Test Failed
Pull Request — master (#589)
by Richard
08:35
created
htdocs/xoops_lib/modules/protector/class/protector.php 1 patch
Spacing   +57 added lines, -57 removed lines patch added patch discarded remove patch
@@ -126,7 +126,7 @@  discard block
 block discarded – undo
126 126
                     $this->_safe_contami   = false;
127 127
                     $this->last_error_type = 'CONTAMI';
128 128
                 }
129
-                $this->_initial_recursive($subval, $key . '_' . base64_encode($subkey));
129
+                $this->_initial_recursive($subval, $key.'_'.base64_encode($subkey));
130 130
             }
131 131
         } else {
132 132
             // check nullbyte attack
@@ -163,13 +163,13 @@  discard block
 block discarded – undo
163 163
      */
164 164
     public function updateConfFromDb()
165 165
     {
166
-        $constpref = '_MI_' . strtoupper($this->mydirname);
166
+        $constpref = '_MI_'.strtoupper($this->mydirname);
167 167
 
168 168
         if (empty($this->_conn)) {
169 169
             return false;
170 170
         }
171 171
 
172
-        $result = @mysqli_query($this->_conn, 'SELECT conf_name,conf_value FROM ' . XOOPS_DB_PREFIX . "_config WHERE conf_title like '" . $constpref . "%'");
172
+        $result = @mysqli_query($this->_conn, 'SELECT conf_name,conf_value FROM '.XOOPS_DB_PREFIX."_config WHERE conf_title like '".$constpref."%'");
173 173
         if (!$result || mysqli_num_rows($result) < 5) {
174 174
             return false;
175 175
         }
@@ -214,7 +214,7 @@  discard block
 block discarded – undo
214 214
         $this->purgeNoExit();
215 215
 
216 216
         if ($redirect_to_top) {
217
-            header('Location: ' . XOOPS_URL . '/');
217
+            header('Location: '.XOOPS_URL.'/');
218 218
             exit;
219 219
         } else {
220 220
             $ret = $this->call_filter('prepurge_exit');
@@ -240,7 +240,7 @@  discard block
 block discarded – undo
240 240
     public function purgeCookies()
241 241
     {
242 242
         if (!headers_sent()) {
243
-            $domain =  defined(XOOPS_COOKIE_DOMAIN) ? XOOPS_COOKIE_DOMAIN : '';
243
+            $domain = defined(XOOPS_COOKIE_DOMAIN) ? XOOPS_COOKIE_DOMAIN : '';
244 244
             $past = time() - 3600;
245 245
             foreach ($_COOKIE as $key => $value) {
246 246
                 setcookie($key, '', $past, '', $domain);
@@ -303,7 +303,7 @@  discard block
 block discarded – undo
303 303
         $agent = @$_SERVER['HTTP_USER_AGENT'];
304 304
 
305 305
         if ($unique_check) {
306
-            $result = mysqli_query($this->_conn, 'SELECT ip,type FROM ' . XOOPS_DB_PREFIX . '_' . $this->mydirname . '_log ORDER BY timestamp DESC LIMIT 1');
306
+            $result = mysqli_query($this->_conn, 'SELECT ip,type FROM '.XOOPS_DB_PREFIX.'_'.$this->mydirname.'_log ORDER BY timestamp DESC LIMIT 1');
307 307
             list($last_ip, $last_type) = mysqli_fetch_row($result);
308 308
             if ($last_ip == $ip && $last_type == $type) {
309 309
                 $this->_logged = true;
@@ -314,12 +314,12 @@  discard block
 block discarded – undo
314 314
 
315 315
         mysqli_query(
316 316
             $this->_conn,
317
-            'INSERT INTO ' . XOOPS_DB_PREFIX . '_' . $this->mydirname . "_log SET ip='"
318
-            . mysqli_real_escape_string($this->_conn, $ip) . "',agent='"
319
-            . mysqli_real_escape_string($this->_conn, $agent) . "',type='"
320
-            . mysqli_real_escape_string($this->_conn, $type) . "',description='"
321
-            . mysqli_real_escape_string($this->_conn, $this->message) . "',uid='"
322
-            . (int)$uid . "',timestamp=NOW()"
317
+            'INSERT INTO '.XOOPS_DB_PREFIX.'_'.$this->mydirname."_log SET ip='"
318
+            . mysqli_real_escape_string($this->_conn, $ip)."',agent='"
319
+            . mysqli_real_escape_string($this->_conn, $agent)."',type='"
320
+            . mysqli_real_escape_string($this->_conn, $type)."',description='"
321
+            . mysqli_real_escape_string($this->_conn, $this->message)."',uid='"
322
+            . (int)$uid."',timestamp=NOW()"
323 323
         );
324 324
         $this->_logged = true;
325 325
 
@@ -338,7 +338,7 @@  discard block
 block discarded – undo
338 338
         $fp = @fopen($this->get_filepath4bwlimit(), 'w');
339 339
         if ($fp) {
340 340
             @flock($fp, LOCK_EX);
341
-            fwrite($fp, $expire . "\n");
341
+            fwrite($fp, $expire."\n");
342 342
             @flock($fp, LOCK_UN);
343 343
             fclose($fp);
344 344
 
@@ -364,7 +364,7 @@  discard block
 block discarded – undo
364 364
      */
365 365
     public static function get_filepath4bwlimit()
366 366
     {
367
-        return XOOPS_VAR_PATH . '/protector/bwlimit' . substr(md5(XOOPS_ROOT_PATH . XOOPS_DB_USER . XOOPS_DB_PREFIX), 0, 6);
367
+        return XOOPS_VAR_PATH.'/protector/bwlimit'.substr(md5(XOOPS_ROOT_PATH.XOOPS_DB_USER.XOOPS_DB_PREFIX), 0, 6);
368 368
     }
369 369
 
370 370
     /**
@@ -379,7 +379,7 @@  discard block
 block discarded – undo
379 379
         $fp = @fopen($this->get_filepath4badips(), 'w');
380 380
         if ($fp) {
381 381
             @flock($fp, LOCK_EX);
382
-            fwrite($fp, serialize($bad_ips) . "\n");
382
+            fwrite($fp, serialize($bad_ips)."\n");
383 383
             @flock($fp, LOCK_UN);
384 384
             fclose($fp);
385 385
 
@@ -445,7 +445,7 @@  discard block
 block discarded – undo
445 445
      */
446 446
     public static function get_filepath4badips()
447 447
     {
448
-        return XOOPS_VAR_PATH . '/protector/badips' . substr(md5(XOOPS_ROOT_PATH . XOOPS_DB_USER . XOOPS_DB_PREFIX), 0, 6);
448
+        return XOOPS_VAR_PATH.'/protector/badips'.substr(md5(XOOPS_ROOT_PATH.XOOPS_DB_USER.XOOPS_DB_PREFIX), 0, 6);
449 449
     }
450 450
 
451 451
     /**
@@ -473,7 +473,7 @@  discard block
 block discarded – undo
473 473
      */
474 474
     public static function get_filepath4group1ips()
475 475
     {
476
-        return XOOPS_VAR_PATH . '/protector/group1ips' . substr(md5(XOOPS_ROOT_PATH . XOOPS_DB_USER . XOOPS_DB_PREFIX), 0, 6);
476
+        return XOOPS_VAR_PATH.'/protector/group1ips'.substr(md5(XOOPS_ROOT_PATH.XOOPS_DB_USER.XOOPS_DB_PREFIX), 0, 6);
477 477
     }
478 478
 
479 479
     /**
@@ -481,7 +481,7 @@  discard block
 block discarded – undo
481 481
      */
482 482
     public function get_filepath4confighcache()
483 483
     {
484
-        return XOOPS_VAR_PATH . '/protector/configcache' . substr(md5(XOOPS_ROOT_PATH . XOOPS_DB_USER . XOOPS_DB_PREFIX), 0, 6);
484
+        return XOOPS_VAR_PATH.'/protector/configcache'.substr(md5(XOOPS_ROOT_PATH.XOOPS_DB_USER.XOOPS_DB_PREFIX), 0, 6);
485 485
     }
486 486
 
487 487
     /**
@@ -560,8 +560,8 @@  discard block
 block discarded – undo
560 560
             return false;
561 561
         }
562 562
 
563
-        $target_htaccess = XOOPS_ROOT_PATH . '/.htaccess';
564
-        $backup_htaccess = XOOPS_ROOT_PATH . '/uploads/.htaccess.bak';
563
+        $target_htaccess = XOOPS_ROOT_PATH.'/.htaccess';
564
+        $backup_htaccess = XOOPS_ROOT_PATH.'/uploads/.htaccess.bak';
565 565
 
566 566
         $ht_body = file_get_contents($target_htaccess);
567 567
 
@@ -586,9 +586,9 @@  discard block
 block discarded – undo
586 586
             if (substr($regs[2], -strlen($ip)) == $ip) {
587 587
                 return true;
588 588
             }
589
-            $new_ht_body = $regs[1] . "#PROTECTOR#\n" . $regs[2] . " $ip\n#PROTECTOR#\n" . $regs[3];
589
+            $new_ht_body = $regs[1]."#PROTECTOR#\n".$regs[2]." $ip\n#PROTECTOR#\n".$regs[3];
590 590
         } else {
591
-            $new_ht_body = "#PROTECTOR#\nDENY FROM $ip\n#PROTECTOR#\n" . $ht_body;
591
+            $new_ht_body = "#PROTECTOR#\nDENY FROM $ip\n#PROTECTOR#\n".$ht_body;
592 592
         }
593 593
 
594 594
         // error_log( "$new_ht_body\n" , 3 , "/tmp/error_log" ) ;
@@ -653,7 +653,7 @@  discard block
 block discarded – undo
653 653
 
654 654
         if (!empty($this->_dblayertrap_doubtfuls) || $force_override) {
655 655
             @define('XOOPS_DB_ALTERNATIVE', 'ProtectorMysqlDatabase');
656
-            require_once dirname(__DIR__) . '/class/ProtectorMysqlDatabase.class.php';
656
+            require_once dirname(__DIR__).'/class/ProtectorMysqlDatabase.class.php';
657 657
         }
658 658
     }
659 659
 
@@ -837,7 +837,7 @@  discard block
 block discarded – undo
837 837
             if (!is_array($current)) {
838 838
                 return false;
839 839
             }
840
-            $current =& $current[$index];
840
+            $current = & $current[$index];
841 841
         }
842 842
 
843 843
         return $current;
@@ -857,16 +857,16 @@  discard block
 block discarded – undo
857 857
 
858 858
         switch ($base_array) {
859 859
             case 'G' :
860
-                $main_ref   =& $this->get_ref_from_base64index($_GET, $indexes);
861
-                $legacy_ref =& $this->get_ref_from_base64index($HTTP_GET_VARS, $indexes);
860
+                $main_ref   = & $this->get_ref_from_base64index($_GET, $indexes);
861
+                $legacy_ref = & $this->get_ref_from_base64index($HTTP_GET_VARS, $indexes);
862 862
                 break;
863 863
             case 'P' :
864
-                $main_ref   =& $this->get_ref_from_base64index($_POST, $indexes);
865
-                $legacy_ref =& $this->get_ref_from_base64index($HTTP_POST_VARS, $indexes);
864
+                $main_ref   = & $this->get_ref_from_base64index($_POST, $indexes);
865
+                $legacy_ref = & $this->get_ref_from_base64index($HTTP_POST_VARS, $indexes);
866 866
                 break;
867 867
             case 'C' :
868
-                $main_ref   =& $this->get_ref_from_base64index($_COOKIE, $indexes);
869
-                $legacy_ref =& $this->get_ref_from_base64index($HTTP_COOKIE_VARS, $indexes);
868
+                $main_ref   = & $this->get_ref_from_base64index($_COOKIE, $indexes);
869
+                $legacy_ref = & $this->get_ref_from_base64index($HTTP_COOKIE_VARS, $indexes);
870 870
                 break;
871 871
             default :
872 872
                 exit;
@@ -874,7 +874,7 @@  discard block
 block discarded – undo
874 874
         if (!isset($main_ref)) {
875 875
             exit;
876 876
         }
877
-        $request_ref =& $this->get_ref_from_base64index($_REQUEST, $indexes);
877
+        $request_ref = & $this->get_ref_from_base64index($_REQUEST, $indexes);
878 878
         if ($request_ref !== false && $main_ref == $request_ref) {
879 879
             $request_ref = $val;
880 880
         }
@@ -945,7 +945,7 @@  discard block
 block discarded – undo
945 945
                     $image_attributes = @getimagesize($_file['tmp_name']);
946 946
                     if ($image_attributes === false && is_uploaded_file($_file['tmp_name'])) {
947 947
                         // open_basedir restriction
948
-                        $temp_file = XOOPS_ROOT_PATH . '/uploads/protector_upload_temporary' . md5(time());
948
+                        $temp_file = XOOPS_ROOT_PATH.'/uploads/protector_upload_temporary'.md5(time());
949 949
                         move_uploaded_file($_file['tmp_name'], $temp_file);
950 950
                         $image_attributes = @getimagesize($temp_file);
951 951
                         @unlink($temp_file);
@@ -1002,7 +1002,7 @@  discard block
 block discarded – undo
1002 1002
                 if ($str === false) {
1003 1003
                     $this->message .= "Isolated comment-in found. ($val)\n";
1004 1004
                     if ($sanitize) {
1005
-                        $this->replace_doubtful($key, $val . '*/');
1005
+                        $this->replace_doubtful($key, $val.'*/');
1006 1006
                     }
1007 1007
                     $this->_safe_isocom    = false;
1008 1008
                     $this->last_error_type = 'ISOCOM';
@@ -1089,16 +1089,16 @@  discard block
 block discarded – undo
1089 1089
                 break;
1090 1090
             case 'san' :
1091 1091
                 $_POST = array();
1092
-                $this->message .= 'POST deleted for IP:' . $_SERVER['REMOTE_ADDR'];
1092
+                $this->message .= 'POST deleted for IP:'.$_SERVER['REMOTE_ADDR'];
1093 1093
                 break;
1094 1094
             case 'biptime0' :
1095 1095
                 $_POST = array();
1096
-                $this->message .= 'BAN and POST deleted for IP:' . $_SERVER['REMOTE_ADDR'];
1096
+                $this->message .= 'BAN and POST deleted for IP:'.$_SERVER['REMOTE_ADDR'];
1097 1097
                 $this->_should_be_banned_time0 = true;
1098 1098
                 break;
1099 1099
             case 'bip' :
1100 1100
                 $_POST = array();
1101
-                $this->message .= 'Ban and POST deleted for IP:' . $_SERVER['REMOTE_ADDR'];
1101
+                $this->message .= 'Ban and POST deleted for IP:'.$_SERVER['REMOTE_ADDR'];
1102 1102
                 $this->_should_be_banned = true;
1103 1103
                 break;
1104 1104
         }
@@ -1115,15 +1115,15 @@  discard block
 block discarded – undo
1115 1115
         }
1116 1116
 
1117 1117
         $query = '';
1118
-        $query .= (empty($ip)) ? '' : '&ip=' . $ip;
1119
-        $query .= (empty($email)) ? '' : '&email=' . $email;
1120
-        $query .= (empty($username)) ? '' : '&username=' . $username;
1118
+        $query .= (empty($ip)) ? '' : '&ip='.$ip;
1119
+        $query .= (empty($email)) ? '' : '&email='.$email;
1120
+        $query .= (empty($username)) ? '' : '&username='.$username;
1121 1121
 
1122 1122
         if (empty($query)) {
1123 1123
             return false;
1124 1124
         }
1125 1125
 
1126
-        $url = 'http://www.stopforumspam.com/api?f=json' . $query;
1126
+        $url = 'http://www.stopforumspam.com/api?f=json'.$query;
1127 1127
         $ch  = curl_init();
1128 1128
         curl_setopt($ch, CURLOPT_URL, $url);
1129 1129
         curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
@@ -1153,7 +1153,7 @@  discard block
 block discarded – undo
1153 1153
             return true;
1154 1154
         }
1155 1155
 
1156
-        $ip      = \Xmf\IPAddress::fromRequest();
1156
+        $ip = \Xmf\IPAddress::fromRequest();
1157 1157
         if (false === $ip->asReadable()) {
1158 1158
             return true;
1159 1159
         }
@@ -1164,7 +1164,7 @@  discard block
 block discarded – undo
1164 1164
 
1165 1165
         // gargage collection
1166 1166
         $result = $xoopsDB->queryF(
1167
-            'DELETE FROM ' . $xoopsDB->prefix($this->mydirname . '_access')
1167
+            'DELETE FROM '.$xoopsDB->prefix($this->mydirname.'_access')
1168 1168
             . ' WHERE expire < UNIX_TIMESTAMP()'
1169 1169
         );
1170 1170
 
@@ -1176,13 +1176,13 @@  discard block
 block discarded – undo
1176 1176
         }
1177 1177
 
1178 1178
         // sql for recording access log (INSERT should be placed after SELECT)
1179
-        $sql4insertlog = 'INSERT INTO ' . $xoopsDB->prefix($this->mydirname . '_access')
1179
+        $sql4insertlog = 'INSERT INTO '.$xoopsDB->prefix($this->mydirname.'_access')
1180 1180
                          . " SET ip={$ip4sql}, request_uri={$uri4sql},"
1181
-                         . " expire=UNIX_TIMESTAMP()+'" . (int)$this->_conf['dos_expire'] . "'";
1181
+                         . " expire=UNIX_TIMESTAMP()+'".(int)$this->_conf['dos_expire']."'";
1182 1182
 
1183 1183
         // bandwidth limitation
1184 1184
         if (@$this->_conf['bwlimit_count'] >= 10) {
1185
-            $result = $xoopsDB->query('SELECT COUNT(*) FROM ' . $xoopsDB->prefix($this->mydirname . '_access'));
1185
+            $result = $xoopsDB->query('SELECT COUNT(*) FROM '.$xoopsDB->prefix($this->mydirname.'_access'));
1186 1186
             list($bw_count) = $xoopsDB->fetchRow($result);
1187 1187
             if ($bw_count > $this->_conf['bwlimit_count']) {
1188 1188
                 $this->write_file_bwlimit(time() + $this->_conf['dos_expire']);
@@ -1191,7 +1191,7 @@  discard block
 block discarded – undo
1191 1191
 
1192 1192
         // F5 attack check (High load & same URI)
1193 1193
         $result = $xoopsDB->query(
1194
-            'SELECT COUNT(*) FROM ' . $xoopsDB->prefix($this->mydirname . '_access')
1194
+            'SELECT COUNT(*) FROM '.$xoopsDB->prefix($this->mydirname.'_access')
1195 1195
             . " WHERE ip={$ip4sql} AND request_uri={$uri4sql}");
1196 1196
         list($f5_count) = $xoopsDB->fetchRow($result);
1197 1197
         if ($f5_count > $this->_conf['dos_f5count']) {
@@ -1250,7 +1250,7 @@  discard block
 block discarded – undo
1250 1250
 
1251 1251
         // Crawler check (High load & different URI)
1252 1252
         $result = $xoopsDB->query(
1253
-            'SELECT COUNT(*) FROM ' . $xoopsDB->prefix($this->mydirname . '_access') . " WHERE ip={$ip4sql}"
1253
+            'SELECT COUNT(*) FROM '.$xoopsDB->prefix($this->mydirname.'_access')." WHERE ip={$ip4sql}"
1254 1254
         );
1255 1255
         list($crawler_count) = $xoopsDB->fetchRow($result);
1256 1256
 
@@ -1308,7 +1308,7 @@  discard block
 block discarded – undo
1308 1308
     {
1309 1309
         global $xoopsDB;
1310 1310
 
1311
-        $ip      = \Xmf\IPAddress::fromRequest();
1311
+        $ip = \Xmf\IPAddress::fromRequest();
1312 1312
         if (false === $ip->asReadable()) {
1313 1313
             return true;
1314 1314
         }
@@ -1325,23 +1325,23 @@  discard block
 block discarded – undo
1325 1325
 
1326 1326
         // gargage collection
1327 1327
         $result = $xoopsDB->queryF(
1328
-            'DELETE FROM ' . $xoopsDB->prefix($this->mydirname . '_access') . ' WHERE expire < UNIX_TIMESTAMP()'
1328
+            'DELETE FROM '.$xoopsDB->prefix($this->mydirname.'_access').' WHERE expire < UNIX_TIMESTAMP()'
1329 1329
         );
1330 1330
 
1331 1331
         // sql for recording access log (INSERT should be placed after SELECT)
1332
-        $sql4insertlog = 'INSERT INTO ' . $xoopsDB->prefix($this->mydirname . '_access')
1332
+        $sql4insertlog = 'INSERT INTO '.$xoopsDB->prefix($this->mydirname.'_access')
1333 1333
                          . " SET ip={$ip4sql}, request_uri={$uri4sql}, malicious_actions={$mal4sql}, expire=UNIX_TIMESTAMP()+600";
1334 1334
 
1335 1335
         // count check
1336 1336
         $result = $xoopsDB->query(
1337
-            'SELECT COUNT(*) FROM ' . $xoopsDB->prefix($this->mydirname . '_access')
1337
+            'SELECT COUNT(*) FROM '.$xoopsDB->prefix($this->mydirname.'_access')
1338 1338
             . " WHERE ip={$ip4sql} AND malicious_actions like 'BRUTE FORCE:%'"
1339 1339
         );
1340 1340
         list($bf_count) = $xoopsDB->fetchRow($result);
1341 1341
         if ($bf_count > $this->_conf['bf_count']) {
1342 1342
             $this->register_bad_ips(time() + $this->_conf['banip_time0']);
1343 1343
             $this->last_error_type = 'BruteForce';
1344
-            $this->message .= "Trying to login as '" . addslashes($victim_uname) . "' found.\n";
1344
+            $this->message .= "Trying to login as '".addslashes($victim_uname)."' found.\n";
1345 1345
             $this->output_log('BRUTE FORCE', 0, true, 1);
1346 1346
             $ret = $this->call_filter('bruteforce_overrun');
1347 1347
             if ($ret == false) {
@@ -1379,7 +1379,7 @@  discard block
 block discarded – undo
1379 1379
             }
1380 1380
 
1381 1381
             // count BBCode likd [url=www....] up (without [url=http://...])
1382
-            $this->_spamcount_uri += count(preg_split('/\[url=(?!http|\\"http|\\\'http|' . $http_host . ')/i', $val)) - 1;
1382
+            $this->_spamcount_uri += count(preg_split('/\[url=(?!http|\\"http|\\\'http|'.$http_host.')/i', $val)) - 1;
1383 1383
         }
1384 1384
     }
1385 1385
 
@@ -1393,7 +1393,7 @@  discard block
 block discarded – undo
1393 1393
         $this->_spam_check_point_recursive($_POST);
1394 1394
 
1395 1395
         if ($this->_spamcount_uri >= $points4deny) {
1396
-            $this->message .= @$_SERVER['REQUEST_URI'] . " SPAM POINT: $this->_spamcount_uri\n";
1396
+            $this->message .= @$_SERVER['REQUEST_URI']." SPAM POINT: $this->_spamcount_uri\n";
1397 1397
             $this->output_log('URI SPAM', $uid, false, 128);
1398 1398
             $ret = $this->call_filter('spamcheck_overrun');
1399 1399
             if ($ret == false) {
@@ -1467,11 +1467,11 @@  discard block
 block discarded – undo
1467 1467
 
1468 1468
             // preview CSRF zx 2004/12/14
1469 1469
             // news submit.php
1470
-            if (substr(@$_SERVER['SCRIPT_NAME'], -23) === 'modules/news/submit.php' && isset($_POST['preview']) && strpos(@$_SERVER['HTTP_REFERER'], XOOPS_URL . '/modules/news/submit.php') !== 0) {
1470
+            if (substr(@$_SERVER['SCRIPT_NAME'], -23) === 'modules/news/submit.php' && isset($_POST['preview']) && strpos(@$_SERVER['HTTP_REFERER'], XOOPS_URL.'/modules/news/submit.php') !== 0) {
1471 1471
                 $HTTP_POST_VARS['nohtml'] = $_POST['nohtml'] = 1;
1472 1472
             }
1473 1473
             // news admin/index.php
1474
-            if (substr(@$_SERVER['SCRIPT_NAME'], -28) === 'modules/news/admin/index.php' && ($_POST['op'] === 'preview' || $_GET['op'] === 'preview') && strpos(@$_SERVER['HTTP_REFERER'], XOOPS_URL . '/modules/news/admin/index.php') !== 0) {
1474
+            if (substr(@$_SERVER['SCRIPT_NAME'], -28) === 'modules/news/admin/index.php' && ($_POST['op'] === 'preview' || $_GET['op'] === 'preview') && strpos(@$_SERVER['HTTP_REFERER'], XOOPS_URL.'/modules/news/admin/index.php') !== 0) {
1475 1475
                 $HTTP_POST_VARS['nohtml'] = $_POST['nohtml'] = 1;
1476 1476
             }
1477 1477
             // comment comment_post.php
@@ -1502,7 +1502,7 @@  discard block
 block discarded – undo
1502 1502
      */
1503 1503
     public function call_filter($type, $dying_message = '')
1504 1504
     {
1505
-        require_once __DIR__ . '/ProtectorFilter.php';
1505
+        require_once __DIR__.'/ProtectorFilter.php';
1506 1506
         $filter_handler = ProtectorFilterHandler::getInstance();
1507 1507
         $ret            = $filter_handler->execute($type);
1508 1508
         if ($ret == false && $dying_message) {
Please login to merge, or discard this patch.
htdocs/ajaxfineupload.php 1 patch
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -57,10 +57,10 @@  discard block
 block discarded – undo
57 57
  * SOFTWARE.
58 58
  */
59 59
 
60
-if(isset($_POST['Authorization'])) {
60
+if (isset($_POST['Authorization'])) {
61 61
     define('PROTECTOR_SKIP_DOS_CHECK', 1);
62 62
 }
63
-include __DIR__ . '/mainfile.php';
63
+include __DIR__.'/mainfile.php';
64 64
 $xoopsLogger->activated = false;
65 65
 
66 66
 /**
@@ -91,11 +91,11 @@  discard block
 block discarded – undo
91 91
 XoopsLoad::load('fineuploadhandler', 'system');
92 92
 
93 93
 $handler = (property_exists($claims, 'handler')) ? $claims->handler : 'fineuploadhandler';
94
-$moddir  = (property_exists($claims, 'moddir'))  ? $claims->moddir  : 'system';
94
+$moddir  = (property_exists($claims, 'moddir')) ? $claims->moddir : 'system';
95 95
 
96 96
 XoopsLoad::load($handler, $moddir);
97 97
 
98
-$className = $moddir . $handler;
98
+$className = $moddir.$handler;
99 99
 /* $uploader XoopsFineUploadHandler */
100 100
 $uploader = new $className($claims);
101 101
 
@@ -119,10 +119,10 @@  discard block
 block discarded – undo
119 119
     // Assumes you have a chunking.success.endpoint set to point here with a query parameter of "done".
120 120
     // For example: /myserver/handlers/endpoint.php?done
121 121
     if (isset($_GET["done"])) {
122
-        $result = $uploader->combineChunks(XOOPS_ROOT_PATH . "/uploads");
122
+        $result = $uploader->combineChunks(XOOPS_ROOT_PATH."/uploads");
123 123
     } else { // Handle upload requests
124 124
         // Call handleUpload() with the name of the folder, relative to PHP's getcwd()
125
-        $result = $uploader->handleUpload(XOOPS_ROOT_PATH . "/uploads");
125
+        $result = $uploader->handleUpload(XOOPS_ROOT_PATH."/uploads");
126 126
 
127 127
         // To return a name used for uploaded file you can use the following line.
128 128
         $result["uploadName"] = $uploader->getUploadName();
Please login to merge, or discard this patch.