@@ -25,8 +25,8 @@ discard block |
||
25 | 25 | * \brief Page with information on database tables. Add also some maintenance action to convert tables. |
26 | 26 | */ |
27 | 27 | |
28 | -if (! defined('CSRFCHECK_WITH_TOKEN')) { |
|
29 | - define('CSRFCHECK_WITH_TOKEN', '1'); // Force use of CSRF protection with tokens even for GET |
|
28 | +if (!defined('CSRFCHECK_WITH_TOKEN')) { |
|
29 | + define('CSRFCHECK_WITH_TOKEN', '1'); // Force use of CSRF protection with tokens even for GET |
|
30 | 30 | } |
31 | 31 | |
32 | 32 | // Load Dolibarr environment |
@@ -115,7 +115,7 @@ discard block |
||
115 | 115 | //print $shortsqlfilename.' '; |
116 | 116 | $shortsqlfilename = preg_replace('/\-[a-z]+\./', '.', $value['name']); |
117 | 117 | $arrayoffiles[$value['name']] = $shortsqlfilename; |
118 | - if ($value['name'] == $shortsqlfilename && ! preg_match('/\.key\.sql$/', $value['name'])) { |
|
118 | + if ($value['name'] == $shortsqlfilename && !preg_match('/\.key\.sql$/', $value['name'])) { |
|
119 | 119 | // This is a sql file automatically created |
120 | 120 | $arrayoftablesautocreated[$value['name']] = $shortsqlfilename; |
121 | 121 | } |
@@ -54,10 +54,10 @@ discard block |
||
54 | 54 | while ($i < $num) { |
55 | 55 | $row = $db->fetch_row($resql); |
56 | 56 | if ($row[0] == $field) { |
57 | - $sql = "ALTER TABLE " . $db->sanitize($table) . " MODIFY " . $db->sanitize($row[0]) . " " . $row[1] . " CHARACTER SET utf8"; // We must not sanitize the $row[1] |
|
57 | + $sql = "ALTER TABLE " . $db->sanitize($table) . " MODIFY " . $db->sanitize($row[0]) . " " . $row[1] . " CHARACTER SET utf8"; // We must not sanitize the $row[1] |
|
58 | 58 | $db->query($sql); |
59 | 59 | |
60 | - $sql = "ALTER TABLE " . $db->sanitize($table) . " MODIFY " . $db->sanitize($row[0]) . " " . $row[1] . " COLLATE utf8_unicode_ci"; // We must not sanitize the $row[1] |
|
60 | + $sql = "ALTER TABLE " . $db->sanitize($table) . " MODIFY " . $db->sanitize($row[0]) . " " . $row[1] . " COLLATE utf8_unicode_ci"; // We must not sanitize the $row[1] |
|
61 | 61 | $db->query($sql); |
62 | 62 | |
63 | 63 | break; |
@@ -75,10 +75,10 @@ discard block |
||
75 | 75 | while ($i < $num) { |
76 | 76 | $row = $db->fetch_row($resql); |
77 | 77 | if ($row[0] == $field) { |
78 | - $sql = "ALTER TABLE " . $db->sanitize($table) . " MODIFY " . $db->sanitize($row[0]) . " " . $row[1] . " CHARACTER SET utf8mb4"; // We must not sanitize the $row[1] |
|
78 | + $sql = "ALTER TABLE " . $db->sanitize($table) . " MODIFY " . $db->sanitize($row[0]) . " " . $row[1] . " CHARACTER SET utf8mb4"; // We must not sanitize the $row[1] |
|
79 | 79 | $db->query($sql); |
80 | 80 | |
81 | - $sql = "ALTER TABLE " . $db->sanitize($table) . " MODIFY " . $db->sanitize($row[0]) . " " . $row[1] . " COLLATE utf8mb4_unicode_ci"; // We must not sanitize the $row[1] |
|
81 | + $sql = "ALTER TABLE " . $db->sanitize($table) . " MODIFY " . $db->sanitize($row[0]) . " " . $row[1] . " COLLATE utf8mb4_unicode_ci"; // We must not sanitize the $row[1] |
|
82 | 82 | $db->query($sql); |
83 | 83 | |
84 | 84 | break; |
@@ -232,7 +232,7 @@ discard block |
||
232 | 232 | $arrayofmassactions = array(); |
233 | 233 | |
234 | 234 | $varpage = empty($contextpage) ? $_SERVER["PHP_SELF"] : $contextpage; |
235 | -$htmlofselectarray = $form->multiSelectArrayWithCheckbox('selectedfields', $arrayfields, $varpage, getDolGlobalString('MAIN_CHECKBOX_LEFT_COLUMN')); // This also change content of $arrayfields with user setup |
|
235 | +$htmlofselectarray = $form->multiSelectArrayWithCheckbox('selectedfields', $arrayfields, $varpage, getDolGlobalString('MAIN_CHECKBOX_LEFT_COLUMN')); // This also change content of $arrayfields with user setup |
|
236 | 236 | $selectedfields = ($mode != 'kanban' ? $htmlofselectarray : ''); |
237 | 237 | $selectedfields .= (count($arrayofmassactions) ? $form->showCheckAddButtons('checkforselect', 1) : ''); |
238 | 238 | |
@@ -319,7 +319,7 @@ discard block |
||
319 | 319 | usort( |
320 | 320 | $moduleList, |
321 | 321 | /** @return int */ |
322 | - function (stdClass $a, stdClass $b) { |
|
322 | + function(stdClass $a, stdClass $b) { |
|
323 | 323 | return strcasecmp($a->name, $b->name); |
324 | 324 | } |
325 | 325 | ); |
@@ -327,7 +327,7 @@ discard block |
||
327 | 327 | usort( |
328 | 328 | $moduleList, |
329 | 329 | /** @return int */ |
330 | - static function (stdClass $a, stdClass $b) { |
|
330 | + static function(stdClass $a, stdClass $b) { |
|
331 | 331 | return strcasecmp($b->name, $a->name); |
332 | 332 | } |
333 | 333 | ); |
@@ -335,7 +335,7 @@ discard block |
||
335 | 335 | usort( |
336 | 336 | $moduleList, |
337 | 337 | /** @return int */ |
338 | - static function (stdClass $a, stdClass $b) { |
|
338 | + static function(stdClass $a, stdClass $b) { |
|
339 | 339 | return strcasecmp($a->version, $b->version); |
340 | 340 | } |
341 | 341 | ); |
@@ -343,7 +343,7 @@ discard block |
||
343 | 343 | usort( |
344 | 344 | $moduleList, |
345 | 345 | /** @return int */ |
346 | - static function (stdClass $a, stdClass $b) { |
|
346 | + static function(stdClass $a, stdClass $b) { |
|
347 | 347 | return strcasecmp($b->version, $a->version); |
348 | 348 | } |
349 | 349 | ); |
@@ -172,7 +172,7 @@ |
||
172 | 172 | } |
173 | 173 | } |
174 | 174 | if (GETPOST('target') == 'remote') { |
175 | - $xmlarray = getURLContent($xmlremote, 'GET', '', 1, array(), array('http', 'https'), 0); // Accept http or https links on external remote server only. Same is used into api_setup.class.php. |
|
175 | + $xmlarray = getURLContent($xmlremote, 'GET', '', 1, array(), array('http', 'https'), 0); // Accept http or https links on external remote server only. Same is used into api_setup.class.php. |
|
176 | 176 | |
177 | 177 | // Return array('content'=>response,'curl_error_no'=>errno,'curl_error_msg'=>errmsg...) |
178 | 178 | if (!$xmlarray['curl_error_no'] && $xmlarray['http_code'] != '400' && $xmlarray['http_code'] != '404') { |
@@ -49,7 +49,7 @@ |
||
49 | 49 | |
50 | 50 | $action = GETPOST('action', 'aZ09'); |
51 | 51 | $value = GETPOST('value', 'alpha'); |
52 | -$modulepart = GETPOST('modulepart', 'aZ09'); // Used by actions_setmoduleoptions.inc.php |
|
52 | +$modulepart = GETPOST('modulepart', 'aZ09'); // Used by actions_setmoduleoptions.inc.php |
|
53 | 53 | |
54 | 54 | $label = GETPOST('label', 'alpha'); |
55 | 55 | $scandir = GETPOST('scan_dir', 'alpha'); |
@@ -53,7 +53,7 @@ |
||
53 | 53 | |
54 | 54 | $value = GETPOST('value', 'alpha'); |
55 | 55 | $label = GETPOST('label', 'alpha'); |
56 | -$modulepart = GETPOST('modulepart', 'aZ09'); // Used by actions_setmoduleoptions.inc.php |
|
56 | +$modulepart = GETPOST('modulepart', 'aZ09'); // Used by actions_setmoduleoptions.inc.php |
|
57 | 57 | |
58 | 58 | $scandir = GETPOST('scan_dir', 'alpha'); |
59 | 59 | $type = 'invoice'; |
@@ -40,7 +40,7 @@ |
||
40 | 40 | |
41 | 41 | // Get Parameters |
42 | 42 | $action = GETPOST('action', 'aZ09'); |
43 | -$modulepart = GETPOST('modulepart', 'aZ09'); // Used by actions_setmoduleoptions.inc.php |
|
43 | +$modulepart = GETPOST('modulepart', 'aZ09'); // Used by actions_setmoduleoptions.inc.php |
|
44 | 44 | |
45 | 45 | |
46 | 46 | /* |
@@ -453,7 +453,7 @@ |
||
453 | 453 | if (!empty($conf->use_javascript_ajax) || (isset($conf->global->MAIN_MAIL_SENDMODE_TICKET) && in_array($conf->global->MAIN_MAIL_SENDMODE_TICKET, array('smtps', 'swiftmailer')))) { |
454 | 454 | print '<tr class="oddeven smtp_oauth_service hideifdefault"><td>' . $langs->trans("MAIN_MAIL_SMTPS_OAUTH_SERVICE") . '</td><td>'; |
455 | 455 | // SuperAdministrator access only |
456 | - if (!isModEnabled('multicompany') || ($user->admin && !$user->entity)) { |
|
456 | + if (!isModEnabled('multicompany') || ($user->admin && !$user->entity)) { |
|
457 | 457 | print $form->selectarray('MAIN_MAIL_SMTPS_OAUTH_SERVICE_TICKET', $oauthservices, $conf->global->MAIN_MAIL_SMTPS_OAUTH_SERVICE_TICKET); |
458 | 458 | } else { |
459 | 459 | $text = $oauthservices[getDolGlobalString('MAIN_MAIL_SMTPS_OAUTH_SERVICE_TICKET')]; |
@@ -48,7 +48,7 @@ |
||
48 | 48 | */ |
49 | 49 | |
50 | 50 | $parameters = array(); |
51 | -$reshook = $hookmanager->executeHooks('doActions', $parameters, $object, $action); // Note that $action and $object may have been modified by some hooks |
|
51 | +$reshook = $hookmanager->executeHooks('doActions', $parameters, $object, $action); // Note that $action and $object may have been modified by some hooks |
|
52 | 52 | if ($reshook < 0) { |
53 | 53 | setEventMessages($hookmanager->error, $hookmanager->errors, 'errors'); |
54 | 54 | } |