . $txt['zero_to_disable']), |
469 | 479 | 'moderate' => array('int', 'warning_moderate', 'subtext' => $txt['setting_warning_moderate_note'] . ' ' . $txt['zero_to_disable']), |
@@ -472,15 +482,18 @@ discard block |
||
472 | 482 | 'rem2' => array('int', 'warning_decrement', 'subtext' => $txt['setting_warning_decrement_note'] . ' ' . $txt['zero_to_disable']), |
473 | 483 | array('permissions', 'view_warning'), |
474 | 484 | ); |
485 | + } |
|
475 | 486 | |
476 | 487 | call_integration_hook('integrate_warning_settings', array(&$config_vars)); |
477 | 488 | |
478 | - if ($return_config) |
|
479 | - return $config_vars; |
|
489 | + if ($return_config) { |
|
490 | + return $config_vars; |
|
491 | + } |
|
480 | 492 | |
481 | 493 | // Cannot use moderation if post moderation is not enabled. |
482 | - if (!$modSettings['postmod_active']) |
|
483 | - unset($config_vars['moderate']); |
|
494 | + if (!$modSettings['postmod_active']) { |
|
495 | + unset($config_vars['moderate']); |
|
496 | + } |
|
484 | 497 | |
485 | 498 | // Will need the utility functions from here. |
486 | 499 | require_once($sourcedir . '/ManageServer.php'); |
@@ -505,16 +518,16 @@ discard block |
||
505 | 518 | 'warning_watch' => 10, |
506 | 519 | 'warning_mute' => 60, |
507 | 520 | ); |
508 | - if ($modSettings['postmod_active']) |
|
509 | - $vars['warning_moderate'] = 35; |
|
521 | + if ($modSettings['postmod_active']) { |
|
522 | + $vars['warning_moderate'] = 35; |
|
523 | + } |
|
510 | 524 | |
511 | 525 | foreach ($vars as $var => $value) |
512 | 526 | { |
513 | 527 | $config_vars[] = array('int', $var); |
514 | 528 | $_POST[$var] = $value; |
515 | 529 | } |
516 | - } |
|
517 | - else |
|
530 | + } else |
|
518 | 531 | { |
519 | 532 | $_POST['warning_watch'] = min($_POST['warning_watch'], 100); |
520 | 533 | $_POST['warning_moderate'] = $modSettings['postmod_active'] ? min($_POST['warning_moderate'], 100) : 0; |
@@ -595,8 +608,9 @@ discard block |
||
595 | 608 | |
596 | 609 | call_integration_hook('integrate_spam_settings', array(&$config_vars)); |
597 | 610 | |
598 | - if ($return_config) |
|
599 | - return $config_vars; |
|
611 | + if ($return_config) { |
|
612 | + return $config_vars; |
|
613 | + } |
|
600 | 614 | |
601 | 615 | // You need to be an admin to edit settings! |
602 | 616 | isAllowedTo('admin_forum'); |
@@ -630,8 +644,9 @@ discard block |
||
630 | 644 | |
631 | 645 | if (empty($context['qa_by_lang'][strtr($language, array('-utf8' => ''))]) && !empty($context['question_answers'])) |
632 | 646 | { |
633 | - if (empty($context['settings_insert_above'])) |
|
634 | - $context['settings_insert_above'] = ''; |
|
647 | + if (empty($context['settings_insert_above'])) { |
|
648 | + $context['settings_insert_above'] = ''; |
|
649 | + } |
|
635 | 650 | |
636 | 651 | $context['settings_insert_above'] .= '<div class="noticebox">' . sprintf($txt['question_not_defined'], $context['languages'][$language]['name']) . '</div>'; |
637 | 652 | } |
@@ -674,8 +689,9 @@ discard block |
||
674 | 689 | $_POST['pm_spam_settings'] = (int) $_POST['max_pm_recipients'] . ',' . (int) $_POST['pm_posts_verification'] . ',' . (int) $_POST['pm_posts_per_hour']; |
675 | 690 | |
676 | 691 | // Hack in guest requiring verification! |
677 | - if (empty($_POST['posts_require_captcha']) && !empty($_POST['guests_require_captcha'])) |
|
678 | - $_POST['posts_require_captcha'] = -1; |
|
692 | + if (empty($_POST['posts_require_captcha']) && !empty($_POST['guests_require_captcha'])) { |
|
693 | + $_POST['posts_require_captcha'] = -1; |
|
694 | + } |
|
679 | 695 | |
680 | 696 | $save_vars = $config_vars; |
681 | 697 | unset($save_vars['pm1'], $save_vars['pm2'], $save_vars['pm3'], $save_vars['guest_verify']); |
@@ -692,14 +708,16 @@ discard block |
||
692 | 708 | foreach ($context['qa_languages'] as $lang_id => $dummy) |
693 | 709 | { |
694 | 710 | // If we had some questions for this language before, but don't now, delete everything from that language. |
695 | - if ((!isset($_POST['question'][$lang_id]) || !is_array($_POST['question'][$lang_id])) && !empty($context['qa_by_lang'][$lang_id])) |
|
696 | - $changes['delete'] = array_merge($questions['delete'], $context['qa_by_lang'][$lang_id]); |
|
711 | + if ((!isset($_POST['question'][$lang_id]) || !is_array($_POST['question'][$lang_id])) && !empty($context['qa_by_lang'][$lang_id])) { |
|
712 | + $changes['delete'] = array_merge($questions['delete'], $context['qa_by_lang'][$lang_id]); |
|
713 | + } |
|
697 | 714 | |
698 | 715 | // Now step through and see if any existing questions no longer exist. |
699 | - if (!empty($context['qa_by_lang'][$lang_id])) |
|
700 | - foreach ($context['qa_by_lang'][$lang_id] as $q_id) |
|
716 | + if (!empty($context['qa_by_lang'][$lang_id])) { |
|
717 | + foreach ($context['qa_by_lang'][$lang_id] as $q_id) |
|
701 | 718 | if (empty($_POST['question'][$lang_id][$q_id])) |
702 | 719 | $changes['delete'][] = $q_id; |
720 | + } |
|
703 | 721 | |
704 | 722 | // Now let's see if there are new questions or ones that need updating. |
705 | 723 | if (isset($_POST['question'][$lang_id])) |
@@ -708,14 +726,16 @@ discard block |
||
708 | 726 | { |
709 | 727 | // Ignore junky ids. |
710 | 728 | $q_id = (int) $q_id; |
711 | - if ($q_id <= 0) |
|
712 | - continue; |
|
729 | + if ($q_id <= 0) { |
|
730 | + continue; |
|
731 | + } |
|
713 | 732 | |
714 | 733 | // Check the question isn't empty (because they want to delete it?) |
715 | 734 | if (empty($question) || trim($question) == '') |
716 | 735 | { |
717 | - if (isset($context['question_answers'][$q_id])) |
|
718 | - $changes['delete'][] = $q_id; |
|
736 | + if (isset($context['question_answers'][$q_id])) { |
|
737 | + $changes['delete'][] = $q_id; |
|
738 | + } |
|
719 | 739 | continue; |
720 | 740 | } |
721 | 741 | $question = $smcFunc['htmlspecialchars'](trim($question)); |
@@ -723,19 +743,22 @@ discard block |
||
723 | 743 | // Get the answers. Firstly check there actually might be some. |
724 | 744 | if (!isset($_POST['answer'][$lang_id][$q_id]) || !is_array($_POST['answer'][$lang_id][$q_id])) |
725 | 745 | { |
726 | - if (isset($context['question_answers'][$q_id])) |
|
727 | - $changes['delete'][] = $q_id; |
|
746 | + if (isset($context['question_answers'][$q_id])) { |
|
747 | + $changes['delete'][] = $q_id; |
|
748 | + } |
|
728 | 749 | continue; |
729 | 750 | } |
730 | 751 | // Now get them and check that they might be viable. |
731 | 752 | $answers = array(); |
732 | - foreach ($_POST['answer'][$lang_id][$q_id] as $answer) |
|
733 | - if (!empty($answer) && trim($answer) !== '') |
|
753 | + foreach ($_POST['answer'][$lang_id][$q_id] as $answer) { |
|
754 | + if (!empty($answer) && trim($answer) !== '') |
|
734 | 755 | $answers[] = $smcFunc['htmlspecialchars'](trim($answer)); |
756 | + } |
|
735 | 757 | if (empty($answers)) |
736 | 758 | { |
737 | - if (isset($context['question_answers'][$q_id])) |
|
738 | - $changes['delete'][] = $q_id; |
|
759 | + if (isset($context['question_answers'][$q_id])) { |
|
760 | + $changes['delete'][] = $q_id; |
|
761 | + } |
|
739 | 762 | continue; |
740 | 763 | } |
741 | 764 | $answers = json_encode($answers); |
@@ -745,16 +768,17 @@ discard block |
||
745 | 768 | { |
746 | 769 | // New question. Now, we don't want to randomly consume ids, so we'll set those, rather than trusting the browser's supplied ids. |
747 | 770 | $changes['insert'][] = array($lang_id, $question, $answers); |
748 | - } |
|
749 | - else |
|
771 | + } else |
|
750 | 772 | { |
751 | 773 | // It's an existing question. Let's see what's changed, if anything. |
752 | - if ($lang_id != $context['question_answers'][$q_id]['lngfile'] || $question != $context['question_answers'][$q_id]['question'] || $answers != $context['question_answers'][$q_id]['answers']) |
|
753 | - $changes['replace'][$q_id] = array('lngfile' => $lang_id, 'question' => $question, 'answers' => $answers); |
|
774 | + if ($lang_id != $context['question_answers'][$q_id]['lngfile'] || $question != $context['question_answers'][$q_id]['question'] || $answers != $context['question_answers'][$q_id]['answers']) { |
|
775 | + $changes['replace'][$q_id] = array('lngfile' => $lang_id, 'question' => $question, 'answers' => $answers); |
|
776 | + } |
|
754 | 777 | } |
755 | 778 | |
756 | - if (!isset($qs_per_lang[$lang_id])) |
|
757 | - $qs_per_lang[$lang_id] = 0; |
|
779 | + if (!isset($qs_per_lang[$lang_id])) { |
|
780 | + $qs_per_lang[$lang_id] = 0; |
|
781 | + } |
|
758 | 782 | $qs_per_lang[$lang_id]++; |
759 | 783 | } |
760 | 784 | } |
@@ -804,8 +828,9 @@ discard block |
||
804 | 828 | |
805 | 829 | // Lastly, the count of messages needs to be no more than the lowest number of questions for any one language. |
806 | 830 | $count_questions = empty($qs_per_lang) ? 0 : min($qs_per_lang); |
807 | - if (empty($count_questions) || $_POST['qa_verification_number'] > $count_questions) |
|
808 | - $_POST['qa_verification_number'] = $count_questions; |
|
831 | + if (empty($count_questions) || $_POST['qa_verification_number'] > $count_questions) { |
|
832 | + $_POST['qa_verification_number'] = $count_questions; |
|
833 | + } |
|
809 | 834 | |
810 | 835 | call_integration_hook('integrate_save_spam_settings', array(&$save_vars)); |
811 | 836 | |
@@ -820,24 +845,27 @@ discard block |
||
820 | 845 | |
821 | 846 | $character_range = array_merge(range('A', 'H'), array('K', 'M', 'N', 'P', 'R'), range('T', 'Y')); |
822 | 847 | $_SESSION['visual_verification_code'] = ''; |
823 | - for ($i = 0; $i < 6; $i++) |
|
824 | - $_SESSION['visual_verification_code'] .= $character_range[array_rand($character_range)]; |
|
848 | + for ($i = 0; $i < 6; $i++) { |
|
849 | + $_SESSION['visual_verification_code'] .= $character_range[array_rand($character_range)]; |
|
850 | + } |
|
825 | 851 | |
826 | 852 | // Some javascript for CAPTCHA. |
827 | 853 | $context['settings_post_javascript'] = ''; |
828 | - if ($context['use_graphic_library']) |
|
829 | - $context['settings_post_javascript'] .= ' |
|
854 | + if ($context['use_graphic_library']) { |
|
855 | + $context['settings_post_javascript'] .= ' |
|
830 | 856 | function refreshImages() |
831 | 857 | { |
832 | 858 | var imageType = document.getElementById(\'visual_verification_type\').value; |
833 | 859 | document.getElementById(\'verification_image\').src = \'' . $context['verification_image_href'] . ';type=\' + imageType; |
834 | 860 | }'; |
861 | + } |
|
835 | 862 | |
836 | 863 | // Show the image itself, or text saying we can't. |
837 | - if ($context['use_graphic_library']) |
|
838 | - $config_vars['vv']['postinput'] = '<br><img src="' . $context['verification_image_href'] . ';type=' . (empty($modSettings['visual_verification_type']) ? 0 : $modSettings['visual_verification_type']) . '" alt="' . $txt['setting_image_verification_sample'] . '" id="verification_image"><br>'; |
|
839 | - else |
|
840 | - $config_vars['vv']['postinput'] = '<br><span class="smalltext">' . $txt['setting_image_verification_nogd'] . '</span>'; |
|
864 | + if ($context['use_graphic_library']) { |
|
865 | + $config_vars['vv']['postinput'] = '<br><img src="' . $context['verification_image_href'] . ';type=' . (empty($modSettings['visual_verification_type']) ? 0 : $modSettings['visual_verification_type']) . '" alt="' . $txt['setting_image_verification_sample'] . '" id="verification_image"><br>'; |
|
866 | + } else { |
|
867 | + $config_vars['vv']['postinput'] = '<br><span class="smalltext">' . $txt['setting_image_verification_nogd'] . '</span>'; |
|
868 | + } |
|
841 | 869 | |
842 | 870 | // Hack for PM spam settings. |
843 | 871 | list ($modSettings['max_pm_recipients'], $modSettings['pm_posts_verification'], $modSettings['pm_posts_per_hour']) = explode(',', $modSettings['pm_spam_settings']); |
@@ -847,9 +875,10 @@ discard block |
||
847 | 875 | $modSettings['posts_require_captcha'] = !isset($modSettings['posts_require_captcha']) || $modSettings['posts_require_captcha'] == -1 ? 0 : $modSettings['posts_require_captcha']; |
848 | 876 | |
849 | 877 | // Some minor javascript for the guest post setting. |
850 | - if ($modSettings['posts_require_captcha']) |
|
851 | - $context['settings_post_javascript'] .= ' |
|
878 | + if ($modSettings['posts_require_captcha']) { |
|
879 | + $context['settings_post_javascript'] .= ' |
|
852 | 880 | document.getElementById(\'guests_require_captcha\').disabled = true;'; |
881 | + } |
|
853 | 882 | |
854 | 883 | // And everything else. |
855 | 884 | $context['post_url'] = $scripturl . '?action=admin;area=antispam;save'; |
@@ -896,8 +925,9 @@ discard block |
||
896 | 925 | |
897 | 926 | call_integration_hook('integrate_signature_settings', array(&$config_vars)); |
898 | 927 | |
899 | - if ($return_config) |
|
900 | - return $config_vars; |
|
928 | + if ($return_config) { |
|
929 | + return $config_vars; |
|
930 | + } |
|
901 | 931 | |
902 | 932 | // Setup the template. |
903 | 933 | $context['page_title'] = $txt['signature_settings']; |
@@ -952,8 +982,9 @@ discard block |
||
952 | 982 | $sig = strtr($row['signature'], array('<br>' => "\n")); |
953 | 983 | |
954 | 984 | // Max characters... |
955 | - if (!empty($sig_limits[1])) |
|
956 | - $sig = $smcFunc['substr']($sig, 0, $sig_limits[1]); |
|
985 | + if (!empty($sig_limits[1])) { |
|
986 | + $sig = $smcFunc['substr']($sig, 0, $sig_limits[1]); |
|
987 | + } |
|
957 | 988 | // Max lines... |
958 | 989 | if (!empty($sig_limits[2])) |
959 | 990 | { |
@@ -963,8 +994,9 @@ discard block |
||
963 | 994 | if ($sig[$i] == "\n") |
964 | 995 | { |
965 | 996 | $count++; |
966 | - if ($count >= $sig_limits[2]) |
|
967 | - $sig = substr($sig, 0, $i) . strtr(substr($sig, $i), array("\n" => ' ')); |
|
997 | + if ($count >= $sig_limits[2]) { |
|
998 | + $sig = substr($sig, 0, $i) . strtr(substr($sig, $i), array("\n" => ' ')); |
|
999 | + } |
|
968 | 1000 | } |
969 | 1001 | } |
970 | 1002 | } |
@@ -975,17 +1007,19 @@ discard block |
||
975 | 1007 | { |
976 | 1008 | $limit_broke = 0; |
977 | 1009 | // Attempt to allow all sizes of abuse, so to speak. |
978 | - if ($matches[2][$ind] == 'px' && $size > $sig_limits[7]) |
|
979 | - $limit_broke = $sig_limits[7] . 'px'; |
|
980 | - elseif ($matches[2][$ind] == 'pt' && $size > ($sig_limits[7] * 0.75)) |
|
981 | - $limit_broke = ((int) $sig_limits[7] * 0.75) . 'pt'; |
|
982 | - elseif ($matches[2][$ind] == 'em' && $size > ((float) $sig_limits[7] / 16)) |
|
983 | - $limit_broke = ((float) $sig_limits[7] / 16) . 'em'; |
|
984 | - elseif ($matches[2][$ind] != 'px' && $matches[2][$ind] != 'pt' && $matches[2][$ind] != 'em' && $sig_limits[7] < 18) |
|
985 | - $limit_broke = 'large'; |
|
986 | - |
|
987 | - if ($limit_broke) |
|
988 | - $sig = str_replace($matches[0][$ind], '[size=' . $sig_limits[7] . 'px', $sig); |
|
1010 | + if ($matches[2][$ind] == 'px' && $size > $sig_limits[7]) { |
|
1011 | + $limit_broke = $sig_limits[7] . 'px'; |
|
1012 | + } elseif ($matches[2][$ind] == 'pt' && $size > ($sig_limits[7] * 0.75)) { |
|
1013 | + $limit_broke = ((int) $sig_limits[7] * 0.75) . 'pt'; |
|
1014 | + } elseif ($matches[2][$ind] == 'em' && $size > ((float) $sig_limits[7] / 16)) { |
|
1015 | + $limit_broke = ((float) $sig_limits[7] / 16) . 'em'; |
|
1016 | + } elseif ($matches[2][$ind] != 'px' && $matches[2][$ind] != 'pt' && $matches[2][$ind] != 'em' && $sig_limits[7] < 18) { |
|
1017 | + $limit_broke = 'large'; |
|
1018 | + } |
|
1019 | + |
|
1020 | + if ($limit_broke) { |
|
1021 | + $sig = str_replace($matches[0][$ind], '[size=' . $sig_limits[7] . 'px', $sig); |
|
1022 | + } |
|
989 | 1023 | } |
990 | 1024 | } |
991 | 1025 | |
@@ -1041,32 +1075,34 @@ discard block |
||
1041 | 1075 | $img_offset = false; |
1042 | 1076 | } |
1043 | 1077 | } |
1078 | + } else { |
|
1079 | + $replaces[$image] = ''; |
|
1044 | 1080 | } |
1045 | - else |
|
1046 | - $replaces[$image] = ''; |
|
1047 | 1081 | |
1048 | 1082 | continue; |
1049 | 1083 | } |
1050 | 1084 | |
1051 | 1085 | // Does it have predefined restraints? Width first. |
1052 | - if ($matches[6][$key]) |
|
1053 | - $matches[2][$key] = $matches[6][$key]; |
|
1086 | + if ($matches[6][$key]) { |
|
1087 | + $matches[2][$key] = $matches[6][$key]; |
|
1088 | + } |
|
1054 | 1089 | if ($matches[2][$key] && $sig_limits[5] && $matches[2][$key] > $sig_limits[5]) |
1055 | 1090 | { |
1056 | 1091 | $width = $sig_limits[5]; |
1057 | 1092 | $matches[4][$key] = $matches[4][$key] * ($width / $matches[2][$key]); |
1093 | + } elseif ($matches[2][$key]) { |
|
1094 | + $width = $matches[2][$key]; |
|
1058 | 1095 | } |
1059 | - elseif ($matches[2][$key]) |
|
1060 | - $width = $matches[2][$key]; |
|
1061 | 1096 | // ... and height. |
1062 | 1097 | if ($matches[4][$key] && $sig_limits[6] && $matches[4][$key] > $sig_limits[6]) |
1063 | 1098 | { |
1064 | 1099 | $height = $sig_limits[6]; |
1065 | - if ($width != -1) |
|
1066 | - $width = $width * ($height / $matches[4][$key]); |
|
1100 | + if ($width != -1) { |
|
1101 | + $width = $width * ($height / $matches[4][$key]); |
|
1102 | + } |
|
1103 | + } elseif ($matches[4][$key]) { |
|
1104 | + $height = $matches[4][$key]; |
|
1067 | 1105 | } |
1068 | - elseif ($matches[4][$key]) |
|
1069 | - $height = $matches[4][$key]; |
|
1070 | 1106 | |
1071 | 1107 | // If the dimensions are still not fixed - we need to check the actual image. |
1072 | 1108 | if (($width == -1 && $sig_limits[5]) || ($height == -1 && $sig_limits[6])) |
@@ -1084,12 +1120,13 @@ discard block |
||
1084 | 1120 | if ($sizes[1] > $sig_limits[6] && $sig_limits[6]) |
1085 | 1121 | { |
1086 | 1122 | $height = $sig_limits[6]; |
1087 | - if ($width == -1) |
|
1088 | - $width = $sizes[0]; |
|
1123 | + if ($width == -1) { |
|
1124 | + $width = $sizes[0]; |
|
1125 | + } |
|
1089 | 1126 | $width = $width * ($height / $sizes[1]); |
1127 | + } elseif ($width != -1) { |
|
1128 | + $height = $sizes[1]; |
|
1090 | 1129 | } |
1091 | - elseif ($width != -1) |
|
1092 | - $height = $sizes[1]; |
|
1093 | 1130 | } |
1094 | 1131 | } |
1095 | 1132 | |
@@ -1102,8 +1139,9 @@ discard block |
||
1102 | 1139 | // Record that we got one. |
1103 | 1140 | $image_count_holder[$image] = isset($image_count_holder[$image]) ? $image_count_holder[$image] + 1 : 1; |
1104 | 1141 | } |
1105 | - if (!empty($replaces)) |
|
1106 | - $sig = str_replace(array_keys($replaces), array_values($replaces), $sig); |
|
1142 | + if (!empty($replaces)) { |
|
1143 | + $sig = str_replace(array_keys($replaces), array_values($replaces), $sig); |
|
1144 | + } |
|
1107 | 1145 | } |
1108 | 1146 | } |
1109 | 1147 | // Try to fix disabled tags. |
@@ -1115,18 +1153,20 @@ discard block |
||
1115 | 1153 | |
1116 | 1154 | $sig = strtr($sig, array("\n" => '<br>')); |
1117 | 1155 | call_integration_hook('integrate_apply_signature_settings', array(&$sig, $sig_limits, $disabledTags)); |
1118 | - if ($sig != $row['signature']) |
|
1119 | - $changes[$row['id_member']] = $sig; |
|
1156 | + if ($sig != $row['signature']) { |
|
1157 | + $changes[$row['id_member']] = $sig; |
|
1158 | + } |
|
1159 | + } |
|
1160 | + if ($smcFunc['db_num_rows']($request) == 0) { |
|
1161 | + $done = true; |
|
1120 | 1162 | } |
1121 | - if ($smcFunc['db_num_rows']($request) == 0) |
|
1122 | - $done = true; |
|
1123 | 1163 | $smcFunc['db_free_result']($request); |
1124 | 1164 | |
1125 | 1165 | // Do we need to delete what we have? |
1126 | 1166 | if (!empty($changes)) |
1127 | 1167 | { |
1128 | - foreach ($changes as $id => $sig) |
|
1129 | - $smcFunc['db_query']('', ' |
|
1168 | + foreach ($changes as $id => $sig) { |
|
1169 | + $smcFunc['db_query']('', ' |
|
1130 | 1170 | UPDATE {db_prefix}members |
1131 | 1171 | SET signature = {string:signature} |
1132 | 1172 | WHERE id_member = {int:id_member}', |
@@ -1135,11 +1175,13 @@ discard block |
||
1135 | 1175 | 'signature' => $sig, |
1136 | 1176 | ) |
1137 | 1177 | ); |
1178 | + } |
|
1138 | 1179 | } |
1139 | 1180 | |
1140 | 1181 | $_GET['step'] += 50; |
1141 | - if (!$done) |
|
1142 | - pauseSignatureApplySettings(); |
|
1182 | + if (!$done) { |
|
1183 | + pauseSignatureApplySettings(); |
|
1184 | + } |
|
1143 | 1185 | } |
1144 | 1186 | $settings_applied = true; |
1145 | 1187 | } |
@@ -1157,8 +1199,9 @@ discard block |
||
1157 | 1199 | ); |
1158 | 1200 | |
1159 | 1201 | // Temporarily make each setting a modSetting! |
1160 | - foreach ($context['signature_settings'] as $key => $value) |
|
1161 | - $modSettings['signature_' . $key] = $value; |
|
1202 | + foreach ($context['signature_settings'] as $key => $value) { |
|
1203 | + $modSettings['signature_' . $key] = $value; |
|
1204 | + } |
|
1162 | 1205 | |
1163 | 1206 | // Make sure we check the right tags! |
1164 | 1207 | $modSettings['bbc_disabled_signature_bbc'] = $disabledTags; |
@@ -1170,23 +1213,26 @@ discard block |
||
1170 | 1213 | |
1171 | 1214 | // Clean up the tag stuff! |
1172 | 1215 | $bbcTags = array(); |
1173 | - foreach (parse_bbc(false) as $tag) |
|
1174 | - $bbcTags[] = $tag['tag']; |
|
1216 | + foreach (parse_bbc(false) as $tag) { |
|
1217 | + $bbcTags[] = $tag['tag']; |
|
1218 | + } |
|
1175 | 1219 | |
1176 | - if (!isset($_POST['signature_bbc_enabledTags'])) |
|
1177 | - $_POST['signature_bbc_enabledTags'] = array(); |
|
1178 | - elseif (!is_array($_POST['signature_bbc_enabledTags'])) |
|
1179 | - $_POST['signature_bbc_enabledTags'] = array($_POST['signature_bbc_enabledTags']); |
|
1220 | + if (!isset($_POST['signature_bbc_enabledTags'])) { |
|
1221 | + $_POST['signature_bbc_enabledTags'] = array(); |
|
1222 | + } elseif (!is_array($_POST['signature_bbc_enabledTags'])) { |
|
1223 | + $_POST['signature_bbc_enabledTags'] = array($_POST['signature_bbc_enabledTags']); |
|
1224 | + } |
|
1180 | 1225 | |
1181 | 1226 | $sig_limits = array(); |
1182 | 1227 | foreach ($context['signature_settings'] as $key => $value) |
1183 | 1228 | { |
1184 | - if ($key == 'allow_smileys') |
|
1185 | - continue; |
|
1186 | - elseif ($key == 'max_smileys' && empty($_POST['signature_allow_smileys'])) |
|
1187 | - $sig_limits[] = -1; |
|
1188 | - else |
|
1189 | - $sig_limits[] = !empty($_POST['signature_' . $key]) ? max(1, (int) $_POST['signature_' . $key]) : 0; |
|
1229 | + if ($key == 'allow_smileys') { |
|
1230 | + continue; |
|
1231 | + } elseif ($key == 'max_smileys' && empty($_POST['signature_allow_smileys'])) { |
|
1232 | + $sig_limits[] = -1; |
|
1233 | + } else { |
|
1234 | + $sig_limits[] = !empty($_POST['signature_' . $key]) ? max(1, (int) $_POST['signature_' . $key]) : 0; |
|
1235 | + } |
|
1190 | 1236 | } |
1191 | 1237 | |
1192 | 1238 | call_integration_hook('integrate_save_signature_settings', array(&$sig_limits, &$bbcTags)); |
@@ -1219,12 +1265,14 @@ discard block |
||
1219 | 1265 | |
1220 | 1266 | // Try get more time... |
1221 | 1267 | @set_time_limit(600); |
1222 | - if (function_exists('apache_reset_timeout')) |
|
1223 | - @apache_reset_timeout(); |
|
1268 | + if (function_exists('apache_reset_timeout')) { |
|
1269 | + @apache_reset_timeout(); |
|
1270 | + } |
|
1224 | 1271 | |
1225 | 1272 | // Have we exhausted all the time we allowed? |
1226 | - if (time() - array_sum(explode(' ', $sig_start)) < 3) |
|
1227 | - return; |
|
1273 | + if (time() - array_sum(explode(' ', $sig_start)) < 3) { |
|
1274 | + return; |
|
1275 | + } |
|
1228 | 1276 | |
1229 | 1277 | $context['continue_get_data'] = '?action=admin;area=featuresettings;sa=sig;apply;step=' . $_GET['step'] . ';' . $context['session_var'] . '=' . $context['session_id']; |
1230 | 1278 | $context['page_title'] = $txt['not_done_title']; |
@@ -1270,9 +1318,10 @@ discard block |
||
1270 | 1318 | $disable_fields = array_flip($standard_fields); |
1271 | 1319 | if (!empty($_POST['active'])) |
1272 | 1320 | { |
1273 | - foreach ($_POST['active'] as $value) |
|
1274 | - if (isset($disable_fields[$value])) |
|
1321 | + foreach ($_POST['active'] as $value) { |
|
1322 | + if (isset($disable_fields[$value])) |
|
1275 | 1323 | unset($disable_fields[$value]); |
1324 | + } |
|
1276 | 1325 | } |
1277 | 1326 | // What we have left! |
1278 | 1327 | $changes['disabled_profile_fields'] = empty($disable_fields) ? '' : implode(',', array_keys($disable_fields)); |
@@ -1281,16 +1330,18 @@ discard block |
||
1281 | 1330 | $reg_fields = array(); |
1282 | 1331 | if (!empty($_POST['reg'])) |
1283 | 1332 | { |
1284 | - foreach ($_POST['reg'] as $value) |
|
1285 | - if (in_array($value, $standard_fields) && !isset($disable_fields[$value])) |
|
1333 | + foreach ($_POST['reg'] as $value) { |
|
1334 | + if (in_array($value, $standard_fields) && !isset($disable_fields[$value])) |
|
1286 | 1335 | $reg_fields[] = $value; |
1336 | + } |
|
1287 | 1337 | } |
1288 | 1338 | // What we have left! |
1289 | 1339 | $changes['registration_fields'] = empty($reg_fields) ? '' : implode(',', $reg_fields); |
1290 | 1340 | |
1291 | 1341 | $_SESSION['adm-save'] = true; |
1292 | - if (!empty($changes)) |
|
1293 | - updateSettings($changes); |
|
1342 | + if (!empty($changes)) { |
|
1343 | + updateSettings($changes); |
|
1344 | + } |
|
1294 | 1345 | } |
1295 | 1346 | |
1296 | 1347 | createToken('admin-scp'); |
@@ -1393,11 +1444,13 @@ discard block |
||
1393 | 1444 | { |
1394 | 1445 | $return = '<p class="centertext bold_text">'. $rowData['field_order'] .'<br />'; |
1395 | 1446 | |
1396 | - if ($rowData['field_order'] > 1) |
|
1397 | - $return .= '<a href="' . $scripturl . '?action=admin;area=featuresettings;sa=profileedit;fid=' . $rowData['id_field'] . ';move=up"><span class="toggle_up" title="'. $txt['custom_edit_order_move'] .' '. $txt['custom_edit_order_up'] .'"></span></a>'; |
|
1447 | + if ($rowData['field_order'] > 1) { |
|
1448 | + $return .= '<a href="' . $scripturl . '?action=admin;area=featuresettings;sa=profileedit;fid=' . $rowData['id_field'] . ';move=up"><span class="toggle_up" title="'. $txt['custom_edit_order_move'] .' '. $txt['custom_edit_order_up'] .'"></span></a>'; |
|
1449 | + } |
|
1398 | 1450 | |
1399 | - if ($rowData['field_order'] < $context['custFieldsMaxOrder']) |
|
1400 | - $return .= '<a href="' . $scripturl . '?action=admin;area=featuresettings;sa=profileedit;fid=' . $rowData['id_field'] . ';move=down"><span class="toggle_down" title="'. $txt['custom_edit_order_move'] .' '. $txt['custom_edit_order_down'] .'"></span></a>'; |
|
1451 | + if ($rowData['field_order'] < $context['custFieldsMaxOrder']) { |
|
1452 | + $return .= '<a href="' . $scripturl . '?action=admin;area=featuresettings;sa=profileedit;fid=' . $rowData['id_field'] . ';move=down"><span class="toggle_down" title="'. $txt['custom_edit_order_move'] .' '. $txt['custom_edit_order_down'] .'"></span></a>'; |
|
1453 | + } |
|
1401 | 1454 | |
1402 | 1455 | $return .= '</p>'; |
1403 | 1456 | |
@@ -1535,16 +1588,16 @@ discard block |
||
1535 | 1588 | $disabled_fields = isset($modSettings['disabled_profile_fields']) ? explode(',', $modSettings['disabled_profile_fields']) : array(); |
1536 | 1589 | $registration_fields = isset($modSettings['registration_fields']) ? explode(',', $modSettings['registration_fields']) : array(); |
1537 | 1590 | |
1538 | - foreach ($standard_fields as $field) |
|
1539 | - $list[] = array( |
|
1591 | + foreach ($standard_fields as $field) { |
|
1592 | + $list[] = array( |
|
1540 | 1593 | 'id' => $field, |
1541 | 1594 | 'label' => isset($txt['standard_profile_field_' . $field]) ? $txt['standard_profile_field_' . $field] : (isset($txt[$field]) ? $txt[$field] : $field), |
1542 | 1595 | 'disabled' => in_array($field, $disabled_fields), |
1543 | 1596 | 'on_register' => in_array($field, $registration_fields) && !in_array($field, $fields_no_registration), |
1544 | 1597 | 'can_show_register' => !in_array($field, $fields_no_registration), |
1545 | 1598 | ); |
1546 | - } |
|
1547 | - else |
|
1599 | + } |
|
1600 | + } else |
|
1548 | 1601 | { |
1549 | 1602 | // Load all the fields. |
1550 | 1603 | $request = $smcFunc['db_query']('', ' |
@@ -1558,8 +1611,9 @@ discard block |
||
1558 | 1611 | 'items_per_page' => $items_per_page, |
1559 | 1612 | ) |
1560 | 1613 | ); |
1561 | - while ($row = $smcFunc['db_fetch_assoc']($request)) |
|
1562 | - $list[] = $row; |
|
1614 | + while ($row = $smcFunc['db_fetch_assoc']($request)) { |
|
1615 | + $list[] = $row; |
|
1616 | + } |
|
1563 | 1617 | $smcFunc['db_free_result']($request); |
1564 | 1618 | } |
1565 | 1619 | |
@@ -1625,9 +1679,9 @@ discard block |
||
1625 | 1679 | $context['field'] = array(); |
1626 | 1680 | while ($row = $smcFunc['db_fetch_assoc']($request)) |
1627 | 1681 | { |
1628 | - if ($row['field_type'] == 'textarea') |
|
1629 | - @list ($rows, $cols) = @explode(',', $row['default_value']); |
|
1630 | - else |
|
1682 | + if ($row['field_type'] == 'textarea') { |
|
1683 | + @list ($rows, $cols) = @explode(',', $row['default_value']); |
|
1684 | + } else |
|
1631 | 1685 | { |
1632 | 1686 | $rows = 3; |
1633 | 1687 | $cols = 30; |
@@ -1663,8 +1717,8 @@ discard block |
||
1663 | 1717 | } |
1664 | 1718 | |
1665 | 1719 | // Setup the default values as needed. |
1666 | - if (empty($context['field'])) |
|
1667 | - $context['field'] = array( |
|
1720 | + if (empty($context['field'])) { |
|
1721 | + $context['field'] = array( |
|
1668 | 1722 | 'name' => '', |
1669 | 1723 | 'col_name' => '???', |
1670 | 1724 | 'desc' => '', |
@@ -1689,6 +1743,7 @@ discard block |
||
1689 | 1743 | 'enclose' => '', |
1690 | 1744 | 'placement' => 0, |
1691 | 1745 | ); |
1746 | + } |
|
1692 | 1747 | |
1693 | 1748 | // Are we moving it? |
1694 | 1749 | if (isset($_GET['move']) && in_array($smcFunc['htmlspecialchars']($_GET['move']), $move_to)) |
@@ -1697,8 +1752,10 @@ discard block |
||
1697 | 1752 | $new_order = ($_GET['move'] == 'up' ? ($context['field']['order'] - 1) : ($context['field']['order'] + 1)); |
1698 | 1753 | |
1699 | 1754 | // Is this a valid position? |
1700 | - if ($new_order <= 0 || $new_order > $order_count) |
|
1701 | - redirectexit('action=admin;area=featuresettings;sa=profile'); // @todo implement an error handler |
|
1755 | + if ($new_order <= 0 || $new_order > $order_count) { |
|
1756 | + redirectexit('action=admin;area=featuresettings;sa=profile'); |
|
1757 | + } |
|
1758 | + // @todo implement an error handler |
|
1702 | 1759 | |
1703 | 1760 | // All good, proceed. |
1704 | 1761 | $smcFunc['db_query']('',' |
@@ -1729,12 +1786,14 @@ discard block |
||
1729 | 1786 | validateToken('admin-ecp'); |
1730 | 1787 | |
1731 | 1788 | // Everyone needs a name - even the (bracket) unknown... |
1732 | - if (trim($_POST['field_name']) == '') |
|
1733 | - redirectexit($scripturl . '?action=admin;area=featuresettings;sa=profileedit;fid=' . $_GET['fid'] . ';msg=need_name'); |
|
1789 | + if (trim($_POST['field_name']) == '') { |
|
1790 | + redirectexit($scripturl . '?action=admin;area=featuresettings;sa=profileedit;fid=' . $_GET['fid'] . ';msg=need_name'); |
|
1791 | + } |
|
1734 | 1792 | |
1735 | 1793 | // Regex you say? Do a very basic test to see if the pattern is valid |
1736 | - if (!empty($_POST['regex']) && @preg_match($_POST['regex'], 'dummy') === false) |
|
1737 | - redirectexit($scripturl . '?action=admin;area=featuresettings;sa=profileedit;fid=' . $_GET['fid'] . ';msg=regex_error'); |
|
1794 | + if (!empty($_POST['regex']) && @preg_match($_POST['regex'], 'dummy') === false) { |
|
1795 | + redirectexit($scripturl . '?action=admin;area=featuresettings;sa=profileedit;fid=' . $_GET['fid'] . ';msg=regex_error'); |
|
1796 | + } |
|
1738 | 1797 | |
1739 | 1798 | $_POST['field_name'] = $smcFunc['htmlspecialchars']($_POST['field_name']); |
1740 | 1799 | $_POST['field_desc'] = $smcFunc['htmlspecialchars']($_POST['field_desc']); |
@@ -1751,8 +1810,9 @@ discard block |
||
1751 | 1810 | |
1752 | 1811 | // Some masking stuff... |
1753 | 1812 | $mask = isset($_POST['mask']) ? $_POST['mask'] : ''; |
1754 | - if ($mask == 'regex' && isset($_POST['regex'])) |
|
1755 | - $mask .= $_POST['regex']; |
|
1813 | + if ($mask == 'regex' && isset($_POST['regex'])) { |
|
1814 | + $mask .= $_POST['regex']; |
|
1815 | + } |
|
1756 | 1816 | |
1757 | 1817 | $field_length = isset($_POST['max_length']) ? (int) $_POST['max_length'] : 255; |
1758 | 1818 | $enclose = isset($_POST['enclose']) ? $_POST['enclose'] : ''; |
@@ -1771,8 +1831,9 @@ discard block |
||
1771 | 1831 | $v = strtr($v, array(',' => '')); |
1772 | 1832 | |
1773 | 1833 | // Nada, zip, etc... |
1774 | - if (trim($v) == '') |
|
1775 | - continue; |
|
1834 | + if (trim($v) == '') { |
|
1835 | + continue; |
|
1836 | + } |
|
1776 | 1837 | |
1777 | 1838 | // Otherwise, save it boy. |
1778 | 1839 | $field_options .= $v . ','; |
@@ -1780,15 +1841,17 @@ discard block |
||
1780 | 1841 | $newOptions[$k] = $v; |
1781 | 1842 | |
1782 | 1843 | // Is it default? |
1783 | - if (isset($_POST['default_select']) && $_POST['default_select'] == $k) |
|
1784 | - $default = $v; |
|
1844 | + if (isset($_POST['default_select']) && $_POST['default_select'] == $k) { |
|
1845 | + $default = $v; |
|
1846 | + } |
|
1785 | 1847 | } |
1786 | 1848 | $field_options = substr($field_options, 0, -1); |
1787 | 1849 | } |
1788 | 1850 | |
1789 | 1851 | // Text area has default has dimensions |
1790 | - if ($_POST['field_type'] == 'textarea') |
|
1791 | - $default = (int) $_POST['rows'] . ',' . (int) $_POST['cols']; |
|
1852 | + if ($_POST['field_type'] == 'textarea') { |
|
1853 | + $default = (int) $_POST['rows'] . ',' . (int) $_POST['cols']; |
|
1854 | + } |
|
1792 | 1855 | |
1793 | 1856 | // Come up with the unique name? |
1794 | 1857 | if (empty($context['fid'])) |
@@ -1797,32 +1860,36 @@ discard block |
||
1797 | 1860 | preg_match('~([\w\d_-]+)~', $col_name, $matches); |
1798 | 1861 | |
1799 | 1862 | // If there is nothing to the name, then let's start out own - for foreign languages etc. |
1800 | - if (isset($matches[1])) |
|
1801 | - $col_name = $initial_col_name = 'cust_' . strtolower($matches[1]); |
|
1802 | - else |
|
1803 | - $col_name = $initial_col_name = 'cust_' . mt_rand(1, 9999); |
|
1863 | + if (isset($matches[1])) { |
|
1864 | + $col_name = $initial_col_name = 'cust_' . strtolower($matches[1]); |
|
1865 | + } else { |
|
1866 | + $col_name = $initial_col_name = 'cust_' . mt_rand(1, 9999); |
|
1867 | + } |
|
1804 | 1868 | |
1805 | 1869 | // Make sure this is unique. |
1806 | 1870 | $current_fields = array(); |
1807 | 1871 | $request = $smcFunc['db_query']('', ' |
1808 | 1872 | SELECT id_field, col_name |
1809 | 1873 | FROM {db_prefix}custom_fields'); |
1810 | - while ($row = $smcFunc['db_fetch_assoc']($request)) |
|
1811 | - $current_fields[$row['id_field']] = $row['col_name']; |
|
1874 | + while ($row = $smcFunc['db_fetch_assoc']($request)) { |
|
1875 | + $current_fields[$row['id_field']] = $row['col_name']; |
|
1876 | + } |
|
1812 | 1877 | $smcFunc['db_free_result']($request); |
1813 | 1878 | |
1814 | 1879 | $unique = false; |
1815 | 1880 | for ($i = 0; !$unique && $i < 9; $i ++) |
1816 | 1881 | { |
1817 | - if (!in_array($col_name, $current_fields)) |
|
1818 | - $unique = true; |
|
1819 | - else |
|
1820 | - $col_name = $initial_col_name . $i; |
|
1882 | + if (!in_array($col_name, $current_fields)) { |
|
1883 | + $unique = true; |
|
1884 | + } else { |
|
1885 | + $col_name = $initial_col_name . $i; |
|
1886 | + } |
|
1821 | 1887 | } |
1822 | 1888 | |
1823 | 1889 | // Still not a unique column name? Leave it up to the user, then. |
1824 | - if (!$unique) |
|
1825 | - fatal_lang_error('custom_option_not_unique'); |
|
1890 | + if (!$unique) { |
|
1891 | + fatal_lang_error('custom_option_not_unique'); |
|
1892 | + } |
|
1826 | 1893 | } |
1827 | 1894 | // Work out what to do with the user data otherwise... |
1828 | 1895 | else |
@@ -1850,8 +1917,9 @@ discard block |
||
1850 | 1917 | // Work out what's changed! |
1851 | 1918 | foreach ($context['field']['options'] as $k => $option) |
1852 | 1919 | { |
1853 | - if (trim($option) == '') |
|
1854 | - continue; |
|
1920 | + if (trim($option) == '') { |
|
1921 | + continue; |
|
1922 | + } |
|
1855 | 1923 | |
1856 | 1924 | // Still exists? |
1857 | 1925 | if (in_array($option, $newOptions)) |
@@ -1865,8 +1933,8 @@ discard block |
||
1865 | 1933 | foreach ($optionChanges as $k => $option) |
1866 | 1934 | { |
1867 | 1935 | // Just been renamed? |
1868 | - if (!in_array($k, $takenKeys) && !empty($newOptions[$k])) |
|
1869 | - $smcFunc['db_query']('', ' |
|
1936 | + if (!in_array($k, $takenKeys) && !empty($newOptions[$k])) { |
|
1937 | + $smcFunc['db_query']('', ' |
|
1870 | 1938 | UPDATE {db_prefix}themes |
1871 | 1939 | SET value = {string:new_value} |
1872 | 1940 | WHERE variable = {string:current_column} |
@@ -1879,6 +1947,7 @@ discard block |
||
1879 | 1947 | 'old_value' => $option, |
1880 | 1948 | ) |
1881 | 1949 | ); |
1950 | + } |
|
1882 | 1951 | } |
1883 | 1952 | } |
1884 | 1953 | // @todo Maybe we should adjust based on new text length limits? |
@@ -1921,8 +1990,8 @@ discard block |
||
1921 | 1990 | ); |
1922 | 1991 | |
1923 | 1992 | // Just clean up any old selects - these are a pain! |
1924 | - if (($_POST['field_type'] == 'select' || $_POST['field_type'] == 'radio') && !empty($newOptions)) |
|
1925 | - $smcFunc['db_query']('', ' |
|
1993 | + if (($_POST['field_type'] == 'select' || $_POST['field_type'] == 'radio') && !empty($newOptions)) { |
|
1994 | + $smcFunc['db_query']('', ' |
|
1926 | 1995 | DELETE FROM {db_prefix}themes |
1927 | 1996 | WHERE variable = {string:current_column} |
1928 | 1997 | AND value NOT IN ({array_string:new_option_values}) |
@@ -1933,8 +2002,8 @@ discard block |
||
1933 | 2002 | 'current_column' => $context['field']['col_name'], |
1934 | 2003 | ) |
1935 | 2004 | ); |
1936 | - } |
|
1937 | - else |
|
2005 | + } |
|
2006 | + } else |
|
1938 | 2007 | { |
1939 | 2008 | // Gotta figure it out the order. |
1940 | 2009 | $new_order = $order_count > 1 ? ($order_count + 1) : 1; |
@@ -2108,11 +2177,13 @@ discard block |
||
2108 | 2177 | call_integration_hook('integrate_prune_settings', array(&$config_vars, &$prune_toggle, false)); |
2109 | 2178 | |
2110 | 2179 | $prune_toggle_dt = array(); |
2111 | - foreach ($prune_toggle as $item) |
|
2112 | - $prune_toggle_dt[] = 'setting_' . $item; |
|
2180 | + foreach ($prune_toggle as $item) { |
|
2181 | + $prune_toggle_dt[] = 'setting_' . $item; |
|
2182 | + } |
|
2113 | 2183 | |
2114 | - if ($return_config) |
|
2115 | - return $config_vars; |
|
2184 | + if ($return_config) { |
|
2185 | + return $config_vars; |
|
2186 | + } |
|
2116 | 2187 | |
2117 | 2188 | addInlineJavaScript(' |
2118 | 2189 | function togglePruned() |
@@ -2150,15 +2221,16 @@ discard block |
||
2150 | 2221 | $vals = array(); |
2151 | 2222 | foreach ($config_vars as $index => $dummy) |
2152 | 2223 | { |
2153 | - if (!is_array($dummy) || $index == 'pruningOptions' || !in_array($dummy[1], $prune_toggle)) |
|
2154 | - continue; |
|
2224 | + if (!is_array($dummy) || $index == 'pruningOptions' || !in_array($dummy[1], $prune_toggle)) { |
|
2225 | + continue; |
|
2226 | + } |
|
2155 | 2227 | |
2156 | 2228 | $vals[] = empty($_POST[$dummy[1]]) || $_POST[$dummy[1]] < 0 ? 0 : (int) $_POST[$dummy[1]]; |
2157 | 2229 | } |
2158 | 2230 | $_POST['pruningOptions'] = implode(',', $vals); |
2231 | + } else { |
|
2232 | + $_POST['pruningOptions'] = ''; |
|
2159 | 2233 | } |
2160 | - else |
|
2161 | - $_POST['pruningOptions'] = ''; |
|
2162 | 2234 | |
2163 | 2235 | saveDBSettings($savevar); |
2164 | 2236 | $_SESSION['adm-save'] = true; |
@@ -2170,10 +2242,11 @@ discard block |
||
2170 | 2242 | $context['sub_template'] = 'show_settings'; |
2171 | 2243 | |
2172 | 2244 | // Get the actual values |
2173 | - if (!empty($modSettings['pruningOptions'])) |
|
2174 | - @list ($modSettings['pruneErrorLog'], $modSettings['pruneModLog'], $modSettings['pruneBanLog'], $modSettings['pruneReportLog'], $modSettings['pruneScheduledTaskLog'], $modSettings['pruneSpiderHitLog']) = explode(',', $modSettings['pruningOptions']); |
|
2175 | - else |
|
2176 | - $modSettings['pruneErrorLog'] = $modSettings['pruneModLog'] = $modSettings['pruneBanLog'] = $modSettings['pruneReportLog'] = $modSettings['pruneScheduledTaskLog'] = $modSettings['pruneSpiderHitLog'] = 0; |
|
2245 | + if (!empty($modSettings['pruningOptions'])) { |
|
2246 | + @list ($modSettings['pruneErrorLog'], $modSettings['pruneModLog'], $modSettings['pruneBanLog'], $modSettings['pruneReportLog'], $modSettings['pruneScheduledTaskLog'], $modSettings['pruneSpiderHitLog']) = explode(',', $modSettings['pruningOptions']); |
|
2247 | + } else { |
|
2248 | + $modSettings['pruneErrorLog'] = $modSettings['pruneModLog'] = $modSettings['pruneBanLog'] = $modSettings['pruneReportLog'] = $modSettings['pruneScheduledTaskLog'] = $modSettings['pruneSpiderHitLog'] = 0; |
|
2249 | + } |
|
2177 | 2250 | |
2178 | 2251 | prepareDBSettingContext($config_vars); |
2179 | 2252 | } |
@@ -2195,8 +2268,9 @@ discard block |
||
2195 | 2268 | // Make it even easier to add new settings. |
2196 | 2269 | call_integration_hook('integrate_general_mod_settings', array(&$config_vars)); |
2197 | 2270 | |
2198 | - if ($return_config) |
|
2199 | - return $config_vars; |
|
2271 | + if ($return_config) { |
|
2272 | + return $config_vars; |
|
2273 | + } |
|
2200 | 2274 | |
2201 | 2275 | $context['post_url'] = $scripturl . '?action=admin;area=modsettings;save;sa=general'; |
2202 | 2276 | $context['settings_title'] = $txt['mods_cat_modifications_misc']; |
@@ -52,7 +52,7 @@ discard block |
||
52 | 52 | require_once($sourcedir . '/Subs-Auth.php'); |
53 | 53 | |
54 | 54 | // Posting the password... check it. |
55 | - if (isset($_POST[$type. '_pass'])) |
|
55 | + if (isset($_POST[$type . '_pass'])) |
|
56 | 56 | { |
57 | 57 | // Check to ensure we're forcing SSL for authentication |
58 | 58 | if (!empty($modSettings['force_ssl']) && empty($maintenance) && (!isset($_SERVER['HTTPS']) || $_SERVER['HTTPS'] != 'on')) |
@@ -179,7 +179,7 @@ discard block |
||
179 | 179 | { |
180 | 180 | if ($ip_number == 'ip2' && $user_info['ip2'] == $user_info['ip']) |
181 | 181 | continue; |
182 | - $ban_query[] = ' {inet:'.$ip_number.'} BETWEEN bi.ip_low and bi.ip_high'; |
|
182 | + $ban_query[] = ' {inet:' . $ip_number . '} BETWEEN bi.ip_low and bi.ip_high'; |
|
183 | 183 | $ban_query_vars[$ip_number] = $user_info[$ip_number]; |
184 | 184 | // IP was valid, maybe there's also a hostname... |
185 | 185 | if (empty($modSettings['disableHostnameLookup']) && $user_info[$ip_number] != 'unknown') |
@@ -187,8 +187,8 @@ discard block |
||
187 | 187 | $hostname = host_from_ip($user_info[$ip_number]); |
188 | 188 | if (strlen($hostname) > 0) |
189 | 189 | { |
190 | - $ban_query[] = '({string:hostname'.$ip_number.'} LIKE bi.hostname)'; |
|
191 | - $ban_query_vars['hostname'.$ip_number] = $hostname; |
|
190 | + $ban_query[] = '({string:hostname' . $ip_number . '} LIKE bi.hostname)'; |
|
191 | + $ban_query_vars['hostname' . $ip_number] = $hostname; |
|
192 | 192 | } |
193 | 193 | } |
194 | 194 | } |
@@ -912,7 +912,7 @@ discard block |
||
912 | 912 | return true; |
913 | 913 | |
914 | 914 | // Let's ensure this is an array. |
915 | - $permission = (array)$permission; |
|
915 | + $permission = (array) $permission; |
|
916 | 916 | |
917 | 917 | // Are we checking the _current_ board, or some other boards? |
918 | 918 | if ($boards === null) |
@@ -14,8 +14,9 @@ discard block |
||
14 | 14 | * @version 2.1 Beta 3 |
15 | 15 | */ |
16 | 16 | |
17 | -if (!defined('SMF')) |
|
17 | +if (!defined('SMF')) { |
|
18 | 18 | die('No direct access...'); |
19 | +} |
|
19 | 20 | |
20 | 21 | /** |
21 | 22 | * Check if the user is who he/she says he is |
@@ -42,12 +43,14 @@ discard block |
||
42 | 43 | $refreshTime = isset($_GET['xml']) ? 4200 : 3600; |
43 | 44 | |
44 | 45 | // Is the security option off? |
45 | - if (!empty($modSettings['securityDisable' . ($type != 'admin' ? '_' . $type : '')])) |
|
46 | - return; |
|
46 | + if (!empty($modSettings['securityDisable' . ($type != 'admin' ? '_' . $type : '')])) { |
|
47 | + return; |
|
48 | + } |
|
47 | 49 | |
48 | 50 | // Or are they already logged in?, Moderator or admin session is need for this area |
49 | - if ((!empty($_SESSION[$type . '_time']) && $_SESSION[$type . '_time'] + $refreshTime >= time()) || (!empty($_SESSION['admin_time']) && $_SESSION['admin_time'] + $refreshTime >= time())) |
|
50 | - return; |
|
51 | + if ((!empty($_SESSION[$type . '_time']) && $_SESSION[$type . '_time'] + $refreshTime >= time()) || (!empty($_SESSION['admin_time']) && $_SESSION['admin_time'] + $refreshTime >= time())) { |
|
52 | + return; |
|
53 | + } |
|
51 | 54 | |
52 | 55 | require_once($sourcedir . '/Subs-Auth.php'); |
53 | 56 | |
@@ -55,8 +58,9 @@ discard block |
||
55 | 58 | if (isset($_POST[$type. '_pass'])) |
56 | 59 | { |
57 | 60 | // Check to ensure we're forcing SSL for authentication |
58 | - if (!empty($modSettings['force_ssl']) && empty($maintenance) && (!isset($_SERVER['HTTPS']) || $_SERVER['HTTPS'] != 'on')) |
|
59 | - fatal_lang_error('login_ssl_required'); |
|
61 | + if (!empty($modSettings['force_ssl']) && empty($maintenance) && (!isset($_SERVER['HTTPS']) || $_SERVER['HTTPS'] != 'on')) { |
|
62 | + fatal_lang_error('login_ssl_required'); |
|
63 | + } |
|
60 | 64 | |
61 | 65 | checkSession(); |
62 | 66 | |
@@ -72,17 +76,19 @@ discard block |
||
72 | 76 | } |
73 | 77 | |
74 | 78 | // Better be sure to remember the real referer |
75 | - if (empty($_SESSION['request_referer'])) |
|
76 | - $_SESSION['request_referer'] = isset($_SERVER['HTTP_REFERER']) ? @parse_url($_SERVER['HTTP_REFERER']) : array(); |
|
77 | - elseif (empty($_POST)) |
|
78 | - unset($_SESSION['request_referer']); |
|
79 | + if (empty($_SESSION['request_referer'])) { |
|
80 | + $_SESSION['request_referer'] = isset($_SERVER['HTTP_REFERER']) ? @parse_url($_SERVER['HTTP_REFERER']) : array(); |
|
81 | + } elseif (empty($_POST)) { |
|
82 | + unset($_SESSION['request_referer']); |
|
83 | + } |
|
79 | 84 | |
80 | 85 | // Need to type in a password for that, man. |
81 | - if (!isset($_GET['xml'])) |
|
82 | - adminLogin($type); |
|
83 | - else |
|
84 | - return 'session_verify_fail'; |
|
85 | -} |
|
86 | + if (!isset($_GET['xml'])) { |
|
87 | + adminLogin($type); |
|
88 | + } else { |
|
89 | + return 'session_verify_fail'; |
|
90 | + } |
|
91 | + } |
|
86 | 92 | |
87 | 93 | /** |
88 | 94 | * Require a user who is logged in. (not a guest.) |
@@ -96,25 +102,30 @@ discard block |
||
96 | 102 | global $user_info, $txt, $context, $scripturl, $modSettings; |
97 | 103 | |
98 | 104 | // Luckily, this person isn't a guest. |
99 | - if (!$user_info['is_guest']) |
|
100 | - return; |
|
105 | + if (!$user_info['is_guest']) { |
|
106 | + return; |
|
107 | + } |
|
101 | 108 | |
102 | 109 | // Log what they were trying to do didn't work) |
103 | - if (!empty($modSettings['who_enabled'])) |
|
104 | - $_GET['error'] = 'guest_login'; |
|
110 | + if (!empty($modSettings['who_enabled'])) { |
|
111 | + $_GET['error'] = 'guest_login'; |
|
112 | + } |
|
105 | 113 | writeLog(true); |
106 | 114 | |
107 | 115 | // Just die. |
108 | - if (isset($_REQUEST['xml'])) |
|
109 | - obExit(false); |
|
116 | + if (isset($_REQUEST['xml'])) { |
|
117 | + obExit(false); |
|
118 | + } |
|
110 | 119 | |
111 | 120 | // Attempt to detect if they came from dlattach. |
112 | - if (SMF != 'SSI' && empty($context['theme_loaded'])) |
|
113 | - loadTheme(); |
|
121 | + if (SMF != 'SSI' && empty($context['theme_loaded'])) { |
|
122 | + loadTheme(); |
|
123 | + } |
|
114 | 124 | |
115 | 125 | // Never redirect to an attachment |
116 | - if (strpos($_SERVER['REQUEST_URL'], 'dlattach') === false) |
|
117 | - $_SESSION['login_url'] = $_SERVER['REQUEST_URL']; |
|
126 | + if (strpos($_SERVER['REQUEST_URL'], 'dlattach') === false) { |
|
127 | + $_SESSION['login_url'] = $_SERVER['REQUEST_URL']; |
|
128 | + } |
|
118 | 129 | |
119 | 130 | // Load the Login template and language file. |
120 | 131 | loadLanguage('Login'); |
@@ -124,8 +135,7 @@ discard block |
||
124 | 135 | { |
125 | 136 | $_SESSION['login_url'] = $scripturl . '?' . $_SERVER['QUERY_STRING']; |
126 | 137 | redirectexit('action=login'); |
127 | - } |
|
128 | - else |
|
138 | + } else |
|
129 | 139 | { |
130 | 140 | loadTemplate('Login'); |
131 | 141 | $context['sub_template'] = 'kick_guest'; |
@@ -155,8 +165,9 @@ discard block |
||
155 | 165 | global $sourcedir, $cookiename, $user_settings, $smcFunc; |
156 | 166 | |
157 | 167 | // You cannot be banned if you are an admin - doesn't help if you log out. |
158 | - if ($user_info['is_admin']) |
|
159 | - return; |
|
168 | + if ($user_info['is_admin']) { |
|
169 | + return; |
|
170 | + } |
|
160 | 171 | |
161 | 172 | // Only check the ban every so often. (to reduce load.) |
162 | 173 | if ($forceCheck || !isset($_SESSION['ban']) || empty($modSettings['banLastUpdated']) || ($_SESSION['ban']['last_checked'] < $modSettings['banLastUpdated']) || $_SESSION['ban']['id_member'] != $user_info['id'] || $_SESSION['ban']['ip'] != $user_info['ip'] || $_SESSION['ban']['ip2'] != $user_info['ip2'] || (isset($user_info['email'], $_SESSION['ban']['email']) && $_SESSION['ban']['email'] != $user_info['email'])) |
@@ -177,8 +188,9 @@ discard block |
||
177 | 188 | // Check both IP addresses. |
178 | 189 | foreach (array('ip', 'ip2') as $ip_number) |
179 | 190 | { |
180 | - if ($ip_number == 'ip2' && $user_info['ip2'] == $user_info['ip']) |
|
181 | - continue; |
|
191 | + if ($ip_number == 'ip2' && $user_info['ip2'] == $user_info['ip']) { |
|
192 | + continue; |
|
193 | + } |
|
182 | 194 | $ban_query[] = ' {inet:'.$ip_number.'} BETWEEN bi.ip_low and bi.ip_high'; |
183 | 195 | $ban_query_vars[$ip_number] = $user_info[$ip_number]; |
184 | 196 | // IP was valid, maybe there's also a hostname... |
@@ -228,24 +240,28 @@ discard block |
||
228 | 240 | // Store every type of ban that applies to you in your session. |
229 | 241 | while ($row = $smcFunc['db_fetch_assoc']($request)) |
230 | 242 | { |
231 | - foreach ($restrictions as $restriction) |
|
232 | - if (!empty($row[$restriction])) |
|
243 | + foreach ($restrictions as $restriction) { |
|
244 | + if (!empty($row[$restriction])) |
|
233 | 245 | { |
234 | 246 | $_SESSION['ban'][$restriction]['reason'] = $row['reason']; |
247 | + } |
|
235 | 248 | $_SESSION['ban'][$restriction]['ids'][] = $row['id_ban']; |
236 | - if (!isset($_SESSION['ban']['expire_time']) || ($_SESSION['ban']['expire_time'] != 0 && ($row['expire_time'] == 0 || $row['expire_time'] > $_SESSION['ban']['expire_time']))) |
|
237 | - $_SESSION['ban']['expire_time'] = $row['expire_time']; |
|
249 | + if (!isset($_SESSION['ban']['expire_time']) || ($_SESSION['ban']['expire_time'] != 0 && ($row['expire_time'] == 0 || $row['expire_time'] > $_SESSION['ban']['expire_time']))) { |
|
250 | + $_SESSION['ban']['expire_time'] = $row['expire_time']; |
|
251 | + } |
|
238 | 252 | |
239 | - if (!$user_info['is_guest'] && $restriction == 'cannot_access' && ($row['id_member'] == $user_info['id'] || $row['email_address'] == $user_info['email'])) |
|
240 | - $flag_is_activated = true; |
|
253 | + if (!$user_info['is_guest'] && $restriction == 'cannot_access' && ($row['id_member'] == $user_info['id'] || $row['email_address'] == $user_info['email'])) { |
|
254 | + $flag_is_activated = true; |
|
255 | + } |
|
241 | 256 | } |
242 | 257 | } |
243 | 258 | $smcFunc['db_free_result']($request); |
244 | 259 | } |
245 | 260 | |
246 | 261 | // Mark the cannot_access and cannot_post bans as being 'hit'. |
247 | - if (isset($_SESSION['ban']['cannot_access']) || isset($_SESSION['ban']['cannot_post']) || isset($_SESSION['ban']['cannot_login'])) |
|
248 | - log_ban(array_merge(isset($_SESSION['ban']['cannot_access']) ? $_SESSION['ban']['cannot_access']['ids'] : array(), isset($_SESSION['ban']['cannot_post']) ? $_SESSION['ban']['cannot_post']['ids'] : array(), isset($_SESSION['ban']['cannot_login']) ? $_SESSION['ban']['cannot_login']['ids'] : array())); |
|
262 | + if (isset($_SESSION['ban']['cannot_access']) || isset($_SESSION['ban']['cannot_post']) || isset($_SESSION['ban']['cannot_login'])) { |
|
263 | + log_ban(array_merge(isset($_SESSION['ban']['cannot_access']) ? $_SESSION['ban']['cannot_access']['ids'] : array(), isset($_SESSION['ban']['cannot_post']) ? $_SESSION['ban']['cannot_post']['ids'] : array(), isset($_SESSION['ban']['cannot_login']) ? $_SESSION['ban']['cannot_login']['ids'] : array())); |
|
264 | + } |
|
249 | 265 | |
250 | 266 | // If for whatever reason the is_activated flag seems wrong, do a little work to clear it up. |
251 | 267 | if ($user_info['id'] && (($user_settings['is_activated'] >= 10 && !$flag_is_activated) |
@@ -260,8 +276,9 @@ discard block |
||
260 | 276 | if (!isset($_SESSION['ban']['cannot_access']) && !empty($_COOKIE[$cookiename . '_'])) |
261 | 277 | { |
262 | 278 | $bans = explode(',', $_COOKIE[$cookiename . '_']); |
263 | - foreach ($bans as $key => $value) |
|
264 | - $bans[$key] = (int) $value; |
|
279 | + foreach ($bans as $key => $value) { |
|
280 | + $bans[$key] = (int) $value; |
|
281 | + } |
|
265 | 282 | $request = $smcFunc['db_query']('', ' |
266 | 283 | SELECT bi.id_ban, bg.reason |
267 | 284 | FROM {db_prefix}ban_items AS bi |
@@ -297,14 +314,15 @@ discard block |
||
297 | 314 | if (isset($_SESSION['ban']['cannot_access'])) |
298 | 315 | { |
299 | 316 | // We don't wanna see you! |
300 | - if (!$user_info['is_guest']) |
|
301 | - $smcFunc['db_query']('', ' |
|
317 | + if (!$user_info['is_guest']) { |
|
318 | + $smcFunc['db_query']('', ' |
|
302 | 319 | DELETE FROM {db_prefix}log_online |
303 | 320 | WHERE id_member = {int:current_member}', |
304 | 321 | array( |
305 | 322 | 'current_member' => $user_info['id'], |
306 | 323 | ) |
307 | 324 | ); |
325 | + } |
|
308 | 326 | |
309 | 327 | // 'Log' the user out. Can't have any funny business... (save the name!) |
310 | 328 | $old_name = isset($user_info['name']) && $user_info['name'] != '' ? $user_info['name'] : $txt['guest_title']; |
@@ -390,9 +408,10 @@ discard block |
||
390 | 408 | } |
391 | 409 | |
392 | 410 | // Fix up the banning permissions. |
393 | - if (isset($user_info['permissions'])) |
|
394 | - banPermissions(); |
|
395 | -} |
|
411 | + if (isset($user_info['permissions'])) { |
|
412 | + banPermissions(); |
|
413 | + } |
|
414 | + } |
|
396 | 415 | |
397 | 416 | /** |
398 | 417 | * Fix permissions according to ban status. |
@@ -403,8 +422,9 @@ discard block |
||
403 | 422 | global $user_info, $sourcedir, $modSettings, $context; |
404 | 423 | |
405 | 424 | // Somehow they got here, at least take away all permissions... |
406 | - if (isset($_SESSION['ban']['cannot_access'])) |
|
407 | - $user_info['permissions'] = array(); |
|
425 | + if (isset($_SESSION['ban']['cannot_access'])) { |
|
426 | + $user_info['permissions'] = array(); |
|
427 | + } |
|
408 | 428 | // Okay, well, you can watch, but don't touch a thing. |
409 | 429 | elseif (isset($_SESSION['ban']['cannot_post']) || (!empty($modSettings['warning_mute']) && $modSettings['warning_mute'] <= $user_info['warning'])) |
410 | 430 | { |
@@ -446,44 +466,45 @@ discard block |
||
446 | 466 | call_integration_hook('integrate_warn_permissions', array(&$permission_change)); |
447 | 467 | foreach ($permission_change as $old => $new) |
448 | 468 | { |
449 | - if (!in_array($old, $user_info['permissions'])) |
|
450 | - unset($permission_change[$old]); |
|
451 | - else |
|
452 | - $user_info['permissions'][] = $new; |
|
469 | + if (!in_array($old, $user_info['permissions'])) { |
|
470 | + unset($permission_change[$old]); |
|
471 | + } else { |
|
472 | + $user_info['permissions'][] = $new; |
|
473 | + } |
|
453 | 474 | } |
454 | 475 | $user_info['permissions'] = array_diff($user_info['permissions'], array_keys($permission_change)); |
455 | 476 | } |
456 | 477 | |
457 | 478 | // @todo Find a better place to call this? Needs to be after permissions loaded! |
458 | 479 | // Finally, some bits we cache in the session because it saves queries. |
459 | - if (isset($_SESSION['mc']) && $_SESSION['mc']['time'] > $modSettings['settings_updated'] && $_SESSION['mc']['id'] == $user_info['id']) |
|
460 | - $user_info['mod_cache'] = $_SESSION['mc']; |
|
461 | - else |
|
480 | + if (isset($_SESSION['mc']) && $_SESSION['mc']['time'] > $modSettings['settings_updated'] && $_SESSION['mc']['id'] == $user_info['id']) { |
|
481 | + $user_info['mod_cache'] = $_SESSION['mc']; |
|
482 | + } else |
|
462 | 483 | { |
463 | 484 | require_once($sourcedir . '/Subs-Auth.php'); |
464 | 485 | rebuildModCache(); |
465 | 486 | } |
466 | 487 | |
467 | 488 | // Now that we have the mod cache taken care of lets setup a cache for the number of mod reports still open |
468 | - if (!empty($_SESSION['rc']) && $_SESSION['rc']['time'] > $modSettings['last_mod_report_action'] && $_SESSION['rc']['id'] == $user_info['id']) |
|
469 | - $context['open_mod_reports'] = $_SESSION['rc']['reports']; |
|
470 | - elseif ($_SESSION['mc']['bq'] != '0=1') |
|
489 | + if (!empty($_SESSION['rc']) && $_SESSION['rc']['time'] > $modSettings['last_mod_report_action'] && $_SESSION['rc']['id'] == $user_info['id']) { |
|
490 | + $context['open_mod_reports'] = $_SESSION['rc']['reports']; |
|
491 | + } elseif ($_SESSION['mc']['bq'] != '0=1') |
|
471 | 492 | { |
472 | 493 | require_once($sourcedir . '/Subs-ReportedContent.php'); |
473 | 494 | recountOpenReports('posts'); |
495 | + } else { |
|
496 | + $context['open_mod_reports'] = 0; |
|
474 | 497 | } |
475 | - else |
|
476 | - $context['open_mod_reports'] = 0; |
|
477 | 498 | |
478 | - if (!empty($_SESSION['rc']) && $_SESSION['rc']['time'] > $modSettings['last_mod_report_action'] && $_SESSION['rc']['id'] == $user_info['id']) |
|
479 | - $context['open_member_reports'] = !empty($_SESSION['rc']['member_reports']) ? $_SESSION['rc']['member_reports'] : 0; |
|
480 | - elseif (allowedTo('moderate_forum')) |
|
499 | + if (!empty($_SESSION['rc']) && $_SESSION['rc']['time'] > $modSettings['last_mod_report_action'] && $_SESSION['rc']['id'] == $user_info['id']) { |
|
500 | + $context['open_member_reports'] = !empty($_SESSION['rc']['member_reports']) ? $_SESSION['rc']['member_reports'] : 0; |
|
501 | + } elseif (allowedTo('moderate_forum')) |
|
481 | 502 | { |
482 | 503 | require_once($sourcedir . '/Subs-ReportedContent.php'); |
483 | 504 | recountOpenReports('members'); |
505 | + } else { |
|
506 | + $context['open_member_reports'] = 0; |
|
484 | 507 | } |
485 | - else |
|
486 | - $context['open_member_reports'] = 0; |
|
487 | 508 | |
488 | 509 | } |
489 | 510 | |
@@ -500,8 +521,9 @@ discard block |
||
500 | 521 | global $user_info, $smcFunc; |
501 | 522 | |
502 | 523 | // Don't log web accelerators, it's very confusing... |
503 | - if (isset($_SERVER['HTTP_X_MOZ']) && $_SERVER['HTTP_X_MOZ'] == 'prefetch') |
|
504 | - return; |
|
524 | + if (isset($_SERVER['HTTP_X_MOZ']) && $_SERVER['HTTP_X_MOZ'] == 'prefetch') { |
|
525 | + return; |
|
526 | + } |
|
505 | 527 | |
506 | 528 | $smcFunc['db_insert']('', |
507 | 529 | '{db_prefix}log_banned', |
@@ -511,8 +533,8 @@ discard block |
||
511 | 533 | ); |
512 | 534 | |
513 | 535 | // One extra point for these bans. |
514 | - if (!empty($ban_ids)) |
|
515 | - $smcFunc['db_query']('', ' |
|
536 | + if (!empty($ban_ids)) { |
|
537 | + $smcFunc['db_query']('', ' |
|
516 | 538 | UPDATE {db_prefix}ban_items |
517 | 539 | SET hits = hits + 1 |
518 | 540 | WHERE id_ban IN ({array_int:ban_ids})', |
@@ -520,7 +542,8 @@ discard block |
||
520 | 542 | 'ban_ids' => $ban_ids, |
521 | 543 | ) |
522 | 544 | ); |
523 | -} |
|
545 | + } |
|
546 | + } |
|
524 | 547 | |
525 | 548 | /** |
526 | 549 | * Checks if a given email address might be banned. |
@@ -536,8 +559,9 @@ discard block |
||
536 | 559 | global $txt, $smcFunc; |
537 | 560 | |
538 | 561 | // Can't ban an empty email |
539 | - if (empty($email) || trim($email) == '') |
|
540 | - return; |
|
562 | + if (empty($email) || trim($email) == '') { |
|
563 | + return; |
|
564 | + } |
|
541 | 565 | |
542 | 566 | // Let's start with the bans based on your IP/hostname/memberID... |
543 | 567 | $ban_ids = isset($_SESSION['ban'][$restriction]) ? $_SESSION['ban'][$restriction]['ids'] : array(); |
@@ -610,16 +634,18 @@ discard block |
||
610 | 634 | if ($type == 'post') |
611 | 635 | { |
612 | 636 | $check = isset($_POST[$_SESSION['session_var']]) ? $_POST[$_SESSION['session_var']] : (empty($modSettings['strictSessionCheck']) && isset($_POST['sc']) ? $_POST['sc'] : null); |
613 | - if ($check !== $sc) |
|
614 | - $error = 'session_timeout'; |
|
637 | + if ($check !== $sc) { |
|
638 | + $error = 'session_timeout'; |
|
639 | + } |
|
615 | 640 | } |
616 | 641 | |
617 | 642 | // How about $_GET['sesc']? |
618 | 643 | elseif ($type == 'get') |
619 | 644 | { |
620 | 645 | $check = isset($_GET[$_SESSION['session_var']]) ? $_GET[$_SESSION['session_var']] : (empty($modSettings['strictSessionCheck']) && isset($_GET['sesc']) ? $_GET['sesc'] : null); |
621 | - if ($check !== $sc) |
|
622 | - $error = 'session_verify_fail'; |
|
646 | + if ($check !== $sc) { |
|
647 | + $error = 'session_verify_fail'; |
|
648 | + } |
|
623 | 649 | } |
624 | 650 | |
625 | 651 | // Or can it be in either? |
@@ -627,13 +653,15 @@ discard block |
||
627 | 653 | { |
628 | 654 | $check = isset($_GET[$_SESSION['session_var']]) ? $_GET[$_SESSION['session_var']] : (empty($modSettings['strictSessionCheck']) && isset($_GET['sesc']) ? $_GET['sesc'] : (isset($_POST[$_SESSION['session_var']]) ? $_POST[$_SESSION['session_var']] : (empty($modSettings['strictSessionCheck']) && isset($_POST['sc']) ? $_POST['sc'] : null))); |
629 | 655 | |
630 | - if ($check !== $sc) |
|
631 | - $error = 'session_verify_fail'; |
|
656 | + if ($check !== $sc) { |
|
657 | + $error = 'session_verify_fail'; |
|
658 | + } |
|
632 | 659 | } |
633 | 660 | |
634 | 661 | // Verify that they aren't changing user agents on us - that could be bad. |
635 | - if ((!isset($_SESSION['USER_AGENT']) || $_SESSION['USER_AGENT'] != $_SERVER['HTTP_USER_AGENT']) && empty($modSettings['disableCheckUA'])) |
|
636 | - $error = 'session_verify_fail'; |
|
662 | + if ((!isset($_SESSION['USER_AGENT']) || $_SESSION['USER_AGENT'] != $_SERVER['HTTP_USER_AGENT']) && empty($modSettings['disableCheckUA'])) { |
|
663 | + $error = 'session_verify_fail'; |
|
664 | + } |
|
637 | 665 | |
638 | 666 | // Make sure a page with session check requirement is not being prefetched. |
639 | 667 | if (isset($_SERVER['HTTP_X_MOZ']) && $_SERVER['HTTP_X_MOZ'] == 'prefetch') |
@@ -644,30 +672,35 @@ discard block |
||
644 | 672 | } |
645 | 673 | |
646 | 674 | // Check the referring site - it should be the same server at least! |
647 | - if (isset($_SESSION['request_referer'])) |
|
648 | - $referrer = $_SESSION['request_referer']; |
|
649 | - else |
|
650 | - $referrer = isset($_SERVER['HTTP_REFERER']) ? @parse_url($_SERVER['HTTP_REFERER']) : array(); |
|
675 | + if (isset($_SESSION['request_referer'])) { |
|
676 | + $referrer = $_SESSION['request_referer']; |
|
677 | + } else { |
|
678 | + $referrer = isset($_SERVER['HTTP_REFERER']) ? @parse_url($_SERVER['HTTP_REFERER']) : array(); |
|
679 | + } |
|
651 | 680 | if (!empty($referrer['host'])) |
652 | 681 | { |
653 | - if (strpos($_SERVER['HTTP_HOST'], ':') !== false) |
|
654 | - $real_host = substr($_SERVER['HTTP_HOST'], 0, strpos($_SERVER['HTTP_HOST'], ':')); |
|
655 | - else |
|
656 | - $real_host = $_SERVER['HTTP_HOST']; |
|
682 | + if (strpos($_SERVER['HTTP_HOST'], ':') !== false) { |
|
683 | + $real_host = substr($_SERVER['HTTP_HOST'], 0, strpos($_SERVER['HTTP_HOST'], ':')); |
|
684 | + } else { |
|
685 | + $real_host = $_SERVER['HTTP_HOST']; |
|
686 | + } |
|
657 | 687 | |
658 | 688 | $parsed_url = parse_url($boardurl); |
659 | 689 | |
660 | 690 | // Are global cookies on? If so, let's check them ;). |
661 | 691 | if (!empty($modSettings['globalCookies'])) |
662 | 692 | { |
663 | - if (preg_match('~(?:[^\.]+\.)?([^\.]{3,}\..+)\z~i', $parsed_url['host'], $parts) == 1) |
|
664 | - $parsed_url['host'] = $parts[1]; |
|
693 | + if (preg_match('~(?:[^\.]+\.)?([^\.]{3,}\..+)\z~i', $parsed_url['host'], $parts) == 1) { |
|
694 | + $parsed_url['host'] = $parts[1]; |
|
695 | + } |
|
665 | 696 | |
666 | - if (preg_match('~(?:[^\.]+\.)?([^\.]{3,}\..+)\z~i', $referrer['host'], $parts) == 1) |
|
667 | - $referrer['host'] = $parts[1]; |
|
697 | + if (preg_match('~(?:[^\.]+\.)?([^\.]{3,}\..+)\z~i', $referrer['host'], $parts) == 1) { |
|
698 | + $referrer['host'] = $parts[1]; |
|
699 | + } |
|
668 | 700 | |
669 | - if (preg_match('~(?:[^\.]+\.)?([^\.]{3,}\..+)\z~i', $real_host, $parts) == 1) |
|
670 | - $real_host = $parts[1]; |
|
701 | + if (preg_match('~(?:[^\.]+\.)?([^\.]{3,}\..+)\z~i', $real_host, $parts) == 1) { |
|
702 | + $real_host = $parts[1]; |
|
703 | + } |
|
671 | 704 | } |
672 | 705 | |
673 | 706 | // Okay: referrer must either match parsed_url or real_host. |
@@ -685,12 +718,14 @@ discard block |
||
685 | 718 | $log_error = true; |
686 | 719 | } |
687 | 720 | |
688 | - if (strtolower($_SERVER['HTTP_USER_AGENT']) == 'hacker') |
|
689 | - fatal_error('Sound the alarm! It\'s a hacker! Close the castle gates!!', false); |
|
721 | + if (strtolower($_SERVER['HTTP_USER_AGENT']) == 'hacker') { |
|
722 | + fatal_error('Sound the alarm! It\'s a hacker! Close the castle gates!!', false); |
|
723 | + } |
|
690 | 724 | |
691 | 725 | // Everything is ok, return an empty string. |
692 | - if (!isset($error)) |
|
693 | - return ''; |
|
726 | + if (!isset($error)) { |
|
727 | + return ''; |
|
728 | + } |
|
694 | 729 | // A session error occurred, show the error. |
695 | 730 | elseif ($is_fatal) |
696 | 731 | { |
@@ -699,13 +734,14 @@ discard block |
||
699 | 734 | ob_end_clean(); |
700 | 735 | header('HTTP/1.1 403 Forbidden - Session timeout'); |
701 | 736 | die; |
737 | + } else { |
|
738 | + fatal_lang_error($error, isset($log_error) ? 'user' : false); |
|
702 | 739 | } |
703 | - else |
|
704 | - fatal_lang_error($error, isset($log_error) ? 'user' : false); |
|
705 | 740 | } |
706 | 741 | // A session error occurred, return the error to the calling function. |
707 | - else |
|
708 | - return $error; |
|
742 | + else { |
|
743 | + return $error; |
|
744 | + } |
|
709 | 745 | |
710 | 746 | // We really should never fall through here, for very important reasons. Let's make sure. |
711 | 747 | trigger_error('Hacking attempt...', E_USER_ERROR); |
@@ -721,10 +757,9 @@ discard block |
||
721 | 757 | { |
722 | 758 | global $modSettings; |
723 | 759 | |
724 | - if (isset($_GET['confirm']) && isset($_SESSION['confirm_' . $action]) && md5($_GET['confirm'] . $_SERVER['HTTP_USER_AGENT']) == $_SESSION['confirm_' . $action]) |
|
725 | - return true; |
|
726 | - |
|
727 | - else |
|
760 | + if (isset($_GET['confirm']) && isset($_SESSION['confirm_' . $action]) && md5($_GET['confirm'] . $_SERVER['HTTP_USER_AGENT']) == $_SESSION['confirm_' . $action]) { |
|
761 | + return true; |
|
762 | + } else |
|
728 | 763 | { |
729 | 764 | $token = md5(mt_rand() . session_id() . (string) microtime() . $modSettings['rand_seed']); |
730 | 765 | $_SESSION['confirm_' . $action] = md5($token . $_SERVER['HTTP_USER_AGENT']); |
@@ -775,9 +810,9 @@ discard block |
||
775 | 810 | $return = $_SESSION['token'][$type . '-' . $action][3]; |
776 | 811 | unset($_SESSION['token'][$type . '-' . $action]); |
777 | 812 | return $return; |
813 | + } else { |
|
814 | + return ''; |
|
778 | 815 | } |
779 | - else |
|
780 | - return ''; |
|
781 | 816 | } |
782 | 817 | |
783 | 818 | // This nasty piece of code validates a token. |
@@ -808,12 +843,14 @@ discard block |
||
808 | 843 | fatal_lang_error('token_verify_fail', false); |
809 | 844 | } |
810 | 845 | // Remove this token as its useless |
811 | - else |
|
812 | - unset($_SESSION['token'][$type . '-' . $action]); |
|
846 | + else { |
|
847 | + unset($_SESSION['token'][$type . '-' . $action]); |
|
848 | + } |
|
813 | 849 | |
814 | 850 | // Randomly check if we should remove some older tokens. |
815 | - if (mt_rand(0, 138) == 23) |
|
816 | - cleanTokens(); |
|
851 | + if (mt_rand(0, 138) == 23) { |
|
852 | + cleanTokens(); |
|
853 | + } |
|
817 | 854 | |
818 | 855 | return false; |
819 | 856 | } |
@@ -828,14 +865,16 @@ discard block |
||
828 | 865 | function cleanTokens($complete = false) |
829 | 866 | { |
830 | 867 | // We appreciate cleaning up after yourselves. |
831 | - if (!isset($_SESSION['token'])) |
|
832 | - return; |
|
868 | + if (!isset($_SESSION['token'])) { |
|
869 | + return; |
|
870 | + } |
|
833 | 871 | |
834 | 872 | // Clean up tokens, trying to give enough time still. |
835 | - foreach ($_SESSION['token'] as $key => $data) |
|
836 | - if ($data[2] + 10800 < time() || $complete) |
|
873 | + foreach ($_SESSION['token'] as $key => $data) { |
|
874 | + if ($data[2] + 10800 < time() || $complete) |
|
837 | 875 | unset($_SESSION['token'][$key]); |
838 | -} |
|
876 | + } |
|
877 | + } |
|
839 | 878 | |
840 | 879 | /** |
841 | 880 | * Check whether a form has been submitted twice. |
@@ -853,37 +892,40 @@ discard block |
||
853 | 892 | { |
854 | 893 | global $context; |
855 | 894 | |
856 | - if (!isset($_SESSION['forms'])) |
|
857 | - $_SESSION['forms'] = array(); |
|
895 | + if (!isset($_SESSION['forms'])) { |
|
896 | + $_SESSION['forms'] = array(); |
|
897 | + } |
|
858 | 898 | |
859 | 899 | // Register a form number and store it in the session stack. (use this on the page that has the form.) |
860 | 900 | if ($action == 'register') |
861 | 901 | { |
862 | 902 | $context['form_sequence_number'] = 0; |
863 | - while (empty($context['form_sequence_number']) || in_array($context['form_sequence_number'], $_SESSION['forms'])) |
|
864 | - $context['form_sequence_number'] = mt_rand(1, 16000000); |
|
903 | + while (empty($context['form_sequence_number']) || in_array($context['form_sequence_number'], $_SESSION['forms'])) { |
|
904 | + $context['form_sequence_number'] = mt_rand(1, 16000000); |
|
905 | + } |
|
865 | 906 | } |
866 | 907 | // Check whether the submitted number can be found in the session. |
867 | 908 | elseif ($action == 'check') |
868 | 909 | { |
869 | - if (!isset($_REQUEST['seqnum'])) |
|
870 | - return true; |
|
871 | - elseif (!in_array($_REQUEST['seqnum'], $_SESSION['forms'])) |
|
910 | + if (!isset($_REQUEST['seqnum'])) { |
|
911 | + return true; |
|
912 | + } elseif (!in_array($_REQUEST['seqnum'], $_SESSION['forms'])) |
|
872 | 913 | { |
873 | 914 | $_SESSION['forms'][] = (int) $_REQUEST['seqnum']; |
874 | 915 | return true; |
916 | + } elseif ($is_fatal) { |
|
917 | + fatal_lang_error('error_form_already_submitted', false); |
|
918 | + } else { |
|
919 | + return false; |
|
875 | 920 | } |
876 | - elseif ($is_fatal) |
|
877 | - fatal_lang_error('error_form_already_submitted', false); |
|
878 | - else |
|
879 | - return false; |
|
880 | 921 | } |
881 | 922 | // Don't check, just free the stack number. |
882 | - elseif ($action == 'free' && isset($_REQUEST['seqnum']) && in_array($_REQUEST['seqnum'], $_SESSION['forms'])) |
|
883 | - $_SESSION['forms'] = array_diff($_SESSION['forms'], array($_REQUEST['seqnum'])); |
|
884 | - elseif ($action != 'free') |
|
885 | - trigger_error('checkSubmitOnce(): Invalid action \'' . $action . '\'', E_USER_WARNING); |
|
886 | -} |
|
923 | + elseif ($action == 'free' && isset($_REQUEST['seqnum']) && in_array($_REQUEST['seqnum'], $_SESSION['forms'])) { |
|
924 | + $_SESSION['forms'] = array_diff($_SESSION['forms'], array($_REQUEST['seqnum'])); |
|
925 | + } elseif ($action != 'free') { |
|
926 | + trigger_error('checkSubmitOnce(): Invalid action \'' . $action . '\'', E_USER_WARNING); |
|
927 | + } |
|
928 | + } |
|
887 | 929 | |
888 | 930 | /** |
889 | 931 | * Check the user's permissions. |
@@ -900,16 +942,19 @@ discard block |
||
900 | 942 | global $user_info, $smcFunc; |
901 | 943 | |
902 | 944 | // You're always allowed to do nothing. (unless you're a working man, MR. LAZY :P!) |
903 | - if (empty($permission)) |
|
904 | - return true; |
|
945 | + if (empty($permission)) { |
|
946 | + return true; |
|
947 | + } |
|
905 | 948 | |
906 | 949 | // You're never allowed to do something if your data hasn't been loaded yet! |
907 | - if (empty($user_info)) |
|
908 | - return false; |
|
950 | + if (empty($user_info)) { |
|
951 | + return false; |
|
952 | + } |
|
909 | 953 | |
910 | 954 | // Administrators are supermen :P. |
911 | - if ($user_info['is_admin']) |
|
912 | - return true; |
|
955 | + if ($user_info['is_admin']) { |
|
956 | + return true; |
|
957 | + } |
|
913 | 958 | |
914 | 959 | // Let's ensure this is an array. |
915 | 960 | $permission = (array)$permission; |
@@ -917,14 +962,16 @@ discard block |
||
917 | 962 | // Are we checking the _current_ board, or some other boards? |
918 | 963 | if ($boards === null) |
919 | 964 | { |
920 | - if (count(array_intersect($permission, $user_info['permissions'])) != 0) |
|
921 | - return true; |
|
965 | + if (count(array_intersect($permission, $user_info['permissions'])) != 0) { |
|
966 | + return true; |
|
967 | + } |
|
922 | 968 | // You aren't allowed, by default. |
923 | - else |
|
924 | - return false; |
|
969 | + else { |
|
970 | + return false; |
|
971 | + } |
|
972 | + } elseif (!is_array($boards)) { |
|
973 | + $boards = array($boards); |
|
925 | 974 | } |
926 | - elseif (!is_array($boards)) |
|
927 | - $boards = array($boards); |
|
928 | 975 | |
929 | 976 | $request = $smcFunc['db_query']('', ' |
930 | 977 | SELECT MIN(bp.add_deny) AS add_deny |
@@ -947,12 +994,14 @@ discard block |
||
947 | 994 | ); |
948 | 995 | |
949 | 996 | // Make sure they can do it on all of the boards. |
950 | - if ($smcFunc['db_num_rows']($request) != count($boards)) |
|
951 | - return false; |
|
997 | + if ($smcFunc['db_num_rows']($request) != count($boards)) { |
|
998 | + return false; |
|
999 | + } |
|
952 | 1000 | |
953 | 1001 | $result = true; |
954 | - while ($row = $smcFunc['db_fetch_assoc']($request)) |
|
955 | - $result &= !empty($row['add_deny']); |
|
1002 | + while ($row = $smcFunc['db_fetch_assoc']($request)) { |
|
1003 | + $result &= !empty($row['add_deny']); |
|
1004 | + } |
|
956 | 1005 | $smcFunc['db_free_result']($request); |
957 | 1006 | |
958 | 1007 | // If the query returned 1, they can do it... otherwise, they can't. |
@@ -1017,9 +1066,10 @@ discard block |
||
1017 | 1066 | |
1018 | 1067 | // If you're doing something on behalf of some "heavy" permissions, validate your session. |
1019 | 1068 | // (take out the heavy permissions, and if you can't do anything but those, you need a validated session.) |
1020 | - if (!allowedTo(array_diff($permission, $heavy_permissions), $boards)) |
|
1021 | - validateSession(); |
|
1022 | -} |
|
1069 | + if (!allowedTo(array_diff($permission, $heavy_permissions), $boards)) { |
|
1070 | + validateSession(); |
|
1071 | + } |
|
1072 | + } |
|
1023 | 1073 | |
1024 | 1074 | /** |
1025 | 1075 | * Return the boards a user has a certain (board) permission on. (array(0) if all.) |
@@ -1038,8 +1088,9 @@ discard block |
||
1038 | 1088 | global $user_info, $smcFunc; |
1039 | 1089 | |
1040 | 1090 | // Arrays are nice, most of the time. |
1041 | - if (!is_array($permissions)) |
|
1042 | - $permissions = array($permissions); |
|
1091 | + if (!is_array($permissions)) { |
|
1092 | + $permissions = array($permissions); |
|
1093 | + } |
|
1043 | 1094 | |
1044 | 1095 | /* |
1045 | 1096 | * Set $simple to true to use this function as it were in SMF 2.0.x. |
@@ -1051,13 +1102,14 @@ discard block |
||
1051 | 1102 | // Administrators are all powerful, sorry. |
1052 | 1103 | if ($user_info['is_admin']) |
1053 | 1104 | { |
1054 | - if ($simple) |
|
1055 | - return array(0); |
|
1056 | - else |
|
1105 | + if ($simple) { |
|
1106 | + return array(0); |
|
1107 | + } else |
|
1057 | 1108 | { |
1058 | 1109 | $boards = array(); |
1059 | - foreach ($permissions as $permission) |
|
1060 | - $boards[$permission] = array(0); |
|
1110 | + foreach ($permissions as $permission) { |
|
1111 | + $boards[$permission] = array(0); |
|
1112 | + } |
|
1061 | 1113 | |
1062 | 1114 | return $boards; |
1063 | 1115 | } |
@@ -1089,31 +1141,32 @@ discard block |
||
1089 | 1141 | { |
1090 | 1142 | if ($simple) |
1091 | 1143 | { |
1092 | - if (empty($row['add_deny'])) |
|
1093 | - $deny_boards[] = $row['id_board']; |
|
1094 | - else |
|
1095 | - $boards[] = $row['id_board']; |
|
1096 | - } |
|
1097 | - else |
|
1144 | + if (empty($row['add_deny'])) { |
|
1145 | + $deny_boards[] = $row['id_board']; |
|
1146 | + } else { |
|
1147 | + $boards[] = $row['id_board']; |
|
1148 | + } |
|
1149 | + } else |
|
1098 | 1150 | { |
1099 | - if (empty($row['add_deny'])) |
|
1100 | - $deny_boards[$row['permission']][] = $row['id_board']; |
|
1101 | - else |
|
1102 | - $boards[$row['permission']][] = $row['id_board']; |
|
1151 | + if (empty($row['add_deny'])) { |
|
1152 | + $deny_boards[$row['permission']][] = $row['id_board']; |
|
1153 | + } else { |
|
1154 | + $boards[$row['permission']][] = $row['id_board']; |
|
1155 | + } |
|
1103 | 1156 | } |
1104 | 1157 | } |
1105 | 1158 | $smcFunc['db_free_result']($request); |
1106 | 1159 | |
1107 | - if ($simple) |
|
1108 | - $boards = array_unique(array_values(array_diff($boards, $deny_boards))); |
|
1109 | - else |
|
1160 | + if ($simple) { |
|
1161 | + $boards = array_unique(array_values(array_diff($boards, $deny_boards))); |
|
1162 | + } else |
|
1110 | 1163 | { |
1111 | 1164 | foreach ($permissions as $permission) |
1112 | 1165 | { |
1113 | 1166 | // never had it to start with |
1114 | - if (empty($boards[$permission])) |
|
1115 | - $boards[$permission] = array(); |
|
1116 | - else |
|
1167 | + if (empty($boards[$permission])) { |
|
1168 | + $boards[$permission] = array(); |
|
1169 | + } else |
|
1117 | 1170 | { |
1118 | 1171 | // Or it may have been removed |
1119 | 1172 | $deny_boards[$permission] = isset($deny_boards[$permission]) ? $deny_boards[$permission] : array(); |
@@ -1149,10 +1202,11 @@ discard block |
||
1149 | 1202 | |
1150 | 1203 | |
1151 | 1204 | // Moderators are free... |
1152 | - if (!allowedTo('moderate_board')) |
|
1153 | - $timeLimit = isset($timeOverrides[$error_type]) ? $timeOverrides[$error_type] : $modSettings['spamWaitTime']; |
|
1154 | - else |
|
1155 | - $timeLimit = 2; |
|
1205 | + if (!allowedTo('moderate_board')) { |
|
1206 | + $timeLimit = isset($timeOverrides[$error_type]) ? $timeOverrides[$error_type] : $modSettings['spamWaitTime']; |
|
1207 | + } else { |
|
1208 | + $timeLimit = 2; |
|
1209 | + } |
|
1156 | 1210 | |
1157 | 1211 | call_integration_hook('integrate_spam_protection', array(&$timeOverrides, &$timeLimit)); |
1158 | 1212 | |
@@ -1179,8 +1233,9 @@ discard block |
||
1179 | 1233 | if ($smcFunc['db_affected_rows']() != 1) |
1180 | 1234 | { |
1181 | 1235 | // Spammer! You only have to wait a *few* seconds! |
1182 | - if (!$only_return_result) |
|
1183 | - fatal_lang_error($error_type . '_WaitTime_broken', false, array($timeLimit)); |
|
1236 | + if (!$only_return_result) { |
|
1237 | + fatal_lang_error($error_type . '_WaitTime_broken', false, array($timeLimit)); |
|
1238 | + } |
|
1184 | 1239 | |
1185 | 1240 | return true; |
1186 | 1241 | } |
@@ -1198,11 +1253,13 @@ discard block |
||
1198 | 1253 | */ |
1199 | 1254 | function secureDirectory($path, $attachments = false) |
1200 | 1255 | { |
1201 | - if (empty($path)) |
|
1202 | - return 'empty_path'; |
|
1256 | + if (empty($path)) { |
|
1257 | + return 'empty_path'; |
|
1258 | + } |
|
1203 | 1259 | |
1204 | - if (!is_writable($path)) |
|
1205 | - return 'path_not_writable'; |
|
1260 | + if (!is_writable($path)) { |
|
1261 | + return 'path_not_writable'; |
|
1262 | + } |
|
1206 | 1263 | |
1207 | 1264 | $directoryname = basename($path); |
1208 | 1265 | |
@@ -1214,9 +1271,9 @@ discard block |
||
1214 | 1271 | |
1215 | 1272 | RemoveHandler .php .php3 .phtml .cgi .fcgi .pl .fpl .shtml'; |
1216 | 1273 | |
1217 | - if (file_exists($path . '/.htaccess')) |
|
1218 | - $errors[] = 'htaccess_exists'; |
|
1219 | - else |
|
1274 | + if (file_exists($path . '/.htaccess')) { |
|
1275 | + $errors[] = 'htaccess_exists'; |
|
1276 | + } else |
|
1220 | 1277 | { |
1221 | 1278 | $fh = @fopen($path . '/.htaccess', 'w'); |
1222 | 1279 | if ($fh) { |
@@ -1228,9 +1285,9 @@ discard block |
||
1228 | 1285 | $errors[] = 'htaccess_cannot_create_file'; |
1229 | 1286 | } |
1230 | 1287 | |
1231 | - if (file_exists($path . '/index.php')) |
|
1232 | - $errors[] = 'index-php_exists'; |
|
1233 | - else |
|
1288 | + if (file_exists($path . '/index.php')) { |
|
1289 | + $errors[] = 'index-php_exists'; |
|
1290 | + } else |
|
1234 | 1291 | { |
1235 | 1292 | $fh = @fopen($path . '/index.php', 'w'); |
1236 | 1293 | if ($fh) { |
@@ -1257,11 +1314,12 @@ discard block |
||
1257 | 1314 | $errors[] = 'index-php_cannot_create_file'; |
1258 | 1315 | } |
1259 | 1316 | |
1260 | - if (!empty($errors)) |
|
1261 | - return $errors; |
|
1262 | - else |
|
1263 | - return true; |
|
1264 | -} |
|
1317 | + if (!empty($errors)) { |
|
1318 | + return $errors; |
|
1319 | + } else { |
|
1320 | + return true; |
|
1321 | + } |
|
1322 | + } |
|
1265 | 1323 | |
1266 | 1324 | /** |
1267 | 1325 | * This sets the X-Frame-Options header. |
@@ -1274,14 +1332,16 @@ discard block |
||
1274 | 1332 | global $modSettings; |
1275 | 1333 | |
1276 | 1334 | $option = 'SAMEORIGIN'; |
1277 | - if (is_null($override) && !empty($modSettings['frame_security'])) |
|
1278 | - $option = $modSettings['frame_security']; |
|
1279 | - elseif (in_array($override, array('SAMEORIGIN', 'DENY'))) |
|
1280 | - $option = $override; |
|
1335 | + if (is_null($override) && !empty($modSettings['frame_security'])) { |
|
1336 | + $option = $modSettings['frame_security']; |
|
1337 | + } elseif (in_array($override, array('SAMEORIGIN', 'DENY'))) { |
|
1338 | + $option = $override; |
|
1339 | + } |
|
1281 | 1340 | |
1282 | 1341 | // Don't bother setting the header if we have disabled it. |
1283 | - if ($option == 'DISABLE') |
|
1284 | - return; |
|
1342 | + if ($option == 'DISABLE') { |
|
1343 | + return; |
|
1344 | + } |
|
1285 | 1345 | |
1286 | 1346 | // Finally set it. |
1287 | 1347 | header('X-Frame-Options: ' . $option); |
@@ -11,8 +11,9 @@ discard block |
||
11 | 11 | * @version 2.1 Beta 3 |
12 | 12 | */ |
13 | 13 | |
14 | -if (!defined('SMF')) |
|
14 | +if (!defined('SMF')) { |
|
15 | 15 | die('Hacking attempt...'); |
16 | +} |
|
16 | 17 | |
17 | 18 | /** |
18 | 19 | * Interface cache_api_interface |
@@ -186,8 +187,9 @@ discard block |
||
186 | 187 | { |
187 | 188 | global $cache_enable; |
188 | 189 | |
189 | - if ($test) |
|
190 | - return true; |
|
190 | + if ($test) { |
|
191 | + return true; |
|
192 | + } |
|
191 | 193 | return !empty($cache_enable); |
192 | 194 | } |
193 | 195 | |
@@ -206,10 +208,11 @@ discard block |
||
206 | 208 | global $boardurl, $cachedir; |
207 | 209 | |
208 | 210 | // Set the default if no prefix was specified. |
209 | - if (empty($prefix)) |
|
210 | - $this->prefix = md5($boardurl . filemtime($cachedir . '/' . 'index.php')) . '-SMF-'; |
|
211 | - else |
|
212 | - $this->prefix = $prefix; |
|
211 | + if (empty($prefix)) { |
|
212 | + $this->prefix = md5($boardurl . filemtime($cachedir . '/' . 'index.php')) . '-SMF-'; |
|
213 | + } else { |
|
214 | + $this->prefix = $prefix; |
|
215 | + } |
|
213 | 216 | |
214 | 217 | return true; |
215 | 218 | } |
@@ -272,8 +275,9 @@ discard block |
||
272 | 275 | |
273 | 276 | // Invalidate cache, to be sure! |
274 | 277 | // ... as long as index.php can be modified, anyway. |
275 | - if (is_writable($cachedir . '/' . 'index.php')) |
|
276 | - @touch($cachedir . '/' . 'index.php'); |
|
278 | + if (is_writable($cachedir . '/' . 'index.php')) { |
|
279 | + @touch($cachedir . '/' . 'index.php'); |
|
280 | + } |
|
277 | 281 | |
278 | 282 | return true; |
279 | 283 | } |
@@ -251,7 +251,7 @@ discard block |
||
251 | 251 | $replacement[$key] = 'null'; |
252 | 252 | if (!isValidIP($value)) |
253 | 253 | smf_db_error_backtrace('Wrong value type sent to the database. IPv4 or IPv6 expected.(' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
254 | - $replacement[$key] = sprintf('unhex(\'%1$s\')', bin2hex(inet_pton($value))); |
|
254 | + $replacement[$key] = sprintf('unhex(\'%1$s\')', bin2hex(inet_pton($value))); |
|
255 | 255 | } |
256 | 256 | |
257 | 257 | return implode(', ', $replacement); |
@@ -810,7 +810,7 @@ discard block |
||
810 | 810 | * @param bool $translate_human_wildcards If true, turns human readable wildcards into SQL wildcards. |
811 | 811 | * @return string The escaped string |
812 | 812 | */ |
813 | -function smf_db_escape_wildcard_string($string, $translate_human_wildcards=false) |
|
813 | +function smf_db_escape_wildcard_string($string, $translate_human_wildcards = false) |
|
814 | 814 | { |
815 | 815 | $replacements = array( |
816 | 816 | '%' => '\%', |
@@ -13,8 +13,9 @@ discard block |
||
13 | 13 | * @version 2.1 Beta 3 |
14 | 14 | */ |
15 | 15 | |
16 | -if (!defined('SMF')) |
|
16 | +if (!defined('SMF')) { |
|
17 | 17 | die('No direct access...'); |
18 | +} |
|
18 | 19 | |
19 | 20 | /** |
20 | 21 | * Maps the implementations in this file (smf_db_function_name) |
@@ -33,8 +34,8 @@ discard block |
||
33 | 34 | global $smcFunc, $mysql_set_mode; |
34 | 35 | |
35 | 36 | // Map some database specific functions, only do this once. |
36 | - if (!isset($smcFunc['db_fetch_assoc']) || $smcFunc['db_fetch_assoc'] != 'mysql_fetch_assoc') |
|
37 | - $smcFunc += array( |
|
37 | + if (!isset($smcFunc['db_fetch_assoc']) || $smcFunc['db_fetch_assoc'] != 'mysql_fetch_assoc') { |
|
38 | + $smcFunc += array( |
|
38 | 39 | 'db_query' => 'smf_db_query', |
39 | 40 | 'db_quote' => 'smf_db_quote', |
40 | 41 | 'db_fetch_assoc' => 'mysql_fetch_assoc', |
@@ -58,36 +59,42 @@ discard block |
||
58 | 59 | 'db_escape_wildcard_string' => 'smf_db_escape_wildcard_string', |
59 | 60 | 'db_is_resource' => 'is_resource', |
60 | 61 | ); |
62 | + } |
|
61 | 63 | |
62 | - if (!empty($db_options['port'])) |
|
63 | - $db_server .= ':' . $db_options['port']; |
|
64 | + if (!empty($db_options['port'])) { |
|
65 | + $db_server .= ':' . $db_options['port']; |
|
66 | + } |
|
64 | 67 | |
65 | 68 | $flags = 2; //#define CLIENT_FOUND_ROWS 2 /* Found instead of affected rows */ |
66 | 69 | |
67 | - if (!empty($db_options['persist'])) |
|
68 | - $connection = @mysql_pconnect($db_server, $db_user, $db_passwd, $flags); |
|
69 | - else |
|
70 | - $connection = @mysql_connect($db_server, $db_user, $db_passwd, false, $flags); |
|
70 | + if (!empty($db_options['persist'])) { |
|
71 | + $connection = @mysql_pconnect($db_server, $db_user, $db_passwd, $flags); |
|
72 | + } else { |
|
73 | + $connection = @mysql_connect($db_server, $db_user, $db_passwd, false, $flags); |
|
74 | + } |
|
71 | 75 | |
72 | 76 | // Something's wrong, show an error if its fatal (which we assume it is) |
73 | 77 | if (!$connection) |
74 | 78 | { |
75 | - if (!empty($db_options['non_fatal'])) |
|
76 | - return null; |
|
77 | - else |
|
78 | - display_db_error(); |
|
79 | + if (!empty($db_options['non_fatal'])) { |
|
80 | + return null; |
|
81 | + } else { |
|
82 | + display_db_error(); |
|
83 | + } |
|
79 | 84 | } |
80 | 85 | |
81 | 86 | // Select the database, unless told not to |
82 | - if (empty($db_options['dont_select_db']) && !@mysql_select_db($db_name, $connection) && empty($db_options['non_fatal'])) |
|
83 | - display_db_error(); |
|
87 | + if (empty($db_options['dont_select_db']) && !@mysql_select_db($db_name, $connection) && empty($db_options['non_fatal'])) { |
|
88 | + display_db_error(); |
|
89 | + } |
|
84 | 90 | |
85 | 91 | // This makes it possible to have SMF automatically change the sql_mode and autocommit if needed. |
86 | - if (isset($mysql_set_mode) && $mysql_set_mode === true) |
|
87 | - $smcFunc['db_query']('', 'SET sql_mode = \'\', AUTOCOMMIT = 1', |
|
92 | + if (isset($mysql_set_mode) && $mysql_set_mode === true) { |
|
93 | + $smcFunc['db_query']('', 'SET sql_mode = \'\', AUTOCOMMIT = 1', |
|
88 | 94 | array(), |
89 | 95 | false |
90 | 96 | ); |
97 | + } |
|
91 | 98 | |
92 | 99 | return $connection; |
93 | 100 | } |
@@ -134,37 +141,46 @@ discard block |
||
134 | 141 | list ($values, $connection) = $db_callback; |
135 | 142 | |
136 | 143 | // Connection gone??? This should *never* happen at this point, yet it does :'( |
137 | - if (!is_resource($connection)) |
|
138 | - display_db_error(); |
|
144 | + if (!is_resource($connection)) { |
|
145 | + display_db_error(); |
|
146 | + } |
|
139 | 147 | |
140 | - if ($matches[1] === 'db_prefix') |
|
141 | - return $db_prefix; |
|
148 | + if ($matches[1] === 'db_prefix') { |
|
149 | + return $db_prefix; |
|
150 | + } |
|
142 | 151 | |
143 | - if ($matches[1] === 'query_see_board') |
|
144 | - return $user_info['query_see_board']; |
|
152 | + if ($matches[1] === 'query_see_board') { |
|
153 | + return $user_info['query_see_board']; |
|
154 | + } |
|
145 | 155 | |
146 | - if ($matches[1] === 'query_wanna_see_board') |
|
147 | - return $user_info['query_wanna_see_board']; |
|
156 | + if ($matches[1] === 'query_wanna_see_board') { |
|
157 | + return $user_info['query_wanna_see_board']; |
|
158 | + } |
|
148 | 159 | |
149 | - if ($matches[1] === 'empty') |
|
150 | - return '\'\''; |
|
160 | + if ($matches[1] === 'empty') { |
|
161 | + return '\'\''; |
|
162 | + } |
|
151 | 163 | |
152 | - if (!isset($matches[2])) |
|
153 | - smf_db_error_backtrace('Invalid value inserted or no type specified.', '', E_USER_ERROR, __FILE__, __LINE__); |
|
164 | + if (!isset($matches[2])) { |
|
165 | + smf_db_error_backtrace('Invalid value inserted or no type specified.', '', E_USER_ERROR, __FILE__, __LINE__); |
|
166 | + } |
|
154 | 167 | |
155 | - if ($matches[1] === 'literal') |
|
156 | - return '\'' . mysql_real_escape_string($matches[2], $connection) . '\''; |
|
168 | + if ($matches[1] === 'literal') { |
|
169 | + return '\'' . mysql_real_escape_string($matches[2], $connection) . '\''; |
|
170 | + } |
|
157 | 171 | |
158 | - if (!isset($values[$matches[2]])) |
|
159 | - smf_db_error_backtrace('The database value you\'re trying to insert does not exist: ' . (isset($smcFunc['htmlspecialchars']) ? $smcFunc['htmlspecialchars']($matches[2]) : htmlspecialchars($matches[2])), '', E_USER_ERROR, __FILE__, __LINE__); |
|
172 | + if (!isset($values[$matches[2]])) { |
|
173 | + smf_db_error_backtrace('The database value you\'re trying to insert does not exist: ' . (isset($smcFunc['htmlspecialchars']) ? $smcFunc['htmlspecialchars']($matches[2]) : htmlspecialchars($matches[2])), '', E_USER_ERROR, __FILE__, __LINE__); |
|
174 | + } |
|
160 | 175 | |
161 | 176 | $replacement = $values[$matches[2]]; |
162 | 177 | |
163 | 178 | switch ($matches[1]) |
164 | 179 | { |
165 | 180 | case 'int': |
166 | - if (!is_numeric($replacement) || (string) $replacement !== (string) (int) $replacement) |
|
167 | - smf_db_error_backtrace('Wrong value type sent to the database. Integer expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
181 | + if (!is_numeric($replacement) || (string) $replacement !== (string) (int) $replacement) { |
|
182 | + smf_db_error_backtrace('Wrong value type sent to the database. Integer expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
183 | + } |
|
168 | 184 | return (string) (int) $replacement; |
169 | 185 | break; |
170 | 186 | |
@@ -176,49 +192,55 @@ discard block |
||
176 | 192 | case 'array_int': |
177 | 193 | if (is_array($replacement)) |
178 | 194 | { |
179 | - if (empty($replacement)) |
|
180 | - smf_db_error_backtrace('Database error, given array of integer values is empty. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
195 | + if (empty($replacement)) { |
|
196 | + smf_db_error_backtrace('Database error, given array of integer values is empty. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
197 | + } |
|
181 | 198 | |
182 | 199 | foreach ($replacement as $key => $value) |
183 | 200 | { |
184 | - if (!is_numeric($value) || (string) $value !== (string) (int) $value) |
|
185 | - smf_db_error_backtrace('Wrong value type sent to the database. Array of integers expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
201 | + if (!is_numeric($value) || (string) $value !== (string) (int) $value) { |
|
202 | + smf_db_error_backtrace('Wrong value type sent to the database. Array of integers expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
203 | + } |
|
186 | 204 | |
187 | 205 | $replacement[$key] = (string) (int) $value; |
188 | 206 | } |
189 | 207 | |
190 | 208 | return implode(', ', $replacement); |
209 | + } else { |
|
210 | + smf_db_error_backtrace('Wrong value type sent to the database. Array of integers expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
191 | 211 | } |
192 | - else |
|
193 | - smf_db_error_backtrace('Wrong value type sent to the database. Array of integers expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
194 | 212 | |
195 | 213 | break; |
196 | 214 | |
197 | 215 | case 'array_string': |
198 | 216 | if (is_array($replacement)) |
199 | 217 | { |
200 | - if (empty($replacement)) |
|
201 | - smf_db_error_backtrace('Database error, given array of string values is empty. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
218 | + if (empty($replacement)) { |
|
219 | + smf_db_error_backtrace('Database error, given array of string values is empty. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
220 | + } |
|
202 | 221 | |
203 | - foreach ($replacement as $key => $value) |
|
204 | - $replacement[$key] = sprintf('\'%1$s\'', mysql_real_escape_string($value, $connection)); |
|
222 | + foreach ($replacement as $key => $value) { |
|
223 | + $replacement[$key] = sprintf('\'%1$s\'', mysql_real_escape_string($value, $connection)); |
|
224 | + } |
|
205 | 225 | |
206 | 226 | return implode(', ', $replacement); |
227 | + } else { |
|
228 | + smf_db_error_backtrace('Wrong value type sent to the database. Array of strings expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
207 | 229 | } |
208 | - else |
|
209 | - smf_db_error_backtrace('Wrong value type sent to the database. Array of strings expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
210 | 230 | break; |
211 | 231 | |
212 | 232 | case 'date': |
213 | - if (preg_match('~^(\d{4})-([0-1]?\d)-([0-3]?\d)$~', $replacement, $date_matches) === 1) |
|
214 | - return sprintf('\'%04d-%02d-%02d\'', $date_matches[1], $date_matches[2], $date_matches[3]); |
|
215 | - else |
|
216 | - smf_db_error_backtrace('Wrong value type sent to the database. Date expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
233 | + if (preg_match('~^(\d{4})-([0-1]?\d)-([0-3]?\d)$~', $replacement, $date_matches) === 1) { |
|
234 | + return sprintf('\'%04d-%02d-%02d\'', $date_matches[1], $date_matches[2], $date_matches[3]); |
|
235 | + } else { |
|
236 | + smf_db_error_backtrace('Wrong value type sent to the database. Date expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
237 | + } |
|
217 | 238 | break; |
218 | 239 | |
219 | 240 | case 'float': |
220 | - if (!is_numeric($replacement)) |
|
221 | - smf_db_error_backtrace('Wrong value type sent to the database. Floating point number expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
241 | + if (!is_numeric($replacement)) { |
|
242 | + smf_db_error_backtrace('Wrong value type sent to the database. Floating point number expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
243 | + } |
|
222 | 244 | return (string) (float) $replacement; |
223 | 245 | break; |
224 | 246 | |
@@ -232,32 +254,37 @@ discard block |
||
232 | 254 | break; |
233 | 255 | |
234 | 256 | case 'inet': |
235 | - if ($replacement == 'null' || $replacement == '') |
|
236 | - return 'null'; |
|
237 | - if (!isValidIP($replacement)) |
|
238 | - smf_db_error_backtrace('Wrong value type sent to the database. IPv4 or IPv6 expected.(' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
257 | + if ($replacement == 'null' || $replacement == '') { |
|
258 | + return 'null'; |
|
259 | + } |
|
260 | + if (!isValidIP($replacement)) { |
|
261 | + smf_db_error_backtrace('Wrong value type sent to the database. IPv4 or IPv6 expected.(' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
262 | + } |
|
239 | 263 | //we don't use the native support of mysql > 5.6.2 |
240 | 264 | return sprintf('unhex(\'%1$s\')', bin2hex(inet_pton($replacement))); |
241 | 265 | |
242 | 266 | case 'array_inet': |
243 | 267 | if (is_array($replacement)) |
244 | 268 | { |
245 | - if (empty($replacement)) |
|
246 | - smf_db_error_backtrace('Database error, given array of IPv4 or IPv6 values is empty. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
269 | + if (empty($replacement)) { |
|
270 | + smf_db_error_backtrace('Database error, given array of IPv4 or IPv6 values is empty. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
271 | + } |
|
247 | 272 | |
248 | 273 | foreach ($replacement as $key => $value) |
249 | 274 | { |
250 | - if ($replacement == 'null' || $replacement == '') |
|
251 | - $replacement[$key] = 'null'; |
|
252 | - if (!isValidIP($value)) |
|
253 | - smf_db_error_backtrace('Wrong value type sent to the database. IPv4 or IPv6 expected.(' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
275 | + if ($replacement == 'null' || $replacement == '') { |
|
276 | + $replacement[$key] = 'null'; |
|
277 | + } |
|
278 | + if (!isValidIP($value)) { |
|
279 | + smf_db_error_backtrace('Wrong value type sent to the database. IPv4 or IPv6 expected.(' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
280 | + } |
|
254 | 281 | $replacement[$key] = sprintf('unhex(\'%1$s\')', bin2hex(inet_pton($value))); |
255 | 282 | } |
256 | 283 | |
257 | 284 | return implode(', ', $replacement); |
285 | + } else { |
|
286 | + smf_db_error_backtrace('Wrong value type sent to the database. Array of IPv4 or IPv6 expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
258 | 287 | } |
259 | - else |
|
260 | - smf_db_error_backtrace('Wrong value type sent to the database. Array of IPv4 or IPv6 expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__); |
|
261 | 288 | break; |
262 | 289 | |
263 | 290 | default: |
@@ -328,18 +355,20 @@ discard block |
||
328 | 355 | // One more query.... |
329 | 356 | $db_count = !isset($db_count) ? 1 : $db_count + 1; |
330 | 357 | |
331 | - if (empty($modSettings['disableQueryCheck']) && strpos($db_string, '\'') !== false && empty($db_values['security_override'])) |
|
332 | - smf_db_error_backtrace('Hacking attempt...', 'Illegal character (\') used in query...', true, __FILE__, __LINE__); |
|
358 | + if (empty($modSettings['disableQueryCheck']) && strpos($db_string, '\'') !== false && empty($db_values['security_override'])) { |
|
359 | + smf_db_error_backtrace('Hacking attempt...', 'Illegal character (\') used in query...', true, __FILE__, __LINE__); |
|
360 | + } |
|
333 | 361 | |
334 | 362 | // Use "ORDER BY null" to prevent Mysql doing filesorts for Group By clauses without an Order By |
335 | 363 | if (strpos($db_string, 'GROUP BY') !== false && strpos($db_string, 'ORDER BY') === false && preg_match('~^\s+SELECT~i', $db_string)) |
336 | 364 | { |
337 | 365 | // Add before LIMIT |
338 | - if ($pos = strpos($db_string, 'LIMIT ')) |
|
339 | - $db_string = substr($db_string, 0, $pos) . "\t\t\tORDER BY null\n" . substr($db_string, $pos, strlen($db_string)); |
|
340 | - else |
|
341 | - // Append it. |
|
366 | + if ($pos = strpos($db_string, 'LIMIT ')) { |
|
367 | + $db_string = substr($db_string, 0, $pos) . "\t\t\tORDER BY null\n" . substr($db_string, $pos, strlen($db_string)); |
|
368 | + } else { |
|
369 | + // Append it. |
|
342 | 370 | $db_string .= "\n\t\t\tORDER BY null"; |
371 | + } |
|
343 | 372 | } |
344 | 373 | |
345 | 374 | if (empty($db_values['security_override']) && (!empty($db_values) || strpos($db_string, '{db_prefix}') !== false)) |
@@ -361,8 +390,9 @@ discard block |
||
361 | 390 | list ($file, $line) = smf_db_error_backtrace('', '', 'return', __FILE__, __LINE__); |
362 | 391 | |
363 | 392 | // Initialize $db_cache if not already initialized. |
364 | - if (!isset($db_cache)) |
|
365 | - $db_cache = array(); |
|
393 | + if (!isset($db_cache)) { |
|
394 | + $db_cache = array(); |
|
395 | + } |
|
366 | 396 | |
367 | 397 | if (!empty($_SESSION['debug_redirect'])) |
368 | 398 | { |
@@ -388,17 +418,18 @@ discard block |
||
388 | 418 | while (true) |
389 | 419 | { |
390 | 420 | $pos = strpos($db_string, '\'', $pos + 1); |
391 | - if ($pos === false) |
|
392 | - break; |
|
421 | + if ($pos === false) { |
|
422 | + break; |
|
423 | + } |
|
393 | 424 | $clean .= substr($db_string, $old_pos, $pos - $old_pos); |
394 | 425 | |
395 | 426 | while (true) |
396 | 427 | { |
397 | 428 | $pos1 = strpos($db_string, '\'', $pos + 1); |
398 | 429 | $pos2 = strpos($db_string, '\\', $pos + 1); |
399 | - if ($pos1 === false) |
|
400 | - break; |
|
401 | - elseif ($pos2 === false || $pos2 > $pos1) |
|
430 | + if ($pos1 === false) { |
|
431 | + break; |
|
432 | + } elseif ($pos2 === false || $pos2 > $pos1) |
|
402 | 433 | { |
403 | 434 | $pos = $pos1; |
404 | 435 | break; |
@@ -414,29 +445,35 @@ discard block |
||
414 | 445 | $clean = trim(strtolower(preg_replace($allowed_comments_from, $allowed_comments_to, $clean))); |
415 | 446 | |
416 | 447 | // Comments? We don't use comments in our queries, we leave 'em outside! |
417 | - if (strpos($clean, '/*') > 2 || strpos($clean, '--') !== false || strpos($clean, ';') !== false) |
|
418 | - $fail = true; |
|
448 | + if (strpos($clean, '/*') > 2 || strpos($clean, '--') !== false || strpos($clean, ';') !== false) { |
|
449 | + $fail = true; |
|
450 | + } |
|
419 | 451 | // Trying to change passwords, slow us down, or something? |
420 | - elseif (strpos($clean, 'sleep') !== false && preg_match('~(^|[^a-z])sleep($|[^[_a-z])~s', $clean) != 0) |
|
421 | - $fail = true; |
|
422 | - elseif (strpos($clean, 'benchmark') !== false && preg_match('~(^|[^a-z])benchmark($|[^[a-z])~s', $clean) != 0) |
|
423 | - $fail = true; |
|
452 | + elseif (strpos($clean, 'sleep') !== false && preg_match('~(^|[^a-z])sleep($|[^[_a-z])~s', $clean) != 0) { |
|
453 | + $fail = true; |
|
454 | + } elseif (strpos($clean, 'benchmark') !== false && preg_match('~(^|[^a-z])benchmark($|[^[a-z])~s', $clean) != 0) { |
|
455 | + $fail = true; |
|
456 | + } |
|
424 | 457 | |
425 | - if (!empty($fail) && function_exists('log_error')) |
|
426 | - smf_db_error_backtrace('Hacking attempt...', 'Hacking attempt...' . "\n" . $db_string, E_USER_ERROR, __FILE__, __LINE__); |
|
458 | + if (!empty($fail) && function_exists('log_error')) { |
|
459 | + smf_db_error_backtrace('Hacking attempt...', 'Hacking attempt...' . "\n" . $db_string, E_USER_ERROR, __FILE__, __LINE__); |
|
460 | + } |
|
427 | 461 | } |
428 | 462 | |
429 | - if (empty($db_unbuffered)) |
|
430 | - $ret = @mysql_query($db_string, $connection); |
|
431 | - else |
|
432 | - $ret = @mysql_unbuffered_query($db_string, $connection); |
|
463 | + if (empty($db_unbuffered)) { |
|
464 | + $ret = @mysql_query($db_string, $connection); |
|
465 | + } else { |
|
466 | + $ret = @mysql_unbuffered_query($db_string, $connection); |
|
467 | + } |
|
433 | 468 | |
434 | - if ($ret === false && empty($db_values['db_error_skip'])) |
|
435 | - $ret = smf_db_error($db_string, $connection); |
|
469 | + if ($ret === false && empty($db_values['db_error_skip'])) { |
|
470 | + $ret = smf_db_error($db_string, $connection); |
|
471 | + } |
|
436 | 472 | |
437 | 473 | // Debugging. |
438 | - if (isset($db_show_debug) && $db_show_debug === true) |
|
439 | - $db_cache[$db_count]['t'] = array_sum(explode(' ', microtime())) - array_sum(explode(' ', $st)); |
|
474 | + if (isset($db_show_debug) && $db_show_debug === true) { |
|
475 | + $db_cache[$db_count]['t'] = array_sum(explode(' ', microtime())) - array_sum(explode(' ', $st)); |
|
476 | + } |
|
440 | 477 | |
441 | 478 | return $ret; |
442 | 479 | } |
@@ -485,12 +522,13 @@ discard block |
||
485 | 522 | // Decide which connection to use |
486 | 523 | $connection = $connection === null ? $db_connection : $connection; |
487 | 524 | |
488 | - if ($type == 'begin') |
|
489 | - return @mysql_query('BEGIN', $connection); |
|
490 | - elseif ($type == 'rollback') |
|
491 | - return @mysql_query('ROLLBACK', $connection); |
|
492 | - elseif ($type == 'commit') |
|
493 | - return @mysql_query('COMMIT', $connection); |
|
525 | + if ($type == 'begin') { |
|
526 | + return @mysql_query('BEGIN', $connection); |
|
527 | + } elseif ($type == 'rollback') { |
|
528 | + return @mysql_query('ROLLBACK', $connection); |
|
529 | + } elseif ($type == 'commit') { |
|
530 | + return @mysql_query('COMMIT', $connection); |
|
531 | + } |
|
494 | 532 | |
495 | 533 | return false; |
496 | 534 | } |
@@ -530,8 +568,9 @@ discard block |
||
530 | 568 | // 2013: Lost connection to server during query. |
531 | 569 | |
532 | 570 | // Log the error. |
533 | - if ($query_errno != 1213 && $query_errno != 1205 && function_exists('log_error')) |
|
534 | - log_error($txt['database_error'] . ': ' . $query_error . (!empty($modSettings['enableErrorQueryLogging']) ? "\n\n$db_string" : ''), 'database', $file, $line); |
|
571 | + if ($query_errno != 1213 && $query_errno != 1205 && function_exists('log_error')) { |
|
572 | + log_error($txt['database_error'] . ': ' . $query_error . (!empty($modSettings['enableErrorQueryLogging']) ? "\n\n$db_string" : ''), 'database', $file, $line); |
|
573 | + } |
|
535 | 574 | |
536 | 575 | // Database error auto fixing ;). |
537 | 576 | if (function_exists('cache_get_data') && (!isset($modSettings['autoFixDatabase']) || $modSettings['autoFixDatabase'] == '1')) |
@@ -540,8 +579,9 @@ discard block |
||
540 | 579 | $old_cache = @$modSettings['cache_enable']; |
541 | 580 | $modSettings['cache_enable'] = '1'; |
542 | 581 | |
543 | - if (($temp = cache_get_data('db_last_error', 600)) !== null) |
|
544 | - $db_last_error = max(@$db_last_error, $temp); |
|
582 | + if (($temp = cache_get_data('db_last_error', 600)) !== null) { |
|
583 | + $db_last_error = max(@$db_last_error, $temp); |
|
584 | + } |
|
545 | 585 | |
546 | 586 | if (@$db_last_error < time() - 3600 * 24 * 3) |
547 | 587 | { |
@@ -557,8 +597,9 @@ discard block |
||
557 | 597 | foreach ($tables as $table) |
558 | 598 | { |
559 | 599 | // Now, it's still theoretically possible this could be an injection. So backtick it! |
560 | - if (trim($table) != '') |
|
561 | - $fix_tables[] = '`' . strtr(trim($table), array('`' => '')) . '`'; |
|
600 | + if (trim($table) != '') { |
|
601 | + $fix_tables[] = '`' . strtr(trim($table), array('`' => '')) . '`'; |
|
602 | + } |
|
562 | 603 | } |
563 | 604 | } |
564 | 605 | |
@@ -567,8 +608,9 @@ discard block |
||
567 | 608 | // Table crashed. Let's try to fix it. |
568 | 609 | elseif ($query_errno == 1016) |
569 | 610 | { |
570 | - if (preg_match('~\'([^\.\']+)~', $query_error, $match) != 0) |
|
571 | - $fix_tables = array('`' . $match[1] . '`'); |
|
611 | + if (preg_match('~\'([^\.\']+)~', $query_error, $match) != 0) { |
|
612 | + $fix_tables = array('`' . $match[1] . '`'); |
|
613 | + } |
|
572 | 614 | } |
573 | 615 | // Indexes crashed. Should be easy to fix! |
574 | 616 | elseif ($query_errno == 1034 || $query_errno == 1035) |
@@ -587,13 +629,15 @@ discard block |
||
587 | 629 | |
588 | 630 | // Make a note of the REPAIR... |
589 | 631 | cache_put_data('db_last_error', time(), 600); |
590 | - if (($temp = cache_get_data('db_last_error', 600)) === null) |
|
591 | - updateSettingsFile(array('db_last_error' => time())); |
|
632 | + if (($temp = cache_get_data('db_last_error', 600)) === null) { |
|
633 | + updateSettingsFile(array('db_last_error' => time())); |
|
634 | + } |
|
592 | 635 | |
593 | 636 | // Attempt to find and repair the broken table. |
594 | - foreach ($fix_tables as $table) |
|
595 | - $smcFunc['db_query']('', " |
|
637 | + foreach ($fix_tables as $table) { |
|
638 | + $smcFunc['db_query']('', " |
|
596 | 639 | REPAIR TABLE $table", false, false); |
640 | + } |
|
597 | 641 | |
598 | 642 | // And send off an email! |
599 | 643 | sendmail($webmaster_email, $txt['database_error'], $txt['tried_to_repair'], null, 'dberror'); |
@@ -602,11 +646,12 @@ discard block |
||
602 | 646 | |
603 | 647 | // Try the query again...? |
604 | 648 | $ret = $smcFunc['db_query']('', $db_string, false, false); |
605 | - if ($ret !== false) |
|
606 | - return $ret; |
|
649 | + if ($ret !== false) { |
|
650 | + return $ret; |
|
651 | + } |
|
652 | + } else { |
|
653 | + $modSettings['cache_enable'] = $old_cache; |
|
607 | 654 | } |
608 | - else |
|
609 | - $modSettings['cache_enable'] = $old_cache; |
|
610 | 655 | |
611 | 656 | // Check for the "lost connection" or "deadlock found" errors - and try it just one more time. |
612 | 657 | if (in_array($query_errno, array(1205, 1213, 2006, 2013))) |
@@ -616,22 +661,25 @@ discard block |
||
616 | 661 | // Are we in SSI mode? If so try that username and password first |
617 | 662 | if (SMF == 'SSI' && !empty($ssi_db_user) && !empty($ssi_db_passwd)) |
618 | 663 | { |
619 | - if (empty($db_persist)) |
|
620 | - $db_connection = @mysql_connect($db_server, $ssi_db_user, $ssi_db_passwd); |
|
621 | - else |
|
622 | - $db_connection = @mysql_pconnect($db_server, $ssi_db_user, $ssi_db_passwd); |
|
664 | + if (empty($db_persist)) { |
|
665 | + $db_connection = @mysql_connect($db_server, $ssi_db_user, $ssi_db_passwd); |
|
666 | + } else { |
|
667 | + $db_connection = @mysql_pconnect($db_server, $ssi_db_user, $ssi_db_passwd); |
|
668 | + } |
|
623 | 669 | } |
624 | 670 | // Fall back to the regular username and password if need be |
625 | 671 | if (!$db_connection) |
626 | 672 | { |
627 | - if (empty($db_persist)) |
|
628 | - $db_connection = @mysql_connect($db_server, $db_user, $db_passwd); |
|
629 | - else |
|
630 | - $db_connection = @mysql_pconnect($db_server, $db_user, $db_passwd); |
|
673 | + if (empty($db_persist)) { |
|
674 | + $db_connection = @mysql_connect($db_server, $db_user, $db_passwd); |
|
675 | + } else { |
|
676 | + $db_connection = @mysql_pconnect($db_server, $db_user, $db_passwd); |
|
677 | + } |
|
631 | 678 | } |
632 | 679 | |
633 | - if (!$db_connection || !@mysql_select_db($db_name, $db_connection)) |
|
634 | - $db_connection = false; |
|
680 | + if (!$db_connection || !@mysql_select_db($db_name, $db_connection)) { |
|
681 | + $db_connection = false; |
|
682 | + } |
|
635 | 683 | } |
636 | 684 | |
637 | 685 | if ($db_connection) |
@@ -642,24 +690,27 @@ discard block |
||
642 | 690 | $ret = $smcFunc['db_query']('', $db_string, false, false); |
643 | 691 | |
644 | 692 | $new_errno = mysql_errno($db_connection); |
645 | - if ($ret !== false || in_array($new_errno, array(1205, 1213))) |
|
646 | - break; |
|
693 | + if ($ret !== false || in_array($new_errno, array(1205, 1213))) { |
|
694 | + break; |
|
695 | + } |
|
647 | 696 | } |
648 | 697 | |
649 | 698 | // If it failed again, shucks to be you... we're not trying it over and over. |
650 | - if ($ret !== false) |
|
651 | - return $ret; |
|
699 | + if ($ret !== false) { |
|
700 | + return $ret; |
|
701 | + } |
|
652 | 702 | } |
653 | 703 | } |
654 | 704 | // Are they out of space, perhaps? |
655 | 705 | elseif ($query_errno == 1030 && (strpos($query_error, ' -1 ') !== false || strpos($query_error, ' 28 ') !== false || strpos($query_error, ' 12 ') !== false)) |
656 | 706 | { |
657 | - if (!isset($txt)) |
|
658 | - $query_error .= ' - check database storage space.'; |
|
659 | - else |
|
707 | + if (!isset($txt)) { |
|
708 | + $query_error .= ' - check database storage space.'; |
|
709 | + } else |
|
660 | 710 | { |
661 | - if (!isset($txt['mysql_error_space'])) |
|
662 | - loadLanguage('Errors'); |
|
711 | + if (!isset($txt['mysql_error_space'])) { |
|
712 | + loadLanguage('Errors'); |
|
713 | + } |
|
663 | 714 | |
664 | 715 | $query_error .= !isset($txt['mysql_error_space']) ? ' - check database storage space.' : $txt['mysql_error_space']; |
665 | 716 | } |
@@ -667,15 +718,17 @@ discard block |
||
667 | 718 | } |
668 | 719 | |
669 | 720 | // Nothing's defined yet... just die with it. |
670 | - if (empty($context) || empty($txt)) |
|
671 | - die($query_error); |
|
721 | + if (empty($context) || empty($txt)) { |
|
722 | + die($query_error); |
|
723 | + } |
|
672 | 724 | |
673 | 725 | // Show an error message, if possible. |
674 | 726 | $context['error_title'] = $txt['database_error']; |
675 | - if (allowedTo('admin_forum')) |
|
676 | - $context['error_message'] = nl2br($query_error) . '<br>' . $txt['file'] . ': ' . $file . '<br>' . $txt['line'] . ': ' . $line; |
|
677 | - else |
|
678 | - $context['error_message'] = $txt['try_again']; |
|
727 | + if (allowedTo('admin_forum')) { |
|
728 | + $context['error_message'] = nl2br($query_error) . '<br>' . $txt['file'] . ': ' . $file . '<br>' . $txt['line'] . ': ' . $line; |
|
729 | + } else { |
|
730 | + $context['error_message'] = $txt['try_again']; |
|
731 | + } |
|
679 | 732 | |
680 | 733 | if (allowedTo('admin_forum') && isset($db_show_debug) && $db_show_debug === true) |
681 | 734 | { |
@@ -704,25 +757,28 @@ discard block |
||
704 | 757 | $connection = $connection === null ? $db_connection : $connection; |
705 | 758 | |
706 | 759 | // With nothing to insert, simply return. |
707 | - if (empty($data)) |
|
708 | - return; |
|
760 | + if (empty($data)) { |
|
761 | + return; |
|
762 | + } |
|
709 | 763 | |
710 | 764 | // Replace the prefix holder with the actual prefix. |
711 | 765 | $table = str_replace('{db_prefix}', $db_prefix, $table); |
712 | 766 | |
713 | 767 | // Inserting data as a single row can be done as a single array. |
714 | - if (!is_array($data[array_rand($data)])) |
|
715 | - $data = array($data); |
|
768 | + if (!is_array($data[array_rand($data)])) { |
|
769 | + $data = array($data); |
|
770 | + } |
|
716 | 771 | |
717 | 772 | // Create the mold for a single row insert. |
718 | 773 | $insertData = '('; |
719 | 774 | foreach ($columns as $columnName => $type) |
720 | 775 | { |
721 | 776 | // Are we restricting the length? |
722 | - if (strpos($type, 'string-') !== false) |
|
723 | - $insertData .= sprintf('SUBSTRING({string:%1$s}, 1, ' . substr($type, 7) . '), ', $columnName); |
|
724 | - else |
|
725 | - $insertData .= sprintf('{%1$s:%2$s}, ', $type, $columnName); |
|
777 | + if (strpos($type, 'string-') !== false) { |
|
778 | + $insertData .= sprintf('SUBSTRING({string:%1$s}, 1, ' . substr($type, 7) . '), ', $columnName); |
|
779 | + } else { |
|
780 | + $insertData .= sprintf('{%1$s:%2$s}, ', $type, $columnName); |
|
781 | + } |
|
726 | 782 | } |
727 | 783 | $insertData = substr($insertData, 0, -2) . ')'; |
728 | 784 | |
@@ -731,8 +787,9 @@ discard block |
||
731 | 787 | |
732 | 788 | // Here's where the variables are injected to the query. |
733 | 789 | $insertRows = array(); |
734 | - foreach ($data as $dataRow) |
|
735 | - $insertRows[] = smf_db_quote($insertData, array_combine($indexed_columns, $dataRow), $connection); |
|
790 | + foreach ($data as $dataRow) { |
|
791 | + $insertRows[] = smf_db_quote($insertData, array_combine($indexed_columns, $dataRow), $connection); |
|
792 | + } |
|
736 | 793 | |
737 | 794 | // Determine the method of insertion. |
738 | 795 | $queryTitle = $method == 'replace' ? 'REPLACE' : ($method == 'ignore' ? 'INSERT IGNORE' : 'INSERT'); |
@@ -763,8 +820,9 @@ discard block |
||
763 | 820 | */ |
764 | 821 | function smf_db_error_backtrace($error_message, $log_message = '', $error_type = false, $file = null, $line = null) |
765 | 822 | { |
766 | - if (empty($log_message)) |
|
767 | - $log_message = $error_message; |
|
823 | + if (empty($log_message)) { |
|
824 | + $log_message = $error_message; |
|
825 | + } |
|
768 | 826 | |
769 | 827 | foreach (debug_backtrace() as $step) |
770 | 828 | { |
@@ -783,12 +841,14 @@ discard block |
||
783 | 841 | } |
784 | 842 | |
785 | 843 | // A special case - we want the file and line numbers for debugging. |
786 | - if ($error_type == 'return') |
|
787 | - return array($file, $line); |
|
844 | + if ($error_type == 'return') { |
|
845 | + return array($file, $line); |
|
846 | + } |
|
788 | 847 | |
789 | 848 | // Is always a critical error. |
790 | - if (function_exists('log_error')) |
|
791 | - log_error($log_message, 'critical', $file, $line); |
|
849 | + if (function_exists('log_error')) { |
|
850 | + log_error($log_message, 'critical', $file, $line); |
|
851 | + } |
|
792 | 852 | |
793 | 853 | if (function_exists('fatal_error')) |
794 | 854 | { |
@@ -796,12 +856,12 @@ discard block |
||
796 | 856 | |
797 | 857 | // Cannot continue... |
798 | 858 | exit; |
859 | + } elseif ($error_type) { |
|
860 | + trigger_error($error_message . ($line !== null ? '<em>(' . basename($file) . '-' . $line . ')</em>' : ''), $error_type); |
|
861 | + } else { |
|
862 | + trigger_error($error_message . ($line !== null ? '<em>(' . basename($file) . '-' . $line . ')</em>' : '')); |
|
863 | + } |
|
799 | 864 | } |
800 | - elseif ($error_type) |
|
801 | - trigger_error($error_message . ($line !== null ? '<em>(' . basename($file) . '-' . $line . ')</em>' : ''), $error_type); |
|
802 | - else |
|
803 | - trigger_error($error_message . ($line !== null ? '<em>(' . basename($file) . '-' . $line . ')</em>' : '')); |
|
804 | -} |
|
805 | 865 | |
806 | 866 | /** |
807 | 867 | * Escape the LIKE wildcards so that they match the character and not the wildcard. |
@@ -818,10 +878,11 @@ discard block |
||
818 | 878 | '\\' => '\\\\', |
819 | 879 | ); |
820 | 880 | |
821 | - if ($translate_human_wildcards) |
|
822 | - $replacements += array( |
|
881 | + if ($translate_human_wildcards) { |
|
882 | + $replacements += array( |
|
823 | 883 | '*' => '%', |
824 | 884 | ); |
885 | + } |
|
825 | 886 | |
826 | 887 | return strtr($string, $replacements); |
827 | 888 | } |
@@ -501,7 +501,7 @@ |
||
501 | 501 | { |
502 | 502 | call_integration_hook('integrate_activate', array($regOptions['username'])); |
503 | 503 | |
504 | - setLoginCookie(60 * $modSettings['cookieTime'], $memberID, hash_salt($regOptions['register_vars']['passwd'], $regOptions['register_vars']['password_salt'])); |
|
504 | + setLoginCookie(60 * $modSettings['cookieTime'], $memberID, hash_salt($regOptions['register_vars']['passwd'], $regOptions['register_vars']['password_salt'])); |
|
505 | 505 | |
506 | 506 | redirectexit('action=login2;sa=check;member=' . $memberID, $context['server']['needs_login_fix']); |
507 | 507 | } |
@@ -15,8 +15,9 @@ discard block |
||
15 | 15 | * @version 2.1 Beta 3 |
16 | 16 | */ |
17 | 17 | |
18 | -if (!defined('SMF')) |
|
18 | +if (!defined('SMF')) { |
|
19 | 19 | die('No direct access...'); |
20 | +} |
|
20 | 21 | |
21 | 22 | /** |
22 | 23 | * Begin the registration process. |
@@ -29,19 +30,23 @@ discard block |
||
29 | 30 | global $language, $scripturl, $smcFunc, $sourcedir, $cur_profile; |
30 | 31 | |
31 | 32 | // Is this an incoming AJAX check? |
32 | - if (isset($_GET['sa']) && $_GET['sa'] == 'usernamecheck') |
|
33 | - return RegisterCheckUsername(); |
|
33 | + if (isset($_GET['sa']) && $_GET['sa'] == 'usernamecheck') { |
|
34 | + return RegisterCheckUsername(); |
|
35 | + } |
|
34 | 36 | |
35 | 37 | // Check if the administrator has it disabled. |
36 | - if (!empty($modSettings['registration_method']) && $modSettings['registration_method'] == '3') |
|
37 | - fatal_lang_error('registration_disabled', false); |
|
38 | + if (!empty($modSettings['registration_method']) && $modSettings['registration_method'] == '3') { |
|
39 | + fatal_lang_error('registration_disabled', false); |
|
40 | + } |
|
38 | 41 | |
39 | 42 | // If this user is an admin - redirect them to the admin registration page. |
40 | - if (allowedTo('moderate_forum') && !$user_info['is_guest']) |
|
41 | - redirectexit('action=admin;area=regcenter;sa=register'); |
|
43 | + if (allowedTo('moderate_forum') && !$user_info['is_guest']) { |
|
44 | + redirectexit('action=admin;area=regcenter;sa=register'); |
|
45 | + } |
|
42 | 46 | // You are not a guest, so you are a member - and members don't get to register twice! |
43 | - elseif (empty($user_info['is_guest'])) |
|
44 | - redirectexit(); |
|
47 | + elseif (empty($user_info['is_guest'])) { |
|
48 | + redirectexit(); |
|
49 | + } |
|
45 | 50 | |
46 | 51 | loadLanguage('Login'); |
47 | 52 | loadTemplate('Register'); |
@@ -82,16 +87,18 @@ discard block |
||
82 | 87 | } |
83 | 88 | } |
84 | 89 | // Make sure they don't squeeze through without agreeing. |
85 | - elseif ($current_step > 1 && $context['require_agreement'] && !$context['registration_passed_agreement']) |
|
86 | - $current_step = 1; |
|
90 | + elseif ($current_step > 1 && $context['require_agreement'] && !$context['registration_passed_agreement']) { |
|
91 | + $current_step = 1; |
|
92 | + } |
|
87 | 93 | |
88 | 94 | // Show the user the right form. |
89 | 95 | $context['sub_template'] = $current_step == 1 ? 'registration_agreement' : 'registration_form'; |
90 | 96 | $context['page_title'] = $current_step == 1 ? $txt['registration_agreement'] : $txt['registration_form']; |
91 | 97 | |
92 | 98 | // Kinda need this. |
93 | - if ($context['sub_template'] == 'registration_form') |
|
94 | - loadJavaScriptFile('register.js', array('defer' => false), 'smf_register'); |
|
99 | + if ($context['sub_template'] == 'registration_form') { |
|
100 | + loadJavaScriptFile('register.js', array('defer' => false), 'smf_register'); |
|
101 | + } |
|
95 | 102 | |
96 | 103 | // Add the register chain to the link tree. |
97 | 104 | $context['linktree'][] = array( |
@@ -100,24 +107,26 @@ discard block |
||
100 | 107 | ); |
101 | 108 | |
102 | 109 | // Prepare the time gate! Do it like so, in case later steps want to reset the limit for any reason, but make sure the time is the current one. |
103 | - if (!isset($_SESSION['register'])) |
|
104 | - $_SESSION['register'] = array( |
|
110 | + if (!isset($_SESSION['register'])) { |
|
111 | + $_SESSION['register'] = array( |
|
105 | 112 | 'timenow' => time(), |
106 | 113 | 'limit' => 10, // minimum number of seconds required on this page for registration |
107 | 114 | ); |
108 | - else |
|
109 | - $_SESSION['register']['timenow'] = time(); |
|
115 | + } else { |
|
116 | + $_SESSION['register']['timenow'] = time(); |
|
117 | + } |
|
110 | 118 | |
111 | 119 | // If you have to agree to the agreement, it needs to be fetched from the file. |
112 | 120 | if ($context['require_agreement']) |
113 | 121 | { |
114 | 122 | // Have we got a localized one? |
115 | - if (file_exists($boarddir . '/agreement.' . $user_info['language'] . '.txt')) |
|
116 | - $context['agreement'] = parse_bbc(file_get_contents($boarddir . '/agreement.' . $user_info['language'] . '.txt'), true, 'agreement_' . $user_info['language']); |
|
117 | - elseif (file_exists($boarddir . '/agreement.txt')) |
|
118 | - $context['agreement'] = parse_bbc(file_get_contents($boarddir . '/agreement.txt'), true, 'agreement'); |
|
119 | - else |
|
120 | - $context['agreement'] = ''; |
|
123 | + if (file_exists($boarddir . '/agreement.' . $user_info['language'] . '.txt')) { |
|
124 | + $context['agreement'] = parse_bbc(file_get_contents($boarddir . '/agreement.' . $user_info['language'] . '.txt'), true, 'agreement_' . $user_info['language']); |
|
125 | + } elseif (file_exists($boarddir . '/agreement.txt')) { |
|
126 | + $context['agreement'] = parse_bbc(file_get_contents($boarddir . '/agreement.txt'), true, 'agreement'); |
|
127 | + } else { |
|
128 | + $context['agreement'] = ''; |
|
129 | + } |
|
121 | 130 | |
122 | 131 | // Nothing to show, lets disable registration and inform the admin of this error |
123 | 132 | if (empty($context['agreement'])) |
@@ -133,8 +142,9 @@ discard block |
||
133 | 142 | $selectedLanguage = empty($_SESSION['language']) ? $language : $_SESSION['language']; |
134 | 143 | |
135 | 144 | // Do we have any languages? |
136 | - if (empty($context['languages'])) |
|
137 | - getLanguages(); |
|
145 | + if (empty($context['languages'])) { |
|
146 | + getLanguages(); |
|
147 | + } |
|
138 | 148 | |
139 | 149 | // Try to find our selected language. |
140 | 150 | foreach ($context['languages'] as $key => $lang) |
@@ -142,8 +152,9 @@ discard block |
||
142 | 152 | $context['languages'][$key]['name'] = strtr($lang['name'], array('-utf8' => '')); |
143 | 153 | |
144 | 154 | // Found it! |
145 | - if ($selectedLanguage == $lang['filename']) |
|
146 | - $context['languages'][$key]['selected'] = true; |
|
155 | + if ($selectedLanguage == $lang['filename']) { |
|
156 | + $context['languages'][$key]['selected'] = true; |
|
157 | + } |
|
147 | 158 | } |
148 | 159 | } |
149 | 160 | |
@@ -167,9 +178,10 @@ discard block |
||
167 | 178 | $reg_fields = explode(',', $modSettings['registration_fields']); |
168 | 179 | |
169 | 180 | // We might have had some submissions on this front - go check. |
170 | - foreach ($reg_fields as $field) |
|
171 | - if (isset($_POST[$field])) |
|
181 | + foreach ($reg_fields as $field) { |
|
182 | + if (isset($_POST[$field])) |
|
172 | 183 | $cur_profile[$field] = $smcFunc['htmlspecialchars']($_POST[$field]); |
184 | + } |
|
173 | 185 | |
174 | 186 | // Load all the fields in question. |
175 | 187 | setupProfileContext($reg_fields); |
@@ -186,8 +198,9 @@ discard block |
||
186 | 198 | $context['visual_verification_id'] = $verificationOptions['id']; |
187 | 199 | } |
188 | 200 | // Otherwise we have nothing to show. |
189 | - else |
|
190 | - $context['visual_verification'] = false; |
|
201 | + else { |
|
202 | + $context['visual_verification'] = false; |
|
203 | + } |
|
191 | 204 | |
192 | 205 | |
193 | 206 | $context += array( |
@@ -198,8 +211,9 @@ discard block |
||
198 | 211 | |
199 | 212 | // Were there any errors? |
200 | 213 | $context['registration_errors'] = array(); |
201 | - if (!empty($reg_errors)) |
|
202 | - $context['registration_errors'] = $reg_errors; |
|
214 | + if (!empty($reg_errors)) { |
|
215 | + $context['registration_errors'] = $reg_errors; |
|
216 | + } |
|
203 | 217 | |
204 | 218 | createToken('register'); |
205 | 219 | } |
@@ -216,27 +230,32 @@ discard block |
||
216 | 230 | validateToken('register'); |
217 | 231 | |
218 | 232 | // Check to ensure we're forcing SSL for authentication |
219 | - if (!empty($modSettings['force_ssl']) && empty($maintenance) && (!isset($_SERVER['HTTPS']) || $_SERVER['HTTPS'] != 'on')) |
|
220 | - fatal_lang_error('register_ssl_required'); |
|
233 | + if (!empty($modSettings['force_ssl']) && empty($maintenance) && (!isset($_SERVER['HTTPS']) || $_SERVER['HTTPS'] != 'on')) { |
|
234 | + fatal_lang_error('register_ssl_required'); |
|
235 | + } |
|
221 | 236 | |
222 | 237 | // Start collecting together any errors. |
223 | 238 | $reg_errors = array(); |
224 | 239 | |
225 | 240 | // You can't register if it's disabled. |
226 | - if (!empty($modSettings['registration_method']) && $modSettings['registration_method'] == 3) |
|
227 | - fatal_lang_error('registration_disabled', false); |
|
241 | + if (!empty($modSettings['registration_method']) && $modSettings['registration_method'] == 3) { |
|
242 | + fatal_lang_error('registration_disabled', false); |
|
243 | + } |
|
228 | 244 | |
229 | 245 | // Well, if you don't agree, you can't register. |
230 | - if (!empty($modSettings['requireAgreement']) && empty($_SESSION['registration_agreed'])) |
|
231 | - redirectexit(); |
|
246 | + if (!empty($modSettings['requireAgreement']) && empty($_SESSION['registration_agreed'])) { |
|
247 | + redirectexit(); |
|
248 | + } |
|
232 | 249 | |
233 | 250 | // Make sure they came from *somewhere*, have a session. |
234 | - if (!isset($_SESSION['old_url'])) |
|
235 | - redirectexit('action=signup'); |
|
251 | + if (!isset($_SESSION['old_url'])) { |
|
252 | + redirectexit('action=signup'); |
|
253 | + } |
|
236 | 254 | |
237 | 255 | // If we don't require an agreement, we need a extra check for coppa. |
238 | - if (empty($modSettings['requireAgreement']) && !empty($modSettings['coppaAge'])) |
|
239 | - $_SESSION['skip_coppa'] = !empty($_POST['accept_agreement']); |
|
256 | + if (empty($modSettings['requireAgreement']) && !empty($modSettings['coppaAge'])) { |
|
257 | + $_SESSION['skip_coppa'] = !empty($_POST['accept_agreement']); |
|
258 | + } |
|
240 | 259 | // Are they under age, and under age users are banned? |
241 | 260 | if (!empty($modSettings['coppaAge']) && empty($modSettings['coppaType']) && empty($_SESSION['skip_coppa'])) |
242 | 261 | { |
@@ -245,8 +264,9 @@ discard block |
||
245 | 264 | } |
246 | 265 | |
247 | 266 | // Check the time gate for miscreants. First make sure they came from somewhere that actually set it up. |
248 | - if (empty($_SESSION['register']['timenow']) || empty($_SESSION['register']['limit'])) |
|
249 | - redirectexit('action=signup'); |
|
267 | + if (empty($_SESSION['register']['timenow']) || empty($_SESSION['register']['limit'])) { |
|
268 | + redirectexit('action=signup'); |
|
269 | + } |
|
250 | 270 | // Failing that, check the time on it. |
251 | 271 | if (time() - $_SESSION['register']['timenow'] < $_SESSION['register']['limit']) |
252 | 272 | { |
@@ -266,15 +286,17 @@ discard block |
||
266 | 286 | if (is_array($context['visual_verification'])) |
267 | 287 | { |
268 | 288 | loadLanguage('Errors'); |
269 | - foreach ($context['visual_verification'] as $error) |
|
270 | - $reg_errors[] = $txt['error_' . $error]; |
|
289 | + foreach ($context['visual_verification'] as $error) { |
|
290 | + $reg_errors[] = $txt['error_' . $error]; |
|
291 | + } |
|
271 | 292 | } |
272 | 293 | } |
273 | 294 | |
274 | 295 | foreach ($_POST as $key => $value) |
275 | 296 | { |
276 | - if (!is_array($_POST[$key])) |
|
277 | - $_POST[$key] = htmltrim__recursive(str_replace(array("\n", "\r"), '', $_POST[$key])); |
|
297 | + if (!is_array($_POST[$key])) { |
|
298 | + $_POST[$key] = htmltrim__recursive(str_replace(array("\n", "\r"), '', $_POST[$key])); |
|
299 | + } |
|
278 | 300 | } |
279 | 301 | |
280 | 302 | // Collect all extra registration fields someone might have filled in. |
@@ -304,12 +326,14 @@ discard block |
||
304 | 326 | $reg_fields = explode(',', $modSettings['registration_fields']); |
305 | 327 | |
306 | 328 | // Website is a little different |
307 | - if (in_array('website', $reg_fields)) |
|
308 | - $possible_strings += array('website_url', 'website_title'); |
|
329 | + if (in_array('website', $reg_fields)) { |
|
330 | + $possible_strings += array('website_url', 'website_title'); |
|
331 | + } |
|
309 | 332 | } |
310 | 333 | |
311 | - if (isset($_POST['secret_answer']) && $_POST['secret_answer'] != '') |
|
312 | - $_POST['secret_answer'] = md5($_POST['secret_answer']); |
|
334 | + if (isset($_POST['secret_answer']) && $_POST['secret_answer'] != '') { |
|
335 | + $_POST['secret_answer'] = md5($_POST['secret_answer']); |
|
336 | + } |
|
313 | 337 | |
314 | 338 | // Needed for isReservedName() and registerMember(). |
315 | 339 | require_once($sourcedir . '/Subs-Members.php'); |
@@ -318,32 +342,37 @@ discard block |
||
318 | 342 | if (isset($_POST['real_name']) && (allowedTo('profile_displayed_name') || allowedTo('moderate_forum'))) |
319 | 343 | { |
320 | 344 | $_POST['real_name'] = trim(preg_replace('~[\t\n\r \x0B\0' . ($context['utf8'] ? '\x{A0}\x{AD}\x{2000}-\x{200F}\x{201F}\x{202F}\x{3000}\x{FEFF}' : '\x00-\x08\x0B\x0C\x0E-\x19\xA0') . ']+~' . ($context['utf8'] ? 'u' : ''), ' ', $_POST['real_name'])); |
321 | - if (trim($_POST['real_name']) != '' && !isReservedName($_POST['real_name']) && $smcFunc['strlen']($_POST['real_name']) < 60) |
|
322 | - $possible_strings[] = 'real_name'; |
|
345 | + if (trim($_POST['real_name']) != '' && !isReservedName($_POST['real_name']) && $smcFunc['strlen']($_POST['real_name']) < 60) { |
|
346 | + $possible_strings[] = 'real_name'; |
|
347 | + } |
|
323 | 348 | } |
324 | 349 | |
325 | 350 | // Handle a string as a birthdate... |
326 | - if (isset($_POST['birthdate']) && $_POST['birthdate'] != '') |
|
327 | - $_POST['birthdate'] = strftime('%Y-%m-%d', strtotime($_POST['birthdate'])); |
|
351 | + if (isset($_POST['birthdate']) && $_POST['birthdate'] != '') { |
|
352 | + $_POST['birthdate'] = strftime('%Y-%m-%d', strtotime($_POST['birthdate'])); |
|
353 | + } |
|
328 | 354 | // Or birthdate parts... |
329 | - elseif (!empty($_POST['bday1']) && !empty($_POST['bday2'])) |
|
330 | - $_POST['birthdate'] = sprintf('%04d-%02d-%02d', empty($_POST['bday3']) ? 0 : (int) $_POST['bday3'], (int) $_POST['bday1'], (int) $_POST['bday2']); |
|
355 | + elseif (!empty($_POST['bday1']) && !empty($_POST['bday2'])) { |
|
356 | + $_POST['birthdate'] = sprintf('%04d-%02d-%02d', empty($_POST['bday3']) ? 0 : (int) $_POST['bday3'], (int) $_POST['bday1'], (int) $_POST['bday2']); |
|
357 | + } |
|
331 | 358 | |
332 | 359 | // Validate the passed language file. |
333 | 360 | if (isset($_POST['lngfile']) && !empty($modSettings['userLanguage'])) |
334 | 361 | { |
335 | 362 | // Do we have any languages? |
336 | - if (empty($context['languages'])) |
|
337 | - getLanguages(); |
|
363 | + if (empty($context['languages'])) { |
|
364 | + getLanguages(); |
|
365 | + } |
|
338 | 366 | |
339 | 367 | // Did we find it? |
340 | - if (isset($context['languages'][$_POST['lngfile']])) |
|
341 | - $_SESSION['language'] = $_POST['lngfile']; |
|
342 | - else |
|
368 | + if (isset($context['languages'][$_POST['lngfile']])) { |
|
369 | + $_SESSION['language'] = $_POST['lngfile']; |
|
370 | + } else { |
|
371 | + unset($_POST['lngfile']); |
|
372 | + } |
|
373 | + } else { |
|
343 | 374 | unset($_POST['lngfile']); |
344 | 375 | } |
345 | - else |
|
346 | - unset($_POST['lngfile']); |
|
347 | 376 | |
348 | 377 | // Set the options needed for registration. |
349 | 378 | $regOptions = array( |
@@ -363,22 +392,27 @@ discard block |
||
363 | 392 | ); |
364 | 393 | |
365 | 394 | // Include the additional options that might have been filled in. |
366 | - foreach ($possible_strings as $var) |
|
367 | - if (isset($_POST[$var])) |
|
395 | + foreach ($possible_strings as $var) { |
|
396 | + if (isset($_POST[$var])) |
|
368 | 397 | $regOptions['extra_register_vars'][$var] = $smcFunc['htmlspecialchars']($_POST[$var], ENT_QUOTES); |
369 | - foreach ($possible_ints as $var) |
|
370 | - if (isset($_POST[$var])) |
|
398 | + } |
|
399 | + foreach ($possible_ints as $var) { |
|
400 | + if (isset($_POST[$var])) |
|
371 | 401 | $regOptions['extra_register_vars'][$var] = (int) $_POST[$var]; |
372 | - foreach ($possible_floats as $var) |
|
373 | - if (isset($_POST[$var])) |
|
402 | + } |
|
403 | + foreach ($possible_floats as $var) { |
|
404 | + if (isset($_POST[$var])) |
|
374 | 405 | $regOptions['extra_register_vars'][$var] = (float) $_POST[$var]; |
375 | - foreach ($possible_bools as $var) |
|
376 | - if (isset($_POST[$var])) |
|
406 | + } |
|
407 | + foreach ($possible_bools as $var) { |
|
408 | + if (isset($_POST[$var])) |
|
377 | 409 | $regOptions['extra_register_vars'][$var] = empty($_POST[$var]) ? 0 : 1; |
410 | + } |
|
378 | 411 | |
379 | 412 | // Registration options are always default options... |
380 | - if (isset($_POST['default_options'])) |
|
381 | - $_POST['options'] = isset($_POST['options']) ? $_POST['options'] + $_POST['default_options'] : $_POST['default_options']; |
|
413 | + if (isset($_POST['default_options'])) { |
|
414 | + $_POST['options'] = isset($_POST['options']) ? $_POST['options'] + $_POST['default_options'] : $_POST['default_options']; |
|
415 | + } |
|
382 | 416 | $regOptions['theme_vars'] = isset($_POST['options']) && is_array($_POST['options']) ? $_POST['options'] : array(); |
383 | 417 | |
384 | 418 | // Make sure they are clean, dammit! |
@@ -398,12 +432,14 @@ discard block |
||
398 | 432 | while ($row = $smcFunc['db_fetch_assoc']($request)) |
399 | 433 | { |
400 | 434 | // Don't allow overriding of the theme variables. |
401 | - if (isset($regOptions['theme_vars'][$row['col_name']])) |
|
402 | - unset($regOptions['theme_vars'][$row['col_name']]); |
|
435 | + if (isset($regOptions['theme_vars'][$row['col_name']])) { |
|
436 | + unset($regOptions['theme_vars'][$row['col_name']]); |
|
437 | + } |
|
403 | 438 | |
404 | 439 | // Not actually showing it then? |
405 | - if (!$row['show_reg']) |
|
406 | - continue; |
|
440 | + if (!$row['show_reg']) { |
|
441 | + continue; |
|
442 | + } |
|
407 | 443 | |
408 | 444 | // Prepare the value! |
409 | 445 | $value = isset($_POST['customfield'][$row['col_name']]) ? trim($_POST['customfield'][$row['col_name']]) : ''; |
@@ -412,24 +448,27 @@ discard block |
||
412 | 448 | if (!in_array($row['field_type'], array('check', 'select', 'radio'))) |
413 | 449 | { |
414 | 450 | // Is it too long? |
415 | - if ($row['field_length'] && $row['field_length'] < $smcFunc['strlen']($value)) |
|
416 | - $custom_field_errors[] = array('custom_field_too_long', array($row['field_name'], $row['field_length'])); |
|
451 | + if ($row['field_length'] && $row['field_length'] < $smcFunc['strlen']($value)) { |
|
452 | + $custom_field_errors[] = array('custom_field_too_long', array($row['field_name'], $row['field_length'])); |
|
453 | + } |
|
417 | 454 | |
418 | 455 | // Any masks to apply? |
419 | 456 | if ($row['field_type'] == 'text' && !empty($row['mask']) && $row['mask'] != 'none') |
420 | 457 | { |
421 | - if ($row['mask'] == 'email' && (!filter_var($value, FILTER_VALIDATE_EMAIL) || strlen($value) > 255)) |
|
422 | - $custom_field_errors[] = array('custom_field_invalid_email', array($row['field_name'])); |
|
423 | - elseif ($row['mask'] == 'number' && preg_match('~[^\d]~', $value)) |
|
424 | - $custom_field_errors[] = array('custom_field_not_number', array($row['field_name'])); |
|
425 | - elseif (substr($row['mask'], 0, 5) == 'regex' && trim($value) != '' && preg_match(substr($row['mask'], 5), $value) === 0) |
|
426 | - $custom_field_errors[] = array('custom_field_inproper_format', array($row['field_name'])); |
|
458 | + if ($row['mask'] == 'email' && (!filter_var($value, FILTER_VALIDATE_EMAIL) || strlen($value) > 255)) { |
|
459 | + $custom_field_errors[] = array('custom_field_invalid_email', array($row['field_name'])); |
|
460 | + } elseif ($row['mask'] == 'number' && preg_match('~[^\d]~', $value)) { |
|
461 | + $custom_field_errors[] = array('custom_field_not_number', array($row['field_name'])); |
|
462 | + } elseif (substr($row['mask'], 0, 5) == 'regex' && trim($value) != '' && preg_match(substr($row['mask'], 5), $value) === 0) { |
|
463 | + $custom_field_errors[] = array('custom_field_inproper_format', array($row['field_name'])); |
|
464 | + } |
|
427 | 465 | } |
428 | 466 | } |
429 | 467 | |
430 | 468 | // Is this required but not there? |
431 | - if (trim($value) == '' && $row['show_reg'] > 1) |
|
432 | - $custom_field_errors[] = array('custom_field_empty', array($row['field_name'])); |
|
469 | + if (trim($value) == '' && $row['show_reg'] > 1) { |
|
470 | + $custom_field_errors[] = array('custom_field_empty', array($row['field_name'])); |
|
471 | + } |
|
433 | 472 | } |
434 | 473 | $smcFunc['db_free_result']($request); |
435 | 474 | |
@@ -437,8 +476,9 @@ discard block |
||
437 | 476 | if (!empty($custom_field_errors)) |
438 | 477 | { |
439 | 478 | loadLanguage('Errors'); |
440 | - foreach ($custom_field_errors as $error) |
|
441 | - $reg_errors[] = vsprintf($txt['error_' . $error[0]], $error[1]); |
|
479 | + foreach ($custom_field_errors as $error) { |
|
480 | + $reg_errors[] = vsprintf($txt['error_' . $error[0]], $error[1]); |
|
481 | + } |
|
442 | 482 | } |
443 | 483 | |
444 | 484 | // Lets check for other errors before trying to register the member. |
@@ -483,8 +523,9 @@ discard block |
||
483 | 523 | } |
484 | 524 | |
485 | 525 | // If COPPA has been selected then things get complicated, setup the template. |
486 | - if (!empty($modSettings['coppaAge']) && empty($_SESSION['skip_coppa'])) |
|
487 | - redirectexit('action=coppa;member=' . $memberID); |
|
526 | + if (!empty($modSettings['coppaAge']) && empty($_SESSION['skip_coppa'])) { |
|
527 | + redirectexit('action=coppa;member=' . $memberID); |
|
528 | + } |
|
488 | 529 | // Basic template variable setup. |
489 | 530 | elseif (!empty($modSettings['registration_method'])) |
490 | 531 | { |
@@ -496,8 +537,7 @@ discard block |
||
496 | 537 | 'sub_template' => 'after', |
497 | 538 | 'description' => $modSettings['registration_method'] == 2 ? $txt['approval_after_registration'] : $txt['activate_after_registration'] |
498 | 539 | ); |
499 | - } |
|
500 | - else |
|
540 | + } else |
|
501 | 541 | { |
502 | 542 | call_integration_hook('integrate_activate', array($regOptions['username'])); |
503 | 543 | |
@@ -517,16 +557,18 @@ discard block |
||
517 | 557 | global $context, $txt, $modSettings, $scripturl, $sourcedir, $smcFunc, $language, $user_info; |
518 | 558 | |
519 | 559 | // Logged in users should not bother to activate their accounts |
520 | - if (!empty($user_info['id'])) |
|
521 | - redirectexit(); |
|
560 | + if (!empty($user_info['id'])) { |
|
561 | + redirectexit(); |
|
562 | + } |
|
522 | 563 | |
523 | 564 | loadLanguage('Login'); |
524 | 565 | loadTemplate('Login'); |
525 | 566 | |
526 | 567 | if (empty($_REQUEST['u']) && empty($_POST['user'])) |
527 | 568 | { |
528 | - if (empty($modSettings['registration_method']) || $modSettings['registration_method'] == '3') |
|
529 | - fatal_lang_error('no_access', false); |
|
569 | + if (empty($modSettings['registration_method']) || $modSettings['registration_method'] == '3') { |
|
570 | + fatal_lang_error('no_access', false); |
|
571 | + } |
|
530 | 572 | |
531 | 573 | $context['member_id'] = 0; |
532 | 574 | $context['sub_template'] = 'resend'; |
@@ -566,11 +608,13 @@ discard block |
||
566 | 608 | // Change their email address? (they probably tried a fake one first :P.) |
567 | 609 | if (isset($_POST['new_email'], $_REQUEST['passwd']) && hash_password($row['member_name'], $_REQUEST['passwd']) == $row['passwd'] && ($row['is_activated'] == 0 || $row['is_activated'] == 2)) |
568 | 610 | { |
569 | - if (empty($modSettings['registration_method']) || $modSettings['registration_method'] == 3) |
|
570 | - fatal_lang_error('no_access', false); |
|
611 | + if (empty($modSettings['registration_method']) || $modSettings['registration_method'] == 3) { |
|
612 | + fatal_lang_error('no_access', false); |
|
613 | + } |
|
571 | 614 | |
572 | - if (!filter_var($_POST['new_email'], FILTER_VALIDATE_EMAIL)) |
|
573 | - fatal_error(sprintf($txt['valid_email_needed'], $smcFunc['htmlspecialchars']($_POST['new_email'])), false); |
|
615 | + if (!filter_var($_POST['new_email'], FILTER_VALIDATE_EMAIL)) { |
|
616 | + fatal_error(sprintf($txt['valid_email_needed'], $smcFunc['htmlspecialchars']($_POST['new_email'])), false); |
|
617 | + } |
|
574 | 618 | |
575 | 619 | // Make sure their email isn't banned. |
576 | 620 | isBannedEmail($_POST['new_email'], 'cannot_register', $txt['ban_register_prohibited']); |
@@ -586,8 +630,9 @@ discard block |
||
586 | 630 | ) |
587 | 631 | ); |
588 | 632 | |
589 | - if ($smcFunc['db_num_rows']($request) != 0) |
|
590 | - fatal_lang_error('email_in_use', false, array($smcFunc['htmlspecialchars']($_POST['new_email']))); |
|
633 | + if ($smcFunc['db_num_rows']($request) != 0) { |
|
634 | + fatal_lang_error('email_in_use', false, array($smcFunc['htmlspecialchars']($_POST['new_email']))); |
|
635 | + } |
|
591 | 636 | $smcFunc['db_free_result']($request); |
592 | 637 | |
593 | 638 | updateMemberData($row['id_member'], array('email_address' => $_POST['new_email'])); |
@@ -625,9 +670,9 @@ discard block |
||
625 | 670 | // Quit if this code is not right. |
626 | 671 | if (empty($_REQUEST['code']) || $row['validation_code'] != $_REQUEST['code']) |
627 | 672 | { |
628 | - if (!empty($row['is_activated'])) |
|
629 | - fatal_lang_error('already_activated', false); |
|
630 | - elseif ($row['validation_code'] == '') |
|
673 | + if (!empty($row['is_activated'])) { |
|
674 | + fatal_lang_error('already_activated', false); |
|
675 | + } elseif ($row['validation_code'] == '') |
|
631 | 676 | { |
632 | 677 | loadLanguage('Profile'); |
633 | 678 | fatal_error(sprintf($txt['registration_not_approved'], $scripturl . '?action=activate;user=' . $row['member_name']), false); |
@@ -677,8 +722,9 @@ discard block |
||
677 | 722 | loadTemplate('Register'); |
678 | 723 | |
679 | 724 | // No User ID?? |
680 | - if (!isset($_GET['member'])) |
|
681 | - fatal_lang_error('no_access', false); |
|
725 | + if (!isset($_GET['member'])) { |
|
726 | + fatal_lang_error('no_access', false); |
|
727 | + } |
|
682 | 728 | |
683 | 729 | // Get the user details... |
684 | 730 | $request = $smcFunc['db_query']('', ' |
@@ -691,8 +737,9 @@ discard block |
||
691 | 737 | 'is_coppa' => 5, |
692 | 738 | ) |
693 | 739 | ); |
694 | - if ($smcFunc['db_num_rows']($request) == 0) |
|
695 | - fatal_lang_error('no_access', false); |
|
740 | + if ($smcFunc['db_num_rows']($request) == 0) { |
|
741 | + fatal_lang_error('no_access', false); |
|
742 | + } |
|
696 | 743 | list ($username) = $smcFunc['db_fetch_row']($request); |
697 | 744 | $smcFunc['db_free_result']($request); |
698 | 745 | |
@@ -730,8 +777,7 @@ discard block |
||
730 | 777 | echo $data; |
731 | 778 | obExit(false); |
732 | 779 | } |
733 | - } |
|
734 | - else |
|
780 | + } else |
|
735 | 781 | { |
736 | 782 | $context += array( |
737 | 783 | 'page_title' => $txt['coppa_title'], |
@@ -784,8 +830,9 @@ discard block |
||
784 | 830 | { |
785 | 831 | require_once($sourcedir . '/Subs-Graphics.php'); |
786 | 832 | |
787 | - if (in_array('gd', get_loaded_extensions()) && !showCodeImage($code)) |
|
788 | - header('HTTP/1.1 400 Bad Request'); |
|
833 | + if (in_array('gd', get_loaded_extensions()) && !showCodeImage($code)) { |
|
834 | + header('HTTP/1.1 400 Bad Request'); |
|
835 | + } |
|
789 | 836 | |
790 | 837 | // Otherwise just show a pre-defined letter. |
791 | 838 | elseif (isset($_REQUEST['letter'])) |
@@ -803,14 +850,13 @@ discard block |
||
803 | 850 | header('Content-Type: image/gif'); |
804 | 851 | die("\x47\x49\x46\x38\x39\x61\x01\x00\x01\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x21\xF9\x04\x01\x00\x00\x00\x00\x2C\x00\x00\x00\x00\x01\x00\x01\x00\x00\x02\x02\x44\x01\x00\x3B"); |
805 | 852 | } |
806 | - } |
|
807 | - |
|
808 | - elseif ($_REQUEST['format'] === '.wav') |
|
853 | + } elseif ($_REQUEST['format'] === '.wav') |
|
809 | 854 | { |
810 | 855 | require_once($sourcedir . '/Subs-Sound.php'); |
811 | 856 | |
812 | - if (!createWaveFile($code)) |
|
813 | - header('HTTP/1.1 400 Bad Request'); |
|
857 | + if (!createWaveFile($code)) { |
|
858 | + header('HTTP/1.1 400 Bad Request'); |
|
859 | + } |
|
814 | 860 | } |
815 | 861 | |
816 | 862 | // We all die one day... |
@@ -12,7 +12,8 @@ |
||
12 | 12 | header('Location: ' . $boardurl); |
13 | 13 | } |
14 | 14 | // Can't find it... just forget it. |
15 | -else |
|
15 | +else { |
|
16 | 16 | exit; |
17 | +} |
|
17 | 18 | |
18 | 19 | ?> |
19 | 20 | \ No newline at end of file |
@@ -13,8 +13,9 @@ discard block |
||
13 | 13 | * @version 2.1 Beta 3 |
14 | 14 | */ |
15 | 15 | |
16 | -if (!defined('SMF')) |
|
16 | +if (!defined('SMF')) { |
|
17 | 17 | die('No direct access...'); |
18 | +} |
|
18 | 19 | |
19 | 20 | /** |
20 | 21 | * Dispatches to the right function based on the given subaction. |
@@ -176,8 +177,9 @@ discard block |
||
176 | 177 | // If it's inherited, just add it as a child. |
177 | 178 | if ($row['id_parent'] != -2) |
178 | 179 | { |
179 | - if (isset($context['groups'][$row['id_parent']])) |
|
180 | - $context['groups'][$row['id_parent']]['children'][$row['id_group']] = $row['group_name']; |
|
180 | + if (isset($context['groups'][$row['id_parent']])) { |
|
181 | + $context['groups'][$row['id_parent']]['children'][$row['id_group']] = $row['group_name']; |
|
182 | + } |
|
181 | 183 | continue; |
182 | 184 | } |
183 | 185 | |
@@ -202,10 +204,11 @@ discard block |
||
202 | 204 | 'access' => false, |
203 | 205 | ); |
204 | 206 | |
205 | - if ($row['min_posts'] == -1) |
|
206 | - $normalGroups[$row['id_group']] = $row['id_group']; |
|
207 | - else |
|
208 | - $postGroups[$row['id_group']] = $row['id_group']; |
|
207 | + if ($row['min_posts'] == -1) { |
|
208 | + $normalGroups[$row['id_group']] = $row['id_group']; |
|
209 | + } else { |
|
210 | + $postGroups[$row['id_group']] = $row['id_group']; |
|
211 | + } |
|
209 | 212 | } |
210 | 213 | $smcFunc['db_free_result']($query); |
211 | 214 | |
@@ -221,8 +224,9 @@ discard block |
||
221 | 224 | 'post_group_list' => $postGroups, |
222 | 225 | ) |
223 | 226 | ); |
224 | - while ($row = $smcFunc['db_fetch_assoc']($query)) |
|
225 | - $context['groups'][$row['id_group']]['num_members'] += $row['num_members']; |
|
227 | + while ($row = $smcFunc['db_fetch_assoc']($query)) { |
|
228 | + $context['groups'][$row['id_group']]['num_members'] += $row['num_members']; |
|
229 | + } |
|
226 | 230 | $smcFunc['db_free_result']($query); |
227 | 231 | } |
228 | 232 | |
@@ -238,8 +242,9 @@ discard block |
||
238 | 242 | 'normal_group_list' => $normalGroups, |
239 | 243 | ) |
240 | 244 | ); |
241 | - while ($row = $smcFunc['db_fetch_assoc']($query)) |
|
242 | - $context['groups'][$row['id_group']]['num_members'] += $row['num_members']; |
|
245 | + while ($row = $smcFunc['db_fetch_assoc']($query)) { |
|
246 | + $context['groups'][$row['id_group']]['num_members'] += $row['num_members']; |
|
247 | + } |
|
243 | 248 | $smcFunc['db_free_result']($query); |
244 | 249 | |
245 | 250 | // This one is slower, but it's okay... careful not to count twice! |
@@ -256,15 +261,17 @@ discard block |
||
256 | 261 | 'blank_string' => '', |
257 | 262 | ) |
258 | 263 | ); |
259 | - while ($row = $smcFunc['db_fetch_assoc']($query)) |
|
260 | - $context['groups'][$row['id_group']]['num_members'] += $row['num_members']; |
|
264 | + while ($row = $smcFunc['db_fetch_assoc']($query)) { |
|
265 | + $context['groups'][$row['id_group']]['num_members'] += $row['num_members']; |
|
266 | + } |
|
261 | 267 | $smcFunc['db_free_result']($query); |
262 | 268 | } |
263 | 269 | |
264 | 270 | foreach ($context['groups'] as $id => $data) |
265 | 271 | { |
266 | - if ($data['href'] != '') |
|
267 | - $context['groups'][$id]['link'] = '<a href="' . $data['href'] . '">' . $data['num_members'] . '</a>'; |
|
272 | + if ($data['href'] != '') { |
|
273 | + $context['groups'][$id]['link'] = '<a href="' . $data['href'] . '">' . $data['num_members'] . '</a>'; |
|
274 | + } |
|
268 | 275 | } |
269 | 276 | |
270 | 277 | if (empty($_REQUEST['pid'])) |
@@ -278,9 +285,10 @@ discard block |
||
278 | 285 | 'hidden_permissions' => !empty($context['hidden_permissions']) ? $context['hidden_permissions'] : array(), |
279 | 286 | ) |
280 | 287 | ); |
281 | - while ($row = $smcFunc['db_fetch_assoc']($request)) |
|
282 | - if (isset($context['groups'][(int) $row['id_group']]) && (!empty($row['add_deny']) || $row['id_group'] != -1)) |
|
288 | + while ($row = $smcFunc['db_fetch_assoc']($request)) { |
|
289 | + if (isset($context['groups'][(int) $row['id_group']]) && (!empty($row['add_deny']) || $row['id_group'] != -1)) |
|
283 | 290 | $context['groups'][(int) $row['id_group']]['num_permissions'][empty($row['add_deny']) ? 'denied' : 'allowed'] = $row['num_permissions']; |
291 | + } |
|
284 | 292 | $smcFunc['db_free_result']($request); |
285 | 293 | |
286 | 294 | // Get the "default" profile permissions too. |
@@ -297,17 +305,18 @@ discard block |
||
297 | 305 | ); |
298 | 306 | while ($row = $smcFunc['db_fetch_assoc']($request)) |
299 | 307 | { |
300 | - if (isset($context['groups'][(int) $row['id_group']]) && (!empty($row['add_deny']) || $row['id_group'] != -1)) |
|
301 | - $context['groups'][(int) $row['id_group']]['num_permissions'][empty($row['add_deny']) ? 'denied' : 'allowed'] += $row['num_permissions']; |
|
308 | + if (isset($context['groups'][(int) $row['id_group']]) && (!empty($row['add_deny']) || $row['id_group'] != -1)) { |
|
309 | + $context['groups'][(int) $row['id_group']]['num_permissions'][empty($row['add_deny']) ? 'denied' : 'allowed'] += $row['num_permissions']; |
|
310 | + } |
|
302 | 311 | } |
303 | 312 | $smcFunc['db_free_result']($request); |
304 | - } |
|
305 | - else |
|
313 | + } else |
|
306 | 314 | { |
307 | 315 | $_REQUEST['pid'] = (int) $_REQUEST['pid']; |
308 | 316 | |
309 | - if (!isset($context['profiles'][$_REQUEST['pid']])) |
|
310 | - fatal_lang_error('no_access', false); |
|
317 | + if (!isset($context['profiles'][$_REQUEST['pid']])) { |
|
318 | + fatal_lang_error('no_access', false); |
|
319 | + } |
|
311 | 320 | |
312 | 321 | // Change the selected tab to better reflect that this really is a board profile. |
313 | 322 | $context[$context['admin_menu_name']]['current_subsection'] = 'profiles'; |
@@ -323,8 +332,9 @@ discard block |
||
323 | 332 | ); |
324 | 333 | while ($row = $smcFunc['db_fetch_assoc']($request)) |
325 | 334 | { |
326 | - if (isset($context['groups'][(int) $row['id_group']]) && (!empty($row['add_deny']) || $row['id_group'] != -1)) |
|
327 | - $context['groups'][(int) $row['id_group']]['num_permissions'][empty($row['add_deny']) ? 'denied' : 'allowed'] += $row['num_permissions']; |
|
335 | + if (isset($context['groups'][(int) $row['id_group']]) && (!empty($row['add_deny']) || $row['id_group'] != -1)) { |
|
336 | + $context['groups'][(int) $row['id_group']]['num_permissions'][empty($row['add_deny']) ? 'denied' : 'allowed'] += $row['num_permissions']; |
|
337 | + } |
|
328 | 338 | } |
329 | 339 | $smcFunc['db_free_result']($request); |
330 | 340 | |
@@ -366,8 +376,8 @@ discard block |
||
366 | 376 | |
367 | 377 | if (!empty($changes)) |
368 | 378 | { |
369 | - foreach ($changes as $profile => $boards) |
|
370 | - $smcFunc['db_query']('', ' |
|
379 | + foreach ($changes as $profile => $boards) { |
|
380 | + $smcFunc['db_query']('', ' |
|
371 | 381 | UPDATE {db_prefix}boards |
372 | 382 | SET id_profile = {int:current_profile} |
373 | 383 | WHERE id_board IN ({array_int:board_list})', |
@@ -376,6 +386,7 @@ discard block |
||
376 | 386 | 'current_profile' => $profile, |
377 | 387 | ) |
378 | 388 | ); |
389 | + } |
|
379 | 390 | } |
380 | 391 | |
381 | 392 | $context['edit_all'] = false; |
@@ -400,8 +411,9 @@ discard block |
||
400 | 411 | ); |
401 | 412 | foreach ($boardList[$catid] as $boardid) |
402 | 413 | { |
403 | - if (!isset($context['profiles'][$boards[$boardid]['profile']])) |
|
404 | - $boards[$boardid]['profile'] = 1; |
|
414 | + if (!isset($context['profiles'][$boards[$boardid]['profile']])) { |
|
415 | + $boards[$boardid]['profile'] = 1; |
|
416 | + } |
|
405 | 417 | |
406 | 418 | $context['categories'][$catid]['boards'][$boardid] = array( |
407 | 419 | 'id' => &$boards[$boardid]['id'], |
@@ -433,64 +445,74 @@ discard block |
||
433 | 445 | loadIllegalGuestPermissions(); |
434 | 446 | |
435 | 447 | // Make sure only one of the quick options was selected. |
436 | - if ((!empty($_POST['predefined']) && ((isset($_POST['copy_from']) && $_POST['copy_from'] != 'empty') || !empty($_POST['permissions']))) || (!empty($_POST['copy_from']) && $_POST['copy_from'] != 'empty' && !empty($_POST['permissions']))) |
|
437 | - fatal_lang_error('permissions_only_one_option', false); |
|
448 | + if ((!empty($_POST['predefined']) && ((isset($_POST['copy_from']) && $_POST['copy_from'] != 'empty') || !empty($_POST['permissions']))) || (!empty($_POST['copy_from']) && $_POST['copy_from'] != 'empty' && !empty($_POST['permissions']))) { |
|
449 | + fatal_lang_error('permissions_only_one_option', false); |
|
450 | + } |
|
438 | 451 | |
439 | - if (empty($_POST['group']) || !is_array($_POST['group'])) |
|
440 | - $_POST['group'] = array(); |
|
452 | + if (empty($_POST['group']) || !is_array($_POST['group'])) { |
|
453 | + $_POST['group'] = array(); |
|
454 | + } |
|
441 | 455 | |
442 | 456 | // Only accept numeric values for selected membergroups. |
443 | - foreach ($_POST['group'] as $id => $group_id) |
|
444 | - $_POST['group'][$id] = (int) $group_id; |
|
457 | + foreach ($_POST['group'] as $id => $group_id) { |
|
458 | + $_POST['group'][$id] = (int) $group_id; |
|
459 | + } |
|
445 | 460 | $_POST['group'] = array_unique($_POST['group']); |
446 | 461 | |
447 | - if (empty($_REQUEST['pid'])) |
|
448 | - $_REQUEST['pid'] = 0; |
|
449 | - else |
|
450 | - $_REQUEST['pid'] = (int) $_REQUEST['pid']; |
|
462 | + if (empty($_REQUEST['pid'])) { |
|
463 | + $_REQUEST['pid'] = 0; |
|
464 | + } else { |
|
465 | + $_REQUEST['pid'] = (int) $_REQUEST['pid']; |
|
466 | + } |
|
451 | 467 | |
452 | 468 | // Fix up the old global to the new default! |
453 | 469 | $bid = max(1, $_REQUEST['pid']); |
454 | 470 | |
455 | 471 | // No modifying the predefined profiles. |
456 | - if ($_REQUEST['pid'] > 1 && $_REQUEST['pid'] < 5) |
|
457 | - fatal_lang_error('no_access', false); |
|
472 | + if ($_REQUEST['pid'] > 1 && $_REQUEST['pid'] < 5) { |
|
473 | + fatal_lang_error('no_access', false); |
|
474 | + } |
|
458 | 475 | |
459 | 476 | // Clear out any cached authority. |
460 | 477 | updateSettings(array('settings_updated' => time())); |
461 | 478 | |
462 | 479 | // No groups where selected. |
463 | - if (empty($_POST['group'])) |
|
464 | - redirectexit('action=admin;area=permissions;pid=' . $_REQUEST['pid']); |
|
480 | + if (empty($_POST['group'])) { |
|
481 | + redirectexit('action=admin;area=permissions;pid=' . $_REQUEST['pid']); |
|
482 | + } |
|
465 | 483 | |
466 | 484 | // Set a predefined permission profile. |
467 | 485 | if (!empty($_POST['predefined'])) |
468 | 486 | { |
469 | 487 | // Make sure it's a predefined permission set we expect. |
470 | - if (!in_array($_POST['predefined'], array('restrict', 'standard', 'moderator', 'maintenance'))) |
|
471 | - redirectexit('action=admin;area=permissions;pid=' . $_REQUEST['pid']); |
|
488 | + if (!in_array($_POST['predefined'], array('restrict', 'standard', 'moderator', 'maintenance'))) { |
|
489 | + redirectexit('action=admin;area=permissions;pid=' . $_REQUEST['pid']); |
|
490 | + } |
|
472 | 491 | |
473 | 492 | foreach ($_POST['group'] as $group_id) |
474 | 493 | { |
475 | - if (!empty($_REQUEST['pid'])) |
|
476 | - setPermissionLevel($_POST['predefined'], $group_id, $_REQUEST['pid']); |
|
477 | - else |
|
478 | - setPermissionLevel($_POST['predefined'], $group_id); |
|
494 | + if (!empty($_REQUEST['pid'])) { |
|
495 | + setPermissionLevel($_POST['predefined'], $group_id, $_REQUEST['pid']); |
|
496 | + } else { |
|
497 | + setPermissionLevel($_POST['predefined'], $group_id); |
|
498 | + } |
|
479 | 499 | } |
480 | 500 | } |
481 | 501 | // Set a permission profile based on the permissions of a selected group. |
482 | 502 | elseif ($_POST['copy_from'] != 'empty') |
483 | 503 | { |
484 | 504 | // Just checking the input. |
485 | - if (!is_numeric($_POST['copy_from'])) |
|
486 | - redirectexit('action=admin;area=permissions;pid=' . $_REQUEST['pid']); |
|
505 | + if (!is_numeric($_POST['copy_from'])) { |
|
506 | + redirectexit('action=admin;area=permissions;pid=' . $_REQUEST['pid']); |
|
507 | + } |
|
487 | 508 | |
488 | 509 | // Make sure the group we're copying to is never included. |
489 | 510 | $_POST['group'] = array_diff($_POST['group'], array($_POST['copy_from'])); |
490 | 511 | |
491 | 512 | // No groups left? Too bad. |
492 | - if (empty($_POST['group'])) |
|
493 | - redirectexit('action=admin;area=permissions;pid=' . $_REQUEST['pid']); |
|
513 | + if (empty($_POST['group'])) { |
|
514 | + redirectexit('action=admin;area=permissions;pid=' . $_REQUEST['pid']); |
|
515 | + } |
|
494 | 516 | |
495 | 517 | if (empty($_REQUEST['pid'])) |
496 | 518 | { |
@@ -504,22 +526,26 @@ discard block |
||
504 | 526 | ) |
505 | 527 | ); |
506 | 528 | $target_perm = array(); |
507 | - while ($row = $smcFunc['db_fetch_assoc']($request)) |
|
508 | - $target_perm[$row['permission']] = $row['add_deny']; |
|
529 | + while ($row = $smcFunc['db_fetch_assoc']($request)) { |
|
530 | + $target_perm[$row['permission']] = $row['add_deny']; |
|
531 | + } |
|
509 | 532 | $smcFunc['db_free_result']($request); |
510 | 533 | |
511 | 534 | $inserts = array(); |
512 | - foreach ($_POST['group'] as $group_id) |
|
513 | - foreach ($target_perm as $perm => $add_deny) |
|
535 | + foreach ($_POST['group'] as $group_id) { |
|
536 | + foreach ($target_perm as $perm => $add_deny) |
|
514 | 537 | { |
515 | 538 | // No dodgy permissions please! |
516 | 539 | if (!empty($context['illegal_permissions']) && in_array($perm, $context['illegal_permissions'])) |
517 | 540 | continue; |
518 | - if ($group_id == -1 && in_array($perm, $context['non_guest_permissions'])) |
|
519 | - continue; |
|
541 | + } |
|
542 | + if ($group_id == -1 && in_array($perm, $context['non_guest_permissions'])) { |
|
543 | + continue; |
|
544 | + } |
|
520 | 545 | |
521 | - if ($group_id != 1 && $group_id != 3) |
|
522 | - $inserts[] = array($perm, $group_id, $add_deny); |
|
546 | + if ($group_id != 1 && $group_id != 3) { |
|
547 | + $inserts[] = array($perm, $group_id, $add_deny); |
|
548 | + } |
|
523 | 549 | } |
524 | 550 | |
525 | 551 | // Delete the previous permissions... |
@@ -559,17 +585,19 @@ discard block |
||
559 | 585 | ) |
560 | 586 | ); |
561 | 587 | $target_perm = array(); |
562 | - while ($row = $smcFunc['db_fetch_assoc']($request)) |
|
563 | - $target_perm[$row['permission']] = $row['add_deny']; |
|
588 | + while ($row = $smcFunc['db_fetch_assoc']($request)) { |
|
589 | + $target_perm[$row['permission']] = $row['add_deny']; |
|
590 | + } |
|
564 | 591 | $smcFunc['db_free_result']($request); |
565 | 592 | |
566 | 593 | $inserts = array(); |
567 | - foreach ($_POST['group'] as $group_id) |
|
568 | - foreach ($target_perm as $perm => $add_deny) |
|
594 | + foreach ($_POST['group'] as $group_id) { |
|
595 | + foreach ($target_perm as $perm => $add_deny) |
|
569 | 596 | { |
570 | 597 | // Are these for guests? |
571 | 598 | if ($group_id == -1 && in_array($perm, $context['non_guest_permissions'])) |
572 | 599 | continue; |
600 | + } |
|
573 | 601 | |
574 | 602 | $inserts[] = array($perm, $group_id, $bid, $add_deny); |
575 | 603 | } |
@@ -607,13 +635,14 @@ discard block |
||
607 | 635 | list ($permissionType, $permission) = explode('/', $_POST['permissions']); |
608 | 636 | |
609 | 637 | // Check whether our input is within expected range. |
610 | - if (!in_array($_POST['add_remove'], array('add', 'clear', 'deny')) || !in_array($permissionType, array('membergroup', 'board'))) |
|
611 | - redirectexit('action=admin;area=permissions;pid=' . $_REQUEST['pid']); |
|
638 | + if (!in_array($_POST['add_remove'], array('add', 'clear', 'deny')) || !in_array($permissionType, array('membergroup', 'board'))) { |
|
639 | + redirectexit('action=admin;area=permissions;pid=' . $_REQUEST['pid']); |
|
640 | + } |
|
612 | 641 | |
613 | 642 | if ($_POST['add_remove'] == 'clear') |
614 | 643 | { |
615 | - if ($permissionType == 'membergroup') |
|
616 | - $smcFunc['db_query']('', ' |
|
644 | + if ($permissionType == 'membergroup') { |
|
645 | + $smcFunc['db_query']('', ' |
|
617 | 646 | DELETE FROM {db_prefix}permissions |
618 | 647 | WHERE id_group IN ({array_int:current_group_list}) |
619 | 648 | AND permission = {string:current_permission} |
@@ -624,8 +653,8 @@ discard block |
||
624 | 653 | 'illegal_permissions' => !empty($context['illegal_permissions']) ? $context['illegal_permissions'] : array(), |
625 | 654 | ) |
626 | 655 | ); |
627 | - else |
|
628 | - $smcFunc['db_query']('', ' |
|
656 | + } else { |
|
657 | + $smcFunc['db_query']('', ' |
|
629 | 658 | DELETE FROM {db_prefix}board_permissions |
630 | 659 | WHERE id_group IN ({array_int:current_group_list}) |
631 | 660 | AND id_profile = {int:current_profile} |
@@ -636,6 +665,7 @@ discard block |
||
636 | 665 | 'current_permission' => $permission, |
637 | 666 | ) |
638 | 667 | ); |
668 | + } |
|
639 | 669 | } |
640 | 670 | // Add a permission (either 'set' or 'deny'). |
641 | 671 | else |
@@ -644,32 +674,36 @@ discard block |
||
644 | 674 | $permChange = array(); |
645 | 675 | foreach ($_POST['group'] as $groupID) |
646 | 676 | { |
647 | - if ($groupID == -1 && in_array($permission, $context['non_guest_permissions'])) |
|
648 | - continue; |
|
677 | + if ($groupID == -1 && in_array($permission, $context['non_guest_permissions'])) { |
|
678 | + continue; |
|
679 | + } |
|
649 | 680 | |
650 | - if ($permissionType == 'membergroup' && $groupID != 1 && $groupID != 3 && (empty($context['illegal_permissions']) || !in_array($permission, $context['illegal_permissions']))) |
|
651 | - $permChange[] = array($permission, $groupID, $add_deny); |
|
652 | - elseif ($permissionType != 'membergroup') |
|
653 | - $permChange[] = array($permission, $groupID, $bid, $add_deny); |
|
681 | + if ($permissionType == 'membergroup' && $groupID != 1 && $groupID != 3 && (empty($context['illegal_permissions']) || !in_array($permission, $context['illegal_permissions']))) { |
|
682 | + $permChange[] = array($permission, $groupID, $add_deny); |
|
683 | + } elseif ($permissionType != 'membergroup') { |
|
684 | + $permChange[] = array($permission, $groupID, $bid, $add_deny); |
|
685 | + } |
|
654 | 686 | } |
655 | 687 | |
656 | 688 | if (!empty($permChange)) |
657 | 689 | { |
658 | - if ($permissionType == 'membergroup') |
|
659 | - $smcFunc['db_insert']('replace', |
|
690 | + if ($permissionType == 'membergroup') { |
|
691 | + $smcFunc['db_insert']('replace', |
|
660 | 692 | '{db_prefix}permissions', |
661 | 693 | array('permission' => 'string', 'id_group' => 'int', 'add_deny' => 'int'), |
662 | 694 | $permChange, |
663 | 695 | array('permission', 'id_group') |
664 | 696 | ); |
697 | + } |
|
665 | 698 | // Board permissions go into the other table. |
666 | - else |
|
667 | - $smcFunc['db_insert']('replace', |
|
699 | + else { |
|
700 | + $smcFunc['db_insert']('replace', |
|
668 | 701 | '{db_prefix}board_permissions', |
669 | 702 | array('permission' => 'string', 'id_group' => 'int', 'id_profile' => 'int', 'add_deny' => 'int'), |
670 | 703 | $permChange, |
671 | 704 | array('permission', 'id_group', 'id_profile') |
672 | 705 | ); |
706 | + } |
|
673 | 707 | } |
674 | 708 | } |
675 | 709 | |
@@ -687,14 +721,16 @@ discard block |
||
687 | 721 | { |
688 | 722 | global $context, $txt, $smcFunc, $modSettings; |
689 | 723 | |
690 | - if (!isset($_GET['group'])) |
|
691 | - fatal_lang_error('no_access', false); |
|
724 | + if (!isset($_GET['group'])) { |
|
725 | + fatal_lang_error('no_access', false); |
|
726 | + } |
|
692 | 727 | |
693 | 728 | $context['group']['id'] = (int) $_GET['group']; |
694 | 729 | |
695 | 730 | // It's not likely you'd end up here with this setting disabled. |
696 | - if ($_GET['group'] == 1) |
|
697 | - redirectexit('action=admin;area=permissions'); |
|
731 | + if ($_GET['group'] == 1) { |
|
732 | + redirectexit('action=admin;area=permissions'); |
|
733 | + } |
|
698 | 734 | |
699 | 735 | loadAllPermissions(); |
700 | 736 | loadPermissionProfiles(); |
@@ -715,13 +751,14 @@ discard block |
||
715 | 751 | $smcFunc['db_free_result']($result); |
716 | 752 | |
717 | 753 | // Cannot edit an inherited group! |
718 | - if ($parent != -2) |
|
719 | - fatal_lang_error('cannot_edit_permissions_inherited'); |
|
754 | + if ($parent != -2) { |
|
755 | + fatal_lang_error('cannot_edit_permissions_inherited'); |
|
756 | + } |
|
757 | + } elseif ($context['group']['id'] == -1) { |
|
758 | + $context['group']['name'] = $txt['membergroups_guests']; |
|
759 | + } else { |
|
760 | + $context['group']['name'] = $txt['membergroups_members']; |
|
720 | 761 | } |
721 | - elseif ($context['group']['id'] == -1) |
|
722 | - $context['group']['name'] = $txt['membergroups_guests']; |
|
723 | - else |
|
724 | - $context['group']['name'] = $txt['membergroups_members']; |
|
725 | 762 | |
726 | 763 | $context['profile']['id'] = empty($_GET['pid']) ? 0 : (int) $_GET['pid']; |
727 | 764 | |
@@ -767,8 +804,9 @@ discard block |
||
767 | 804 | 'current_group' => $_GET['group'], |
768 | 805 | ) |
769 | 806 | ); |
770 | - while ($row = $smcFunc['db_fetch_assoc']($result)) |
|
771 | - $permissions['membergroup'][empty($row['add_deny']) ? 'denied' : 'allowed'][] = $row['permission']; |
|
807 | + while ($row = $smcFunc['db_fetch_assoc']($result)) { |
|
808 | + $permissions['membergroup'][empty($row['add_deny']) ? 'denied' : 'allowed'][] = $row['permission']; |
|
809 | + } |
|
772 | 810 | $smcFunc['db_free_result']($result); |
773 | 811 | } |
774 | 812 | |
@@ -783,8 +821,9 @@ discard block |
||
783 | 821 | 'current_profile' => $context['permission_type'] == 'membergroup' ? 1 : $context['profile']['id'], |
784 | 822 | ) |
785 | 823 | ); |
786 | - while ($row = $smcFunc['db_fetch_assoc']($result)) |
|
787 | - $permissions['board'][empty($row['add_deny']) ? 'denied' : 'allowed'][] = $row['permission']; |
|
824 | + while ($row = $smcFunc['db_fetch_assoc']($result)) { |
|
825 | + $permissions['board'][empty($row['add_deny']) ? 'denied' : 'allowed'][] = $row['permission']; |
|
826 | + } |
|
788 | 827 | $smcFunc['db_free_result']($result); |
789 | 828 | |
790 | 829 | // Loop through each permission and set whether it's checked. |
@@ -803,9 +842,9 @@ discard block |
||
803 | 842 | { |
804 | 843 | $curPerm['any']['select'] = in_array($perm['id'] . '_any', $permissions[$permissionType]['allowed']) ? 'on' : (in_array($perm['id'] . '_any', $permissions[$permissionType]['denied']) ? 'deny' : 'off'); |
805 | 844 | $curPerm['own']['select'] = in_array($perm['id'] . '_own', $permissions[$permissionType]['allowed']) ? 'on' : (in_array($perm['id'] . '_own', $permissions[$permissionType]['denied']) ? 'deny' : 'off'); |
845 | + } else { |
|
846 | + $curPerm['select'] = in_array($perm['id'], $permissions[$permissionType]['denied']) ? 'deny' : (in_array($perm['id'], $permissions[$permissionType]['allowed']) ? 'on' : 'off'); |
|
806 | 847 | } |
807 | - else |
|
808 | - $curPerm['select'] = in_array($perm['id'], $permissions[$permissionType]['denied']) ? 'deny' : (in_array($perm['id'], $permissions[$permissionType]['allowed']) ? 'on' : 'off'); |
|
809 | 848 | |
810 | 849 | // Keep the last value if it's hidden. |
811 | 850 | if ($perm['hidden'] || $permissionArray['hidden']) |
@@ -822,13 +861,13 @@ discard block |
||
822 | 861 | $perm['any']['id'], |
823 | 862 | $curPerm['any']['select'] == 'deny' && !empty($modSettings['permission_enable_deny']) ? 'deny' : $curPerm['any']['select'], |
824 | 863 | ); |
825 | - } |
|
826 | - else |
|
827 | - $context['hidden_perms'][] = array( |
|
864 | + } else { |
|
865 | + $context['hidden_perms'][] = array( |
|
828 | 866 | $permissionType, |
829 | 867 | $perm['id'], |
830 | 868 | $curPerm['select'] == 'deny' && !empty($modSettings['permission_enable_deny']) ? 'deny' : $curPerm['select'], |
831 | 869 | ); |
870 | + } |
|
832 | 871 | } |
833 | 872 | } |
834 | 873 | } |
@@ -856,13 +895,14 @@ discard block |
||
856 | 895 | $_GET['pid'] = (int) $_GET['pid']; |
857 | 896 | |
858 | 897 | // Cannot modify predefined profiles. |
859 | - if ($_GET['pid'] > 1 && $_GET['pid'] < 5) |
|
860 | - fatal_lang_error('no_access', false); |
|
898 | + if ($_GET['pid'] > 1 && $_GET['pid'] < 5) { |
|
899 | + fatal_lang_error('no_access', false); |
|
900 | + } |
|
861 | 901 | |
862 | 902 | // Verify this isn't inherited. |
863 | - if ($_GET['group'] == -1 || $_GET['group'] == 0) |
|
864 | - $parent = -2; |
|
865 | - else |
|
903 | + if ($_GET['group'] == -1 || $_GET['group'] == 0) { |
|
904 | + $parent = -2; |
|
905 | + } else |
|
866 | 906 | { |
867 | 907 | $result = $smcFunc['db_query']('', ' |
868 | 908 | SELECT id_parent |
@@ -877,8 +917,9 @@ discard block |
||
877 | 917 | $smcFunc['db_free_result']($result); |
878 | 918 | } |
879 | 919 | |
880 | - if ($parent != -2) |
|
881 | - fatal_lang_error('cannot_edit_permissions_inherited'); |
|
920 | + if ($parent != -2) { |
|
921 | + fatal_lang_error('cannot_edit_permissions_inherited'); |
|
922 | + } |
|
882 | 923 | |
883 | 924 | $givePerms = array('membergroup' => array(), 'board' => array()); |
884 | 925 | |
@@ -896,12 +937,13 @@ discard block |
||
896 | 937 | { |
897 | 938 | if (is_array($perm_array)) |
898 | 939 | { |
899 | - foreach ($perm_array as $permission => $value) |
|
900 | - if ($value == 'on' || $value == 'deny') |
|
940 | + foreach ($perm_array as $permission => $value) { |
|
941 | + if ($value == 'on' || $value == 'deny') |
|
901 | 942 | { |
902 | 943 | // Don't allow people to escalate themselves! |
903 | 944 | if (!empty($context['illegal_permissions']) && in_array($permission, $context['illegal_permissions'])) |
904 | 945 | continue; |
946 | + } |
|
905 | 947 | |
906 | 948 | $givePerms[$perm_type][] = array($_GET['group'], $permission, $value == 'deny' ? 0 : 1); |
907 | 949 | } |
@@ -946,8 +988,9 @@ discard block |
||
946 | 988 | ); |
947 | 989 | if (!empty($givePerms['board'])) |
948 | 990 | { |
949 | - foreach ($givePerms['board'] as $k => $v) |
|
950 | - $givePerms['board'][$k][] = $profileid; |
|
991 | + foreach ($givePerms['board'] as $k => $v) { |
|
992 | + $givePerms['board'][$k][] = $profileid; |
|
993 | + } |
|
951 | 994 | $smcFunc['db_insert']('replace', |
952 | 995 | '{db_prefix}board_permissions', |
953 | 996 | array('id_group' => 'int', 'permission' => 'string', 'add_deny' => 'int', 'id_profile' => 'int'), |
@@ -988,8 +1031,9 @@ discard block |
||
988 | 1031 | |
989 | 1032 | call_integration_hook('integrate_modify_permission_settings', array(&$config_vars)); |
990 | 1033 | |
991 | - if ($return_config) |
|
992 | - return $config_vars; |
|
1034 | + if ($return_config) { |
|
1035 | + return $config_vars; |
|
1036 | + } |
|
993 | 1037 | |
994 | 1038 | $context['page_title'] = $txt['permission_settings_title']; |
995 | 1039 | $context['sub_template'] = 'show_settings'; |
@@ -1040,8 +1084,9 @@ discard block |
||
1040 | 1084 | 'min_posts' => -1, |
1041 | 1085 | ) |
1042 | 1086 | ); |
1043 | - while ($row = $smcFunc['db_fetch_assoc']($request)) |
|
1044 | - $post_groups[] = $row['id_group']; |
|
1087 | + while ($row = $smcFunc['db_fetch_assoc']($request)) { |
|
1088 | + $post_groups[] = $row['id_group']; |
|
1089 | + } |
|
1045 | 1090 | $smcFunc['db_free_result']($request); |
1046 | 1091 | |
1047 | 1092 | // Remove'em. |
@@ -1250,16 +1295,19 @@ discard block |
||
1250 | 1295 | // Make sure we're not granting someone too many permissions! |
1251 | 1296 | foreach ($groupLevels['global'][$level] as $k => $permission) |
1252 | 1297 | { |
1253 | - if (!empty($context['illegal_permissions']) && in_array($permission, $context['illegal_permissions'])) |
|
1254 | - unset($groupLevels['global'][$level][$k]); |
|
1298 | + if (!empty($context['illegal_permissions']) && in_array($permission, $context['illegal_permissions'])) { |
|
1299 | + unset($groupLevels['global'][$level][$k]); |
|
1300 | + } |
|
1255 | 1301 | |
1256 | - if ($group == -1 && in_array($permission, $context['non_guest_permissions'])) |
|
1257 | - unset($groupLevels['global'][$level][$k]); |
|
1302 | + if ($group == -1 && in_array($permission, $context['non_guest_permissions'])) { |
|
1303 | + unset($groupLevels['global'][$level][$k]); |
|
1304 | + } |
|
1258 | 1305 | } |
1259 | - if ($group == -1) |
|
1260 | - foreach ($groupLevels['board'][$level] as $k => $permission) |
|
1306 | + if ($group == -1) { |
|
1307 | + foreach ($groupLevels['board'][$level] as $k => $permission) |
|
1261 | 1308 | if (in_array($permission, $context['non_guest_permissions'])) |
1262 | 1309 | unset($groupLevels['board'][$level][$k]); |
1310 | + } |
|
1263 | 1311 | |
1264 | 1312 | // Reset all cached permissions. |
1265 | 1313 | updateSettings(array('settings_updated' => time())); |
@@ -1269,8 +1317,9 @@ discard block |
||
1269 | 1317 | { |
1270 | 1318 | $group = (int) $group; |
1271 | 1319 | |
1272 | - if (empty($groupLevels['global'][$level])) |
|
1273 | - return; |
|
1320 | + if (empty($groupLevels['global'][$level])) { |
|
1321 | + return; |
|
1322 | + } |
|
1274 | 1323 | |
1275 | 1324 | $smcFunc['db_query']('', ' |
1276 | 1325 | DELETE FROM {db_prefix}permissions |
@@ -1292,8 +1341,9 @@ discard block |
||
1292 | 1341 | ); |
1293 | 1342 | |
1294 | 1343 | $groupInserts = array(); |
1295 | - foreach ($groupLevels['global'][$level] as $permission) |
|
1296 | - $groupInserts[] = array($group, $permission); |
|
1344 | + foreach ($groupLevels['global'][$level] as $permission) { |
|
1345 | + $groupInserts[] = array($group, $permission); |
|
1346 | + } |
|
1297 | 1347 | |
1298 | 1348 | $smcFunc['db_insert']('insert', |
1299 | 1349 | '{db_prefix}permissions', |
@@ -1303,8 +1353,9 @@ discard block |
||
1303 | 1353 | ); |
1304 | 1354 | |
1305 | 1355 | $boardInserts = array(); |
1306 | - foreach ($groupLevels['board'][$level] as $permission) |
|
1307 | - $boardInserts[] = array(1, $group, $permission); |
|
1356 | + foreach ($groupLevels['board'][$level] as $permission) { |
|
1357 | + $boardInserts[] = array(1, $group, $permission); |
|
1358 | + } |
|
1308 | 1359 | |
1309 | 1360 | $smcFunc['db_insert']('insert', |
1310 | 1361 | '{db_prefix}board_permissions', |
@@ -1335,8 +1386,9 @@ discard block |
||
1335 | 1386 | if (!empty($groupLevels['board'][$level])) |
1336 | 1387 | { |
1337 | 1388 | $boardInserts = array(); |
1338 | - foreach ($groupLevels['board'][$level] as $permission) |
|
1339 | - $boardInserts[] = array($profile, $group, $permission); |
|
1389 | + foreach ($groupLevels['board'][$level] as $permission) { |
|
1390 | + $boardInserts[] = array($profile, $group, $permission); |
|
1391 | + } |
|
1340 | 1392 | |
1341 | 1393 | $smcFunc['db_insert']('insert', |
1342 | 1394 | '{db_prefix}board_permissions', |
@@ -1359,8 +1411,9 @@ discard block |
||
1359 | 1411 | ) |
1360 | 1412 | ); |
1361 | 1413 | |
1362 | - if (empty($boardLevels[$level])) |
|
1363 | - return; |
|
1414 | + if (empty($boardLevels[$level])) { |
|
1415 | + return; |
|
1416 | + } |
|
1364 | 1417 | |
1365 | 1418 | // Get all the groups... |
1366 | 1419 | $query = $smcFunc['db_query']('', ' |
@@ -1378,8 +1431,9 @@ discard block |
||
1378 | 1431 | $group = $row[0]; |
1379 | 1432 | |
1380 | 1433 | $boardInserts = array(); |
1381 | - foreach ($boardLevels[$level] as $permission) |
|
1382 | - $boardInserts[] = array($profile, $group, $permission); |
|
1434 | + foreach ($boardLevels[$level] as $permission) { |
|
1435 | + $boardInserts[] = array($profile, $group, $permission); |
|
1436 | + } |
|
1383 | 1437 | |
1384 | 1438 | $smcFunc['db_insert']('insert', |
1385 | 1439 | '{db_prefix}board_permissions', |
@@ -1392,8 +1446,9 @@ discard block |
||
1392 | 1446 | |
1393 | 1447 | // Add permissions for ungrouped members. |
1394 | 1448 | $boardInserts = array(); |
1395 | - foreach ($boardLevels[$level] as $permission) |
|
1396 | - $boardInserts[] = array($profile, 0, $permission); |
|
1449 | + foreach ($boardLevels[$level] as $permission) { |
|
1450 | + $boardInserts[] = array($profile, 0, $permission); |
|
1451 | + } |
|
1397 | 1452 | |
1398 | 1453 | $smcFunc['db_insert']('insert', |
1399 | 1454 | '{db_prefix}board_permissions', |
@@ -1403,9 +1458,10 @@ discard block |
||
1403 | 1458 | ); |
1404 | 1459 | } |
1405 | 1460 | // $profile and $group are both null! |
1406 | - else |
|
1407 | - fatal_lang_error('no_access', false); |
|
1408 | -} |
|
1461 | + else { |
|
1462 | + fatal_lang_error('no_access', false); |
|
1463 | + } |
|
1464 | + } |
|
1409 | 1465 | |
1410 | 1466 | /** |
1411 | 1467 | * Load permissions into $context['permissions']. |
@@ -1607,15 +1663,17 @@ discard block |
||
1607 | 1663 | foreach ($permissionList as $permission => $permissionArray) |
1608 | 1664 | { |
1609 | 1665 | // If this is a guest permission we don't do it if it's the guest group. |
1610 | - if (isset($context['group']['id']) && $context['group']['id'] == -1 && in_array($permission, $context['non_guest_permissions'])) |
|
1611 | - continue; |
|
1666 | + if (isset($context['group']['id']) && $context['group']['id'] == -1 && in_array($permission, $context['non_guest_permissions'])) { |
|
1667 | + continue; |
|
1668 | + } |
|
1612 | 1669 | |
1613 | 1670 | // What groups will this permission be in? |
1614 | 1671 | $own_group = $permissionArray[1]; |
1615 | 1672 | |
1616 | 1673 | // First, Do these groups actually exist - if not add them. |
1617 | - if (!isset($permissionGroups[$permissionType][$own_group])) |
|
1618 | - $permissionGroups[$permissionType][$own_group] = true; |
|
1674 | + if (!isset($permissionGroups[$permissionType][$own_group])) { |
|
1675 | + $permissionGroups[$permissionType][$own_group] = true; |
|
1676 | + } |
|
1619 | 1677 | |
1620 | 1678 | // What column should this be located into? |
1621 | 1679 | $position = !in_array($own_group, $leftPermissionGroups) ? 1 : 0; |
@@ -1623,8 +1681,8 @@ discard block |
||
1623 | 1681 | // If the groups have not yet been created be sure to create them. |
1624 | 1682 | $bothGroups = array('own' => $own_group); |
1625 | 1683 | |
1626 | - foreach ($bothGroups as $group) |
|
1627 | - if (!isset($context['permissions'][$permissionType]['columns'][$position][$group])) |
|
1684 | + foreach ($bothGroups as $group) { |
|
1685 | + if (!isset($context['permissions'][$permissionType]['columns'][$position][$group])) |
|
1628 | 1686 | $context['permissions'][$permissionType]['columns'][$position][$group] = array( |
1629 | 1687 | 'type' => $permissionType, |
1630 | 1688 | 'id' => $group, |
@@ -1634,6 +1692,7 @@ discard block |
||
1634 | 1692 | 'hidden' => false, |
1635 | 1693 | 'permissions' => array() |
1636 | 1694 | ); |
1695 | + } |
|
1637 | 1696 | |
1638 | 1697 | $context['permissions'][$permissionType]['columns'][$position][$own_group]['permissions'][$permission] = array( |
1639 | 1698 | 'id' => $permission, |
@@ -1658,27 +1717,30 @@ discard block |
||
1658 | 1717 | { |
1659 | 1718 | $context['hidden_permissions'][] = $permission . '_own'; |
1660 | 1719 | $context['hidden_permissions'][] = $permission . '_any'; |
1720 | + } else { |
|
1721 | + $context['hidden_permissions'][] = $permission; |
|
1661 | 1722 | } |
1662 | - else |
|
1663 | - $context['hidden_permissions'][] = $permission; |
|
1664 | 1723 | } |
1665 | 1724 | } |
1666 | 1725 | ksort($context['permissions'][$permissionType]['columns']); |
1667 | 1726 | |
1668 | 1727 | // Check we don't leave any empty groups - and mark hidden ones as such. |
1669 | - foreach ($context['permissions'][$permissionType]['columns'] as $column => $groups) |
|
1670 | - foreach ($groups as $id => $group) |
|
1728 | + foreach ($context['permissions'][$permissionType]['columns'] as $column => $groups) { |
|
1729 | + foreach ($groups as $id => $group) |
|
1671 | 1730 | { |
1672 | 1731 | if (empty($group['permissions'])) |
1673 | 1732 | unset($context['permissions'][$permissionType]['columns'][$column][$id]); |
1733 | + } |
|
1674 | 1734 | else |
1675 | 1735 | { |
1676 | 1736 | $foundNonHidden = false; |
1677 | - foreach ($group['permissions'] as $permission) |
|
1678 | - if (empty($permission['hidden'])) |
|
1737 | + foreach ($group['permissions'] as $permission) { |
|
1738 | + if (empty($permission['hidden'])) |
|
1679 | 1739 | $foundNonHidden = true; |
1680 | - if (!$foundNonHidden) |
|
1681 | - $context['permissions'][$permissionType]['columns'][$column][$id]['hidden'] = true; |
|
1740 | + } |
|
1741 | + if (!$foundNonHidden) { |
|
1742 | + $context['permissions'][$permissionType]['columns'][$column][$id]['hidden'] = true; |
|
1743 | + } |
|
1682 | 1744 | } |
1683 | 1745 | } |
1684 | 1746 | } |
@@ -1705,12 +1767,13 @@ discard block |
||
1705 | 1767 | $context['can_change_permissions'] = allowedTo('manage_permissions'); |
1706 | 1768 | |
1707 | 1769 | // Nothing to initialize here. |
1708 | - if (!$context['can_change_permissions']) |
|
1709 | - return; |
|
1770 | + if (!$context['can_change_permissions']) { |
|
1771 | + return; |
|
1772 | + } |
|
1710 | 1773 | |
1711 | 1774 | // Load the permission settings for guests |
1712 | - foreach ($permissions as $permission) |
|
1713 | - $context[$permission] = array( |
|
1775 | + foreach ($permissions as $permission) { |
|
1776 | + $context[$permission] = array( |
|
1714 | 1777 | -1 => array( |
1715 | 1778 | 'id' => -1, |
1716 | 1779 | 'name' => $txt['membergroups_guests'], |
@@ -1724,6 +1787,7 @@ discard block |
||
1724 | 1787 | 'status' => 'off', |
1725 | 1788 | ), |
1726 | 1789 | ); |
1790 | + } |
|
1727 | 1791 | |
1728 | 1792 | $request = $smcFunc['db_query']('', ' |
1729 | 1793 | SELECT id_group, CASE WHEN add_deny = {int:denied} THEN {string:deny} ELSE {string:on} END AS status, permission |
@@ -1737,8 +1801,9 @@ discard block |
||
1737 | 1801 | 'on' => 'on', |
1738 | 1802 | ) |
1739 | 1803 | ); |
1740 | - while ($row = $smcFunc['db_fetch_assoc']($request)) |
|
1741 | - $context[$row['permission']][$row['id_group']]['status'] = $row['status']; |
|
1804 | + while ($row = $smcFunc['db_fetch_assoc']($request)) { |
|
1805 | + $context[$row['permission']][$row['id_group']]['status'] = $row['status']; |
|
1806 | + } |
|
1742 | 1807 | $smcFunc['db_free_result']($request); |
1743 | 1808 | |
1744 | 1809 | $request = $smcFunc['db_query']('', ' |
@@ -1759,14 +1824,15 @@ discard block |
||
1759 | 1824 | while ($row = $smcFunc['db_fetch_assoc']($request)) |
1760 | 1825 | { |
1761 | 1826 | // Initialize each permission as being 'off' until proven otherwise. |
1762 | - foreach ($permissions as $permission) |
|
1763 | - if (!isset($context[$permission][$row['id_group']])) |
|
1827 | + foreach ($permissions as $permission) { |
|
1828 | + if (!isset($context[$permission][$row['id_group']])) |
|
1764 | 1829 | $context[$permission][$row['id_group']] = array( |
1765 | 1830 | 'id' => $row['id_group'], |
1766 | 1831 | 'name' => $row['group_name'], |
1767 | 1832 | 'is_postgroup' => $row['min_posts'] != -1, |
1768 | 1833 | 'status' => 'off', |
1769 | 1834 | ); |
1835 | + } |
|
1770 | 1836 | |
1771 | 1837 | $context[$row['permission']][$row['id_group']]['status'] = empty($row['status']) ? 'deny' : ($row['status'] == 1 ? 'on' : 'off'); |
1772 | 1838 | } |
@@ -1780,8 +1846,9 @@ discard block |
||
1780 | 1846 | { |
1781 | 1847 | foreach ($permissions as $permission) |
1782 | 1848 | { |
1783 | - if (isset($context[$permission][$group])) |
|
1784 | - unset($context[$permission][$group]); |
|
1849 | + if (isset($context[$permission][$group])) { |
|
1850 | + unset($context[$permission][$group]); |
|
1851 | + } |
|
1785 | 1852 | } |
1786 | 1853 | } |
1787 | 1854 | |
@@ -1789,8 +1856,9 @@ discard block |
||
1789 | 1856 | $non_guest_perms = array_intersect(str_replace(array('_any', '_own'), '', $permissions), $context['non_guest_permissions']); |
1790 | 1857 | foreach ($non_guest_perms as $permission) |
1791 | 1858 | { |
1792 | - if (isset($context[$permission][-1])) |
|
1793 | - unset($context[$permission][-1]); |
|
1859 | + if (isset($context[$permission][-1])) { |
|
1860 | + unset($context[$permission][-1]); |
|
1861 | + } |
|
1794 | 1862 | } |
1795 | 1863 | |
1796 | 1864 | // Create the token for the separate inline permission verification. |
@@ -1825,8 +1893,9 @@ discard block |
||
1825 | 1893 | global $context, $smcFunc; |
1826 | 1894 | |
1827 | 1895 | // No permissions? Not a great deal to do here. |
1828 | - if (!allowedTo('manage_permissions')) |
|
1829 | - return; |
|
1896 | + if (!allowedTo('manage_permissions')) { |
|
1897 | + return; |
|
1898 | + } |
|
1830 | 1899 | |
1831 | 1900 | // Almighty session check, verify our ways. |
1832 | 1901 | checkSession(); |
@@ -1838,13 +1907,15 @@ discard block |
||
1838 | 1907 | $insertRows = array(); |
1839 | 1908 | foreach ($permissions as $permission) |
1840 | 1909 | { |
1841 | - if (!isset($_POST[$permission])) |
|
1842 | - continue; |
|
1910 | + if (!isset($_POST[$permission])) { |
|
1911 | + continue; |
|
1912 | + } |
|
1843 | 1913 | |
1844 | 1914 | foreach ($_POST[$permission] as $id_group => $value) |
1845 | 1915 | { |
1846 | - if (in_array($value, array('on', 'deny')) && (empty($context['illegal_permissions']) || !in_array($permission, $context['illegal_permissions']))) |
|
1847 | - $insertRows[] = array((int) $id_group, $permission, $value == 'on' ? 1 : 0); |
|
1916 | + if (in_array($value, array('on', 'deny')) && (empty($context['illegal_permissions']) || !in_array($permission, $context['illegal_permissions']))) { |
|
1917 | + $insertRows[] = array((int) $id_group, $permission, $value == 'on' ? 1 : 0); |
|
1918 | + } |
|
1848 | 1919 | } |
1849 | 1920 | } |
1850 | 1921 | |
@@ -1860,13 +1931,14 @@ discard block |
||
1860 | 1931 | ); |
1861 | 1932 | |
1862 | 1933 | // ...and replace them with new ones. |
1863 | - if (!empty($insertRows)) |
|
1864 | - $smcFunc['db_insert']('insert', |
|
1934 | + if (!empty($insertRows)) { |
|
1935 | + $smcFunc['db_insert']('insert', |
|
1865 | 1936 | '{db_prefix}permissions', |
1866 | 1937 | array('id_group' => 'int', 'permission' => 'string', 'add_deny' => 'int'), |
1867 | 1938 | $insertRows, |
1868 | 1939 | array('id_group', 'permission') |
1869 | 1940 | ); |
1941 | + } |
|
1870 | 1942 | |
1871 | 1943 | // Do a full child update. |
1872 | 1944 | updateChildPermissions(array(), -1); |
@@ -1893,10 +1965,11 @@ discard block |
||
1893 | 1965 | while ($row = $smcFunc['db_fetch_assoc']($request)) |
1894 | 1966 | { |
1895 | 1967 | // Format the label nicely. |
1896 | - if (isset($txt['permissions_profile_' . $row['profile_name']])) |
|
1897 | - $name = $txt['permissions_profile_' . $row['profile_name']]; |
|
1898 | - else |
|
1899 | - $name = $row['profile_name']; |
|
1968 | + if (isset($txt['permissions_profile_' . $row['profile_name']])) { |
|
1969 | + $name = $txt['permissions_profile_' . $row['profile_name']]; |
|
1970 | + } else { |
|
1971 | + $name = $row['profile_name']; |
|
1972 | + } |
|
1900 | 1973 | |
1901 | 1974 | $context['profiles'][$row['id_profile']] = array( |
1902 | 1975 | 'id' => $row['id_profile'], |
@@ -1951,17 +2024,19 @@ discard block |
||
1951 | 2024 | ) |
1952 | 2025 | ); |
1953 | 2026 | $inserts = array(); |
1954 | - while ($row = $smcFunc['db_fetch_assoc']($request)) |
|
1955 | - $inserts[] = array($profile_id, $row['id_group'], $row['permission'], $row['add_deny']); |
|
2027 | + while ($row = $smcFunc['db_fetch_assoc']($request)) { |
|
2028 | + $inserts[] = array($profile_id, $row['id_group'], $row['permission'], $row['add_deny']); |
|
2029 | + } |
|
1956 | 2030 | $smcFunc['db_free_result']($request); |
1957 | 2031 | |
1958 | - if (!empty($inserts)) |
|
1959 | - $smcFunc['db_insert']('insert', |
|
2032 | + if (!empty($inserts)) { |
|
2033 | + $smcFunc['db_insert']('insert', |
|
1960 | 2034 | '{db_prefix}board_permissions', |
1961 | 2035 | array('id_profile' => 'int', 'id_group' => 'int', 'permission' => 'string', 'add_deny' => 'int'), |
1962 | 2036 | $inserts, |
1963 | 2037 | array('id_profile', 'id_group', 'permission') |
1964 | 2038 | ); |
2039 | + } |
|
1965 | 2040 | } |
1966 | 2041 | // Renaming? |
1967 | 2042 | elseif (isset($_POST['rename'])) |
@@ -1970,16 +2045,16 @@ discard block |
||
1970 | 2045 | validateToken('admin-mpp'); |
1971 | 2046 | |
1972 | 2047 | // Just showing the boxes? |
1973 | - if (!isset($_POST['rename_profile'])) |
|
1974 | - $context['show_rename_boxes'] = true; |
|
1975 | - else |
|
2048 | + if (!isset($_POST['rename_profile'])) { |
|
2049 | + $context['show_rename_boxes'] = true; |
|
2050 | + } else |
|
1976 | 2051 | { |
1977 | 2052 | foreach ($_POST['rename_profile'] as $id => $value) |
1978 | 2053 | { |
1979 | 2054 | $value = $smcFunc['htmlspecialchars']($value); |
1980 | 2055 | |
1981 | - if (trim($value) != '' && $id > 4) |
|
1982 | - $smcFunc['db_query']('', ' |
|
2056 | + if (trim($value) != '' && $id > 4) { |
|
2057 | + $smcFunc['db_query']('', ' |
|
1983 | 2058 | UPDATE {db_prefix}permission_profiles |
1984 | 2059 | SET profile_name = {string:profile_name} |
1985 | 2060 | WHERE id_profile = {int:current_profile}', |
@@ -1988,6 +2063,7 @@ discard block |
||
1988 | 2063 | 'profile_name' => $value, |
1989 | 2064 | ) |
1990 | 2065 | ); |
2066 | + } |
|
1991 | 2067 | } |
1992 | 2068 | } |
1993 | 2069 | } |
@@ -1998,9 +2074,10 @@ discard block |
||
1998 | 2074 | validateToken('admin-mpp'); |
1999 | 2075 | |
2000 | 2076 | $profiles = array(); |
2001 | - foreach ($_POST['delete_profile'] as $profile) |
|
2002 | - if ($profile > 4) |
|
2077 | + foreach ($_POST['delete_profile'] as $profile) { |
|
2078 | + if ($profile > 4) |
|
2003 | 2079 | $profiles[] = (int) $profile; |
2080 | + } |
|
2004 | 2081 | |
2005 | 2082 | // Verify it's not in use... |
2006 | 2083 | $request = $smcFunc['db_query']('', ' |
@@ -2012,8 +2089,9 @@ discard block |
||
2012 | 2089 | 'profile_list' => $profiles, |
2013 | 2090 | ) |
2014 | 2091 | ); |
2015 | - if ($smcFunc['db_num_rows']($request) != 0) |
|
2016 | - fatal_lang_error('no_access', false); |
|
2092 | + if ($smcFunc['db_num_rows']($request) != 0) { |
|
2093 | + fatal_lang_error('no_access', false); |
|
2094 | + } |
|
2017 | 2095 | $smcFunc['db_free_result']($request); |
2018 | 2096 | |
2019 | 2097 | // Oh well, delete. |
@@ -2037,10 +2115,11 @@ discard block |
||
2037 | 2115 | array( |
2038 | 2116 | ) |
2039 | 2117 | ); |
2040 | - while ($row = $smcFunc['db_fetch_assoc']($request)) |
|
2041 | - if (isset($context['profiles'][$row['id_profile']])) |
|
2118 | + while ($row = $smcFunc['db_fetch_assoc']($request)) { |
|
2119 | + if (isset($context['profiles'][$row['id_profile']])) |
|
2042 | 2120 | { |
2043 | 2121 | $context['profiles'][$row['id_profile']]['in_use'] = true; |
2122 | + } |
|
2044 | 2123 | $context['profiles'][$row['id_profile']]['boards'] = $row['board_count']; |
2045 | 2124 | $context['profiles'][$row['id_profile']]['boards_text'] = $row['board_count'] > 1 ? sprintf($txt['permissions_profile_used_by_many'], $row['board_count']) : $txt['permissions_profile_used_by_' . ($row['board_count'] ? 'one' : 'none')]; |
2046 | 2125 | } |
@@ -2052,8 +2131,9 @@ discard block |
||
2052 | 2131 | { |
2053 | 2132 | // Can't delete special ones. |
2054 | 2133 | $context['profiles'][$id]['can_edit'] = isset($txt['permissions_profile_' . $profile['unformatted_name']]) ? false : true; |
2055 | - if ($context['profiles'][$id]['can_edit']) |
|
2056 | - $context['can_edit_something'] = true; |
|
2134 | + if ($context['profiles'][$id]['can_edit']) { |
|
2135 | + $context['can_edit_something'] = true; |
|
2136 | + } |
|
2057 | 2137 | |
2058 | 2138 | // You can only delete it if you can edit it AND it's not in use. |
2059 | 2139 | $context['profiles'][$id]['can_delete'] = $context['profiles'][$id]['can_edit'] && empty($profile['in_use']) ? true : false; |
@@ -2074,8 +2154,9 @@ discard block |
||
2074 | 2154 | global $smcFunc; |
2075 | 2155 | |
2076 | 2156 | // All the parent groups to sort out. |
2077 | - if (!is_array($parents)) |
|
2078 | - $parents = array($parents); |
|
2157 | + if (!is_array($parents)) { |
|
2158 | + $parents = array($parents); |
|
2159 | + } |
|
2079 | 2160 | |
2080 | 2161 | // Find all the children of this group. |
2081 | 2162 | $request = $smcFunc['db_query']('', ' |
@@ -2102,8 +2183,9 @@ discard block |
||
2102 | 2183 | $parents = array_unique($parents); |
2103 | 2184 | |
2104 | 2185 | // Not a sausage, or a child? |
2105 | - if (empty($children)) |
|
2106 | - return false; |
|
2186 | + if (empty($children)) { |
|
2187 | + return false; |
|
2188 | + } |
|
2107 | 2189 | |
2108 | 2190 | // First off, are we doing general permissions? |
2109 | 2191 | if ($profile < 1 || $profile === null) |
@@ -2118,9 +2200,10 @@ discard block |
||
2118 | 2200 | ) |
2119 | 2201 | ); |
2120 | 2202 | $permissions = array(); |
2121 | - while ($row = $smcFunc['db_fetch_assoc']($request)) |
|
2122 | - foreach ($children[$row['id_group']] as $child) |
|
2203 | + while ($row = $smcFunc['db_fetch_assoc']($request)) { |
|
2204 | + foreach ($children[$row['id_group']] as $child) |
|
2123 | 2205 | $permissions[] = array($child, $row['permission'], $row['add_deny']); |
2206 | + } |
|
2124 | 2207 | $smcFunc['db_free_result']($request); |
2125 | 2208 | |
2126 | 2209 | $smcFunc['db_query']('', ' |
@@ -2160,9 +2243,10 @@ discard block |
||
2160 | 2243 | ) |
2161 | 2244 | ); |
2162 | 2245 | $permissions = array(); |
2163 | - while ($row = $smcFunc['db_fetch_assoc']($request)) |
|
2164 | - foreach ($children[$row['id_group']] as $child) |
|
2246 | + while ($row = $smcFunc['db_fetch_assoc']($request)) { |
|
2247 | + foreach ($children[$row['id_group']] as $child) |
|
2165 | 2248 | $permissions[] = array($child, $row['id_profile'], $row['permission'], $row['add_deny']); |
2249 | + } |
|
2166 | 2250 | $smcFunc['db_free_result']($request); |
2167 | 2251 | |
2168 | 2252 | $smcFunc['db_query']('', ' |
@@ -2196,12 +2280,15 @@ discard block |
||
2196 | 2280 | global $context; |
2197 | 2281 | |
2198 | 2282 | $context['illegal_permissions'] = array(); |
2199 | - if (!allowedTo('admin_forum')) |
|
2200 | - $context['illegal_permissions'][] = 'admin_forum'; |
|
2201 | - if (!allowedTo('manage_membergroups')) |
|
2202 | - $context['illegal_permissions'][] = 'manage_membergroups'; |
|
2203 | - if (!allowedTo('manage_permissions')) |
|
2204 | - $context['illegal_permissions'][] = 'manage_permissions'; |
|
2283 | + if (!allowedTo('admin_forum')) { |
|
2284 | + $context['illegal_permissions'][] = 'admin_forum'; |
|
2285 | + } |
|
2286 | + if (!allowedTo('manage_membergroups')) { |
|
2287 | + $context['illegal_permissions'][] = 'manage_membergroups'; |
|
2288 | + } |
|
2289 | + if (!allowedTo('manage_permissions')) { |
|
2290 | + $context['illegal_permissions'][] = 'manage_permissions'; |
|
2291 | + } |
|
2205 | 2292 | |
2206 | 2293 | call_integration_hook('integrate_load_illegal_permissions'); |
2207 | 2294 | } |
@@ -2350,16 +2437,17 @@ discard block |
||
2350 | 2437 | 'attachment' => 'disallow', |
2351 | 2438 | 'children' => array(), |
2352 | 2439 | ); |
2440 | + } elseif (isset($context['profile_groups'][$row['id_parent']])) { |
|
2441 | + $context['profile_groups'][$row['id_parent']]['children'][] = $row['group_name']; |
|
2353 | 2442 | } |
2354 | - elseif (isset($context['profile_groups'][$row['id_parent']])) |
|
2355 | - $context['profile_groups'][$row['id_parent']]['children'][] = $row['group_name']; |
|
2356 | 2443 | } |
2357 | 2444 | $smcFunc['db_free_result']($request); |
2358 | 2445 | |
2359 | 2446 | // What are the permissions we are querying? |
2360 | 2447 | $all_permissions = array(); |
2361 | - foreach ($mappings as $perm_set) |
|
2362 | - $all_permissions = array_merge($all_permissions, $perm_set); |
|
2448 | + foreach ($mappings as $perm_set) { |
|
2449 | + $all_permissions = array_merge($all_permissions, $perm_set); |
|
2450 | + } |
|
2363 | 2451 | |
2364 | 2452 | // If we're saving the changes then do just that - save them. |
2365 | 2453 | if (!empty($_POST['save_changes']) && ($context['current_profile'] == 1 || $context['current_profile'] > 4)) |
@@ -2374,8 +2462,7 @@ discard block |
||
2374 | 2462 | { |
2375 | 2463 | // Turning it on. This seems easy enough. |
2376 | 2464 | updateSettings(array('postmod_active' => 1)); |
2377 | - } |
|
2378 | - else |
|
2465 | + } else |
|
2379 | 2466 | { |
2380 | 2467 | // Turning it off. Not so straightforward. We have to turn off warnings to moderation level, and make everything approved. |
2381 | 2468 | updateSettings(array( |
@@ -2386,8 +2473,7 @@ discard block |
||
2386 | 2473 | require_once($sourcedir . '/PostModeration.php'); |
2387 | 2474 | approveAllData(); |
2388 | 2475 | } |
2389 | - } |
|
2390 | - elseif ($modSettings['postmod_active']) |
|
2476 | + } elseif ($modSettings['postmod_active']) |
|
2391 | 2477 | { |
2392 | 2478 | // We're not saving a new setting - and if it's still enabled we have more work to do. |
2393 | 2479 | |
@@ -2417,21 +2503,22 @@ discard block |
||
2417 | 2503 | // Give them both sets for fun. |
2418 | 2504 | $new_permissions[] = array($context['current_profile'], $group['id'], $data[0], 1); |
2419 | 2505 | $new_permissions[] = array($context['current_profile'], $group['id'], $data[1], 1); |
2506 | + } elseif ($_POST[$index][$group['id']] == 'moderate') { |
|
2507 | + $new_permissions[] = array($context['current_profile'], $group['id'], $data[1], 1); |
|
2420 | 2508 | } |
2421 | - elseif ($_POST[$index][$group['id']] == 'moderate') |
|
2422 | - $new_permissions[] = array($context['current_profile'], $group['id'], $data[1], 1); |
|
2423 | 2509 | } |
2424 | 2510 | } |
2425 | 2511 | } |
2426 | 2512 | |
2427 | 2513 | // Insert new permissions. |
2428 | - if (!empty($new_permissions)) |
|
2429 | - $smcFunc['db_insert']('', |
|
2514 | + if (!empty($new_permissions)) { |
|
2515 | + $smcFunc['db_insert']('', |
|
2430 | 2516 | '{db_prefix}board_permissions', |
2431 | 2517 | array('id_profile' => 'int', 'id_group' => 'int', 'permission' => 'string', 'add_deny' => 'int'), |
2432 | 2518 | $new_permissions, |
2433 | 2519 | array('id_profile', 'id_group', 'permission') |
2434 | 2520 | ); |
2521 | + } |
|
2435 | 2522 | } |
2436 | 2523 | } |
2437 | 2524 | |
@@ -2460,11 +2547,13 @@ discard block |
||
2460 | 2547 | if ($row['add_deny']) |
2461 | 2548 | { |
2462 | 2549 | // Full allowance? |
2463 | - if ($index == 0) |
|
2464 | - $context['profile_groups'][$row['id_group']][$key] = 'allow'; |
|
2550 | + if ($index == 0) { |
|
2551 | + $context['profile_groups'][$row['id_group']][$key] = 'allow'; |
|
2552 | + } |
|
2465 | 2553 | // Otherwise only bother with moderate if not on allow. |
2466 | - elseif ($context['profile_groups'][$row['id_group']][$key] != 'allow') |
|
2467 | - $context['profile_groups'][$row['id_group']][$key] = 'moderate'; |
|
2554 | + elseif ($context['profile_groups'][$row['id_group']][$key] != 'allow') { |
|
2555 | + $context['profile_groups'][$row['id_group']][$key] = 'moderate'; |
|
2556 | + } |
|
2468 | 2557 | } |
2469 | 2558 | } |
2470 | 2559 | } |
@@ -150,7 +150,7 @@ discard block |
||
150 | 150 | { |
151 | 151 | if (!@is_dir($directory)) |
152 | 152 | { |
153 | - if (!@mkdir($directory,0755)) |
|
153 | + if (!@mkdir($directory, 0755)) |
|
154 | 154 | { |
155 | 155 | $context['dir_creation_error'] = 'attachments_no_create'; |
156 | 156 | return false; |
@@ -248,7 +248,7 @@ discard block |
||
248 | 248 | * |
249 | 249 | * @return array|bool An array of all the directories and subdirectories or false on failure |
250 | 250 | */ |
251 | -function get_directory_tree_elements ($directory) |
|
251 | +function get_directory_tree_elements($directory) |
|
252 | 252 | { |
253 | 253 | /* |
254 | 254 | In Windows server both \ and / can be used as directory separators in paths |
@@ -264,7 +264,7 @@ discard block |
||
264 | 264 | if (substr($directory, 0, 1) != DIRECTORY_SEPARATOR) |
265 | 265 | return false; |
266 | 266 | |
267 | - $tree = explode(DIRECTORY_SEPARATOR, trim($directory,DIRECTORY_SEPARATOR)); |
|
267 | + $tree = explode(DIRECTORY_SEPARATOR, trim($directory, DIRECTORY_SEPARATOR)); |
|
268 | 268 | } |
269 | 269 | return $tree; |
270 | 270 | } |
@@ -277,7 +277,7 @@ discard block |
||
277 | 277 | * |
278 | 278 | * @return string|bool The first part of the path or false on error |
279 | 279 | */ |
280 | -function attachments_init_dir (&$tree, &$count) |
|
280 | +function attachments_init_dir(&$tree, &$count) |
|
281 | 281 | { |
282 | 282 | $directory = ''; |
283 | 283 | // If on Windows servers the first part of the path is the drive (e.g. "C:") |
@@ -286,7 +286,7 @@ discard block |
||
286 | 286 | //Better be sure that the first part of the path is actually a drive letter... |
287 | 287 | //...even if, I should check this in the admin page...isn't it? |
288 | 288 | //...NHAAA Let's leave space for users' complains! :P |
289 | - if (preg_match('/^[a-z]:$/i',$tree[0])) |
|
289 | + if (preg_match('/^[a-z]:$/i', $tree[0])) |
|
290 | 290 | $directory = array_shift($tree); |
291 | 291 | else |
292 | 292 | return false; |
@@ -484,7 +484,7 @@ discard block |
||
484 | 484 | global $modSettings, $context, $sourcedir, $smcFunc; |
485 | 485 | |
486 | 486 | // No data or missing data .... Not necessarily needed, but in case a mod author missed something. |
487 | - if ( empty($_SESSION['temp_attachments'][$attachID])) |
|
487 | + if (empty($_SESSION['temp_attachments'][$attachID])) |
|
488 | 488 | $error = '$_SESSION[\'temp_attachments\'][$attachID]'; |
489 | 489 | |
490 | 490 | elseif (empty($attachID)) |
@@ -911,9 +911,9 @@ discard block |
||
911 | 911 | $attachContext = $attachLoaded[$attachID]; |
912 | 912 | |
913 | 913 | // Fix the url to point out to showAvatar(). |
914 | - $attachContext['href'] = $scripturl . '?action=dlattach;attach=' . $attachID .';type=preview'; |
|
914 | + $attachContext['href'] = $scripturl . '?action=dlattach;attach=' . $attachID . ';type=preview'; |
|
915 | 915 | |
916 | - $attachContext['link'] = '<a href="' . $scripturl . '?action=dlattach;attach=' . $attachID .';type=preview'. (empty($attachContext['is_image']) ? ';file' : '') .'">' . $smcFunc['htmlspecialchars']($attachContext['name']) . '</a>'; |
|
916 | + $attachContext['link'] = '<a href="' . $scripturl . '?action=dlattach;attach=' . $attachID . ';type=preview' . (empty($attachContext['is_image']) ? ';file' : '') . '">' . $smcFunc['htmlspecialchars']($attachContext['name']) . '</a>'; |
|
917 | 917 | |
918 | 918 | // Fix the thumbnail too, if the image has one. |
919 | 919 | if (!empty($attachContext['thumbnail']) && !empty($attachContext['thumbnail']['has_thumb'])) |
@@ -1078,7 +1078,7 @@ discard block |
||
1078 | 1078 | LEFT JOIN {db_prefix}attachments AS thumb ON (thumb.id_attach = a.id_thumb)') . ' |
1079 | 1079 | LEFT JOIN {db_prefix}messages AS m ON (m.id_msg = a.id_msg) |
1080 | 1080 | WHERE a.attachment_type = {int:attachment_type} |
1081 | - '. (!empty($msgID) ? 'AND a.id_msg = {int:message_id}' : '') .'', |
|
1081 | + '. (!empty($msgID) ? 'AND a.id_msg = {int:message_id}' : '') . '', |
|
1082 | 1082 | array( |
1083 | 1083 | 'message_id' => $msgID, |
1084 | 1084 | 'attachment_type' => 0, |
@@ -14,8 +14,9 @@ discard block |
||
14 | 14 | * @version 2.1 Beta 3 |
15 | 15 | */ |
16 | 16 | |
17 | -if (!defined('SMF')) |
|
17 | +if (!defined('SMF')) { |
|
18 | 18 | die('No direct access...'); |
19 | +} |
|
19 | 20 | |
20 | 21 | /** |
21 | 22 | * Check if the current directory is still valid or not. |
@@ -28,22 +29,24 @@ discard block |
||
28 | 29 | global $boarddir, $modSettings, $context; |
29 | 30 | |
30 | 31 | // Not pretty, but since we don't want folders created for every post. It'll do unless a better solution can be found. |
31 | - if (isset($_REQUEST['action']) && $_REQUEST['action'] == 'admin') |
|
32 | - $doit = true; |
|
33 | - elseif (empty($modSettings['automanage_attachments'])) |
|
34 | - return; |
|
35 | - elseif (!isset($_FILES)) |
|
36 | - return; |
|
37 | - elseif (isset($_FILES['attachment'])) |
|
38 | - foreach ($_FILES['attachment']['tmp_name'] as $dummy) |
|
32 | + if (isset($_REQUEST['action']) && $_REQUEST['action'] == 'admin') { |
|
33 | + $doit = true; |
|
34 | + } elseif (empty($modSettings['automanage_attachments'])) { |
|
35 | + return; |
|
36 | + } elseif (!isset($_FILES)) { |
|
37 | + return; |
|
38 | + } elseif (isset($_FILES['attachment'])) { |
|
39 | + foreach ($_FILES['attachment']['tmp_name'] as $dummy) |
|
39 | 40 | if (!empty($dummy)) |
40 | 41 | { |
41 | 42 | $doit = true; |
43 | + } |
|
42 | 44 | break; |
43 | 45 | } |
44 | 46 | |
45 | - if (!isset($doit)) |
|
46 | - return; |
|
47 | + if (!isset($doit)) { |
|
48 | + return; |
|
49 | + } |
|
47 | 50 | |
48 | 51 | $year = date('Y'); |
49 | 52 | $month = date('m'); |
@@ -55,21 +58,25 @@ discard block |
||
55 | 58 | |
56 | 59 | if (!empty($modSettings['attachment_basedirectories']) && !empty($modSettings['use_subdirectories_for_attachments'])) |
57 | 60 | { |
58 | - if (!is_array($modSettings['attachment_basedirectories'])) |
|
59 | - $modSettings['attachment_basedirectories'] = smf_json_decode($modSettings['attachment_basedirectories'], true); |
|
61 | + if (!is_array($modSettings['attachment_basedirectories'])) { |
|
62 | + $modSettings['attachment_basedirectories'] = smf_json_decode($modSettings['attachment_basedirectories'], true); |
|
63 | + } |
|
60 | 64 | $base_dir = array_search($modSettings['basedirectory_for_attachments'], $modSettings['attachment_basedirectories']); |
65 | + } else { |
|
66 | + $base_dir = 0; |
|
61 | 67 | } |
62 | - else |
|
63 | - $base_dir = 0; |
|
64 | 68 | |
65 | 69 | if ($modSettings['automanage_attachments'] == 1) |
66 | 70 | { |
67 | - if (!isset($modSettings['last_attachments_directory'])) |
|
68 | - $modSettings['last_attachments_directory'] = array(); |
|
69 | - if (!is_array($modSettings['last_attachments_directory'])) |
|
70 | - $modSettings['last_attachments_directory'] = smf_json_decode($modSettings['last_attachments_directory'], true); |
|
71 | - if (!isset($modSettings['last_attachments_directory'][$base_dir])) |
|
72 | - $modSettings['last_attachments_directory'][$base_dir] = 0; |
|
71 | + if (!isset($modSettings['last_attachments_directory'])) { |
|
72 | + $modSettings['last_attachments_directory'] = array(); |
|
73 | + } |
|
74 | + if (!is_array($modSettings['last_attachments_directory'])) { |
|
75 | + $modSettings['last_attachments_directory'] = smf_json_decode($modSettings['last_attachments_directory'], true); |
|
76 | + } |
|
77 | + if (!isset($modSettings['last_attachments_directory'][$base_dir])) { |
|
78 | + $modSettings['last_attachments_directory'][$base_dir] = 0; |
|
79 | + } |
|
73 | 80 | } |
74 | 81 | |
75 | 82 | $basedirectory = (!empty($modSettings['use_subdirectories_for_attachments']) ? ($modSettings['basedirectory_for_attachments']) : $boarddir); |
@@ -98,12 +105,14 @@ discard block |
||
98 | 105 | $updir = ''; |
99 | 106 | } |
100 | 107 | |
101 | - if (!is_array($modSettings['attachmentUploadDir'])) |
|
102 | - $modSettings['attachmentUploadDir'] = smf_json_decode($modSettings['attachmentUploadDir'], true); |
|
103 | - if (!in_array($updir, $modSettings['attachmentUploadDir']) && !empty($updir)) |
|
104 | - $outputCreation = automanage_attachments_create_directory($updir); |
|
105 | - elseif (in_array($updir, $modSettings['attachmentUploadDir'])) |
|
106 | - $outputCreation = true; |
|
108 | + if (!is_array($modSettings['attachmentUploadDir'])) { |
|
109 | + $modSettings['attachmentUploadDir'] = smf_json_decode($modSettings['attachmentUploadDir'], true); |
|
110 | + } |
|
111 | + if (!in_array($updir, $modSettings['attachmentUploadDir']) && !empty($updir)) { |
|
112 | + $outputCreation = automanage_attachments_create_directory($updir); |
|
113 | + } elseif (in_array($updir, $modSettings['attachmentUploadDir'])) { |
|
114 | + $outputCreation = true; |
|
115 | + } |
|
107 | 116 | |
108 | 117 | if ($outputCreation) |
109 | 118 | { |
@@ -140,8 +149,9 @@ discard block |
||
140 | 149 | $count = count($tree); |
141 | 150 | |
142 | 151 | $directory = attachments_init_dir($tree, $count); |
143 | - if ($directory === false) |
|
144 | - return false; |
|
152 | + if ($directory === false) { |
|
153 | + return false; |
|
154 | + } |
|
145 | 155 | } |
146 | 156 | |
147 | 157 | $directory .= DIRECTORY_SEPARATOR . array_shift($tree); |
@@ -169,8 +179,9 @@ discard block |
||
169 | 179 | } |
170 | 180 | |
171 | 181 | // Everything seems fine...let's create the .htaccess |
172 | - if (!file_exists($directory . DIRECTORY_SEPARATOR . '.htaccess')) |
|
173 | - secureDirectory($updir, true); |
|
182 | + if (!file_exists($directory . DIRECTORY_SEPARATOR . '.htaccess')) { |
|
183 | + secureDirectory($updir, true); |
|
184 | + } |
|
174 | 185 | |
175 | 186 | $sep = (strtoupper(substr(PHP_OS, 0, 3)) === 'WIN') ? '\/' : DIRECTORY_SEPARATOR; |
176 | 187 | $updir = rtrim($updir, $sep); |
@@ -202,8 +213,9 @@ discard block |
||
202 | 213 | { |
203 | 214 | global $modSettings, $boarddir; |
204 | 215 | |
205 | - if (!isset($modSettings['automanage_attachments']) || (!empty($modSettings['automanage_attachments']) && $modSettings['automanage_attachments'] != 1)) |
|
206 | - return; |
|
216 | + if (!isset($modSettings['automanage_attachments']) || (!empty($modSettings['automanage_attachments']) && $modSettings['automanage_attachments'] != 1)) { |
|
217 | + return; |
|
218 | + } |
|
207 | 219 | |
208 | 220 | $basedirectory = !empty($modSettings['use_subdirectories_for_attachments']) ? $modSettings['basedirectory_for_attachments'] : $boarddir; |
209 | 221 | // Just to be sure: I don't want directory separators at the end |
@@ -215,13 +227,14 @@ discard block |
||
215 | 227 | { |
216 | 228 | $base_dir = array_search($modSettings['basedirectory_for_attachments'], $modSettings['attachment_basedirectories']); |
217 | 229 | $base_dir = !empty($modSettings['automanage_attachments']) ? $base_dir : 0; |
230 | + } else { |
|
231 | + $base_dir = 0; |
|
218 | 232 | } |
219 | - else |
|
220 | - $base_dir = 0; |
|
221 | 233 | |
222 | 234 | // Get the last attachment directory for that base directory |
223 | - if (empty($modSettings['last_attachments_directory'][$base_dir])) |
|
224 | - $modSettings['last_attachments_directory'][$base_dir] = 0; |
|
235 | + if (empty($modSettings['last_attachments_directory'][$base_dir])) { |
|
236 | + $modSettings['last_attachments_directory'][$base_dir] = 0; |
|
237 | + } |
|
225 | 238 | // And increment it. |
226 | 239 | $modSettings['last_attachments_directory'][$base_dir]++; |
227 | 240 | |
@@ -236,10 +249,10 @@ discard block |
||
236 | 249 | $modSettings['last_attachments_directory'] = smf_json_decode($modSettings['last_attachments_directory'], true); |
237 | 250 | |
238 | 251 | return true; |
252 | + } else { |
|
253 | + return false; |
|
254 | + } |
|
239 | 255 | } |
240 | - else |
|
241 | - return false; |
|
242 | -} |
|
243 | 256 | |
244 | 257 | /** |
245 | 258 | * Split a path into a list of all directories and subdirectories |
@@ -257,12 +270,13 @@ discard block |
||
257 | 270 | * in Windows we need to explode for both \ and / |
258 | 271 | * while in linux should be safe to explode only for / (aka DIRECTORY_SEPARATOR) |
259 | 272 | */ |
260 | - if (strtoupper(substr(PHP_OS, 0, 3)) === 'WIN') |
|
261 | - $tree = preg_split('#[\\\/]#', $directory); |
|
262 | - else |
|
273 | + if (strtoupper(substr(PHP_OS, 0, 3)) === 'WIN') { |
|
274 | + $tree = preg_split('#[\\\/]#', $directory); |
|
275 | + } else |
|
263 | 276 | { |
264 | - if (substr($directory, 0, 1) != DIRECTORY_SEPARATOR) |
|
265 | - return false; |
|
277 | + if (substr($directory, 0, 1) != DIRECTORY_SEPARATOR) { |
|
278 | + return false; |
|
279 | + } |
|
266 | 280 | |
267 | 281 | $tree = explode(DIRECTORY_SEPARATOR, trim($directory,DIRECTORY_SEPARATOR)); |
268 | 282 | } |
@@ -286,10 +300,11 @@ discard block |
||
286 | 300 | //Better be sure that the first part of the path is actually a drive letter... |
287 | 301 | //...even if, I should check this in the admin page...isn't it? |
288 | 302 | //...NHAAA Let's leave space for users' complains! :P |
289 | - if (preg_match('/^[a-z]:$/i',$tree[0])) |
|
290 | - $directory = array_shift($tree); |
|
291 | - else |
|
292 | - return false; |
|
303 | + if (preg_match('/^[a-z]:$/i',$tree[0])) { |
|
304 | + $directory = array_shift($tree); |
|
305 | + } else { |
|
306 | + return false; |
|
307 | + } |
|
293 | 308 | |
294 | 309 | $count--; |
295 | 310 | } |
@@ -304,18 +319,20 @@ discard block |
||
304 | 319 | global $context, $modSettings, $smcFunc, $txt, $user_info; |
305 | 320 | |
306 | 321 | // Make sure we're uploading to the right place. |
307 | - if (!empty($modSettings['automanage_attachments'])) |
|
308 | - automanage_attachments_check_directory(); |
|
322 | + if (!empty($modSettings['automanage_attachments'])) { |
|
323 | + automanage_attachments_check_directory(); |
|
324 | + } |
|
309 | 325 | |
310 | - if (!is_array($modSettings['attachmentUploadDir'])) |
|
311 | - $modSettings['attachmentUploadDir'] = smf_json_decode($modSettings['attachmentUploadDir'], true); |
|
326 | + if (!is_array($modSettings['attachmentUploadDir'])) { |
|
327 | + $modSettings['attachmentUploadDir'] = smf_json_decode($modSettings['attachmentUploadDir'], true); |
|
328 | + } |
|
312 | 329 | |
313 | 330 | $context['attach_dir'] = $modSettings['attachmentUploadDir'][$modSettings['currentAttachmentUploadDir']]; |
314 | 331 | |
315 | 332 | // Is the attachments folder actualy there? |
316 | - if (!empty($context['dir_creation_error'])) |
|
317 | - $initial_error = $context['dir_creation_error']; |
|
318 | - elseif (!is_dir($context['attach_dir'])) |
|
333 | + if (!empty($context['dir_creation_error'])) { |
|
334 | + $initial_error = $context['dir_creation_error']; |
|
335 | + } elseif (!is_dir($context['attach_dir'])) |
|
319 | 336 | { |
320 | 337 | $initial_error = 'attach_folder_warning'; |
321 | 338 | log_error(sprintf($txt['attach_folder_admin_warning'], $context['attach_dir']), 'critical'); |
@@ -338,12 +355,12 @@ discard block |
||
338 | 355 | ); |
339 | 356 | list ($context['attachments']['quantity'], $context['attachments']['total_size']) = $smcFunc['db_fetch_row']($request); |
340 | 357 | $smcFunc['db_free_result']($request); |
341 | - } |
|
342 | - else |
|
343 | - $context['attachments'] = array( |
|
358 | + } else { |
|
359 | + $context['attachments'] = array( |
|
344 | 360 | 'quantity' => 0, |
345 | 361 | 'total_size' => 0, |
346 | 362 | ); |
363 | + } |
|
347 | 364 | } |
348 | 365 | |
349 | 366 | // Hmm. There are still files in session. |
@@ -353,39 +370,44 @@ discard block |
||
353 | 370 | // Let's try to keep them. But... |
354 | 371 | $ignore_temp = true; |
355 | 372 | // If new files are being added. We can't ignore those |
356 | - foreach ($_FILES['attachment']['tmp_name'] as $dummy) |
|
357 | - if (!empty($dummy)) |
|
373 | + foreach ($_FILES['attachment']['tmp_name'] as $dummy) { |
|
374 | + if (!empty($dummy)) |
|
358 | 375 | { |
359 | 376 | $ignore_temp = false; |
377 | + } |
|
360 | 378 | break; |
361 | 379 | } |
362 | 380 | |
363 | 381 | // Need to make space for the new files. So, bye bye. |
364 | 382 | if (!$ignore_temp) |
365 | 383 | { |
366 | - foreach ($_SESSION['temp_attachments'] as $attachID => $attachment) |
|
367 | - if (strpos($attachID, 'post_tmp_' . $user_info['id']) !== false) |
|
384 | + foreach ($_SESSION['temp_attachments'] as $attachID => $attachment) { |
|
385 | + if (strpos($attachID, 'post_tmp_' . $user_info['id']) !== false) |
|
368 | 386 | unlink($attachment['tmp_name']); |
387 | + } |
|
369 | 388 | |
370 | 389 | $context['we_are_history'] = $txt['error_temp_attachments_flushed']; |
371 | 390 | $_SESSION['temp_attachments'] = array(); |
372 | 391 | } |
373 | 392 | } |
374 | 393 | |
375 | - if (!isset($_FILES['attachment']['name'])) |
|
376 | - $_FILES['attachment']['tmp_name'] = array(); |
|
394 | + if (!isset($_FILES['attachment']['name'])) { |
|
395 | + $_FILES['attachment']['tmp_name'] = array(); |
|
396 | + } |
|
377 | 397 | |
378 | - if (!isset($_SESSION['temp_attachments'])) |
|
379 | - $_SESSION['temp_attachments'] = array(); |
|
398 | + if (!isset($_SESSION['temp_attachments'])) { |
|
399 | + $_SESSION['temp_attachments'] = array(); |
|
400 | + } |
|
380 | 401 | |
381 | 402 | // Remember where we are at. If it's anywhere at all. |
382 | - if (!$ignore_temp) |
|
383 | - $_SESSION['temp_attachments']['post'] = array( |
|
403 | + if (!$ignore_temp) { |
|
404 | + $_SESSION['temp_attachments']['post'] = array( |
|
384 | 405 | 'msg' => !empty($_REQUEST['msg']) ? $_REQUEST['msg'] : 0, |
385 | 406 | 'last_msg' => !empty($_REQUEST['last_msg']) ? $_REQUEST['last_msg'] : 0, |
386 | 407 | 'topic' => !empty($topic) ? $topic : 0, |
387 | 408 | 'board' => !empty($board) ? $board : 0, |
388 | 409 | ); |
410 | + } |
|
389 | 411 | |
390 | 412 | // If we have an initial error, lets just display it. |
391 | 413 | if (!empty($initial_error)) |
@@ -393,9 +415,10 @@ discard block |
||
393 | 415 | $_SESSION['temp_attachments']['initial_error'] = $initial_error; |
394 | 416 | |
395 | 417 | // And delete the files 'cos they ain't going nowhere. |
396 | - foreach ($_FILES['attachment']['tmp_name'] as $n => $dummy) |
|
397 | - if (file_exists($_FILES['attachment']['tmp_name'][$n])) |
|
418 | + foreach ($_FILES['attachment']['tmp_name'] as $n => $dummy) { |
|
419 | + if (file_exists($_FILES['attachment']['tmp_name'][$n])) |
|
398 | 420 | unlink($_FILES['attachment']['tmp_name'][$n]); |
421 | + } |
|
399 | 422 | |
400 | 423 | $_FILES['attachment']['tmp_name'] = array(); |
401 | 424 | } |
@@ -403,21 +426,24 @@ discard block |
||
403 | 426 | // Loop through $_FILES['attachment'] array and move each file to the current attachments folder. |
404 | 427 | foreach ($_FILES['attachment']['tmp_name'] as $n => $dummy) |
405 | 428 | { |
406 | - if ($_FILES['attachment']['name'][$n] == '') |
|
407 | - continue; |
|
429 | + if ($_FILES['attachment']['name'][$n] == '') { |
|
430 | + continue; |
|
431 | + } |
|
408 | 432 | |
409 | 433 | // First, let's first check for PHP upload errors. |
410 | 434 | $errors = array(); |
411 | 435 | if (!empty($_FILES['attachment']['error'][$n])) |
412 | 436 | { |
413 | - if ($_FILES['attachment']['error'][$n] == 2) |
|
414 | - $errors[] = array('file_too_big', array($modSettings['attachmentSizeLimit'])); |
|
415 | - elseif ($_FILES['attachment']['error'][$n] == 6) |
|
416 | - log_error($_FILES['attachment']['name'][$n] . ': ' . $txt['php_upload_error_6'], 'critical'); |
|
417 | - else |
|
418 | - log_error($_FILES['attachment']['name'][$n] . ': ' . $txt['php_upload_error_' . $_FILES['attachment']['error'][$n]]); |
|
419 | - if (empty($errors)) |
|
420 | - $errors[] = 'attach_php_error'; |
|
437 | + if ($_FILES['attachment']['error'][$n] == 2) { |
|
438 | + $errors[] = array('file_too_big', array($modSettings['attachmentSizeLimit'])); |
|
439 | + } elseif ($_FILES['attachment']['error'][$n] == 6) { |
|
440 | + log_error($_FILES['attachment']['name'][$n] . ': ' . $txt['php_upload_error_6'], 'critical'); |
|
441 | + } else { |
|
442 | + log_error($_FILES['attachment']['name'][$n] . ': ' . $txt['php_upload_error_' . $_FILES['attachment']['error'][$n]]); |
|
443 | + } |
|
444 | + if (empty($errors)) { |
|
445 | + $errors[] = 'attach_php_error'; |
|
446 | + } |
|
421 | 447 | } |
422 | 448 | |
423 | 449 | // Try to move and rename the file before doing any more checks on it. |
@@ -435,16 +461,16 @@ discard block |
||
435 | 461 | ); |
436 | 462 | |
437 | 463 | // Move the file to the attachments folder with a temp name for now. |
438 | - if (@move_uploaded_file($_FILES['attachment']['tmp_name'][$n], $destName)) |
|
439 | - smf_chmod($destName, 0644); |
|
440 | - else |
|
464 | + if (@move_uploaded_file($_FILES['attachment']['tmp_name'][$n], $destName)) { |
|
465 | + smf_chmod($destName, 0644); |
|
466 | + } else |
|
441 | 467 | { |
442 | 468 | $_SESSION['temp_attachments'][$attachID]['errors'][] = 'attach_timeout'; |
443 | - if (file_exists($_FILES['attachment']['tmp_name'][$n])) |
|
444 | - unlink($_FILES['attachment']['tmp_name'][$n]); |
|
469 | + if (file_exists($_FILES['attachment']['tmp_name'][$n])) { |
|
470 | + unlink($_FILES['attachment']['tmp_name'][$n]); |
|
471 | + } |
|
445 | 472 | } |
446 | - } |
|
447 | - else |
|
473 | + } else |
|
448 | 474 | { |
449 | 475 | $_SESSION['temp_attachments'][$attachID] = array( |
450 | 476 | 'name' => $smcFunc['htmlspecialchars'](basename($_FILES['attachment']['name'][$n])), |
@@ -452,12 +478,14 @@ discard block |
||
452 | 478 | 'errors' => $errors, |
453 | 479 | ); |
454 | 480 | |
455 | - if (file_exists($_FILES['attachment']['tmp_name'][$n])) |
|
456 | - unlink($_FILES['attachment']['tmp_name'][$n]); |
|
481 | + if (file_exists($_FILES['attachment']['tmp_name'][$n])) { |
|
482 | + unlink($_FILES['attachment']['tmp_name'][$n]); |
|
483 | + } |
|
457 | 484 | } |
458 | 485 | // If there's no errors to this point. We still do need to apply some additional checks before we are finished. |
459 | - if (empty($_SESSION['temp_attachments'][$attachID]['errors'])) |
|
460 | - attachmentChecks($attachID); |
|
486 | + if (empty($_SESSION['temp_attachments'][$attachID]['errors'])) { |
|
487 | + attachmentChecks($attachID); |
|
488 | + } |
|
461 | 489 | } |
462 | 490 | // Mod authors, finally a hook to hang an alternate attachment upload system upon |
463 | 491 | // Upload to the current attachment folder with the file name $attachID or 'post_tmp_' . $user_info['id'] . '_' . md5(mt_rand()) |
@@ -484,21 +512,20 @@ discard block |
||
484 | 512 | global $modSettings, $context, $sourcedir, $smcFunc; |
485 | 513 | |
486 | 514 | // No data or missing data .... Not necessarily needed, but in case a mod author missed something. |
487 | - if ( empty($_SESSION['temp_attachments'][$attachID])) |
|
488 | - $error = '$_SESSION[\'temp_attachments\'][$attachID]'; |
|
489 | - |
|
490 | - elseif (empty($attachID)) |
|
491 | - $error = '$attachID'; |
|
492 | - |
|
493 | - elseif (empty($context['attachments'])) |
|
494 | - $error = '$context[\'attachments\']'; |
|
495 | - |
|
496 | - elseif (empty($context['attach_dir'])) |
|
497 | - $error = '$context[\'attach_dir\']'; |
|
515 | + if ( empty($_SESSION['temp_attachments'][$attachID])) { |
|
516 | + $error = '$_SESSION[\'temp_attachments\'][$attachID]'; |
|
517 | + } elseif (empty($attachID)) { |
|
518 | + $error = '$attachID'; |
|
519 | + } elseif (empty($context['attachments'])) { |
|
520 | + $error = '$context[\'attachments\']'; |
|
521 | + } elseif (empty($context['attach_dir'])) { |
|
522 | + $error = '$context[\'attach_dir\']'; |
|
523 | + } |
|
498 | 524 | |
499 | 525 | // Let's get their attention. |
500 | - if (!empty($error)) |
|
501 | - fatal_lang_error('attach_check_nag', 'debug', array($error)); |
|
526 | + if (!empty($error)) { |
|
527 | + fatal_lang_error('attach_check_nag', 'debug', array($error)); |
|
528 | + } |
|
502 | 529 | |
503 | 530 | // Just in case this slipped by the first checks, we stop it here and now |
504 | 531 | if ($_SESSION['temp_attachments'][$attachID]['size'] == 0) |
@@ -527,8 +554,9 @@ discard block |
||
527 | 554 | $size = @getimagesize($_SESSION['temp_attachments'][$attachID]['tmp_name']); |
528 | 555 | if (!(empty($size)) && ($size[2] != $old_format)) |
529 | 556 | { |
530 | - if (isset($context['validImageTypes'][$size[2]])) |
|
531 | - $_SESSION['temp_attachments'][$attachID]['type'] = 'image/' . $context['validImageTypes'][$size[2]]; |
|
557 | + if (isset($context['validImageTypes'][$size[2]])) { |
|
558 | + $_SESSION['temp_attachments'][$attachID]['type'] = 'image/' . $context['validImageTypes'][$size[2]]; |
|
559 | + } |
|
532 | 560 | } |
533 | 561 | } |
534 | 562 | } |
@@ -582,42 +610,48 @@ discard block |
||
582 | 610 | // Or, let the user know that it ain't gonna happen. |
583 | 611 | else |
584 | 612 | { |
585 | - if (isset($context['dir_creation_error'])) |
|
586 | - $_SESSION['temp_attachments'][$attachID]['errors'][] = $context['dir_creation_error']; |
|
587 | - else |
|
588 | - $_SESSION['temp_attachments'][$attachID]['errors'][] = 'ran_out_of_space'; |
|
613 | + if (isset($context['dir_creation_error'])) { |
|
614 | + $_SESSION['temp_attachments'][$attachID]['errors'][] = $context['dir_creation_error']; |
|
615 | + } else { |
|
616 | + $_SESSION['temp_attachments'][$attachID]['errors'][] = 'ran_out_of_space'; |
|
617 | + } |
|
589 | 618 | } |
619 | + } else { |
|
620 | + $_SESSION['temp_attachments'][$attachID]['errors'][] = 'ran_out_of_space'; |
|
590 | 621 | } |
591 | - else |
|
592 | - $_SESSION['temp_attachments'][$attachID]['errors'][] = 'ran_out_of_space'; |
|
593 | 622 | } |
594 | 623 | } |
595 | 624 | |
596 | 625 | // Is the file too big? |
597 | 626 | $context['attachments']['total_size'] += $_SESSION['temp_attachments'][$attachID]['size']; |
598 | - if (!empty($modSettings['attachmentSizeLimit']) && $_SESSION['temp_attachments'][$attachID]['size'] > $modSettings['attachmentSizeLimit'] * 1024) |
|
599 | - $_SESSION['temp_attachments'][$attachID]['errors'][] = array('file_too_big', array(comma_format($modSettings['attachmentSizeLimit'], 0))); |
|
627 | + if (!empty($modSettings['attachmentSizeLimit']) && $_SESSION['temp_attachments'][$attachID]['size'] > $modSettings['attachmentSizeLimit'] * 1024) { |
|
628 | + $_SESSION['temp_attachments'][$attachID]['errors'][] = array('file_too_big', array(comma_format($modSettings['attachmentSizeLimit'], 0))); |
|
629 | + } |
|
600 | 630 | |
601 | 631 | // Check the total upload size for this post... |
602 | - if (!empty($modSettings['attachmentPostLimit']) && $context['attachments']['total_size'] > $modSettings['attachmentPostLimit'] * 1024) |
|
603 | - $_SESSION['temp_attachments'][$attachID]['errors'][] = array('attach_max_total_file_size', array(comma_format($modSettings['attachmentPostLimit'], 0), comma_format($modSettings['attachmentPostLimit'] - (($context['attachments']['total_size'] - $_SESSION['temp_attachments'][$attachID]['size']) / 1024), 0))); |
|
632 | + if (!empty($modSettings['attachmentPostLimit']) && $context['attachments']['total_size'] > $modSettings['attachmentPostLimit'] * 1024) { |
|
633 | + $_SESSION['temp_attachments'][$attachID]['errors'][] = array('attach_max_total_file_size', array(comma_format($modSettings['attachmentPostLimit'], 0), comma_format($modSettings['attachmentPostLimit'] - (($context['attachments']['total_size'] - $_SESSION['temp_attachments'][$attachID]['size']) / 1024), 0))); |
|
634 | + } |
|
604 | 635 | |
605 | 636 | // Have we reached the maximum number of files we are allowed? |
606 | 637 | $context['attachments']['quantity']++; |
607 | 638 | |
608 | 639 | // Set a max limit if none exists |
609 | - if (empty($modSettings['attachmentNumPerPostLimit']) && $context['attachments']['quantity'] >= 50) |
|
610 | - $modSettings['attachmentNumPerPostLimit'] = 50; |
|
640 | + if (empty($modSettings['attachmentNumPerPostLimit']) && $context['attachments']['quantity'] >= 50) { |
|
641 | + $modSettings['attachmentNumPerPostLimit'] = 50; |
|
642 | + } |
|
611 | 643 | |
612 | - if (!empty($modSettings['attachmentNumPerPostLimit']) && $context['attachments']['quantity'] > $modSettings['attachmentNumPerPostLimit']) |
|
613 | - $_SESSION['temp_attachments'][$attachID]['errors'][] = array('attachments_limit_per_post', array($modSettings['attachmentNumPerPostLimit'])); |
|
644 | + if (!empty($modSettings['attachmentNumPerPostLimit']) && $context['attachments']['quantity'] > $modSettings['attachmentNumPerPostLimit']) { |
|
645 | + $_SESSION['temp_attachments'][$attachID]['errors'][] = array('attachments_limit_per_post', array($modSettings['attachmentNumPerPostLimit'])); |
|
646 | + } |
|
614 | 647 | |
615 | 648 | // File extension check |
616 | 649 | if (!empty($modSettings['attachmentCheckExtensions'])) |
617 | 650 | { |
618 | 651 | $allowed = explode(',', strtolower($modSettings['attachmentExtensions'])); |
619 | - foreach ($allowed as $k => $dummy) |
|
620 | - $allowed[$k] = trim($dummy); |
|
652 | + foreach ($allowed as $k => $dummy) { |
|
653 | + $allowed[$k] = trim($dummy); |
|
654 | + } |
|
621 | 655 | |
622 | 656 | if (!in_array(strtolower(substr(strrchr($_SESSION['temp_attachments'][$attachID]['name'], '.'), 1)), $allowed)) |
623 | 657 | { |
@@ -629,10 +663,12 @@ discard block |
||
629 | 663 | // Undo the math if there's an error |
630 | 664 | if (!empty($_SESSION['temp_attachments'][$attachID]['errors'])) |
631 | 665 | { |
632 | - if (isset($context['dir_size'])) |
|
633 | - $context['dir_size'] -= $_SESSION['temp_attachments'][$attachID]['size']; |
|
634 | - if (isset($context['dir_files'])) |
|
635 | - $context['dir_files']--; |
|
666 | + if (isset($context['dir_size'])) { |
|
667 | + $context['dir_size'] -= $_SESSION['temp_attachments'][$attachID]['size']; |
|
668 | + } |
|
669 | + if (isset($context['dir_files'])) { |
|
670 | + $context['dir_files']--; |
|
671 | + } |
|
636 | 672 | $context['attachments']['total_size'] -= $_SESSION['temp_attachments'][$attachID]['size']; |
637 | 673 | $context['attachments']['quantity']--; |
638 | 674 | return false; |
@@ -664,12 +700,14 @@ discard block |
||
664 | 700 | if (empty($attachmentOptions['mime_type']) && $attachmentOptions['width']) |
665 | 701 | { |
666 | 702 | // Got a proper mime type? |
667 | - if (!empty($size['mime'])) |
|
668 | - $attachmentOptions['mime_type'] = $size['mime']; |
|
703 | + if (!empty($size['mime'])) { |
|
704 | + $attachmentOptions['mime_type'] = $size['mime']; |
|
705 | + } |
|
669 | 706 | |
670 | 707 | // Otherwise a valid one? |
671 | - elseif (isset($context['validImageTypes'][$size[2]])) |
|
672 | - $attachmentOptions['mime_type'] = 'image/' . $context['validImageTypes'][$size[2]]; |
|
708 | + elseif (isset($context['validImageTypes'][$size[2]])) { |
|
709 | + $attachmentOptions['mime_type'] = 'image/' . $context['validImageTypes'][$size[2]]; |
|
710 | + } |
|
673 | 711 | } |
674 | 712 | |
675 | 713 | // It is possible we might have a MIME type that isn't actually an image but still have a size. |
@@ -681,15 +719,17 @@ discard block |
||
681 | 719 | } |
682 | 720 | |
683 | 721 | // Get the hash if no hash has been given yet. |
684 | - if (empty($attachmentOptions['file_hash'])) |
|
685 | - $attachmentOptions['file_hash'] = getAttachmentFilename($attachmentOptions['name'], false, null, true); |
|
722 | + if (empty($attachmentOptions['file_hash'])) { |
|
723 | + $attachmentOptions['file_hash'] = getAttachmentFilename($attachmentOptions['name'], false, null, true); |
|
724 | + } |
|
686 | 725 | |
687 | 726 | // Assuming no-one set the extension let's take a look at it. |
688 | 727 | if (empty($attachmentOptions['fileext'])) |
689 | 728 | { |
690 | 729 | $attachmentOptions['fileext'] = strtolower(strrpos($attachmentOptions['name'], '.') !== false ? substr($attachmentOptions['name'], strrpos($attachmentOptions['name'], '.') + 1) : ''); |
691 | - if (strlen($attachmentOptions['fileext']) > 8 || '.' . $attachmentOptions['fileext'] == $attachmentOptions['name']) |
|
692 | - $attachmentOptions['fileext'] = ''; |
|
730 | + if (strlen($attachmentOptions['fileext']) > 8 || '.' . $attachmentOptions['fileext'] == $attachmentOptions['name']) { |
|
731 | + $attachmentOptions['fileext'] = ''; |
|
732 | + } |
|
693 | 733 | } |
694 | 734 | |
695 | 735 | // Last chance to change stuff! |
@@ -698,8 +738,9 @@ discard block |
||
698 | 738 | // Make sure the folder is valid... |
699 | 739 | $tmp = is_array($modSettings['attachmentUploadDir']) ? $modSettings['attachmentUploadDir'] : smf_json_decode($modSettings['attachmentUploadDir'], true); |
700 | 740 | $folders = array_keys($tmp); |
701 | - if (empty($attachmentOptions['id_folder']) || !in_array($attachmentOptions['id_folder'], $folders)) |
|
702 | - $attachmentOptions['id_folder'] = $modSettings['currentAttachmentUploadDir']; |
|
741 | + if (empty($attachmentOptions['id_folder']) || !in_array($attachmentOptions['id_folder'], $folders)) { |
|
742 | + $attachmentOptions['id_folder'] = $modSettings['currentAttachmentUploadDir']; |
|
743 | + } |
|
703 | 744 | |
704 | 745 | $smcFunc['db_insert']('', |
705 | 746 | '{db_prefix}attachments', |
@@ -730,8 +771,8 @@ discard block |
||
730 | 771 | rename($attachmentOptions['tmp_name'], $attachmentOptions['destination']); |
731 | 772 | |
732 | 773 | // If it's not approved then add to the approval queue. |
733 | - if (!$attachmentOptions['approved']) |
|
734 | - $smcFunc['db_insert']('', |
|
774 | + if (!$attachmentOptions['approved']) { |
|
775 | + $smcFunc['db_insert']('', |
|
735 | 776 | '{db_prefix}approval_queue', |
736 | 777 | array( |
737 | 778 | 'id_attach' => 'int', 'id_msg' => 'int', |
@@ -741,9 +782,11 @@ discard block |
||
741 | 782 | ), |
742 | 783 | array() |
743 | 784 | ); |
785 | + } |
|
744 | 786 | |
745 | - if (empty($modSettings['attachmentThumbnails']) || (empty($attachmentOptions['width']) && empty($attachmentOptions['height']))) |
|
746 | - return true; |
|
787 | + if (empty($modSettings['attachmentThumbnails']) || (empty($attachmentOptions['width']) && empty($attachmentOptions['height']))) { |
|
788 | + return true; |
|
789 | + } |
|
747 | 790 | |
748 | 791 | // Like thumbnails, do we? |
749 | 792 | if (!empty($modSettings['attachmentThumbWidth']) && !empty($modSettings['attachmentThumbHeight']) && ($attachmentOptions['width'] > $modSettings['attachmentThumbWidth'] || $attachmentOptions['height'] > $modSettings['attachmentThumbHeight'])) |
@@ -754,13 +797,15 @@ discard block |
||
754 | 797 | $size = @getimagesize($attachmentOptions['destination'] . '_thumb'); |
755 | 798 | list ($thumb_width, $thumb_height) = $size; |
756 | 799 | |
757 | - if (!empty($size['mime'])) |
|
758 | - $thumb_mime = $size['mime']; |
|
759 | - elseif (isset($context['validImageTypes'][$size[2]])) |
|
760 | - $thumb_mime = 'image/' . $context['validImageTypes'][$size[2]]; |
|
800 | + if (!empty($size['mime'])) { |
|
801 | + $thumb_mime = $size['mime']; |
|
802 | + } elseif (isset($context['validImageTypes'][$size[2]])) { |
|
803 | + $thumb_mime = 'image/' . $context['validImageTypes'][$size[2]]; |
|
804 | + } |
|
761 | 805 | // Lord only knows how this happened... |
762 | - else |
|
763 | - $thumb_mime = ''; |
|
806 | + else { |
|
807 | + $thumb_mime = ''; |
|
808 | + } |
|
764 | 809 | |
765 | 810 | $thumb_filename = $attachmentOptions['name'] . '_thumb'; |
766 | 811 | $thumb_size = filesize($attachmentOptions['destination'] . '_thumb'); |
@@ -840,15 +885,17 @@ discard block |
||
840 | 885 | global $smcFunc; |
841 | 886 | |
842 | 887 | // Oh, come on! |
843 | - if (empty($attachIDs) || empty($msgID)) |
|
844 | - return false; |
|
888 | + if (empty($attachIDs) || empty($msgID)) { |
|
889 | + return false; |
|
890 | + } |
|
845 | 891 | |
846 | 892 | // "I see what is right and approve, but I do what is wrong." |
847 | 893 | call_integration_hook('integrate_assign_attachments', array(&$attachIDs, &$msgID)); |
848 | 894 | |
849 | 895 | // One last check |
850 | - if (empty($attachIDs)) |
|
851 | - return false; |
|
896 | + if (empty($attachIDs)) { |
|
897 | + return false; |
|
898 | + } |
|
852 | 899 | |
853 | 900 | // Perform. |
854 | 901 | $smcFunc['db_query']('', ' |
@@ -880,8 +927,9 @@ discard block |
||
880 | 927 | $externalParse = false; |
881 | 928 | |
882 | 929 | // Meh... |
883 | - if (empty($attachID)) |
|
884 | - return 'attachments_no_data_loaded'; |
|
930 | + if (empty($attachID)) { |
|
931 | + return 'attachments_no_data_loaded'; |
|
932 | + } |
|
885 | 933 | |
886 | 934 | // Make it easy. |
887 | 935 | $msgID = !empty($_REQUEST['msg']) ? (int) $_REQUEST['msg'] : 0; |
@@ -890,20 +938,23 @@ discard block |
||
890 | 938 | $externalParse = call_integration_hook('integrate_pre_parseAttachBBC', array($attachID, $msgID)); |
891 | 939 | |
892 | 940 | // "I am innocent of the blood of this just person: see ye to it." |
893 | - if (!empty($externalParse) && (is_string($externalParse) || is_array($externalParse))) |
|
894 | - return $externalParse; |
|
941 | + if (!empty($externalParse) && (is_string($externalParse) || is_array($externalParse))) { |
|
942 | + return $externalParse; |
|
943 | + } |
|
895 | 944 | |
896 | 945 | //Are attachments enable? |
897 | - if (empty($modSettings['attachmentEnable'])) |
|
898 | - return 'attachments_not_enable'; |
|
946 | + if (empty($modSettings['attachmentEnable'])) { |
|
947 | + return 'attachments_not_enable'; |
|
948 | + } |
|
899 | 949 | |
900 | 950 | // Previewing much? no msg ID has been set yet. |
901 | 951 | if (!empty($context['preview_message'])) |
902 | 952 | { |
903 | 953 | $allAttachments = getAttachsByMsg(0); |
904 | 954 | |
905 | - if (empty($allAttachments[0][$attachID])) |
|
906 | - return 'attachments_no_data_loaded'; |
|
955 | + if (empty($allAttachments[0][$attachID])) { |
|
956 | + return 'attachments_no_data_loaded'; |
|
957 | + } |
|
907 | 958 | |
908 | 959 | $attachContext = $allAttachments[0][$attachID]; |
909 | 960 | $attachLoaded = loadAttachmentContext(0, $allAttachments); |
@@ -916,57 +967,66 @@ discard block |
||
916 | 967 | $attachContext['link'] = '<a href="' . $scripturl . '?action=dlattach;attach=' . $attachID .';type=preview'. (empty($attachContext['is_image']) ? ';file' : '') .'">' . $smcFunc['htmlspecialchars']($attachContext['name']) . '</a>'; |
917 | 968 | |
918 | 969 | // Fix the thumbnail too, if the image has one. |
919 | - if (!empty($attachContext['thumbnail']) && !empty($attachContext['thumbnail']['has_thumb'])) |
|
920 | - $attachContext['thumbnail']['href'] = $scripturl . '?action=dlattach;attach=' . $attachContext['thumbnail']['id'] . ';image;type=preview'; |
|
970 | + if (!empty($attachContext['thumbnail']) && !empty($attachContext['thumbnail']['has_thumb'])) { |
|
971 | + $attachContext['thumbnail']['href'] = $scripturl . '?action=dlattach;attach=' . $attachContext['thumbnail']['id'] . ';image;type=preview'; |
|
972 | + } |
|
921 | 973 | |
922 | 974 | return $attachContext; |
923 | 975 | } |
924 | 976 | |
925 | 977 | // There is always the chance someone else has already done our dirty work... |
926 | 978 | // If so, all pertinent checks were already done. Hopefully... |
927 | - if (!empty($context['current_attachments']) && !empty($context['current_attachments'][$attachID])) |
|
928 | - return $context['current_attachments'][$attachID]; |
|
979 | + if (!empty($context['current_attachments']) && !empty($context['current_attachments'][$attachID])) { |
|
980 | + return $context['current_attachments'][$attachID]; |
|
981 | + } |
|
929 | 982 | |
930 | 983 | // If we are lucky enough to be in $board's scope then check it! |
931 | - if (!empty($board) && !allowedTo('view_attachments', $board)) |
|
932 | - return 'attachments_not_allowed_to_see'; |
|
984 | + if (!empty($board) && !allowedTo('view_attachments', $board)) { |
|
985 | + return 'attachments_not_allowed_to_see'; |
|
986 | + } |
|
933 | 987 | |
934 | 988 | // Get the message info associated with this particular attach ID. |
935 | 989 | $attachInfo = getAttachMsgInfo($attachID); |
936 | 990 | |
937 | 991 | // There is always the chance this attachment no longer exists or isn't associated to a message anymore... |
938 | - if (empty($attachInfo) || empty($attachInfo['msg'])) |
|
939 | - return 'attachments_no_msg_associated'; |
|
992 | + if (empty($attachInfo) || empty($attachInfo['msg'])) { |
|
993 | + return 'attachments_no_msg_associated'; |
|
994 | + } |
|
940 | 995 | |
941 | 996 | // Hold it! got the info now check if you can see this attachment. |
942 | - if (!allowedTo('view_attachments', $attachInfo['board'])) |
|
943 | - return 'attachments_not_allowed_to_see'; |
|
997 | + if (!allowedTo('view_attachments', $attachInfo['board'])) { |
|
998 | + return 'attachments_not_allowed_to_see'; |
|
999 | + } |
|
944 | 1000 | |
945 | 1001 | $allAttachments = getAttachsByMsg($attachInfo['msg']); |
946 | 1002 | $attachContext = $allAttachments[$attachInfo['msg']][$attachID]; |
947 | 1003 | |
948 | 1004 | // No point in keep going further. |
949 | - if (!allowedTo('view_attachments', $attachContext['board'])) |
|
950 | - return 'attachments_not_allowed_to_see'; |
|
1005 | + if (!allowedTo('view_attachments', $attachContext['board'])) { |
|
1006 | + return 'attachments_not_allowed_to_see'; |
|
1007 | + } |
|
951 | 1008 | |
952 | 1009 | // Load this particular attach's context. |
953 | - if (!empty($attachContext)) |
|
954 | - $attachLoaded = loadAttachmentContext($attachContext['id_msg'], $allAttachments); |
|
1010 | + if (!empty($attachContext)) { |
|
1011 | + $attachLoaded = loadAttachmentContext($attachContext['id_msg'], $allAttachments); |
|
1012 | + } |
|
955 | 1013 | |
956 | 1014 | // One last check, you know, gotta be paranoid... |
957 | - else |
|
958 | - return 'attachments_no_data_loaded'; |
|
1015 | + else { |
|
1016 | + return 'attachments_no_data_loaded'; |
|
1017 | + } |
|
959 | 1018 | |
960 | 1019 | // This is the last "if" I promise! |
961 | - if (empty($attachLoaded)) |
|
962 | - return 'attachments_no_data_loaded'; |
|
963 | - |
|
964 | - else |
|
965 | - $attachContext = $attachLoaded[$attachID]; |
|
1020 | + if (empty($attachLoaded)) { |
|
1021 | + return 'attachments_no_data_loaded'; |
|
1022 | + } else { |
|
1023 | + $attachContext = $attachLoaded[$attachID]; |
|
1024 | + } |
|
966 | 1025 | |
967 | 1026 | // You may or may not want to show this under the post. |
968 | - if (!empty($modSettings['dont_show_attach_under_post']) && !isset($context['show_attach_under_post'][$attachID])) |
|
969 | - $context['show_attach_under_post'][$attachID] = $attachID; |
|
1027 | + if (!empty($modSettings['dont_show_attach_under_post']) && !isset($context['show_attach_under_post'][$attachID])) { |
|
1028 | + $context['show_attach_under_post'][$attachID] = $attachID; |
|
1029 | + } |
|
970 | 1030 | |
971 | 1031 | // Last minute changes? |
972 | 1032 | call_integration_hook('integrate_post_parseAttachBBC', array(&$attachContext)); |
@@ -986,8 +1046,9 @@ discard block |
||
986 | 1046 | { |
987 | 1047 | global $smcFunc, $modSettings; |
988 | 1048 | |
989 | - if (empty($attachIDs)) |
|
990 | - return array(); |
|
1049 | + if (empty($attachIDs)) { |
|
1050 | + return array(); |
|
1051 | + } |
|
991 | 1052 | |
992 | 1053 | $return = array(); |
993 | 1054 | |
@@ -1003,11 +1064,12 @@ discard block |
||
1003 | 1064 | ) |
1004 | 1065 | ); |
1005 | 1066 | |
1006 | - if ($smcFunc['db_num_rows']($request) != 1) |
|
1007 | - return array(); |
|
1067 | + if ($smcFunc['db_num_rows']($request) != 1) { |
|
1068 | + return array(); |
|
1069 | + } |
|
1008 | 1070 | |
1009 | - while ($row = $smcFunc['db_fetch_assoc']($request)) |
|
1010 | - $return[$row['id_attach']] = array( |
|
1071 | + while ($row = $smcFunc['db_fetch_assoc']($request)) { |
|
1072 | + $return[$row['id_attach']] = array( |
|
1011 | 1073 | 'name' => $smcFunc['htmlspecialchars']($row['filename']), |
1012 | 1074 | 'size' => $row['size'], |
1013 | 1075 | 'attachID' => $row['id_attach'], |
@@ -1016,6 +1078,7 @@ discard block |
||
1016 | 1078 | 'mime_type' => $row['mime_type'], |
1017 | 1079 | 'thumb' => $row['id_thumb'], |
1018 | 1080 | ); |
1081 | + } |
|
1019 | 1082 | $smcFunc['db_free_result']($request); |
1020 | 1083 | |
1021 | 1084 | return $return; |
@@ -1032,8 +1095,9 @@ discard block |
||
1032 | 1095 | { |
1033 | 1096 | global $smcFunc; |
1034 | 1097 | |
1035 | - if (empty($attachID)) |
|
1036 | - return array(); |
|
1098 | + if (empty($attachID)) { |
|
1099 | + return array(); |
|
1100 | + } |
|
1037 | 1101 | |
1038 | 1102 | $request = $smcFunc['db_query']('', ' |
1039 | 1103 | SELECT a.id_msg AS msg, m.id_topic AS topic, m.id_board AS board |
@@ -1046,8 +1110,9 @@ discard block |
||
1046 | 1110 | ) |
1047 | 1111 | ); |
1048 | 1112 | |
1049 | - if ($smcFunc['db_num_rows']($request) != 1) |
|
1050 | - return array(); |
|
1113 | + if ($smcFunc['db_num_rows']($request) != 1) { |
|
1114 | + return array(); |
|
1115 | + } |
|
1051 | 1116 | |
1052 | 1117 | $row = $smcFunc['db_fetch_assoc']($request); |
1053 | 1118 | $smcFunc['db_free_result']($request); |
@@ -1088,8 +1153,9 @@ discard block |
||
1088 | 1153 | $temp = array(); |
1089 | 1154 | while ($row = $smcFunc['db_fetch_assoc']($request)) |
1090 | 1155 | { |
1091 | - if (!$row['approved'] && $modSettings['postmod_active'] && !allowedTo('approve_posts') && (!isset($all_posters[$row['id_msg']]) || $all_posters[$row['id_msg']] != $user_info['id'])) |
|
1092 | - continue; |
|
1156 | + if (!$row['approved'] && $modSettings['postmod_active'] && !allowedTo('approve_posts') && (!isset($all_posters[$row['id_msg']]) || $all_posters[$row['id_msg']] != $user_info['id'])) { |
|
1157 | + continue; |
|
1158 | + } |
|
1093 | 1159 | |
1094 | 1160 | $temp[$row['id_attach']] = $row; |
1095 | 1161 | } |
@@ -1118,8 +1184,9 @@ discard block |
||
1118 | 1184 | { |
1119 | 1185 | global $modSettings, $txt, $scripturl, $sourcedir, $smcFunc; |
1120 | 1186 | |
1121 | - if (empty($attachments) || empty($attachments[$id_msg])) |
|
1122 | - return array(); |
|
1187 | + if (empty($attachments) || empty($attachments[$id_msg])) { |
|
1188 | + return array(); |
|
1189 | + } |
|
1123 | 1190 | |
1124 | 1191 | // Set up the attachment info - based on code by Meriadoc. |
1125 | 1192 | $attachmentData = array(); |
@@ -1143,11 +1210,13 @@ discard block |
||
1143 | 1210 | ); |
1144 | 1211 | |
1145 | 1212 | // If something is unapproved we'll note it so we can sort them. |
1146 | - if (!$attachment['approved']) |
|
1147 | - $have_unapproved = true; |
|
1213 | + if (!$attachment['approved']) { |
|
1214 | + $have_unapproved = true; |
|
1215 | + } |
|
1148 | 1216 | |
1149 | - if (!$attachmentData[$i]['is_image']) |
|
1150 | - continue; |
|
1217 | + if (!$attachmentData[$i]['is_image']) { |
|
1218 | + continue; |
|
1219 | + } |
|
1151 | 1220 | |
1152 | 1221 | $attachmentData[$i]['real_width'] = $attachment['width']; |
1153 | 1222 | $attachmentData[$i]['width'] = $attachment['width']; |
@@ -1168,12 +1237,12 @@ discard block |
||
1168 | 1237 | // So what folder are we putting this image in? |
1169 | 1238 | if (!empty($modSettings['currentAttachmentUploadDir'])) |
1170 | 1239 | { |
1171 | - if (!is_array($modSettings['attachmentUploadDir'])) |
|
1172 | - $modSettings['attachmentUploadDir'] = smf_json_decode($modSettings['attachmentUploadDir'], true); |
|
1240 | + if (!is_array($modSettings['attachmentUploadDir'])) { |
|
1241 | + $modSettings['attachmentUploadDir'] = smf_json_decode($modSettings['attachmentUploadDir'], true); |
|
1242 | + } |
|
1173 | 1243 | $path = $modSettings['attachmentUploadDir'][$modSettings['currentAttachmentUploadDir']]; |
1174 | 1244 | $id_folder_thumb = $modSettings['currentAttachmentUploadDir']; |
1175 | - } |
|
1176 | - else |
|
1245 | + } else |
|
1177 | 1246 | { |
1178 | 1247 | $path = $modSettings['attachmentUploadDir']; |
1179 | 1248 | $id_folder_thumb = 1; |
@@ -1188,10 +1257,11 @@ discard block |
||
1188 | 1257 | $thumb_ext = isset($context['validImageTypes'][$size[2]]) ? $context['validImageTypes'][$size[2]] : ''; |
1189 | 1258 | |
1190 | 1259 | // Figure out the mime type. |
1191 | - if (!empty($size['mime'])) |
|
1192 | - $thumb_mime = $size['mime']; |
|
1193 | - else |
|
1194 | - $thumb_mime = 'image/' . $thumb_ext; |
|
1260 | + if (!empty($size['mime'])) { |
|
1261 | + $thumb_mime = $size['mime']; |
|
1262 | + } else { |
|
1263 | + $thumb_mime = 'image/' . $thumb_ext; |
|
1264 | + } |
|
1195 | 1265 | |
1196 | 1266 | $thumb_filename = $attachment['filename'] . '_thumb'; |
1197 | 1267 | $thumb_hash = getAttachmentFilename($thumb_filename, false, null, true); |
@@ -1238,11 +1308,12 @@ discard block |
||
1238 | 1308 | } |
1239 | 1309 | } |
1240 | 1310 | |
1241 | - if (!empty($attachment['id_thumb'])) |
|
1242 | - $attachmentData[$i]['thumbnail'] = array( |
|
1311 | + if (!empty($attachment['id_thumb'])) { |
|
1312 | + $attachmentData[$i]['thumbnail'] = array( |
|
1243 | 1313 | 'id' => $attachment['id_thumb'], |
1244 | 1314 | 'href' => $scripturl . '?action=dlattach;topic=' . $attachment['topic'] . '.0;attach=' . $attachment['id_thumb'] . ';image', |
1245 | 1315 | ); |
1316 | + } |
|
1246 | 1317 | $attachmentData[$i]['thumbnail']['has_thumb'] = !empty($attachment['id_thumb']); |
1247 | 1318 | |
1248 | 1319 | // If thumbnails are disabled, check the maximum size of the image. |
@@ -1252,30 +1323,31 @@ discard block |
||
1252 | 1323 | { |
1253 | 1324 | $attachmentData[$i]['width'] = $modSettings['max_image_width']; |
1254 | 1325 | $attachmentData[$i]['height'] = floor($attachment['height'] * $modSettings['max_image_width'] / $attachment['width']); |
1255 | - } |
|
1256 | - elseif (!empty($modSettings['max_image_width'])) |
|
1326 | + } elseif (!empty($modSettings['max_image_width'])) |
|
1257 | 1327 | { |
1258 | 1328 | $attachmentData[$i]['width'] = floor($attachment['width'] * $modSettings['max_image_height'] / $attachment['height']); |
1259 | 1329 | $attachmentData[$i]['height'] = $modSettings['max_image_height']; |
1260 | 1330 | } |
1261 | - } |
|
1262 | - elseif ($attachmentData[$i]['thumbnail']['has_thumb']) |
|
1331 | + } elseif ($attachmentData[$i]['thumbnail']['has_thumb']) |
|
1263 | 1332 | { |
1264 | 1333 | // If the image is too large to show inline, make it a popup. |
1265 | - if (((!empty($modSettings['max_image_width']) && $attachmentData[$i]['real_width'] > $modSettings['max_image_width']) || (!empty($modSettings['max_image_height']) && $attachmentData[$i]['real_height'] > $modSettings['max_image_height']))) |
|
1266 | - $attachmentData[$i]['thumbnail']['javascript'] = 'return reqWin(\'' . $attachmentData[$i]['href'] . ';image\', ' . ($attachment['width'] + 20) . ', ' . ($attachment['height'] + 20) . ', true);'; |
|
1267 | - else |
|
1268 | - $attachmentData[$i]['thumbnail']['javascript'] = 'return expandThumb(' . $attachment['id_attach'] . ');'; |
|
1334 | + if (((!empty($modSettings['max_image_width']) && $attachmentData[$i]['real_width'] > $modSettings['max_image_width']) || (!empty($modSettings['max_image_height']) && $attachmentData[$i]['real_height'] > $modSettings['max_image_height']))) { |
|
1335 | + $attachmentData[$i]['thumbnail']['javascript'] = 'return reqWin(\'' . $attachmentData[$i]['href'] . ';image\', ' . ($attachment['width'] + 20) . ', ' . ($attachment['height'] + 20) . ', true);'; |
|
1336 | + } else { |
|
1337 | + $attachmentData[$i]['thumbnail']['javascript'] = 'return expandThumb(' . $attachment['id_attach'] . ');'; |
|
1338 | + } |
|
1269 | 1339 | } |
1270 | 1340 | |
1271 | - if (!$attachmentData[$i]['thumbnail']['has_thumb']) |
|
1272 | - $attachmentData[$i]['downloads']++; |
|
1341 | + if (!$attachmentData[$i]['thumbnail']['has_thumb']) { |
|
1342 | + $attachmentData[$i]['downloads']++; |
|
1343 | + } |
|
1273 | 1344 | } |
1274 | 1345 | } |
1275 | 1346 | |
1276 | 1347 | // Do we need to instigate a sort? |
1277 | - if ($have_unapproved) |
|
1278 | - usort($attachmentData, 'approved_attach_sort'); |
|
1348 | + if ($have_unapproved) { |
|
1349 | + usort($attachmentData, 'approved_attach_sort'); |
|
1350 | + } |
|
1279 | 1351 | |
1280 | 1352 | return $attachmentData; |
1281 | 1353 | } |