GitHub Access Token became invalid

It seems like the GitHub access token used for retrieving details about this repository from GitHub became invalid. This might prevent certain types of inspections from being run (in particular, everything related to pull requests).
Please ask an admin of your repository to re-new the access token on this website.
Completed
Push — master ( a9843c...1bb178 )
by Marco
07:48
created
delist.php 3 patches
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -12,7 +12,7 @@
 block discarded – undo
12 12
 $user = username();
13 13
 
14 14
 if ( ($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE )
15
-                exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error);
15
+				exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error);
16 16
 
17 17
 if (changestatus($mysqli,username(),$_POST['value'],'0',$type,$table))
18 18
  print 'OK '.$_POST["type"].' <'.$_POST['value'].'> delisted.';
Please login to merge, or discard this patch.
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -1,7 +1,7 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 require_once('config.php');
3 3
 require_once('function.php');
4
-$typedesc=$_POST['type'];
4
+$typedesc = $_POST['type'];
5 5
 $type = $tables["$typedesc"]['field'];
6 6
 $table = ($tables["$typedesc"]['milter']) ? milterTable($type) : $tables["$typedesc"]['name'];
7 7
 $cl = ($tables["$typedesc"]['milter']) ? 10 : 9;
@@ -11,10 +11,10 @@  discard block
 block discarded – undo
11 11
 openlog($tag, LOG_PID, $fac);
12 12
 $user = username();
13 13
 
14
-if ( ($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE )
15
-                exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error);
14
+if (($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE)
15
+                exit ($user.': Connect Error ('.$mysqli->connect_errno.') '.$mysqli->connect_error);
16 16
 
17
-if (changestatus($mysqli,username(),$_POST['value'],'0',$type,$table))
17
+if (changestatus($mysqli, username(), $_POST['value'], '0', $type, $table))
18 18
  print 'OK '.$_POST["type"].' &lt;'.$_POST['value'].'&gt; delisted.';
19 19
 else
20 20
  print 'ERROR in delist &lt;'.$_POST['value'].'&gt;; check log';
Please login to merge, or discard this patch.
Braces   +5 added lines, -3 removed lines patch added patch discarded remove patch
@@ -11,13 +11,15 @@
 block discarded – undo
11 11
 openlog($tag, LOG_PID, $fac);
12 12
 $user = username();
13 13
 
14
-if ( ($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE )
14
+if ( ($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE ) {
15 15
                 exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error);
16
+}
16 17
 
17
-if (changestatus($mysqli,username(),$_POST['value'],'0',$type,$table))
18
+if (changestatus($mysqli,username(),$_POST['value'],'0',$type,$table)) {
18 19
  print 'OK '.$_POST["type"].' &lt;'.$_POST['value'].'&gt; delisted.';
19
-else
20
+} else {
20 21
  print 'ERROR in delist &lt;'.$_POST['value'].'&gt;; check log';
22
+}
21 23
 print '</td>';
22 24
 $mysqli->close();
23 25
 closelog();
Please login to merge, or discard this patch.
function.php 4 patches
Doc Comments   +14 added lines patch added patch discarded remove patch
@@ -234,6 +234,9 @@  discard block
 block discarded – undo
234 234
 }
235 235
 
236 236
 
237
+/**
238
+ * @param integer $id
239
+ */
237 240
 function askMilter($myconn,$id,$obj,$typedesc,$miltId,$value,$user,$adm)  {
238 241
 	$milts = readMiltName($myconn,$user);
239 242
 	$size = count($milts);
@@ -264,6 +267,11 @@  discard block
 block discarded – undo
264 267
 }
265 268
 
266 269
 
270
+/**
271
+ * @param integer $id
272
+ * @param string $what
273
+ * @param boolean $lock
274
+ */
267 275
 function ask($myconn,$id,$what,$alltables,$typedesc,$value,$lock,$user,$adm) {
268 276
 
269 277
 	$whynot=NULL;
@@ -522,6 +530,9 @@  discard block
 block discarded – undo
522 530
 }
523 531
 
524 532
 
533
+/**
534
+ * @param string $reason
535
+ */
525 536
 function searchAndList ($myconn,$loguser,$tables,$typedesc,$value,$unit,&$quantity,&$reason) {
526 537
 
527 538
 /* Search and list value */
@@ -591,6 +602,9 @@  discard block
 block discarded – undo
591 602
 	return array_map('long2ip', range( ip2long($range[0]), ip2long($range[1]) ) );
592 603
 }
593 604
 
605
+/**
606
+ * @param string $netA
607
+ */
594 608
 function isIn($netA, $netB) {
595 609
 /* TRUE if an IP of $netA is contained in netB */
596 610
 	list($addressA,$maskA) = explode('/', $netA);
Please login to merge, or discard this patch.
Indentation   +158 added lines, -158 removed lines patch added patch discarded remove patch
@@ -4,8 +4,8 @@  discard block
 block discarded – undo
4 4
 
5 5
 function username() {
6 6
 	if (isset ($_SERVER['REMOTE_USER'])) $user = $_SERVER['REMOTE_USER'];
7
-        	else if (isset ($_SERVER['USER'])) $user = $_SERVER['USER'];
8
-                	else $user='unknown';
7
+			else if (isset ($_SERVER['USER'])) $user = $_SERVER['USER'];
8
+					else $user='unknown';
9 9
 	return $user;
10 10
 }
11 11
 
@@ -21,11 +21,11 @@  discard block
 block discarded – undo
21 21
 }
22 22
 
23 23
 function myConnect($host, $user, $pass, $db, $port, $tablelist, $typedesc, $loguser) {
24
-        $db = ( $tablelist["$typedesc"]['milter'] ) ? $tablelist["$typedesc"]['name'] : $db;
24
+		$db = ( $tablelist["$typedesc"]['milter'] ) ? $tablelist["$typedesc"]['name'] : $db;
25 25
 	$mysqli = new mysqli($host, $user, $pass, $db, $port);
26
-        if ($mysqli->connect_error) {
27
-           	syslog (LOG_EMERG, $loguser.': Connect Error to DB <'.$db.'> (' . $mysqli->connect_errno . ') '
28
-                    		. $mysqli->connect_error);
26
+		if ($mysqli->connect_error) {
27
+		   	syslog (LOG_EMERG, $loguser.': Connect Error to DB <'.$db.'> (' . $mysqli->connect_errno . ') '
28
+							. $mysqli->connect_error);
29 29
 		return FALSE;
30 30
 	}
31 31
 	syslog(LOG_INFO, $loguser.': Successfully MySQL connected at DB <'.$db.'> to ' . $mysqli->host_info) ;
@@ -66,7 +66,7 @@  discard block
 block discarded – undo
66 66
 			}
67 67
 		}
68 68
 		list($sub['net'],$sub['mask'])=explode('/',$value);
69
-                $query= sprintf("INSERT INTO `$table` (
69
+				$query= sprintf("INSERT INTO `$table` (
70 70
                         `$type` ,
71 71
 			`netmask`,
72 72
                         `date` ,
@@ -79,10 +79,10 @@  discard block
 block discarded – undo
79 79
                         INET_ATON( '%s' ) , INET_ATON( '%s' ) ,
80 80
                         CURRENT_TIMESTAMP , TIMESTAMPADD(%s,%d,CURRENT_TIMESTAMP), '1', '%s', '%s'
81 81
                 )" ,$sub['net'],$sub['mask'],$expUnit,$expQ,$user,$myreason);
82
-                break;
82
+				break;
83 83
 
84 84
 	  default:
85
-                $query= sprintf("INSERT INTO `$table` (
85
+				$query= sprintf("INSERT INTO `$table` (
86 86
                         `$type` ,
87 87
                         `date` ,
88 88
                         `exp` ,
@@ -97,8 +97,8 @@  discard block
 block discarded – undo
97 97
 	}
98 98
 
99 99
 	if ($myconn->query($query) === TRUE) {
100
-	    syslog(LOG_INFO, "$user: $type <$value> successfully listed on <$table> for $expQ $expUnit.");
101
-	    $result=TRUE;
100
+		syslog(LOG_INFO, "$user: $type <$value> successfully listed on <$table> for $expQ $expUnit.");
101
+		$result=TRUE;
102 102
 	}
103 103
 	else syslog(LOG_ERR, "$user: Error: ".$myconn->error);
104 104
 	return $result;
@@ -116,9 +116,9 @@  discard block
 block discarded – undo
116 116
 		$nlist = '`nlist` + 1';
117 117
 	}
118 118
 
119
-        switch ($type) {
119
+		switch ($type) {
120 120
 	  case 'ip':
121
-                $query= sprintf("UPDATE `$table` SET
121
+				$query= sprintf("UPDATE `$table` SET
122 122
 			`active` = '1',
123 123
 			`user` = '%s',
124 124
 			`exp` = TIMESTAMPADD(%s,%d,%s),
@@ -126,9 +126,9 @@  discard block
 block discarded – undo
126 126
 			`reason` = '%s'
127 127
 			WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$value);
128 128
 		break;
129
-          case 'network':
129
+		  case 'network':
130 130
 		list($sub['net'],$sub['mask'])=explode('/',$value);
131
-                $query= sprintf("UPDATE `$table` SET
131
+				$query= sprintf("UPDATE `$table` SET
132 132
                         `active` = '1',
133 133
                         `user` = '%s',
134 134
                         `exp` = TIMESTAMPADD(%s,%d,%s),
@@ -137,7 +137,7 @@  discard block
 block discarded – undo
137 137
                         WHERE (`$table`.`$type` = INET_ATON('%s') AND `$table`.`netmask` = INET_ATON('%s')) LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$sub['net'],$sub['mask']);
138 138
 		break;
139 139
 	  default:
140
-                $query= sprintf("UPDATE `$table` SET
140
+				$query= sprintf("UPDATE `$table` SET
141 141
                         `active` = '1',
142 142
                         `user` = '%s',
143 143
                         `exp` = TIMESTAMPADD(%s,%d,%s),
@@ -146,18 +146,18 @@  discard block
 block discarded – undo
146 146
 			WHERE `$table`.`$type` = '%s' LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$value);
147 147
 	}
148 148
 
149
-        if ($myconn->query($query) === TRUE) {
150
-            syslog(LOG_INFO, "$user: relist $type <$value> on <$table> for $expQ $expUnit from $exptime.");
149
+		if ($myconn->query($query) === TRUE) {
150
+			syslog(LOG_INFO, "$user: relist $type <$value> on <$table> for $expQ $expUnit from $exptime.");
151 151
 		$result=TRUE;
152
-        }
153
-        else syslog (LOG_ERR, "$user: Error: ". $myconn->error);
152
+		}
153
+		else syslog (LOG_ERR, "$user: Error: ". $myconn->error);
154 154
 	return $result;
155 155
 }
156 156
 
157 157
 function remove ($myconn,$user,$value,$type,$table) {
158 158
 
159
-        switch ($type) {
160
-          case 'ip':
159
+		switch ($type) {
160
+		  case 'ip':
161 161
 		$query = sprintf("DELETE FROM `$table` WHERE
162 162
                         `$table`.`$type` = INET_ATON('%s') LIMIT 1", $value);
163 163
 		break;
@@ -173,18 +173,18 @@  discard block
 block discarded – undo
173 173
 	}
174 174
 
175 175
 
176
-        if ($return=$myconn->query($query) === TRUE) 
177
-            syslog(LOG_INFO, "$user: permanently DELETED $type <$value> from <$table>.");
178
-        else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
176
+		if ($return=$myconn->query($query) === TRUE) 
177
+			syslog(LOG_INFO, "$user: permanently DELETED $type <$value> from <$table>.");
178
+		else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
179 179
 
180
-        return $return;
180
+		return $return;
181 181
 }
182 182
 
183 183
 
184 184
 function changestatus ($myconn,$user,$value,$status,$type,$table) {
185 185
 
186 186
 	switch ($type) {
187
-          case 'ip':
187
+		  case 'ip':
188 188
 		$query= sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1" ,$user, $value);
189 189
 		break;
190 190
 	  case 'network':
@@ -195,16 +195,16 @@  discard block
 block discarded – undo
195 195
 		$query= sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = '%s' LIMIT 1" ,$user, $value);
196 196
 	}
197 197
 
198
-        if ($return=$myconn->query($query) === TRUE) {
199
-            syslog(LOG_INFO, "$user: change status of $type <$value>. The status is now <$status>");
200
-        }
201
-        else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
198
+		if ($return=$myconn->query($query) === TRUE) {
199
+			syslog(LOG_INFO, "$user: change status of $type <$value>. The status is now <$status>");
200
+		}
201
+		else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
202 202
 	return $return;	
203 203
 }
204 204
 
205 205
 
206 206
 function expire ($myconn,$user,$tables,$expireTime) {
207
-        $return=TRUE;
207
+		$return=TRUE;
208 208
 	$log=array();
209 209
 	$desc = array_keys($tables);
210 210
 	foreach ($desc as $tdesc) { 
@@ -214,11 +214,11 @@  discard block
 block discarded – undo
214 214
 		/* END OF QUERY */
215 215
 		$log[0] = 'expired for';
216 216
 		$log[1] = 'disabled for';
217
-        	if ($myconn->multi_query($query)) {
217
+			if ($myconn->multi_query($query)) {
218 218
 			$j = 0;
219 219
 			do {
220
-		    		$numdel = $myconn->affected_rows;
221
-	            		syslog(LOG_INFO, "Expire job - <$user> Permanently DELETED $numdel records ".$log[$j]." $expireTime YEARS from <".$tables["$tdesc"]['name'].'>.');
220
+					$numdel = $myconn->affected_rows;
221
+						syslog(LOG_INFO, "Expire job - <$user> Permanently DELETED $numdel records ".$log[$j]." $expireTime YEARS from <".$tables["$tdesc"]['name'].'>.');
222 222
 				$j++;
223 223
 
224 224
 			} while ($myconn->next_result());
@@ -230,7 +230,7 @@  discard block
 block discarded – undo
230 230
 	}
231 231
 	if ( !($return) ) syslog(LOG_EMERG, 'End of Expire job with error. See above logs. SQL Connection terminated');
232 232
 	else  syslog(LOG_INFO, 'Successfully End of Expire job. SQL Connection successfully terminated.');
233
-        return $return;
233
+		return $return;
234 234
 }
235 235
 
236 236
 
@@ -303,7 +303,7 @@  discard block
 block discarded – undo
303 303
 		if ( $entry->num_rows ) {
304 304
 			if ( $entry->num_rows == 1 ) {
305 305
 				$riga = $entry->fetch_array(MYSQLI_ASSOC);
306
-                        	if (isListed($riga)) {
306
+							if (isListed($riga)) {
307 307
 					$warn = "<$value> is already present in <$listdep> list!";
308 308
 					$entry->free();
309 309
 					return FALSE;
@@ -320,7 +320,7 @@  discard block
 block discarded – undo
320 320
 function searchentry ($myconn,$value,$tablelist) {
321 321
 /* Make a MYSQL query and return result */
322 322
 
323
-        $type = $tablelist['field'];
323
+		$type = $tablelist['field'];
324 324
 	
325 325
 	if ( $tablelist['milter'] ) {
326 326
 		$table = milterTable($type);
@@ -344,7 +344,7 @@  discard block
 block discarded – undo
344 344
 				case 'ip':
345 345
 					$query = sprintf('SELECT * FROM (
346 346
 							SELECT *, GROUP_CONCAT(milt.name) as miltnames FROM `%s` LEFT JOIN milt ON (%s.idmilt=milt.id)' .
347
-                                                		'WHERE `ip` =  INET_ATON(\'%s\')
347
+														'WHERE `ip` =  INET_ATON(\'%s\')
348 348
 							 ) AS val WHERE val.ip IS NOT null', $table, $table, $value);
349 349
 					break;
350 350
 				default:
@@ -355,33 +355,33 @@  discard block
 block discarded – undo
355 355
 	}
356 356
 
357 357
 	else {
358
-	        $table = $tablelist['name'];
359
-	        if ($value == 'ALL') $query = 'select * from '.$table;
360
-	        else {
361
-	                switch ($type) {
362
-	                  case 'ip':
363
-	                        $query= "select * from $table where $type =  INET_ATON('$value')";
364
-	                        break;
365
-	                  case 'network':
366
-	                        list($sub['net'],$sub['mask'])=explode('/',$value);
367
-	                        $query= sprintf('select * from `%s`
358
+			$table = $tablelist['name'];
359
+			if ($value == 'ALL') $query = 'select * from '.$table;
360
+			else {
361
+					switch ($type) {
362
+					  case 'ip':
363
+							$query= "select * from $table where $type =  INET_ATON('$value')";
364
+							break;
365
+					  case 'network':
366
+							list($sub['net'],$sub['mask'])=explode('/',$value);
367
+							$query= sprintf('select * from `%s`
368 368
 						WHERE (
369 369
 							inet_aton(\'%s\') >= network AND
370 370
 							( inet_aton(\'%s\') | ( inet_aton(\'%s\') ^ (power(2,32)-1) ) )
371 371
 								<= network | ( netmask ^ (power(2,32)-1) )
372 372
 						)', $table, $sub['net'], $sub['net'], $sub['mask']);
373 373
 ;
374
-	                        break;
375
-	                  default:
376
-	                        $query= "select * from $table where $type = '$value'";
377
-	                }
378
-	        }
374
+							break;
375
+					  default:
376
+							$query= "select * from $table where $type = '$value'";
377
+					}
378
+			}
379 379
 	}
380 380
 
381 381
 	$result = $myconn->query($query);
382 382
 	if($result === false)
383 383
 		syslog(LOG_EMERG, "ALERT: Query <$query> failed: ".$myconn->error);
384
-        return $result;
384
+		return $result;
385 385
 }
386 386
 
387 387
 function countListed ($myconn,$table) {
@@ -396,14 +396,14 @@  discard block
 block discarded – undo
396 396
 
397 397
 
398 398
 function isFull($myconn,$typedesc,$alltables) {
399
-        if (isset($alltables["$typedesc"]['limit'])) {
399
+		if (isset($alltables["$typedesc"]['limit'])) {
400 400
 		if ( $alltables["$typedesc"]['milter'] )
401 401
 			$tab = 'net';
402 402
 		else
403 403
 			$tab = $alltables["$typedesc"]['name'];
404
-                if ( countListed($myconn,$tab) >= $alltables["$typedesc"]['limit'] ) 
405
-                        return TRUE;
406
-        }
404
+				if ( countListed($myconn,$tab) >= $alltables["$typedesc"]['limit'] ) 
405
+						return TRUE;
406
+		}
407 407
 	return FALSE;
408 408
 }
409 409
 
@@ -428,14 +428,14 @@  discard block
 block discarded – undo
428 428
 	if ($result) {
429 429
 		printf("<pre>Your request for $type &lt;$value&gt; returned %d items.\n</pre>", $result->num_rows);
430 430
 
431
-        /* Check for limit in number of listed items */
431
+		/* Check for limit in number of listed items */
432 432
 	$full = isFull($myconn,$typedesc,$tables);
433 433
 	if ($full) print '<p>'.htmlspecialchars("$typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items.').'</p>';
434 434
 
435 435
 		if ($result->num_rows) {
436 436
 			print $tabhtm;
437 437
 			$i=0;
438
-        		while ($riga = $result->fetch_array(MYSQLI_ASSOC)) {
438
+				while ($riga = $result->fetch_array(MYSQLI_ASSOC)) {
439 439
 				if (isListed($riga)) {
440 440
 					if ($tables["$typedesc"]['bl']) $listed='Listed';
441 441
 					else $listed='WhiteListed';
@@ -461,7 +461,7 @@  discard block
 block discarded – undo
461 461
 					 printf ("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
462 462
 					$element, $riga['date'], $riga['datemod'], $riga['exp'], $riga['active'], $riga['nlist'], $riga['user'],htmlspecialchars($riga['reason']),ask($myconn,$i,$listed,$tables,$typedesc,$element,$full,$user,$adm));
463 463
 				$i++;
464
-        		}
464
+				}
465 465
 			print '</tbody></table>';
466 466
 		}
467 467
 		else {
@@ -481,15 +481,15 @@  discard block
 block discarded – undo
481 481
         
482 482
 function sendEmailWarn($tplf,$from,$to,$sbj,$emailListed,$intervalToExpire,$detail) {
483 483
 	$now = time();
484
-        setlocale (LC_TIME, 'it_IT');
485
-        $date = date("r",$now);
484
+		setlocale (LC_TIME, 'it_IT');
485
+		$date = date("r",$now);
486 486
 	$messageID = md5(uniqid($now,1)) . '@' . gethostname();
487 487
 	$mua = 'PHP/' . phpversion();
488 488
 
489 489
 	/* Parsing headers */
490 490
 	if (!file_exists($tplf['header'])) {
491
-    		syslog(LOG_ERR, 'Sending email... template file <'.$tplf['header'].'> not found!');
492
-    		exit;
491
+			syslog(LOG_ERR, 'Sending email... template file <'.$tplf['header'].'> not found!');
492
+			exit;
493 493
 	}
494 494
 
495 495
 	$head_tmpl = file_get_contents($tplf['header']);
@@ -498,35 +498,35 @@  discard block
 block discarded – undo
498 498
 	$headers = str_replace($arr_tpl_vars, $arr_tpl_data, $head_tmpl);
499 499
 	$headers = preg_replace( '/\r|\n/', "\r\n", $headers );
500 500
 
501
-        /* Parsing body */
501
+		/* Parsing body */
502 502
 
503
-        if (!file_exists($tplf['body'])) {
504
-                syslog(LOG_ERR, 'Sending email... template file <'.$tplf['body'].'> not found!');
505
-                exit;
506
-        }
503
+		if (!file_exists($tplf['body'])) {
504
+				syslog(LOG_ERR, 'Sending email... template file <'.$tplf['body'].'> not found!');
505
+				exit;
506
+		}
507 507
 
508
-        $body_tmpl = file_get_contents($tplf['body']);
509
-        $arr_tpl_vars = array('{emailListed}','{expInterval}','{reason}');
510
-        $arr_tpl_data = array($emailListed,$intervalToExpire,$detail);
511
-        $body = str_replace($arr_tpl_vars, $arr_tpl_data, $body_tmpl);
512
-        $body = preg_replace( "/\r|\n/", "\r\n", $body );
508
+		$body_tmpl = file_get_contents($tplf['body']);
509
+		$arr_tpl_vars = array('{emailListed}','{expInterval}','{reason}');
510
+		$arr_tpl_data = array($emailListed,$intervalToExpire,$detail);
511
+		$body = str_replace($arr_tpl_vars, $arr_tpl_data, $body_tmpl);
512
+		$body = preg_replace( "/\r|\n/", "\r\n", $body );
513 513
 	$body = wordwrap ( $body, 75 , "\r\n" );	
514 514
 
515 515
 	/* Send the mail! */
516
-        if ( strlen(ini_get("safe_mode"))< 1) {
517
-                $old_mailfrom = ini_get("sendmail_from");
518
-                ini_set("sendmail_from", $from);
519
-                $params = sprintf("-oi -f %s", '<>');
520
-                if (!(mail($to,$sbj, $body,$headers,$params))) $flag=FALSE;
521
-                else $flag=TRUE;
522
-                if (isset($old_mailfrom))
523
-                        ini_set("sendmail_from", $old_mailfrom);
524
-        }
525
-        else {
526
-                if (!(mail($to,$sbj, $body,$headers))) $flag=FALSE;
527
-                else $flag=TRUE;
528
-        }
529
-        return $flag;
516
+		if ( strlen(ini_get("safe_mode"))< 1) {
517
+				$old_mailfrom = ini_get("sendmail_from");
518
+				ini_set("sendmail_from", $from);
519
+				$params = sprintf("-oi -f %s", '<>');
520
+				if (!(mail($to,$sbj, $body,$headers,$params))) $flag=FALSE;
521
+				else $flag=TRUE;
522
+				if (isset($old_mailfrom))
523
+						ini_set("sendmail_from", $old_mailfrom);
524
+		}
525
+		else {
526
+				if (!(mail($to,$sbj, $body,$headers))) $flag=FALSE;
527
+				else $flag=TRUE;
528
+		}
529
+		return $flag;
530 530
 }
531 531
 
532 532
 function emailToNotify($notify_file,$dom) {
@@ -540,62 +540,62 @@  discard block
 block discarded – undo
540 540
 function searchAndList ($myconn,$loguser,$tables,$typedesc,$value,$unit,&$quantity,&$reason) {
541 541
 
542 542
 /* Search and list value */
543
-        $type = $tables["$typedesc"]['field'];
544
-        $table = $tables["$typedesc"]['name'];
545
-        $result = searchentry ($myconn,$value,$tables["$typedesc"]);
546
-
547
-        /* Manage abnormal conditions */
548
-        /* Value already present in db more than once. This is absurd. Panic! */
549
-        if ($result->num_rows > 1) {
550
-                syslog(LOG_EMERG,"$loguser: PANIC! Select for $type '$value' returned ". $result->num_rows ." items instead of one. Abnormal. Contact a sysadmin or a developer.");
551
-                $result->free();
552
-                return FALSE;
553
-        }
543
+		$type = $tables["$typedesc"]['field'];
544
+		$table = $tables["$typedesc"]['name'];
545
+		$result = searchentry ($myconn,$value,$tables["$typedesc"]);
546
+
547
+		/* Manage abnormal conditions */
548
+		/* Value already present in db more than once. This is absurd. Panic! */
549
+		if ($result->num_rows > 1) {
550
+				syslog(LOG_EMERG,"$loguser: PANIC! Select for $type '$value' returned ". $result->num_rows ." items instead of one. Abnormal. Contact a sysadmin or a developer.");
551
+				$result->free();
552
+				return FALSE;
553
+		}
554 554
 
555
-        /* Value already present in db or not present: to list anyway */
556
-        if ($result->num_rows >= 0) {
557
-                /* First, check for limit in number of listed items */
558
-                if (isFull($myconn,$typedesc,$tables)) {
559
-                        syslog(LOG_EMERG,"$loguser: $typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items. Abnormal exit.');
560
-                        $result->free();
561
-                        return FALSE;
562
-                }
563
-                /* Second, check if the (re)list would be consistent now */
564
-                if (! consistentListing($myconn,$tables,$typedesc,$value,$whynot) ) {
565
-                        syslog(LOG_ERR, $loguser.': '.$whynot);
566
-                        $result->free();
567
-                        return FALSE;
568
-                }
569
-        }
570
-        /* End of abnormal conditions */
555
+		/* Value already present in db or not present: to list anyway */
556
+		if ($result->num_rows >= 0) {
557
+				/* First, check for limit in number of listed items */
558
+				if (isFull($myconn,$typedesc,$tables)) {
559
+						syslog(LOG_EMERG,"$loguser: $typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items. Abnormal exit.');
560
+						$result->free();
561
+						return FALSE;
562
+				}
563
+				/* Second, check if the (re)list would be consistent now */
564
+				if (! consistentListing($myconn,$tables,$typedesc,$value,$whynot) ) {
565
+						syslog(LOG_ERR, $loguser.': '.$whynot);
566
+						$result->free();
567
+						return FALSE;
568
+				}
569
+		}
570
+		/* End of abnormal conditions */
571 571
 
572 572
 
573
-        /* Finally, here I can list the value! */
573
+		/* Finally, here I can list the value! */
574 574
 	$thisentry = $result->fetch_array(MYSQLI_ASSOC);
575
-        switch ($result->num_rows) {
576
-                /* Relist value if already present */
577
-                case 1:
578
-                        if ( isListed($thisentry) ) {
575
+		switch ($result->num_rows) {
576
+				/* Relist value if already present */
577
+				case 1:
578
+						if ( isListed($thisentry) ) {
579 579
 				/* Entry already listed */
580 580
 				$expdate = $thisentry['exp'];
581 581
 				$reason = sprintf('%s. Already listed. Adding 1 DAY to previous expire date.',
582 582
 					 $reason);
583 583
 				$quantity = 1;
584 584
 				$unit = 'DAY';
585
-                        }
585
+						}
586 586
 			else {
587
-                        	/* Entry delisted */
587
+							/* Entry delisted */
588 588
 				$quantity *= $thisentry['nlist'];
589 589
 				$expdate = 0; /* This forces expiration from CURRENT_TIMESTAMP */
590 590
 			}
591 591
 			$result->free();
592
-                        return relist ($myconn,$loguser,$value,$type,$table,$unit,$quantity,$reason, $expdate);
592
+						return relist ($myconn,$loguser,$value,$type,$table,$unit,$quantity,$reason, $expdate);
593 593
 
594
-                /* First time list value */
595
-                case 0:
596
-                        $result->free();
597
-                        return addtolist ($myconn,$loguser,$value,$tables["$typedesc"],$unit,$quantity,$reason,$_);
598
-        }
594
+				/* First time list value */
595
+				case 0:
596
+						$result->free();
597
+						return addtolist ($myconn,$loguser,$value,$tables["$typedesc"],$unit,$quantity,$reason,$_);
598
+		}
599 599
 }
600 600
 
601 601
 
@@ -628,7 +628,7 @@  discard block
 block discarded – undo
628 628
 		return FALSE;
629 629
 	}
630 630
 	$result = searchentry ($myconn,'ALL',$tabletype);
631
-        if ($result->num_rows) {
631
+		if ($result->num_rows) {
632 632
 		while ($row = $result->fetch_array(MYSQLI_ASSOC)) {
633 633
 			$thisNet = long2ip($row['network']).'/'.long2ip($row['netmask']);
634 634
 			if ( isIn($thisNet, $net) ) {
@@ -648,7 +648,7 @@  discard block
 block discarded – undo
648 648
 /* For miltermap */
649 649
 function checkMilterConf($table) {
650 650
 	if (isset($table['milter'])) {
651
-        	if ($table['milter'] ===  TRUE) {
651
+			if ($table['milter'] ===  TRUE) {
652 652
 			switch ( $table['field'] ) {
653 653
 				case 'network':
654 654
 				case 'ip':
@@ -671,15 +671,15 @@  discard block
 block discarded – undo
671 671
 
672 672
 function milterTable($t) {
673 673
 	/* Return the milter object table for type t  or FALSE on error */
674
-        switch ($t) {
675
-                case 'network':
676
-                        return 'net';
677
-                case 'ip':
678
-                        return 'ips';
679
-                default:
674
+		switch ($t) {
675
+				case 'network':
676
+						return 'net';
677
+				case 'ip':
678
+						return 'ips';
679
+				default:
680 680
 			syslog(LOG_EMERG, "ALERT: type <$t> not allowed in configuration. ");
681
-                        return FALSE;
682
-        }
681
+						return FALSE;
682
+		}
683 683
 }
684 684
 
685 685
 
@@ -687,9 +687,9 @@  discard block
 block discarded – undo
687 687
 	$milters=array();
688 688
 	$query = 'SELECT `name` FROM `config`';
689 689
 
690
-        $result = $myconn->query($query);
691
-        if($result === false) {
692
-                syslog(LOG_EMERG, "$loguser: ALERT: Query <$query> failed: ".$myconn->error);
690
+		$result = $myconn->query($query);
691
+		if($result === false) {
692
+				syslog(LOG_EMERG, "$loguser: ALERT: Query <$query> failed: ".$myconn->error);
693 693
 		return FALSE;
694 694
 	}
695 695
 	if ($result->num_rows) {
@@ -759,21 +759,21 @@  discard block
 block discarded – undo
759 759
 
760 760
 function curl_get($url, array $get = NULL, array $options = array(), $loguser)
761 761
 {
762
-    $defaults = array(
763
-        CURLOPT_URL => $url. (strpos($url, '?') === FALSE ? '?' : ''). http_build_query($get),
764
-        CURLOPT_HEADER => 0,
765
-        CURLOPT_RETURNTRANSFER => TRUE,
766
-        CURLOPT_TIMEOUT => 4
767
-    );
768
-
769
-    $ch = curl_init();
770
-    curl_setopt_array($ch, ($options + $defaults));
771
-    if( ! $result = curl_exec($ch))
772
-    {
773
-        syslog(LOG_ERR, sprintf('%s: CURL Error: <%s>', $loguser, curl_error($ch)));
774
-    }
775
-    curl_close($ch);
776
-    return $result;
762
+	$defaults = array(
763
+		CURLOPT_URL => $url. (strpos($url, '?') === FALSE ? '?' : ''). http_build_query($get),
764
+		CURLOPT_HEADER => 0,
765
+		CURLOPT_RETURNTRANSFER => TRUE,
766
+		CURLOPT_TIMEOUT => 4
767
+	);
768
+
769
+	$ch = curl_init();
770
+	curl_setopt_array($ch, ($options + $defaults));
771
+	if( ! $result = curl_exec($ch))
772
+	{
773
+		syslog(LOG_ERR, sprintf('%s: CURL Error: <%s>', $loguser, curl_error($ch)));
774
+	}
775
+	curl_close($ch);
776
+	return $result;
777 777
 }
778 778
 
779 779
 
Please login to merge, or discard this patch.
Spacing   +167 added lines, -167 removed lines patch added patch discarded remove patch
@@ -5,46 +5,46 @@  discard block
 block discarded – undo
5 5
 function username() {
6 6
 	if (isset ($_SERVER['REMOTE_USER'])) $user = $_SERVER['REMOTE_USER'];
7 7
         	else if (isset ($_SERVER['USER'])) $user = $_SERVER['USER'];
8
-                	else $user='unknown';
8
+                	else $user = 'unknown';
9 9
 	return $user;
10 10
 }
11 11
 
12 12
 function checkSSL() {
13
-	if ( empty( $_SERVER['HTTPS'] ) )
14
-		printf ('<div id="content">Ehi sysadmin! Your site is not secure. Please enable SSL on your server and configure a redirect, such as' .
15
-			'<pre>' .
16
-			htmlspecialchars('<VirtualHost *:80>' . "\n" .
17
-			'  ServerName %s' . "\n" .
18
-			'  Redirect permanent / https://%s/' . "\n" .
19
-			'</VirtualHost>') .
13
+	if (empty($_SERVER['HTTPS']))
14
+		printf('<div id="content">Ehi sysadmin! Your site is not secure. Please enable SSL on your server and configure a redirect, such as'.
15
+			'<pre>'.
16
+			htmlspecialchars('<VirtualHost *:80>'."\n".
17
+			'  ServerName %s'."\n".
18
+			'  Redirect permanent / https://%s/'."\n".
19
+			'</VirtualHost>').
20 20
 			'</pre></div>', gethostname(), gethostname());
21 21
 }
22 22
 
23 23
 function myConnect($host, $user, $pass, $db, $port, $tablelist, $typedesc, $loguser) {
24
-        $db = ( $tablelist["$typedesc"]['milter'] ) ? $tablelist["$typedesc"]['name'] : $db;
24
+        $db = ($tablelist["$typedesc"]['milter']) ? $tablelist["$typedesc"]['name'] : $db;
25 25
 	$mysqli = new mysqli($host, $user, $pass, $db, $port);
26 26
         if ($mysqli->connect_error) {
27
-           	syslog (LOG_EMERG, $loguser.': Connect Error to DB <'.$db.'> (' . $mysqli->connect_errno . ') '
27
+           	syslog(LOG_EMERG, $loguser.': Connect Error to DB <'.$db.'> ('.$mysqli->connect_errno.') '
28 28
                     		. $mysqli->connect_error);
29 29
 		return FALSE;
30 30
 	}
31
-	syslog(LOG_INFO, $loguser.': Successfully MySQL connected at DB <'.$db.'> to ' . $mysqli->host_info) ;
31
+	syslog(LOG_INFO, $loguser.': Successfully MySQL connected at DB <'.$db.'> to '.$mysqli->host_info);
32 32
 	return $mysqli;
33 33
 }
34 34
 
35
-function addtolist ($myconn,$user,$value,$tabledesc,$expUnit,$expQ,$myreason,&$err) {
35
+function addtolist($myconn, $user, $value, $tabledesc, $expUnit, $expQ, $myreason, &$err) {
36 36
 // See MySQL manual for $expQ and $expUnit at
37 37
 // https://dev.mysql.com/doc/refman/5.5/en/date-and-time-functions.html#function_timestampadd
38 38
 
39
-	$result=FALSE;
40
-	$sub=array();
39
+	$result = FALSE;
40
+	$sub = array();
41 41
 	$type = $tabledesc['field'];
42 42
 	$milt = $tabledesc['milter'];
43 43
 	$table = ($milt) ? milterTable($type) : $tabledesc['name'];
44 44
 
45 45
 	switch ($type) {
46 46
 	  case 'ip':
47
-		$query= sprintf("INSERT INTO `$table` (
47
+		$query = sprintf("INSERT INTO `$table` (
48 48
 			`$type` ,
49 49
 			`date` ,
50 50
 			`exp` ,
@@ -55,18 +55,18 @@  discard block
 block discarded – undo
55 55
 		VALUES (
56 56
 			INET_ATON( '%s' ) ,
57 57
 			CURRENT_TIMESTAMP , TIMESTAMPADD(%s,%d,CURRENT_TIMESTAMP), '1', '%s', '%s'
58
-		)" ,$value,$expUnit,$expQ,$user,$myreason);
58
+		)", $value, $expUnit, $expQ, $user, $myreason);
59 59
 		break;
60 60
 
61 61
 	  case 'network':
62 62
 		if (!$milt) {
63
-			if ( netOverlap($myconn, $tabledesc, $value, $overlappedNet, $user) ) {
63
+			if (netOverlap($myconn, $tabledesc, $value, $overlappedNet, $user)) {
64 64
 				$err = "<$value> overlaps the existing network <$overlappedNet>";
65 65
 				return FALSE;
66 66
 			}
67 67
 		}
68
-		list($sub['net'],$sub['mask'])=explode('/',$value);
69
-                $query= sprintf("INSERT INTO `$table` (
68
+		list($sub['net'], $sub['mask']) = explode('/', $value);
69
+                $query = sprintf("INSERT INTO `$table` (
70 70
                         `$type` ,
71 71
 			`netmask`,
72 72
                         `date` ,
@@ -78,11 +78,11 @@  discard block
 block discarded – undo
78 78
                 VALUES (
79 79
                         INET_ATON( '%s' ) , INET_ATON( '%s' ) ,
80 80
                         CURRENT_TIMESTAMP , TIMESTAMPADD(%s,%d,CURRENT_TIMESTAMP), '1', '%s', '%s'
81
-                )" ,$sub['net'],$sub['mask'],$expUnit,$expQ,$user,$myreason);
81
+                )", $sub['net'], $sub['mask'], $expUnit, $expQ, $user, $myreason);
82 82
                 break;
83 83
 
84 84
 	  default:
85
-                $query= sprintf("INSERT INTO `$table` (
85
+                $query = sprintf("INSERT INTO `$table` (
86 86
                         `$type` ,
87 87
                         `date` ,
88 88
                         `exp` ,
@@ -93,23 +93,23 @@  discard block
 block discarded – undo
93 93
                 VALUES (
94 94
                         '%s' ,
95 95
                         CURRENT_TIMESTAMP , TIMESTAMPADD(%s,%d,CURRENT_TIMESTAMP), '1', '%s', '%s'
96
-                )" ,$value,$expUnit,$expQ,$user,$myreason);
96
+                )", $value, $expUnit, $expQ, $user, $myreason);
97 97
 	}
98 98
 
99 99
 	if ($myconn->query($query) === TRUE) {
100 100
 	    syslog(LOG_INFO, "$user: $type <$value> successfully listed on <$table> for $expQ $expUnit.");
101
-	    $result=TRUE;
101
+	    $result = TRUE;
102 102
 	}
103 103
 	else syslog(LOG_ERR, "$user: Error: ".$myconn->error);
104 104
 	return $result;
105 105
 }
106 106
 
107
-function relist ($myconn,$user,$value,$type,$table,$expUnit,$expQ,$myreason, $exptime = 0) {
107
+function relist($myconn, $user, $value, $type, $table, $expUnit, $expQ, $myreason, $exptime = 0) {
108 108
 
109
-	$result=FALSE;
110
-	if ( $exptime ) { /* Entry already listed */
109
+	$result = FALSE;
110
+	if ($exptime) { /* Entry already listed */
111 111
 		$nlist = '`nlist`';
112
-		$exptime = sprintf('\'%s\'', $exptime);  /* Eh MySQL... an hour lost to notice this */
112
+		$exptime = sprintf('\'%s\'', $exptime); /* Eh MySQL... an hour lost to notice this */
113 113
 	}
114 114
 	else {
115 115
 		$exptime = 'CURRENT_TIMESTAMP';
@@ -118,43 +118,43 @@  discard block
 block discarded – undo
118 118
 
119 119
         switch ($type) {
120 120
 	  case 'ip':
121
-                $query= sprintf("UPDATE `$table` SET
121
+                $query = sprintf("UPDATE `$table` SET
122 122
 			`active` = '1',
123 123
 			`user` = '%s',
124 124
 			`exp` = TIMESTAMPADD(%s,%d,%s),
125 125
 			`nlist` = %s,
126 126
 			`reason` = '%s'
127
-			WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$value);
127
+			WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1", $user, $expUnit, $expQ, $exptime, $nlist, $myreason, $value);
128 128
 		break;
129 129
           case 'network':
130
-		list($sub['net'],$sub['mask'])=explode('/',$value);
131
-                $query= sprintf("UPDATE `$table` SET
130
+		list($sub['net'], $sub['mask']) = explode('/', $value);
131
+                $query = sprintf("UPDATE `$table` SET
132 132
                         `active` = '1',
133 133
                         `user` = '%s',
134 134
                         `exp` = TIMESTAMPADD(%s,%d,%s),
135 135
                         `nlist` = %s,
136 136
                         `reason` = '%s'
137
-                        WHERE (`$table`.`$type` = INET_ATON('%s') AND `$table`.`netmask` = INET_ATON('%s')) LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$sub['net'],$sub['mask']);
137
+                        WHERE (`$table`.`$type` = INET_ATON('%s') AND `$table`.`netmask` = INET_ATON('%s')) LIMIT 1", $user, $expUnit, $expQ, $exptime, $nlist, $myreason, $sub['net'], $sub['mask']);
138 138
 		break;
139 139
 	  default:
140
-                $query= sprintf("UPDATE `$table` SET
140
+                $query = sprintf("UPDATE `$table` SET
141 141
                         `active` = '1',
142 142
                         `user` = '%s',
143 143
                         `exp` = TIMESTAMPADD(%s,%d,%s),
144 144
                         `nlist` = %s,
145 145
                         `reason` = '%s'
146
-			WHERE `$table`.`$type` = '%s' LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$value);
146
+			WHERE `$table`.`$type` = '%s' LIMIT 1", $user, $expUnit, $expQ, $exptime, $nlist, $myreason, $value);
147 147
 	}
148 148
 
149 149
         if ($myconn->query($query) === TRUE) {
150 150
             syslog(LOG_INFO, "$user: relist $type <$value> on <$table> for $expQ $expUnit from $exptime.");
151
-		$result=TRUE;
151
+		$result = TRUE;
152 152
         }
153
-        else syslog (LOG_ERR, "$user: Error: ". $myconn->error);
153
+        else syslog(LOG_ERR, "$user: Error: ".$myconn->error);
154 154
 	return $result;
155 155
 }
156 156
 
157
-function remove ($myconn,$user,$value,$type,$table) {
157
+function remove($myconn, $user, $value, $type, $table) {
158 158
 
159 159
         switch ($type) {
160 160
           case 'ip':
@@ -162,10 +162,10 @@  discard block
 block discarded – undo
162 162
                         `$table`.`$type` = INET_ATON('%s') LIMIT 1", $value);
163 163
 		break;
164 164
 	  case 'network':
165
-		list($sub['net'],$sub['mask'])=explode('/',$value);
165
+		list($sub['net'], $sub['mask']) = explode('/', $value);
166 166
 		$query = sprintf("DELETE FROM `$table` WHERE
167 167
 			`$table`.`$type` = INET_ATON('%s') AND `$table`.`netmask` = INET_ATON('%s') LIMIT 1",
168
-			$sub['net'],$sub['mask']);
168
+			$sub['net'], $sub['mask']);
169 169
 		break;
170 170
 	  default:
171 171
 		$query = sprintf("DELETE FROM `$table` WHERE
@@ -173,39 +173,39 @@  discard block
 block discarded – undo
173 173
 	}
174 174
 
175 175
 
176
-        if ($return=$myconn->query($query) === TRUE) 
176
+        if ($return = $myconn->query($query) === TRUE) 
177 177
             syslog(LOG_INFO, "$user: permanently DELETED $type <$value> from <$table>.");
178
-        else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
178
+        else syslog(LOG_ERR, "$user: Error: ".$myconn->error);
179 179
 
180 180
         return $return;
181 181
 }
182 182
 
183 183
 
184
-function changestatus ($myconn,$user,$value,$status,$type,$table) {
184
+function changestatus($myconn, $user, $value, $status, $type, $table) {
185 185
 
186 186
 	switch ($type) {
187 187
           case 'ip':
188
-		$query= sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1" ,$user, $value);
188
+		$query = sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1", $user, $value);
189 189
 		break;
190 190
 	  case 'network':
191
-		list($sub['net'],$sub['mask'])=explode('/',$value);
192
-		$query= sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE (`$table`.`$type` = INET_ATON('%s') AND `$table`.`netmask` = INET_ATON('%s')) LIMIT 1" ,$user, $sub['net'],$sub['mask']);
191
+		list($sub['net'], $sub['mask']) = explode('/', $value);
192
+		$query = sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE (`$table`.`$type` = INET_ATON('%s') AND `$table`.`netmask` = INET_ATON('%s')) LIMIT 1", $user, $sub['net'], $sub['mask']);
193 193
 		break;
194 194
 	  default:
195
-		$query= sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = '%s' LIMIT 1" ,$user, $value);
195
+		$query = sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = '%s' LIMIT 1", $user, $value);
196 196
 	}
197 197
 
198
-        if ($return=$myconn->query($query) === TRUE) {
198
+        if ($return = $myconn->query($query) === TRUE) {
199 199
             syslog(LOG_INFO, "$user: change status of $type <$value>. The status is now <$status>");
200 200
         }
201
-        else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
201
+        else syslog(LOG_ERR, "$user: Error: ".$myconn->error);
202 202
 	return $return;	
203 203
 }
204 204
 
205 205
 
206
-function expire ($myconn,$user,$tables,$expireTime) {
207
-        $return=TRUE;
208
-	$log=array();
206
+function expire($myconn, $user, $tables, $expireTime) {
207
+        $return = TRUE;
208
+	$log = array();
209 209
 	$desc = array_keys($tables);
210 210
 	foreach ($desc as $tdesc) { 
211 211
 		/* QUERY */
@@ -224,11 +224,11 @@  discard block
 block discarded – undo
224 224
 			} while ($myconn->next_result());
225 225
 		}
226 226
 		else {
227
-			syslog(LOG_ERR, "Expire job - Error: ". $myconn->error);
227
+			syslog(LOG_ERR, "Expire job - Error: ".$myconn->error);
228 228
 			$return = FALSE;
229 229
 		}
230 230
 	}
231
-	if ( !($return) ) syslog(LOG_EMERG, 'End of Expire job with error. See above logs. SQL Connection terminated');
231
+	if (!($return)) syslog(LOG_EMERG, 'End of Expire job with error. See above logs. SQL Connection terminated');
232 232
 	else  syslog(LOG_INFO, 'Successfully End of Expire job. SQL Connection successfully terminated.');
233 233
         return $return;
234 234
 }
@@ -236,18 +236,18 @@  discard block
 block discarded – undo
236 236
 
237 237
 function isListed($row) {
238 238
 
239
-	$exp=new DateTime($row['exp']);
240
-	$now=new DateTime('NOW');
241
-	if (($exp > $now) and ($row['active'])) return true;
239
+	$exp = new DateTime($row['exp']);
240
+	$now = new DateTime('NOW');
241
+	if (($exp>$now) and ($row['active'])) return true;
242 242
 	else return false;
243 243
 
244 244
 }
245 245
 
246 246
 
247
-function askMilter($myconn,$id,$obj,$typedesc,$miltId,$value,$user,$adm)  {
248
-	$milts = readMiltName($myconn,$user);
247
+function askMilter($myconn, $id, $obj, $typedesc, $miltId, $value, $user, $adm) {
248
+	$milts = readMiltName($myconn, $user);
249 249
 	$size = count($milts);
250
-	if (in_array($user,array_keys($adm))) {
250
+	if (in_array($user, array_keys($adm))) {
251 251
 		$button = <<<END
252 252
 		<form style="margin:0; display:inline;" name="Milter$id" enctype="text/plain" method="post" target="_self" action="changeMilter.php" onSubmit="xmlhttpPost('changeMilter.php', 'Milter$id', 'id$id', '<img src=\'/include/pleasewait.gif\'>'); return false;" />
253 253
 		<input name="object" type="hidden" value="$obj" /><input name="oldvalues" type="hidden" value="$value" />
@@ -257,12 +257,12 @@  discard block
 block discarded – undo
257 257
 		<div class="noscroll">
258 258
 		<select class="input_text" name="newvalues[]" multiple size="$size">
259 259
 END;
260
-		$activeMilts = explode(',',$value);
261
-		foreach ( $milts as $milter ) {
262
-			if ( in_array($milter, $activeMilts) )
263
-				$selected= 'selected';
260
+		$activeMilts = explode(',', $value);
261
+		foreach ($milts as $milter) {
262
+			if (in_array($milter, $activeMilts))
263
+				$selected = 'selected';
264 264
 			else
265
-				$selected= NULL;
265
+				$selected = NULL;
266 266
 			$button .= sprintf('<option value="%s" %s>%s</option>', $milter, $selected, $milter);
267 267
 		}	
268 268
 		$button .= '</select></div><input class="button" name="Change" type="submit" value="Change" /></form>';
@@ -274,14 +274,14 @@  discard block
 block discarded – undo
274 274
 }
275 275
 
276 276
 
277
-function ask($myconn,$id,$what,$alltables,$typedesc,$value,$lock,$user,$adm) {
277
+function ask($myconn, $id, $what, $alltables, $typedesc, $value, $lock, $user, $adm) {
278 278
 
279
-	$whynot=NULL;
279
+	$whynot = NULL;
280 280
 	switch ($what) {
281 281
 		case 'Ok':
282 282
 			if ($lock) return NULL;
283
-			if (in_array($user,array_keys($adm)))
284
-				if ( consistentListing($myconn,$alltables,$typedesc,$value,$whynot) ) return require('relistButton.php');
283
+			if (in_array($user, array_keys($adm)))
284
+				if (consistentListing($myconn, $alltables, $typedesc, $value, $whynot)) return require('relistButton.php');
285 285
 			return htmlspecialchars($whynot);
286 286
 		case 'Listed':
287 287
 		case 'WhiteListed':
@@ -290,18 +290,18 @@  discard block
 block discarded – undo
290 290
 }
291 291
 
292 292
 
293
-function consistentListing($myconn,$alltables,$typed,$value,&$warn) {
293
+function consistentListing($myconn, $alltables, $typed, $value, &$warn) {
294 294
 /* Check if there are no pending mislisting */
295 295
 	$warn = NULL;
296
-	if (! isset($alltables["$typed"]['depend']) ) return TRUE;
296
+	if (!isset($alltables["$typed"]['depend'])) return TRUE;
297 297
 	foreach ($alltables["$typed"]['depend'] as $listdep) {
298
-		if ($alltables["$typed"]['field'] != $alltables["$listdep"]['field'] ) {
298
+		if ($alltables["$typed"]['field'] != $alltables["$listdep"]['field']) {
299 299
 			$warn = "Config ERROR: <$typed> and <$listdep> are of different types! I can't check consistency!";
300 300
 			return FALSE;
301 301
 		}
302
-		$entry = searchentry($myconn,$value,$alltables["$listdep"]);
303
-		if ( $entry->num_rows ) {
304
-			if ( $entry->num_rows == 1 ) {
302
+		$entry = searchentry($myconn, $value, $alltables["$listdep"]);
303
+		if ($entry->num_rows) {
304
+			if ($entry->num_rows == 1) {
305 305
 				$riga = $entry->fetch_array(MYSQLI_ASSOC);
306 306
                         	if (isListed($riga)) {
307 307
 					$warn = "<$value> is already present in <$listdep> list!";
@@ -309,7 +309,7 @@  discard block
 block discarded – undo
309 309
 					return FALSE;
310 310
 				}
311 311
 			}
312
-			if ( $entry->num_rows > 1 ) {$warn = "<$value> seems to be present more than once in <$listdep>. Contact a sysadmin NOW!";}
312
+			if ($entry->num_rows>1) {$warn = "<$value> seems to be present more than once in <$listdep>. Contact a sysadmin NOW!"; }
313 313
 		}
314 314
 		$entry->free();
315 315
 	}
@@ -317,20 +317,20 @@  discard block
 block discarded – undo
317 317
 	return TRUE;
318 318
 }
319 319
 
320
-function searchentry ($myconn,$value,$tablelist) {
320
+function searchentry($myconn, $value, $tablelist) {
321 321
 /* Make a MYSQL query and return result */
322 322
 
323 323
         $type = $tablelist['field'];
324 324
 	
325
-	if ( $tablelist['milter'] ) {
325
+	if ($tablelist['milter']) {
326 326
 		$table = milterTable($type);
327 327
 		if ($value == 'ALL')
328 328
 			$query = sprintf('SELECT *, GROUP_CONCAT(milt.name) as miltnames FROM `%s` LEFT JOIN milt ON (%s.idmilt=milt.id) GROUP by idmilt',
329
-				$table,$table);
329
+				$table, $table);
330 330
 		else {
331 331
 			switch ($type) {
332 332
 				case 'network':
333
-					list($sub['net'],$sub['mask'])=explode('/',$value);
333
+					list($sub['net'], $sub['mask']) = explode('/', $value);
334 334
 					$query = sprintf('SELECT * FROM (
335 335
 							SELECT *, GROUP_CONCAT(milt.name) as miltnames FROM `%s` LEFT JOIN milt ON (%s.idmilt=milt.id)
336 336
 				 				WHERE (
@@ -348,7 +348,7 @@  discard block
 block discarded – undo
348 348
 							 ) AS val WHERE val.ip IS NOT null', $table, $table, $value);
349 349
 					break;
350 350
 				default:
351
-					syslog(LOG_EMERG, 'ALERT: The type <'.$type.'> is not allowed for milter lists.' );
351
+					syslog(LOG_EMERG, 'ALERT: The type <'.$type.'> is not allowed for milter lists.');
352 352
 					return FALSE;
353 353
 			}
354 354
 		}
@@ -360,11 +360,11 @@  discard block
 block discarded – undo
360 360
 	        else {
361 361
 	                switch ($type) {
362 362
 	                  case 'ip':
363
-	                        $query= "select * from $table where $type =  INET_ATON('$value')";
363
+	                        $query = "select * from $table where $type =  INET_ATON('$value')";
364 364
 	                        break;
365 365
 	                  case 'network':
366
-	                        list($sub['net'],$sub['mask'])=explode('/',$value);
367
-	                        $query= sprintf('select * from `%s`
366
+	                        list($sub['net'], $sub['mask']) = explode('/', $value);
367
+	                        $query = sprintf('select * from `%s`
368 368
 						WHERE (
369 369
 							inet_aton(\'%s\') >= network AND
370 370
 							( inet_aton(\'%s\') | ( inet_aton(\'%s\') ^ (power(2,32)-1) ) )
@@ -373,18 +373,18 @@  discard block
 block discarded – undo
373 373
 ;
374 374
 	                        break;
375 375
 	                  default:
376
-	                        $query= "select * from $table where $type = '$value'";
376
+	                        $query = "select * from $table where $type = '$value'";
377 377
 	                }
378 378
 	        }
379 379
 	}
380 380
 
381 381
 	$result = $myconn->query($query);
382
-	if($result === false)
382
+	if ($result === false)
383 383
 		syslog(LOG_EMERG, "ALERT: Query <$query> failed: ".$myconn->error);
384 384
         return $result;
385 385
 }
386 386
 
387
-function countListed ($myconn,$table) {
387
+function countListed($myconn, $table) {
388 388
 /* Return number of current listed items into a rbl table */
389 389
 	$query = "SELECT COUNT(*) as `count` FROM `$table` WHERE (`active`=1 AND TIMESTAMPDIFF(MICROSECOND,NOW(),`exp`)>0) GROUP BY `active` ORDER BY `count` DESC LIMIT 1";
390 390
 	$row = $myconn->query($query);
@@ -395,27 +395,27 @@  discard block
 block discarded – undo
395 395
 }
396 396
 
397 397
 
398
-function isFull($myconn,$typedesc,$alltables) {
398
+function isFull($myconn, $typedesc, $alltables) {
399 399
         if (isset($alltables["$typedesc"]['limit'])) {
400
-		if ( $alltables["$typedesc"]['milter'] )
400
+		if ($alltables["$typedesc"]['milter'])
401 401
 			$tab = 'net';
402 402
 		else
403 403
 			$tab = $alltables["$typedesc"]['name'];
404
-                if ( countListed($myconn,$tab) >= $alltables["$typedesc"]['limit'] ) 
404
+                if (countListed($myconn, $tab)>=$alltables["$typedesc"]['limit']) 
405 405
                         return TRUE;
406 406
         }
407 407
 	return FALSE;
408 408
 }
409 409
 
410
-function rlookup ($myconn,$user,$adm,$value,$typedesc,$tables) {
410
+function rlookup($myconn, $user, $adm, $value, $typedesc, $tables) {
411 411
 
412 412
 	$type = $tables["$typedesc"]['field'];
413
-	$whynot=NULL;
413
+	$whynot = NULL;
414 414
 
415 415
 	$tabhtm = <<<END
416 416
 	<table><thead><tr><th>$type</th><th title="The date this object has been listed for the first time">DateAdd</th><th>DateMod</th><th>Exp</th><th>Status</th><th title="Number of times this object has been listed">#List</th>
417 417
 END;
418
-	if ( $tables["$typedesc"]['milter'] )
418
+	if ($tables["$typedesc"]['milter'])
419 419
 		$tabhtm .= '<th title="Milter active for this object">Milters</th>';
420 420
 	$tabhtm .= '<th>Authored by</th><th width="250">Reason</th><th>Action</th></tr></thead><tfoot><tr></tr></tfoot><tbody>'."\n";
421 421
 
@@ -424,24 +424,24 @@  discard block
 block discarded – undo
424 424
 	if (is_null($value))
425 425
 		return FALSE;
426 426
 
427
-	$result = searchentry ($myconn,$value,$tables["$typedesc"]);
427
+	$result = searchentry($myconn, $value, $tables["$typedesc"]);
428 428
 	if ($result) {
429 429
 		printf("<pre>Your request for $type &lt;$value&gt; returned %d items.\n</pre>", $result->num_rows);
430 430
 
431 431
         /* Check for limit in number of listed items */
432
-	$full = isFull($myconn,$typedesc,$tables);
432
+	$full = isFull($myconn, $typedesc, $tables);
433 433
 	if ($full) print '<p>'.htmlspecialchars("$typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items.').'</p>';
434 434
 
435 435
 		if ($result->num_rows) {
436 436
 			print $tabhtm;
437
-			$i=0;
437
+			$i = 0;
438 438
         		while ($riga = $result->fetch_array(MYSQLI_ASSOC)) {
439 439
 				if (isListed($riga)) {
440
-					if ($tables["$typedesc"]['bl']) $listed='Listed';
441
-					else $listed='WhiteListed';
440
+					if ($tables["$typedesc"]['bl']) $listed = 'Listed';
441
+					else $listed = 'WhiteListed';
442 442
 				}	
443 443
 				else
444
-					$listed='Ok';
444
+					$listed = 'Ok';
445 445
 
446 446
 				switch ($type) {
447 447
 				  case 'ip':
@@ -454,20 +454,20 @@  discard block
 block discarded – undo
454 454
 					$element = $riga["$type"];
455 455
 				}
456 456
 
457
-				if ( $tables["$typedesc"]['milter'] AND checkMilterConf($tables["$typedesc"]) )
458
-					printf ("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td nowrap id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
459
-					$element, $riga['date'], $riga['datemod'], $riga['exp'], $riga['active'], $riga['nlist'], askMilter($myconn,$i,$element,$typedesc,$riga['idmilt'],$riga['miltnames'],$user,$adm), $riga['user'],htmlspecialchars($riga['reason']),ask($myconn,$i,$listed,$tables,$typedesc,$element,$full,$user,$adm));
457
+				if ($tables["$typedesc"]['milter'] AND checkMilterConf($tables["$typedesc"]))
458
+					printf("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td nowrap id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
459
+					$element, $riga['date'], $riga['datemod'], $riga['exp'], $riga['active'], $riga['nlist'], askMilter($myconn, $i, $element, $typedesc, $riga['idmilt'], $riga['miltnames'], $user, $adm), $riga['user'], htmlspecialchars($riga['reason']), ask($myconn, $i, $listed, $tables, $typedesc, $element, $full, $user, $adm));
460 460
 				else
461
-					 printf ("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
462
-					$element, $riga['date'], $riga['datemod'], $riga['exp'], $riga['active'], $riga['nlist'], $riga['user'],htmlspecialchars($riga['reason']),ask($myconn,$i,$listed,$tables,$typedesc,$element,$full,$user,$adm));
461
+					 printf("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
462
+					$element, $riga['date'], $riga['datemod'], $riga['exp'], $riga['active'], $riga['nlist'], $riga['user'], htmlspecialchars($riga['reason']), ask($myconn, $i, $listed, $tables, $typedesc, $element, $full, $user, $adm));
463 463
 				$i++;
464 464
         		}
465 465
 			print '</tbody></table>';
466 466
 		}
467 467
 		else {
468 468
 			print "<pre>$type &lt;$value&gt; is not listed!\n</pre>";
469
-			if ( in_array($user,array_keys($adm)) AND ($value != 'ALL') )
470
-				if ( (!$full) AND (consistentListing($myconn,$tables,$typedesc,$value,$whynot)) ) require_once('listForm.php');
469
+			if (in_array($user, array_keys($adm)) AND ($value != 'ALL'))
470
+				if ((!$full) AND (consistentListing($myconn, $tables, $typedesc, $value, $whynot))) require_once('listForm.php');
471 471
 									else print '<p>'.htmlspecialchars($whynot).'</p>';
472 472
 				
473 473
 		}
@@ -479,12 +479,12 @@  discard block
 block discarded – undo
479 479
 
480 480
 
481 481
         
482
-function sendEmailWarn($tplf,$from,$to,$sbj,$emailListed,$intervalToExpire,$detail) {
482
+function sendEmailWarn($tplf, $from, $to, $sbj, $emailListed, $intervalToExpire, $detail) {
483 483
 	$now = time();
484
-        setlocale (LC_TIME, 'it_IT');
485
-        $date = date("r",$now);
486
-	$messageID = md5(uniqid($now,1)) . '@' . gethostname();
487
-	$mua = 'PHP/' . phpversion();
484
+        setlocale(LC_TIME, 'it_IT');
485
+        $date = date("r", $now);
486
+	$messageID = md5(uniqid($now, 1)).'@'.gethostname();
487
+	$mua = 'PHP/'.phpversion();
488 488
 
489 489
 	/* Parsing headers */
490 490
 	if (!file_exists($tplf['header'])) {
@@ -493,10 +493,10 @@  discard block
 block discarded – undo
493 493
 	}
494 494
 
495 495
 	$head_tmpl = file_get_contents($tplf['header']);
496
-	$arr_tpl_vars = array('{from}','{to}','{date}','{messageID}','{mua}');
497
-	$arr_tpl_data = array($from,$to,$date,$messageID,$mua);
496
+	$arr_tpl_vars = array('{from}', '{to}', '{date}', '{messageID}', '{mua}');
497
+	$arr_tpl_data = array($from, $to, $date, $messageID, $mua);
498 498
 	$headers = str_replace($arr_tpl_vars, $arr_tpl_data, $head_tmpl);
499
-	$headers = preg_replace( '/\r|\n/', "\r\n", $headers );
499
+	$headers = preg_replace('/\r|\n/', "\r\n", $headers);
500 500
 
501 501
         /* Parsing body */
502 502
 
@@ -506,62 +506,62 @@  discard block
 block discarded – undo
506 506
         }
507 507
 
508 508
         $body_tmpl = file_get_contents($tplf['body']);
509
-        $arr_tpl_vars = array('{emailListed}','{expInterval}','{reason}');
510
-        $arr_tpl_data = array($emailListed,$intervalToExpire,$detail);
509
+        $arr_tpl_vars = array('{emailListed}', '{expInterval}', '{reason}');
510
+        $arr_tpl_data = array($emailListed, $intervalToExpire, $detail);
511 511
         $body = str_replace($arr_tpl_vars, $arr_tpl_data, $body_tmpl);
512
-        $body = preg_replace( "/\r|\n/", "\r\n", $body );
513
-	$body = wordwrap ( $body, 75 , "\r\n" );	
512
+        $body = preg_replace("/\r|\n/", "\r\n", $body);
513
+	$body = wordwrap($body, 75, "\r\n");	
514 514
 
515 515
 	/* Send the mail! */
516
-        if ( strlen(ini_get("safe_mode"))< 1) {
516
+        if (strlen(ini_get("safe_mode"))<1) {
517 517
                 $old_mailfrom = ini_get("sendmail_from");
518 518
                 ini_set("sendmail_from", $from);
519 519
                 $params = sprintf("-oi -f %s", '<>');
520
-                if (!(mail($to,$sbj, $body,$headers,$params))) $flag=FALSE;
521
-                else $flag=TRUE;
520
+                if (!(mail($to, $sbj, $body, $headers, $params))) $flag = FALSE;
521
+                else $flag = TRUE;
522 522
                 if (isset($old_mailfrom))
523 523
                         ini_set("sendmail_from", $old_mailfrom);
524 524
         }
525 525
         else {
526
-                if (!(mail($to,$sbj, $body,$headers))) $flag=FALSE;
527
-                else $flag=TRUE;
526
+                if (!(mail($to, $sbj, $body, $headers))) $flag = FALSE;
527
+                else $flag = TRUE;
528 528
         }
529 529
         return $flag;
530 530
 }
531 531
 
532
-function emailToNotify($notify_file,$dom) {
532
+function emailToNotify($notify_file, $dom) {
533 533
 	$ini_array = parse_ini_file($notify_file);
534
-	if (in_array($dom,array_keys($ini_array)))
534
+	if (in_array($dom, array_keys($ini_array)))
535 535
 		return $ini_array["$dom"];
536 536
 	else return FALSE;
537 537
 }
538 538
 
539 539
 
540
-function searchAndList ($myconn,$loguser,$tables,$typedesc,$value,$unit,&$quantity,&$reason) {
540
+function searchAndList($myconn, $loguser, $tables, $typedesc, $value, $unit, &$quantity, &$reason) {
541 541
 
542 542
 /* Search and list value */
543 543
         $type = $tables["$typedesc"]['field'];
544 544
         $table = $tables["$typedesc"]['name'];
545
-        $result = searchentry ($myconn,$value,$tables["$typedesc"]);
545
+        $result = searchentry($myconn, $value, $tables["$typedesc"]);
546 546
 
547 547
         /* Manage abnormal conditions */
548 548
         /* Value already present in db more than once. This is absurd. Panic! */
549
-        if ($result->num_rows > 1) {
550
-                syslog(LOG_EMERG,"$loguser: PANIC! Select for $type '$value' returned ". $result->num_rows ." items instead of one. Abnormal. Contact a sysadmin or a developer.");
549
+        if ($result->num_rows>1) {
550
+                syslog(LOG_EMERG, "$loguser: PANIC! Select for $type '$value' returned ".$result->num_rows." items instead of one. Abnormal. Contact a sysadmin or a developer.");
551 551
                 $result->free();
552 552
                 return FALSE;
553 553
         }
554 554
 
555 555
         /* Value already present in db or not present: to list anyway */
556
-        if ($result->num_rows >= 0) {
556
+        if ($result->num_rows>=0) {
557 557
                 /* First, check for limit in number of listed items */
558
-                if (isFull($myconn,$typedesc,$tables)) {
559
-                        syslog(LOG_EMERG,"$loguser: $typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items. Abnormal exit.');
558
+                if (isFull($myconn, $typedesc, $tables)) {
559
+                        syslog(LOG_EMERG, "$loguser: $typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items. Abnormal exit.');
560 560
                         $result->free();
561 561
                         return FALSE;
562 562
                 }
563 563
                 /* Second, check if the (re)list would be consistent now */
564
-                if (! consistentListing($myconn,$tables,$typedesc,$value,$whynot) ) {
564
+                if (!consistentListing($myconn, $tables, $typedesc, $value, $whynot)) {
565 565
                         syslog(LOG_ERR, $loguser.': '.$whynot);
566 566
                         $result->free();
567 567
                         return FALSE;
@@ -575,7 +575,7 @@  discard block
 block discarded – undo
575 575
         switch ($result->num_rows) {
576 576
                 /* Relist value if already present */
577 577
                 case 1:
578
-                        if ( isListed($thisentry) ) {
578
+                        if (isListed($thisentry)) {
579 579
 				/* Entry already listed */
580 580
 				$expdate = $thisentry['exp'];
581 581
 				$reason = sprintf('%s. Already listed. Adding 1 DAY to previous expire date.',
@@ -589,33 +589,33 @@  discard block
 block discarded – undo
589 589
 				$expdate = 0; /* This forces expiration from CURRENT_TIMESTAMP */
590 590
 			}
591 591
 			$result->free();
592
-                        return relist ($myconn,$loguser,$value,$type,$table,$unit,$quantity,$reason, $expdate);
592
+                        return relist($myconn, $loguser, $value, $type, $table, $unit, $quantity, $reason, $expdate);
593 593
 
594 594
                 /* First time list value */
595 595
                 case 0:
596 596
                         $result->free();
597
-                        return addtolist ($myconn,$loguser,$value,$tables["$typedesc"],$unit,$quantity,$reason,$_);
597
+                        return addtolist($myconn, $loguser, $value, $tables["$typedesc"], $unit, $quantity, $reason, $_);
598 598
         }
599 599
 }
600 600
 
601 601
 
602 602
 /*************** Functions to check if two net overlap each other ********************/
603 603
 
604
-function ipRange ($range) {
604
+function ipRange($range) {
605 605
 /* List IP in range */
606
-	return array_map('long2ip', range( ip2long($range[0]), ip2long($range[1]) ) );
606
+	return array_map('long2ip', range(ip2long($range[0]), ip2long($range[1])));
607 607
 }
608 608
 
609 609
 function isIn($netA, $netB) {
610 610
 /* TRUE if an IP of $netA is contained in netB */
611
-	list($addressA,$maskA) = explode('/', $netA);
612
-	list($addressB,$maskB) = explode('/', $netB);
611
+	list($addressA, $maskA) = explode('/', $netA);
612
+	list($addressB, $maskB) = explode('/', $netB);
613 613
 	require_once 'vendor/autoload.php';
614 614
 	$net = new \dautkom\ipv4\IPv4();
615 615
 	$range = $net->address($addressA)->mask($maskA)->getRange();
616 616
 	$ips = ipRange($range);
617
-	foreach ( $ips as $ip )
618
-		if ( $net->address($addressB)->mask($maskB)->has($ip) )
617
+	foreach ($ips as $ip)
618
+		if ($net->address($addressB)->mask($maskB)->has($ip))
619 619
 			return TRUE;
620 620
 	return FALSE;
621 621
 }
@@ -627,11 +627,11 @@  discard block
 block discarded – undo
627 627
 		syslog(LOG_ERR, $loguser.': '.$tabletype['name'].' is not a network list.');
628 628
 		return FALSE;
629 629
 	}
630
-	$result = searchentry ($myconn,'ALL',$tabletype);
630
+	$result = searchentry($myconn, 'ALL', $tabletype);
631 631
         if ($result->num_rows) {
632 632
 		while ($row = $result->fetch_array(MYSQLI_ASSOC)) {
633 633
 			$thisNet = long2ip($row['network']).'/'.long2ip($row['netmask']);
634
-			if ( isIn($thisNet, $net) ) {
634
+			if (isIn($thisNet, $net)) {
635 635
 				$result->free();
636 636
 				syslog(LOG_INFO, "$loguser: the net <$net> overlaps the existing network <$thisNet>.");
637 637
 				return TRUE;
@@ -648,8 +648,8 @@  discard block
 block discarded – undo
648 648
 /* For miltermap */
649 649
 function checkMilterConf($table) {
650 650
 	if (isset($table['milter'])) {
651
-        	if ($table['milter'] ===  TRUE) {
652
-			switch ( $table['field'] ) {
651
+        	if ($table['milter'] === TRUE) {
652
+			switch ($table['field']) {
653 653
 				case 'network':
654 654
 				case 'ip':
655 655
 					return TRUE;
@@ -683,12 +683,12 @@  discard block
 block discarded – undo
683 683
 }
684 684
 
685 685
 
686
-function readMiltName($myconn,$loguser) {
687
-	$milters=array();
686
+function readMiltName($myconn, $loguser) {
687
+	$milters = array();
688 688
 	$query = 'SELECT `name` FROM `config`';
689 689
 
690 690
         $result = $myconn->query($query);
691
-        if($result === false) {
691
+        if ($result === false) {
692 692
                 syslog(LOG_EMERG, "$loguser: ALERT: Query <$query> failed: ".$myconn->error);
693 693
 		return FALSE;
694 694
 	}
@@ -700,27 +700,27 @@  discard block
 block discarded – undo
700 700
 	return $milters;
701 701
 }
702 702
 
703
-function changeMilter ($myconn,$loguser,$miltVal,$table,$miltID) {
703
+function changeMilter($myconn, $loguser, $miltVal, $table, $miltID) {
704 704
 	$query = array();
705
-	foreach ( $miltVal as $value => $action ) {
706
-		switch ( $action ) {
705
+	foreach ($miltVal as $value => $action) {
706
+		switch ($action) {
707 707
 			case 'keep':
708 708
 				break;
709 709
 			case 'add':
710
-				$query[] = sprintf( "INSERT INTO `milt` (
710
+				$query[] = sprintf("INSERT INTO `milt` (
711 711
                 		        	`id` ,
712 712
                         			`name` 
713 713
                 			)
714 714
                 			VALUES (
715 715
                         			%d ,
716 716
 						'%s'
717
-					)",$miltID,$value);
717
+					)",$miltID, $value);
718 718
 				break;
719 719
 			case 'del':
720 720
 				$query[] = "DELETE FROM  `milt` WHERE (`id` = '$miltID' AND `name` = '$value')";
721 721
 		}
722 722
 	}
723
-	if ( count($query) ) /* This "if" is redundant, because if I call this I already checked there is a change */
723
+	if (count($query)) /* This "if" is redundant, because if I call this I already checked there is a change */
724 724
 		/* I update datemod because the user couldn't change */
725 725
 		$query[] = sprintf('UPDATE `%s` SET
726 726
 						`user`=\'%s\',
@@ -732,18 +732,18 @@  discard block
 block discarded – undo
732 732
 	$myconn->autocommit(FALSE);
733 733
 	$myconn->begin_transaction(MYSQLI_TRANS_START_READ_ONLY);
734 734
 	$ok = TRUE;
735
-	foreach ( $query as $q ) {
735
+	foreach ($query as $q) {
736 736
 		if ($myconn->query($q) !== TRUE) {
737 737
 			$ok = FALSE;
738 738
 			syslog(LOG_ERR, "$loguser: Error: ".$myconn->error);
739 739
 		}
740 740
 	}
741
-	if ( $ok ) {
742
-		if ( $myconn->commit() )
741
+	if ($ok) {
742
+		if ($myconn->commit())
743 743
 			syslog(LOG_INFO, "$loguser: Milter setting changed successfully.");
744 744
 		else {
745 745
 			syslog(LOG_ERR, "$loguser: Milter setting NOT changed for an unpredictable COMMIT error.");
746
-			if ( $myconn->rollback() )
746
+			if ($myconn->rollback())
747 747
 				syslog(LOG_INFO, "$loguser: rollback succeeded.");
748 748
 			else
749 749
 				syslog(LOG_ERR, "$loguser: rollback failed. Your db could be compromized. Check it!");
@@ -760,15 +760,15 @@  discard block
 block discarded – undo
760 760
 function curl_get($url, array $get = NULL, array $options = array(), $loguser)
761 761
 {
762 762
     $defaults = array(
763
-        CURLOPT_URL => $url. (strpos($url, '?') === FALSE ? '?' : ''). http_build_query($get),
763
+        CURLOPT_URL => $url.(strpos($url, '?') === FALSE ? '?' : '').http_build_query($get),
764 764
         CURLOPT_HEADER => 0,
765 765
         CURLOPT_RETURNTRANSFER => TRUE,
766 766
         CURLOPT_TIMEOUT => 4
767 767
     );
768 768
 
769 769
     $ch = curl_init();
770
-    curl_setopt_array($ch, ($options + $defaults));
771
-    if( ! $result = curl_exec($ch))
770
+    curl_setopt_array($ch, ($options+$defaults));
771
+    if (!$result = curl_exec($ch))
772 772
     {
773 773
         syslog(LOG_ERR, sprintf('%s: CURL Error: <%s>', $loguser, curl_error($ch)));
774 774
     }
@@ -780,19 +780,19 @@  discard block
 block discarded – undo
780 780
 function nsdom($dom) {
781 781
 /* Return the first upper domain (or domain itself) with NS record */
782 782
 /* checkdnsrr doesn't work with alias... use dns_get_record */
783
-	if (dns_get_record ( $dom , DNS_NS ))
783
+	if (dns_get_record($dom, DNS_NS))
784 784
 		return rtrim($dom, '.');
785
-	if (dns_get_record ( $dom , DNS_A )) 
786
-		return nsdom( ltrim(strstr($dom, '.'), '.') );
785
+	if (dns_get_record($dom, DNS_A)) 
786
+		return nsdom(ltrim(strstr($dom, '.'), '.'));
787 787
 	return NULL;
788 788
 }
789 789
 
790 790
 function isValid($dom) {
791 791
 /* Return TRUE id domain has NS or A record */
792
-	if (preg_match('/^(?!:\/\/)([a-zA-Z0-9-]+\.){0,5}[a-zA-Z0-9-][a-zA-Z0-9-]+\.[a-zA-Z]{2,64}?\.{0,1}$/i',$dom) === 1) {
793
-		if (checkdnsrr ( $dom , 'NS' ))
792
+	if (preg_match('/^(?!:\/\/)([a-zA-Z0-9-]+\.){0,5}[a-zA-Z0-9-][a-zA-Z0-9-]+\.[a-zA-Z]{2,64}?\.{0,1}$/i', $dom) === 1) {
793
+		if (checkdnsrr($dom, 'NS'))
794 794
 			return TRUE;
795
-		if (checkdnsrr ( $dom , 'A' ))
795
+		if (checkdnsrr($dom, 'A'))
796 796
 			return TRUE;
797 797
 	}
798 798
 	return FALSE;
Please login to merge, or discard this patch.
Braces   +152 added lines, -103 removed lines patch added patch discarded remove patch
@@ -3,22 +3,27 @@  discard block
 block discarded – undo
3 3
 ini_set('error_log', 'syslog');
4 4
 
5 5
 function username() {
6
-	if (isset ($_SERVER['REMOTE_USER'])) $user = $_SERVER['REMOTE_USER'];
7
-        	else if (isset ($_SERVER['USER'])) $user = $_SERVER['USER'];
8
-                	else $user='unknown';
6
+	if (isset ($_SERVER['REMOTE_USER'])) {
7
+		$user = $_SERVER['REMOTE_USER'];
8
+	} else if (isset ($_SERVER['USER'])) {
9
+        		$user = $_SERVER['USER'];
10
+        	} else {
11
+                		$user='unknown';
12
+                	}
9 13
 	return $user;
10 14
 }
11 15
 
12 16
 function checkSSL() {
13
-	if ( empty( $_SERVER['HTTPS'] ) )
14
-		printf ('<div id="content">Ehi sysadmin! Your site is not secure. Please enable SSL on your server and configure a redirect, such as' .
17
+	if ( empty( $_SERVER['HTTPS'] ) ) {
18
+			printf ('<div id="content">Ehi sysadmin! Your site is not secure. Please enable SSL on your server and configure a redirect, such as' .
15 19
 			'<pre>' .
16 20
 			htmlspecialchars('<VirtualHost *:80>' . "\n" .
17 21
 			'  ServerName %s' . "\n" .
18 22
 			'  Redirect permanent / https://%s/' . "\n" .
19 23
 			'</VirtualHost>') .
20 24
 			'</pre></div>', gethostname(), gethostname());
21
-}
25
+	}
26
+	}
22 27
 
23 28
 function myConnect($host, $user, $pass, $db, $port, $tablelist, $typedesc, $loguser) {
24 29
         $db = ( $tablelist["$typedesc"]['milter'] ) ? $tablelist["$typedesc"]['name'] : $db;
@@ -99,8 +104,9 @@  discard block
 block discarded – undo
99 104
 	if ($myconn->query($query) === TRUE) {
100 105
 	    syslog(LOG_INFO, "$user: $type <$value> successfully listed on <$table> for $expQ $expUnit.");
101 106
 	    $result=TRUE;
107
+	} else {
108
+		syslog(LOG_ERR, "$user: Error: ".$myconn->error);
102 109
 	}
103
-	else syslog(LOG_ERR, "$user: Error: ".$myconn->error);
104 110
 	return $result;
105 111
 }
106 112
 
@@ -110,8 +116,7 @@  discard block
 block discarded – undo
110 116
 	if ( $exptime ) { /* Entry already listed */
111 117
 		$nlist = '`nlist`';
112 118
 		$exptime = sprintf('\'%s\'', $exptime);  /* Eh MySQL... an hour lost to notice this */
113
-	}
114
-	else {
119
+	} else {
115 120
 		$exptime = 'CURRENT_TIMESTAMP';
116 121
 		$nlist = '`nlist` + 1';
117 122
 	}
@@ -149,8 +154,9 @@  discard block
 block discarded – undo
149 154
         if ($myconn->query($query) === TRUE) {
150 155
             syslog(LOG_INFO, "$user: relist $type <$value> on <$table> for $expQ $expUnit from $exptime.");
151 156
 		$result=TRUE;
157
+        } else {
158
+        	syslog (LOG_ERR, "$user: Error: ". $myconn->error);
152 159
         }
153
-        else syslog (LOG_ERR, "$user: Error: ". $myconn->error);
154 160
 	return $result;
155 161
 }
156 162
 
@@ -173,9 +179,11 @@  discard block
 block discarded – undo
173 179
 	}
174 180
 
175 181
 
176
-        if ($return=$myconn->query($query) === TRUE) 
177
-            syslog(LOG_INFO, "$user: permanently DELETED $type <$value> from <$table>.");
178
-        else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
182
+        if ($return=$myconn->query($query) === TRUE) {
183
+                    syslog(LOG_INFO, "$user: permanently DELETED $type <$value> from <$table>.");
184
+        } else {
185
+        	syslog(LOG_ERR, "$user: Error: ". $myconn->error);
186
+        }
179 187
 
180 188
         return $return;
181 189
 }
@@ -197,8 +205,9 @@  discard block
 block discarded – undo
197 205
 
198 206
         if ($return=$myconn->query($query) === TRUE) {
199 207
             syslog(LOG_INFO, "$user: change status of $type <$value>. The status is now <$status>");
208
+        } else {
209
+        	syslog(LOG_ERR, "$user: Error: ". $myconn->error);
200 210
         }
201
-        else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
202 211
 	return $return;	
203 212
 }
204 213
 
@@ -222,14 +231,16 @@  discard block
 block discarded – undo
222 231
 				$j++;
223 232
 
224 233
 			} while ($myconn->next_result());
225
-		}
226
-		else {
234
+		} else {
227 235
 			syslog(LOG_ERR, "Expire job - Error: ". $myconn->error);
228 236
 			$return = FALSE;
229 237
 		}
230 238
 	}
231
-	if ( !($return) ) syslog(LOG_EMERG, 'End of Expire job with error. See above logs. SQL Connection terminated');
232
-	else  syslog(LOG_INFO, 'Successfully End of Expire job. SQL Connection successfully terminated.');
239
+	if ( !($return) ) {
240
+		syslog(LOG_EMERG, 'End of Expire job with error. See above logs. SQL Connection terminated');
241
+	} else {
242
+		syslog(LOG_INFO, 'Successfully End of Expire job. SQL Connection successfully terminated.');
243
+	}
233 244
         return $return;
234 245
 }
235 246
 
@@ -238,8 +249,11 @@  discard block
 block discarded – undo
238 249
 
239 250
 	$exp=new DateTime($row['exp']);
240 251
 	$now=new DateTime('NOW');
241
-	if (($exp > $now) and ($row['active'])) return true;
242
-	else return false;
252
+	if (($exp > $now) and ($row['active'])) {
253
+		return true;
254
+	} else {
255
+		return false;
256
+	}
243 257
 
244 258
 }
245 259
 
@@ -259,10 +273,11 @@  discard block
 block discarded – undo
259 273
 END;
260 274
 		$activeMilts = explode(',',$value);
261 275
 		foreach ( $milts as $milter ) {
262
-			if ( in_array($milter, $activeMilts) )
263
-				$selected= 'selected';
264
-			else
265
-				$selected= NULL;
276
+			if ( in_array($milter, $activeMilts) ) {
277
+							$selected= 'selected';
278
+			} else {
279
+							$selected= NULL;
280
+			}
266 281
 			$button .= sprintf('<option value="%s" %s>%s</option>', $milter, $selected, $milter);
267 282
 		}	
268 283
 		$button .= '</select></div><input class="button" name="Change" type="submit" value="Change" /></form>';
@@ -279,9 +294,12 @@  discard block
 block discarded – undo
279 294
 	$whynot=NULL;
280 295
 	switch ($what) {
281 296
 		case 'Ok':
282
-			if ($lock) return NULL;
283
-			if (in_array($user,array_keys($adm)))
284
-				if ( consistentListing($myconn,$alltables,$typedesc,$value,$whynot) ) return require('relistButton.php');
297
+			if ($lock) {
298
+				return NULL;
299
+			}
300
+			if (in_array($user,array_keys($adm))) {
301
+							if ( consistentListing($myconn,$alltables,$typedesc,$value,$whynot) ) return require('relistButton.php');
302
+			}
285 303
 			return htmlspecialchars($whynot);
286 304
 		case 'Listed':
287 305
 		case 'WhiteListed':
@@ -293,7 +311,9 @@  discard block
 block discarded – undo
293 311
 function consistentListing($myconn,$alltables,$typed,$value,&$warn) {
294 312
 /* Check if there are no pending mislisting */
295 313
 	$warn = NULL;
296
-	if (! isset($alltables["$typed"]['depend']) ) return TRUE;
314
+	if (! isset($alltables["$typed"]['depend']) ) {
315
+		return TRUE;
316
+	}
297 317
 	foreach ($alltables["$typed"]['depend'] as $listdep) {
298 318
 		if ($alltables["$typed"]['field'] != $alltables["$listdep"]['field'] ) {
299 319
 			$warn = "Config ERROR: <$typed> and <$listdep> are of different types! I can't check consistency!";
@@ -324,10 +344,10 @@  discard block
 block discarded – undo
324 344
 	
325 345
 	if ( $tablelist['milter'] ) {
326 346
 		$table = milterTable($type);
327
-		if ($value == 'ALL')
328
-			$query = sprintf('SELECT *, GROUP_CONCAT(milt.name) as miltnames FROM `%s` LEFT JOIN milt ON (%s.idmilt=milt.id) GROUP by idmilt',
347
+		if ($value == 'ALL') {
348
+					$query = sprintf('SELECT *, GROUP_CONCAT(milt.name) as miltnames FROM `%s` LEFT JOIN milt ON (%s.idmilt=milt.id) GROUP by idmilt',
329 349
 				$table,$table);
330
-		else {
350
+		} else {
331 351
 			switch ($type) {
332 352
 				case 'network':
333 353
 					list($sub['net'],$sub['mask'])=explode('/',$value);
@@ -352,12 +372,11 @@  discard block
 block discarded – undo
352 372
 					return FALSE;
353 373
 			}
354 374
 		}
355
-	}
356
-
357
-	else {
375
+	} else {
358 376
 	        $table = $tablelist['name'];
359
-	        if ($value == 'ALL') $query = 'select * from '.$table;
360
-	        else {
377
+	        if ($value == 'ALL') {
378
+	        	$query = 'select * from '.$table;
379
+	        } else {
361 380
 	                switch ($type) {
362 381
 	                  case 'ip':
363 382
 	                        $query= "select * from $table where $type =  INET_ATON('$value')";
@@ -379,8 +398,9 @@  discard block
 block discarded – undo
379 398
 	}
380 399
 
381 400
 	$result = $myconn->query($query);
382
-	if($result === false)
383
-		syslog(LOG_EMERG, "ALERT: Query <$query> failed: ".$myconn->error);
401
+	if($result === false) {
402
+			syslog(LOG_EMERG, "ALERT: Query <$query> failed: ".$myconn->error);
403
+	}
384 404
         return $result;
385 405
 }
386 406
 
@@ -397,12 +417,14 @@  discard block
 block discarded – undo
397 417
 
398 418
 function isFull($myconn,$typedesc,$alltables) {
399 419
         if (isset($alltables["$typedesc"]['limit'])) {
400
-		if ( $alltables["$typedesc"]['milter'] )
401
-			$tab = 'net';
402
-		else
403
-			$tab = $alltables["$typedesc"]['name'];
404
-                if ( countListed($myconn,$tab) >= $alltables["$typedesc"]['limit'] ) 
405
-                        return TRUE;
420
+		if ( $alltables["$typedesc"]['milter'] ) {
421
+					$tab = 'net';
422
+		} else {
423
+					$tab = $alltables["$typedesc"]['name'];
424
+		}
425
+                if ( countListed($myconn,$tab) >= $alltables["$typedesc"]['limit'] ) {
426
+                                        return TRUE;
427
+                }
406 428
         }
407 429
 	return FALSE;
408 430
 }
@@ -415,14 +437,17 @@  discard block
 block discarded – undo
415 437
 	$tabhtm = <<<END
416 438
 	<table><thead><tr><th>$type</th><th title="The date this object has been listed for the first time">DateAdd</th><th>DateMod</th><th>Exp</th><th>Status</th><th title="Number of times this object has been listed">#List</th>
417 439
 END;
418
-	if ( $tables["$typedesc"]['milter'] )
419
-		$tabhtm .= '<th title="Milter active for this object">Milters</th>';
440
+	if ( $tables["$typedesc"]['milter'] ) {
441
+			$tabhtm .= '<th title="Milter active for this object">Milters</th>';
442
+	}
420 443
 	$tabhtm .= '<th>Authored by</th><th width="250">Reason</th><th>Action</th></tr></thead><tfoot><tr></tr></tfoot><tbody>'."\n";
421 444
 
422
-	if ($type == 'domain')
423
-		$value = nsdom($value);
424
-	if (is_null($value))
425
-		return FALSE;
445
+	if ($type == 'domain') {
446
+			$value = nsdom($value);
447
+	}
448
+	if (is_null($value)) {
449
+			return FALSE;
450
+	}
426 451
 
427 452
 	$result = searchentry ($myconn,$value,$tables["$typedesc"]);
428 453
 	if ($result) {
@@ -430,18 +455,23 @@  discard block
 block discarded – undo
430 455
 
431 456
         /* Check for limit in number of listed items */
432 457
 	$full = isFull($myconn,$typedesc,$tables);
433
-	if ($full) print '<p>'.htmlspecialchars("$typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items.').'</p>';
458
+	if ($full) {
459
+		print '<p>'.htmlspecialchars("$typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items.').'</p>';
460
+	}
434 461
 
435 462
 		if ($result->num_rows) {
436 463
 			print $tabhtm;
437 464
 			$i=0;
438 465
         		while ($riga = $result->fetch_array(MYSQLI_ASSOC)) {
439 466
 				if (isListed($riga)) {
440
-					if ($tables["$typedesc"]['bl']) $listed='Listed';
441
-					else $listed='WhiteListed';
442
-				}	
443
-				else
444
-					$listed='Ok';
467
+					if ($tables["$typedesc"]['bl']) {
468
+						$listed='Listed';
469
+					} else {
470
+						$listed='WhiteListed';
471
+					}
472
+				} else {
473
+									$listed='Ok';
474
+				}
445 475
 
446 476
 				switch ($type) {
447 477
 				  case 'ip':
@@ -454,27 +484,30 @@  discard block
 block discarded – undo
454 484
 					$element = $riga["$type"];
455 485
 				}
456 486
 
457
-				if ( $tables["$typedesc"]['milter'] AND checkMilterConf($tables["$typedesc"]) )
458
-					printf ("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td nowrap id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
487
+				if ( $tables["$typedesc"]['milter'] AND checkMilterConf($tables["$typedesc"]) ) {
488
+									printf ("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td nowrap id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
459 489
 					$element, $riga['date'], $riga['datemod'], $riga['exp'], $riga['active'], $riga['nlist'], askMilter($myconn,$i,$element,$typedesc,$riga['idmilt'],$riga['miltnames'],$user,$adm), $riga['user'],htmlspecialchars($riga['reason']),ask($myconn,$i,$listed,$tables,$typedesc,$element,$full,$user,$adm));
460
-				else
461
-					 printf ("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
490
+				} else {
491
+									 printf ("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
462 492
 					$element, $riga['date'], $riga['datemod'], $riga['exp'], $riga['active'], $riga['nlist'], $riga['user'],htmlspecialchars($riga['reason']),ask($myconn,$i,$listed,$tables,$typedesc,$element,$full,$user,$adm));
493
+				}
463 494
 				$i++;
464 495
         		}
465 496
 			print '</tbody></table>';
466
-		}
467
-		else {
497
+		} else {
468 498
 			print "<pre>$type &lt;$value&gt; is not listed!\n</pre>";
469
-			if ( in_array($user,array_keys($adm)) AND ($value != 'ALL') )
470
-				if ( (!$full) AND (consistentListing($myconn,$tables,$typedesc,$value,$whynot)) ) require_once('listForm.php');
471
-									else print '<p>'.htmlspecialchars($whynot).'</p>';
499
+			if ( in_array($user,array_keys($adm)) AND ($value != 'ALL') ) {
500
+							if ( (!$full) AND (consistentListing($myconn,$tables,$typedesc,$value,$whynot)) ) require_once('listForm.php');
501
+			} else {
502
+										print '<p>'.htmlspecialchars($whynot).'</p>';
503
+									}
472 504
 				
473 505
 		}
474 506
 		$result->free();
507
+	} else {
508
+		print '<pre>Query error or something wrong in DB schema'."\n</pre>";
509
+	}
475 510
 	}
476
-	else print '<pre>Query error or something wrong in DB schema'."\n</pre>";
477
-}
478 511
 
479 512
 
480 513
 
@@ -517,24 +550,32 @@  discard block
 block discarded – undo
517 550
                 $old_mailfrom = ini_get("sendmail_from");
518 551
                 ini_set("sendmail_from", $from);
519 552
                 $params = sprintf("-oi -f %s", '<>');
520
-                if (!(mail($to,$sbj, $body,$headers,$params))) $flag=FALSE;
521
-                else $flag=TRUE;
522
-                if (isset($old_mailfrom))
523
-                        ini_set("sendmail_from", $old_mailfrom);
524
-        }
525
-        else {
526
-                if (!(mail($to,$sbj, $body,$headers))) $flag=FALSE;
527
-                else $flag=TRUE;
553
+                if (!(mail($to,$sbj, $body,$headers,$params))) {
554
+                	$flag=FALSE;
555
+                } else {
556
+                	$flag=TRUE;
557
+                }
558
+                if (isset($old_mailfrom)) {
559
+                                        ini_set("sendmail_from", $old_mailfrom);
560
+                }
561
+        } else {
562
+                if (!(mail($to,$sbj, $body,$headers))) {
563
+                	$flag=FALSE;
564
+                } else {
565
+                	$flag=TRUE;
566
+                }
528 567
         }
529 568
         return $flag;
530 569
 }
531 570
 
532 571
 function emailToNotify($notify_file,$dom) {
533 572
 	$ini_array = parse_ini_file($notify_file);
534
-	if (in_array($dom,array_keys($ini_array)))
535
-		return $ini_array["$dom"];
536
-	else return FALSE;
537
-}
573
+	if (in_array($dom,array_keys($ini_array))) {
574
+			return $ini_array["$dom"];
575
+	} else {
576
+		return FALSE;
577
+	}
578
+	}
538 579
 
539 580
 
540 581
 function searchAndList ($myconn,$loguser,$tables,$typedesc,$value,$unit,&$quantity,&$reason) {
@@ -582,8 +623,7 @@  discard block
 block discarded – undo
582 623
 					 $reason);
583 624
 				$quantity = 1;
584 625
 				$unit = 'DAY';
585
-                        }
586
-			else {
626
+                        } else {
587 627
                         	/* Entry delisted */
588 628
 				$quantity *= $thisentry['nlist'];
589 629
 				$expdate = 0; /* This forces expiration from CURRENT_TIMESTAMP */
@@ -614,9 +654,10 @@  discard block
 block discarded – undo
614 654
 	$net = new \dautkom\ipv4\IPv4();
615 655
 	$range = $net->address($addressA)->mask($maskA)->getRange();
616 656
 	$ips = ipRange($range);
617
-	foreach ( $ips as $ip )
618
-		if ( $net->address($addressB)->mask($maskB)->has($ip) )
657
+	foreach ( $ips as $ip ) {
658
+			if ( $net->address($addressB)->mask($maskB)->has($ip) )
619 659
 			return TRUE;
660
+	}
620 661
 	return FALSE;
621 662
 }
622 663
 
@@ -693,8 +734,9 @@  discard block
 block discarded – undo
693 734
 		return FALSE;
694 735
 	}
695 736
 	if ($result->num_rows) {
696
-		while ($milt = $result->fetch_array(MYSQLI_ASSOC))
697
-			$milters[] = $milt['name'];
737
+		while ($milt = $result->fetch_array(MYSQLI_ASSOC)) {
738
+					$milters[] = $milt['name'];
739
+		}
698 740
 	}
699 741
 	$result->free();
700 742
 	return $milters;
@@ -720,12 +762,14 @@  discard block
 block discarded – undo
720 762
 				$query[] = "DELETE FROM  `milt` WHERE (`id` = '$miltID' AND `name` = '$value')";
721 763
 		}
722 764
 	}
723
-	if ( count($query) ) /* This "if" is redundant, because if I call this I already checked there is a change */
765
+	if ( count($query) ) {
766
+		/* This "if" is redundant, because if I call this I already checked there is a change */
724 767
 		/* I update datemod because the user couldn't change */
725 768
 		$query[] = sprintf('UPDATE `%s` SET
726 769
 						`user`=\'%s\',
727 770
 						`datemod`= CURRENT_TIMESTAMP
728 771
 					 WHERE `idmilt`=%d', $table, $loguser, $miltID);
772
+	}
729 773
 
730 774
 
731 775
 	/* Start a safe transaction: it commits only if all queries happen */
@@ -739,19 +783,20 @@  discard block
 block discarded – undo
739 783
 		}
740 784
 	}
741 785
 	if ( $ok ) {
742
-		if ( $myconn->commit() )
743
-			syslog(LOG_INFO, "$loguser: Milter setting changed successfully.");
744
-		else {
786
+		if ( $myconn->commit() ) {
787
+					syslog(LOG_INFO, "$loguser: Milter setting changed successfully.");
788
+		} else {
745 789
 			syslog(LOG_ERR, "$loguser: Milter setting NOT changed for an unpredictable COMMIT error.");
746
-			if ( $myconn->rollback() )
747
-				syslog(LOG_INFO, "$loguser: rollback succeeded.");
748
-			else
749
-				syslog(LOG_ERR, "$loguser: rollback failed. Your db could be compromized. Check it!");
790
+			if ( $myconn->rollback() ) {
791
+							syslog(LOG_INFO, "$loguser: rollback succeeded.");
792
+			} else {
793
+							syslog(LOG_ERR, "$loguser: rollback failed. Your db could be compromized. Check it!");
794
+			}
750 795
 			$ok = FALSE;
751 796
 		}
797
+	} else {
798
+			syslog(LOG_ERR, "$loguser: Error: Milter setting NOT changed. See at above errors.");
752 799
 	}
753
-	else
754
-		syslog(LOG_ERR, "$loguser: Error: Milter setting NOT changed. See at above errors.");
755 800
 	return $ok;
756 801
 		
757 802
 }
@@ -780,20 +825,24 @@  discard block
 block discarded – undo
780 825
 function nsdom($dom) {
781 826
 /* Return the first upper domain (or domain itself) with NS record */
782 827
 /* checkdnsrr doesn't work with alias... use dns_get_record */
783
-	if (dns_get_record ( $dom , DNS_NS ))
784
-		return rtrim($dom, '.');
785
-	if (dns_get_record ( $dom , DNS_A )) 
786
-		return nsdom( ltrim(strstr($dom, '.'), '.') );
828
+	if (dns_get_record ( $dom , DNS_NS )) {
829
+			return rtrim($dom, '.');
830
+	}
831
+	if (dns_get_record ( $dom , DNS_A )) {
832
+			return nsdom( ltrim(strstr($dom, '.'), '.') );
833
+	}
787 834
 	return NULL;
788 835
 }
789 836
 
790 837
 function isValid($dom) {
791 838
 /* Return TRUE id domain has NS or A record */
792 839
 	if (preg_match('/^(?!:\/\/)([a-zA-Z0-9-]+\.){0,5}[a-zA-Z0-9-][a-zA-Z0-9-]+\.[a-zA-Z]{2,64}?\.{0,1}$/i',$dom) === 1) {
793
-		if (checkdnsrr ( $dom , 'NS' ))
794
-			return TRUE;
795
-		if (checkdnsrr ( $dom , 'A' ))
796
-			return TRUE;
840
+		if (checkdnsrr ( $dom , 'NS' )) {
841
+					return TRUE;
842
+		}
843
+		if (checkdnsrr ( $dom , 'A' )) {
844
+					return TRUE;
845
+		}
797 846
 	}
798 847
 	return FALSE;
799 848
 }
Please login to merge, or discard this patch.
contrib/splunk/webhook/readPost.php 3 patches
Indentation   +49 added lines, -49 removed lines patch added patch discarded remove patch
@@ -26,17 +26,17 @@  discard block
 block discarded – undo
26 26
 
27 27
  /* Conf */
28 28
 if (!isset($_GET['conf'])) {
29
-        syslog(LOG_ALERT,
30
-        sprintf('%s: you must insert the config file name as a GET parameter, such as %s?conf=listEmail.conf',
31
-                $user, $_SERVER['SCRIPT_NAME']) );
32
-        exit(254);
29
+		syslog(LOG_ALERT,
30
+		sprintf('%s: you must insert the config file name as a GET parameter, such as %s?conf=listEmail.conf',
31
+				$user, $_SERVER['SCRIPT_NAME']) );
32
+		exit(254);
33 33
 }
34 34
 $fileconf = $_GET['conf'];
35 35
 if ( !file_exists(dirname(__FILE__) . '/../' . $fileconf) ) {
36
-        syslog(LOG_ALERT,
37
-        sprintf('%s: the configuration file <%s> doesn\'t exist.',
38
-                $user, $fileconf ));
39
-        exit(254);
36
+		syslog(LOG_ALERT,
37
+		sprintf('%s: the configuration file <%s> doesn\'t exist.',
38
+				$user, $fileconf ));
39
+		exit(254);
40 40
 }
41 41
 
42 42
 closelog();
@@ -64,8 +64,8 @@  discard block
 block discarded – undo
64 64
 
65 65
 /* check you select a blocklist */
66 66
 if ( !$tables["$typedesc"]['bl'] ) {
67
-        syslog(LOG_EMERG,"$user: <$typedesc> is not a blocklist. Are you stupid? Do you want to whitelist a spammer? I refuse to continue.");
68
-        exit (254);
67
+		syslog(LOG_EMERG,"$user: <$typedesc> is not a blocklist. Are you stupid? Do you want to whitelist a spammer? I refuse to continue.");
68
+		exit (254);
69 69
 }
70 70
 
71 71
 
@@ -95,15 +95,15 @@  discard block
 block discarded – undo
95 95
 if (preg_match_all('/^https?\:\/\/(?<splunkhost>[\w\.\-]+)\:8000\/app\/(?<splunkapp>[\w\.\-]+)\/\@go\?sid=(?<job>[\w\.\-\d]+)$/',
96 96
 	$webhook['results_link'], $out, PREG_PATTERN_ORDER) === FALSE) {
97 97
 	syslog(LOG_ALERT,
98
-        	sprintf('%s: unexpected error: can\'t parse the results link returned by webhook (<%s>).',
98
+			sprintf('%s: unexpected error: can\'t parse the results link returned by webhook (<%s>).',
99 99
 		$user, $webhook['results_link']) );
100 100
 	return 255;
101 101
 }
102 102
 
103 103
 if ( $webhook['app'] != $out['splunkapp'][0] ) {
104 104
 	syslog(LOG_ALERT,
105
-        	sprintf('%s: unexpected error: the APP returned by webhook (<%s>) doesn\'t match the app (<%s>) in result link.',
106
-                $user, $webhook['app'], $out['splunkapp'][0] ) );
105
+			sprintf('%s: unexpected error: the APP returned by webhook (<%s>) doesn\'t match the app (<%s>) in result link.',
106
+				$user, $webhook['app'], $out['splunkapp'][0] ) );
107 107
 	return 255;
108 108
 }
109 109
 
@@ -137,14 +137,14 @@  discard block
 block discarded – undo
137 137
 
138 138
 $nr = count ($results);
139 139
 for ($i=1; $i<$nr; $i++) {	/* We skip first header line (i=0) */
140
-        $data = str_getcsv($results[$i], ',');
141
-        $thisVal = $data[1];
142
-        unset($data[1]);
143
-        $data = array_values($data);
144
-        if ( !in_array($thisVal,array_keys($tolist))  )
145
-	        $tolist["$thisVal"] = $data;
146
-        else if ($data[3]>$tolist[$thisVal][3])
147
-	        $tolist["$thisVal"] = $data;
140
+		$data = str_getcsv($results[$i], ',');
141
+		$thisVal = $data[1];
142
+		unset($data[1]);
143
+		$data = array_values($data);
144
+		if ( !in_array($thisVal,array_keys($tolist))  )
145
+			$tolist["$thisVal"] = $data;
146
+		else if ($data[3]>$tolist[$thisVal][3])
147
+			$tolist["$thisVal"] = $data;
148 148
 }
149 149
 
150 150
 /* Make MYSQL connection */
@@ -154,34 +154,34 @@  discard block
 block discarded – undo
154 154
 	exit (254);
155 155
 
156 156
 foreach ( array_keys($tolist) as $value) {
157
-        $quantity = $conf['quantity'];
158
-        $reason = 'On ['.$tolist["$value"][0]."] <$value> sent ".$tolist["$value"][1].' messages to '.$tolist["$value"][2].' recipients.';
159
-        if ( $tolist["$value"][3] >= $threshold ) {
160
-                if ( searchAndList ($mysqli,$user,$tables,$typedesc,$value,$unit,$quantity,$reason) ) {
161
-                        syslog (LOG_INFO, "$user: ".'Listing reason: '.$reason);
162
-                        /* Send a email to domain admin if you list an email */
163
-                        if ( ( $tables["$typedesc"]['field'] == 'email' ) OR ( $tables["$typedesc"]['field'] == 'username' ) ) {
164
-                                /* Sometime uid are in the form of <user>@<domain> ... */
165
-                                if ( strpos($value, '@') !== FALSE ) {
166
-                                        $domain = substr(strrchr($value, '@'), 1);
167
-                                        if ( strpos($domain, '@') === FALSE ) {
168
-                                                $recip = emailToNotify($domainNotify_file,$domain);
169
-                                                $subject = sprintf('%s <%s> is now blocked because exceedes limits on outgoing emails',
170
-                                                                $tables["$typedesc"]['field'], $value);
171
-                                                if (!empty($recip))
172
-                                                        if ( sendEmailWarn($tplfile,'[email protected]',$recip,
173
-                                                                $subject,$value,"$quantity $unit",$reason) )
174
-                                                                syslog(LOG_INFO, "$user: \"$recip\" was notified about the \"$value\" abuse.");
175
-                                        }
176
-                                        else syslog(LOG_ERR,"$user: <$domain> contains the '@' char. Notification cannot be sent.");
177
-                                }
178
-                        }
179
-                }
180
-        }
181
-        else {
182
-                $reason .= " But it has NOT been listed because it doesn't apply to the trigger condition.";
183
-                syslog (LOG_INFO, "$user: ".$reason);
184
-        }
157
+		$quantity = $conf['quantity'];
158
+		$reason = 'On ['.$tolist["$value"][0]."] <$value> sent ".$tolist["$value"][1].' messages to '.$tolist["$value"][2].' recipients.';
159
+		if ( $tolist["$value"][3] >= $threshold ) {
160
+				if ( searchAndList ($mysqli,$user,$tables,$typedesc,$value,$unit,$quantity,$reason) ) {
161
+						syslog (LOG_INFO, "$user: ".'Listing reason: '.$reason);
162
+						/* Send a email to domain admin if you list an email */
163
+						if ( ( $tables["$typedesc"]['field'] == 'email' ) OR ( $tables["$typedesc"]['field'] == 'username' ) ) {
164
+								/* Sometime uid are in the form of <user>@<domain> ... */
165
+								if ( strpos($value, '@') !== FALSE ) {
166
+										$domain = substr(strrchr($value, '@'), 1);
167
+										if ( strpos($domain, '@') === FALSE ) {
168
+												$recip = emailToNotify($domainNotify_file,$domain);
169
+												$subject = sprintf('%s <%s> is now blocked because exceedes limits on outgoing emails',
170
+																$tables["$typedesc"]['field'], $value);
171
+												if (!empty($recip))
172
+														if ( sendEmailWarn($tplfile,'[email protected]',$recip,
173
+																$subject,$value,"$quantity $unit",$reason) )
174
+																syslog(LOG_INFO, "$user: \"$recip\" was notified about the \"$value\" abuse.");
175
+										}
176
+										else syslog(LOG_ERR,"$user: <$domain> contains the '@' char. Notification cannot be sent.");
177
+								}
178
+						}
179
+				}
180
+		}
181
+		else {
182
+				$reason .= " But it has NOT been listed because it doesn't apply to the trigger condition.";
183
+				syslog (LOG_INFO, "$user: ".$reason);
184
+		}
185 185
 }
186 186
 
187 187
 /* Close connection */
Please login to merge, or discard this patch.
Spacing   +33 added lines, -33 removed lines patch added patch discarded remove patch
@@ -16,11 +16,11 @@  discard block
 block discarded – undo
16 16
 
17 17
 /************** Conf *******************/
18 18
 $base = '/var/www/html/RBL';
19
-require_once($base . '/config.php');
19
+require_once($base.'/config.php');
20 20
 
21 21
  /* Syslog basic */
22
-$tag            .= 'SplunkLister';
23
-$user		 = 'Splunk';
22
+$tag .= 'SplunkLister';
23
+$user = 'Splunk';
24 24
 
25 25
 openlog($tag, LOG_PID, $fac);
26 26
 
@@ -28,43 +28,43 @@  discard block
 block discarded – undo
28 28
 if (!isset($_GET['conf'])) {
29 29
         syslog(LOG_ALERT,
30 30
         sprintf('%s: you must insert the config file name as a GET parameter, such as %s?conf=listEmail.conf',
31
-                $user, $_SERVER['SCRIPT_NAME']) );
31
+                $user, $_SERVER['SCRIPT_NAME']));
32 32
         exit(254);
33 33
 }
34 34
 $fileconf = $_GET['conf'];
35
-if ( !file_exists(dirname(__FILE__) . '/../' . $fileconf) ) {
35
+if (!file_exists(dirname(__FILE__).'/../'.$fileconf)) {
36 36
         syslog(LOG_ALERT,
37 37
         sprintf('%s: the configuration file <%s> doesn\'t exist.',
38
-                $user, $fileconf ));
38
+                $user, $fileconf));
39 39
         exit(254);
40 40
 }
41 41
 
42 42
 closelog();
43
-$conf = parse_ini_file( dirname(__FILE__) . '/../' . $fileconf );
43
+$conf = parse_ini_file(dirname(__FILE__).'/../'.$fileconf);
44 44
 
45 45
  /* Splunk inherited parameters */
46
-$threshold = $conf['threshold'];         /* Threshold value on trigger condition; the same which engage the alert */
46
+$threshold = $conf['threshold']; /* Threshold value on trigger condition; the same which engage the alert */
47 47
 
48 48
  /* Blacklist name */
49 49
 $typedesc  = $conf['typedesc'];
50 50
 
51 51
  /* How long to list's parameters */
52
-$unit = $conf['unit'];          /* MySQL language ;) */
52
+$unit = $conf['unit']; /* MySQL language ;) */
53 53
 
54 54
  /* Syslog extended info */
55
-$tag            .= $conf['tag'];
55
+$tag .= $conf['tag'];
56 56
 
57 57
  /* Splunk password of alert owner*/
58 58
 $splpwd = $conf['splunkpassword'];
59 59
 /************** End of conf *************************/
60 60
 
61 61
 openlog($tag, LOG_PID, $fac);
62
-require_once($base . '/function.php');
62
+require_once($base.'/function.php');
63 63
 
64 64
 
65 65
 /* check you select a blocklist */
66
-if ( !$tables["$typedesc"]['bl'] ) {
67
-        syslog(LOG_EMERG,"$user: <$typedesc> is not a blocklist. Are you stupid? Do you want to whitelist a spammer? I refuse to continue.");
66
+if (!$tables["$typedesc"]['bl']) {
67
+        syslog(LOG_EMERG, "$user: <$typedesc> is not a blocklist. Are you stupid? Do you want to whitelist a spammer? I refuse to continue.");
68 68
         exit (254);
69 69
 }
70 70
 
@@ -96,14 +96,14 @@  discard block
 block discarded – undo
96 96
 	$webhook['results_link'], $out, PREG_PATTERN_ORDER) === FALSE) {
97 97
 	syslog(LOG_ALERT,
98 98
         	sprintf('%s: unexpected error: can\'t parse the results link returned by webhook (<%s>).',
99
-		$user, $webhook['results_link']) );
99
+		$user, $webhook['results_link']));
100 100
 	return 255;
101 101
 }
102 102
 
103
-if ( $webhook['app'] != $out['splunkapp'][0] ) {
103
+if ($webhook['app'] != $out['splunkapp'][0]) {
104 104
 	syslog(LOG_ALERT,
105 105
         	sprintf('%s: unexpected error: the APP returned by webhook (<%s>) doesn\'t match the app (<%s>) in result link.',
106
-                $user, $webhook['app'], $out['splunkapp'][0] ) );
106
+                $user, $webhook['app'], $out['splunkapp'][0]));
107 107
 	return 255;
108 108
 }
109 109
 
@@ -135,13 +135,13 @@  discard block
 block discarded – undo
135 135
 
136 136
 $tolist = array();
137 137
 
138
-$nr = count ($results);
139
-for ($i=1; $i<$nr; $i++) {	/* We skip first header line (i=0) */
138
+$nr = count($results);
139
+for ($i = 1; $i<$nr; $i++) {	/* We skip first header line (i=0) */
140 140
         $data = str_getcsv($results[$i], ',');
141 141
         $thisVal = $data[1];
142 142
         unset($data[1]);
143 143
         $data = array_values($data);
144
-        if ( !in_array($thisVal,array_keys($tolist))  )
144
+        if (!in_array($thisVal, array_keys($tolist)))
145 145
 	        $tolist["$thisVal"] = $data;
146 146
         else if ($data[3]>$tolist[$thisVal][3])
147 147
 	        $tolist["$thisVal"] = $data;
@@ -150,42 +150,42 @@  discard block
 block discarded – undo
150 150
 /* Make MYSQL connection */
151 151
 
152 152
 $mysqli = myConnect($host, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user);
153
-if ( $mysqli === FALSE )
153
+if ($mysqli === FALSE)
154 154
 	exit (254);
155 155
 
156
-foreach ( array_keys($tolist) as $value) {
156
+foreach (array_keys($tolist) as $value) {
157 157
         $quantity = $conf['quantity'];
158 158
         $reason = 'On ['.$tolist["$value"][0]."] <$value> sent ".$tolist["$value"][1].' messages to '.$tolist["$value"][2].' recipients.';
159
-        if ( $tolist["$value"][3] >= $threshold ) {
160
-                if ( searchAndList ($mysqli,$user,$tables,$typedesc,$value,$unit,$quantity,$reason) ) {
161
-                        syslog (LOG_INFO, "$user: ".'Listing reason: '.$reason);
159
+        if ($tolist["$value"][3]>=$threshold) {
160
+                if (searchAndList($mysqli, $user, $tables, $typedesc, $value, $unit, $quantity, $reason)) {
161
+                        syslog(LOG_INFO, "$user: ".'Listing reason: '.$reason);
162 162
                         /* Send a email to domain admin if you list an email */
163
-                        if ( ( $tables["$typedesc"]['field'] == 'email' ) OR ( $tables["$typedesc"]['field'] == 'username' ) ) {
163
+                        if (($tables["$typedesc"]['field'] == 'email') OR ($tables["$typedesc"]['field'] == 'username')) {
164 164
                                 /* Sometime uid are in the form of <user>@<domain> ... */
165
-                                if ( strpos($value, '@') !== FALSE ) {
165
+                                if (strpos($value, '@') !== FALSE) {
166 166
                                         $domain = substr(strrchr($value, '@'), 1);
167
-                                        if ( strpos($domain, '@') === FALSE ) {
168
-                                                $recip = emailToNotify($domainNotify_file,$domain);
167
+                                        if (strpos($domain, '@') === FALSE) {
168
+                                                $recip = emailToNotify($domainNotify_file, $domain);
169 169
                                                 $subject = sprintf('%s <%s> is now blocked because exceedes limits on outgoing emails',
170 170
                                                                 $tables["$typedesc"]['field'], $value);
171 171
                                                 if (!empty($recip))
172
-                                                        if ( sendEmailWarn($tplfile,'[email protected]',$recip,
173
-                                                                $subject,$value,"$quantity $unit",$reason) )
172
+                                                        if (sendEmailWarn($tplfile, '[email protected]', $recip,
173
+                                                                $subject, $value, "$quantity $unit", $reason))
174 174
                                                                 syslog(LOG_INFO, "$user: \"$recip\" was notified about the \"$value\" abuse.");
175 175
                                         }
176
-                                        else syslog(LOG_ERR,"$user: <$domain> contains the '@' char. Notification cannot be sent.");
176
+                                        else syslog(LOG_ERR, "$user: <$domain> contains the '@' char. Notification cannot be sent.");
177 177
                                 }
178 178
                         }
179 179
                 }
180 180
         }
181 181
         else {
182 182
                 $reason .= " But it has NOT been listed because it doesn't apply to the trigger condition.";
183
-                syslog (LOG_INFO, "$user: ".$reason);
183
+                syslog(LOG_INFO, "$user: ".$reason);
184 184
         }
185 185
 }
186 186
 
187 187
 /* Close connection */
188
-syslog (LOG_INFO, "$user: ".'Successfully end of session.');
188
+syslog(LOG_INFO, "$user: ".'Successfully end of session.');
189 189
 $mysqli->close();
190 190
 closelog();
191 191
 
Please login to merge, or discard this patch.
Braces   +14 added lines, -11 removed lines patch added patch discarded remove patch
@@ -141,17 +141,19 @@  discard block
 block discarded – undo
141 141
         $thisVal = $data[1];
142 142
         unset($data[1]);
143 143
         $data = array_values($data);
144
-        if ( !in_array($thisVal,array_keys($tolist))  )
145
-	        $tolist["$thisVal"] = $data;
146
-        else if ($data[3]>$tolist[$thisVal][3])
147
-	        $tolist["$thisVal"] = $data;
148
-}
144
+        if ( !in_array($thisVal,array_keys($tolist))  ) {
145
+        	        $tolist["$thisVal"] = $data;
146
+        } else if ($data[3]>$tolist[$thisVal][3]) {
147
+        	        $tolist["$thisVal"] = $data;
148
+        }
149
+        }
149 150
 
150 151
 /* Make MYSQL connection */
151 152
 
152 153
 $mysqli = myConnect($host, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user);
153
-if ( $mysqli === FALSE )
154
+if ( $mysqli === FALSE ) {
154 155
 	exit (254);
156
+}
155 157
 
156 158
 foreach ( array_keys($tolist) as $value) {
157 159
         $quantity = $conf['quantity'];
@@ -168,17 +170,18 @@  discard block
 block discarded – undo
168 170
                                                 $recip = emailToNotify($domainNotify_file,$domain);
169 171
                                                 $subject = sprintf('%s <%s> is now blocked because exceedes limits on outgoing emails',
170 172
                                                                 $tables["$typedesc"]['field'], $value);
171
-                                                if (!empty($recip))
172
-                                                        if ( sendEmailWarn($tplfile,'[email protected]',$recip,
173
+                                                if (!empty($recip)) {
174
+                                                                                                        if ( sendEmailWarn($tplfile,'[email protected]',$recip,
173 175
                                                                 $subject,$value,"$quantity $unit",$reason) )
174 176
                                                                 syslog(LOG_INFO, "$user: \"$recip\" was notified about the \"$value\" abuse.");
177
+                                                }
178
+                                        } else {
179
+                                        	syslog(LOG_ERR,"$user: <$domain> contains the '@' char. Notification cannot be sent.");
175 180
                                         }
176
-                                        else syslog(LOG_ERR,"$user: <$domain> contains the '@' char. Notification cannot be sent.");
177 181
                                 }
178 182
                         }
179 183
                 }
180
-        }
181
-        else {
184
+        } else {
182 185
                 $reason .= " But it has NOT been listed because it doesn't apply to the trigger condition.";
183 186
                 syslog (LOG_INFO, "$user: ".$reason);
184 187
         }
Please login to merge, or discard this patch.
index.php 2 patches
Spacing   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -14,11 +14,11 @@  discard block
 block discarded – undo
14 14
 require_once('function.php');
15 15
 
16 16
 checkSSL();
17
-if ( $require_auth )
18
-	if ( username() == 'unknown' ) exit ("<p>You MUST configure your server to use authentication.</p>");
17
+if ($require_auth)
18
+	if (username() == 'unknown') exit ("<p>You MUST configure your server to use authentication.</p>");
19 19
 
20 20
 
21
-if ( $imapListActive )
21
+if ($imapListActive)
22 22
 	print ' <p style="text-align: right"><a href="/spamreport" target="_new">SPAM Learn Observer</a></p>';
23 23
 
24 24
 print <<<END
@@ -27,10 +27,10 @@  discard block
 block discarded – undo
27 27
 END;
28 28
 
29 29
 
30
-$option=NULL;
30
+$option = NULL;
31 31
 $desc = array_keys($tables);
32 32
 foreach ($desc as $description) { 
33
-	$disabled = $tables["$description"]['active']==TRUE ? '' : ' disabled';  
33
+	$disabled = $tables["$description"]['active'] == TRUE ? '' : ' disabled';  
34 34
 	$option .= '<option value="'.$description."\"$disabled>$description</option>";
35 35
 	}
36 36
 
Please login to merge, or discard this patch.
Braces   +4 added lines, -2 removed lines patch added patch discarded remove patch
@@ -14,12 +14,14 @@
 block discarded – undo
14 14
 require_once('function.php');
15 15
 
16 16
 checkSSL();
17
-if ( $require_auth )
17
+if ( $require_auth ) {
18 18
 	if ( username() == 'unknown' ) exit ("<p>You MUST configure your server to use authentication.</p>");
19
+}
19 20
 
20 21
 
21
-if ( $imapListActive )
22
+if ( $imapListActive ) {
22 23
 	print ' <p style="text-align: right"><a href="/spamreport" target="_new">SPAM Learn Observer</a></p>';
24
+}
23 25
 
24 26
 print <<<END
25 27
 <form name="check" action="result.php" onSubmit="xmlhttpPost('result.php', 'check', 'Risultato', '<img src=\'/include/pleasewait.gif\'>'); return false;" enctype="text/plain" method="post" target="_self">
Please login to merge, or discard this patch.
contrib/mailClassifier/result.php 3 patches
Indentation   +26 added lines, -26 removed lines patch added patch discarded remove patch
@@ -27,32 +27,32 @@
 block discarded – undo
27 27
 
28 28
 
29 29
 $data = array(
30
-                'date' => NULL,
31
-                'from' => NULL,
32
-                'messageid' => NULL,
33
-                'dmarc' => array(
34
-                        'result' => NULL,
35
-                        'dom'   => NULL
36
-                        ),
37
-                'spf' => array(
38
-                        'result' => NULL,
39
-                        'dom'   => NULL
40
-                        ),
41
-                'dkim' => array(
42
-                        'result' => NULL,
43
-                        'dom'   => NULL
44
-                        ),
45
-                'spam' => array(
46
-                        'status' => NULL,
47
-                        'score' => NULL,
48
-                        'th'    => NULL,
49
-                        ),
50
-                'dspam' => array(
51
-                        'type' => NULL,
52
-                        'level' => NULL,
53
-                        'learn' => NULL
54
-                        ),
55
-                'warn' => NULL
30
+				'date' => NULL,
31
+				'from' => NULL,
32
+				'messageid' => NULL,
33
+				'dmarc' => array(
34
+						'result' => NULL,
35
+						'dom'   => NULL
36
+						),
37
+				'spf' => array(
38
+						'result' => NULL,
39
+						'dom'   => NULL
40
+						),
41
+				'dkim' => array(
42
+						'result' => NULL,
43
+						'dom'   => NULL
44
+						),
45
+				'spam' => array(
46
+						'status' => NULL,
47
+						'score' => NULL,
48
+						'th'    => NULL,
49
+						),
50
+				'dspam' => array(
51
+						'type' => NULL,
52
+						'level' => NULL,
53
+						'learn' => NULL
54
+						),
55
+				'warn' => NULL
56 56
 );
57 57
 
58 58
 if (empty($folder)) exit ('<p>No folder found.</p>'); /* This should not occur */
Please login to merge, or discard this patch.
Braces   +7 added lines, -2 removed lines patch added patch discarded remove patch
@@ -55,10 +55,15 @@
 block discarded – undo
55 55
                 'warn' => NULL
56 56
 );
57 57
 
58
-if (empty($folder)) exit ('<p>No folder found.</p>'); /* This should not occur */
58
+if (empty($folder)) {
59
+	exit ('<p>No folder found.</p>');
60
+}
61
+/* This should not occur */
59 62
 $confimap['user'] = $username;
60 63
 $headers = imapFind($confimap, $account, $folder);
61
-if (empty($headers)) exit (sprintf('<p>No suitable mail found in <b>%s</b> folder.</p>', htmlentities("<$folder>")));
64
+if (empty($headers)) {
65
+	exit (sprintf('<p>No suitable mail found in <b>%s</b> folder.</p>', htmlentities("<$folder>")));
66
+}
62 67
 print '<table>';
63 68
 printTableHeader($folder,$data,TRUE,sprintf('Found %d suitable mails.',count($headers)));
64 69
 
Please login to merge, or discard this patch.
Spacing   +7 added lines, -7 removed lines patch added patch discarded remove patch
@@ -1,5 +1,5 @@  discard block
 block discarded – undo
1 1
 <?php
2
-$path='/var/www/html/RBL/';
2
+$path = '/var/www/html/RBL/';
3 3
 include_once($path.'config.php');
4 4
 require_once($path.'function.php');
5 5
 
@@ -14,14 +14,14 @@  discard block
 block discarded – undo
14 14
 $tag .= $conf['syslog']['tag'];
15 15
 openlog($tag, LOG_PID, $fac);
16 16
 
17
-if ( $confimap['learn']=='dspamc' ) {
17
+if ($confimap['learn'] == 'dspamc') {
18 18
 	$cmd = escapeshellcmd('which dspamc');
19 19
 	$cmd = escapeshellcmd('which ls');
20
-	exec ( $cmd, $out, $ret );
20
+	exec($cmd, $out, $ret);
21 21
 	if ($ret != 0) {
22 22
 		$err = 'No DSPAM Client found on your system. Please, force your sysadmin to install "dspamc".';
23 23
 		syslog(LOG_ERR, $username.': Error: '.$err);
24
-		exit (sprintf('<p>%s</p>',htmlentities($err)));
24
+		exit (sprintf('<p>%s</p>', htmlentities($err)));
25 25
 	}
26 26
 }
27 27
 
@@ -60,10 +60,10 @@  discard block
 block discarded – undo
60 60
 $headers = imapFind($confimap, $account, $folder);
61 61
 if (empty($headers)) exit (sprintf('<p>No suitable mail found in <b>%s</b> folder.</p>', htmlentities("<$folder>")));
62 62
 print '<table>';
63
-printTableHeader($folder,$data,TRUE,sprintf('Found %d suitable mails.',count($headers)));
63
+printTableHeader($folder, $data, TRUE, sprintf('Found %d suitable mails.', count($headers)));
64 64
 
65
-foreach ( $headers AS $header ) {
66
-	$values = imapInfo($username, $header,$conf['host']['ar'],$confimap['dspamtospamass'],$confimap['learn']);
65
+foreach ($headers AS $header) {
66
+	$values = imapInfo($username, $header, $conf['host']['ar'], $confimap['dspamtospamass'], $confimap['learn']);
67 67
 	print '<tr>';
68 68
 	printTableRow($values, $confimap['learn']);
69 69
 	print '</tr>';
Please login to merge, or discard this patch.
contrib/mailClassifier/index.php 3 patches
Indentation   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -16,10 +16,10 @@
 block discarded – undo
16 16
 require_once('function.php');
17 17
 
18 18
 if ( !isset($version) ) {
19
-        openlog('mailClassifierEmergency', LOG_PID, LOG_LOCAL0);
20
-        syslog (LOG_EMERG, sprintf('unknown: I can\'t read the config files. Do you have configured the $path in %s?', __FILE__));
21
-        closelog();
22
-        exit(255);
19
+		openlog('mailClassifierEmergency', LOG_PID, LOG_LOCAL0);
20
+		syslog (LOG_EMERG, sprintf('unknown: I can\'t read the config files. Do you have configured the $path in %s?', __FILE__));
21
+		closelog();
22
+		exit(255);
23 23
 }
24 24
 
25 25
 checkSSL();
Please login to merge, or discard this patch.
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -10,24 +10,24 @@
 block discarded – undo
10 10
 <body>
11 11
 <h1> Mail Classifier</h1> 
12 12
 <?php
13
-$path='/var/www/html/RBL/';
13
+$path = '/var/www/html/RBL/';
14 14
 require_once($path.'config.php');
15 15
 require_once($path.'function.php');
16 16
 require_once('function.php');
17 17
 
18
-if ( !isset($version) ) {
18
+if (!isset($version)) {
19 19
         openlog('mailClassifierEmergency', LOG_PID, LOG_LOCAL0);
20
-        syslog (LOG_EMERG, sprintf('unknown: I can\'t read the config files. Do you have configured the $path in %s?', __FILE__));
20
+        syslog(LOG_EMERG, sprintf('unknown: I can\'t read the config files. Do you have configured the $path in %s?', __FILE__));
21 21
         closelog();
22 22
         exit(255);
23 23
 }
24 24
 
25 25
 checkSSL();
26 26
 $user = username();
27
-$isAdmin = in_array($user,array_keys($admins));
27
+$isAdmin = in_array($user, array_keys($admins));
28 28
 $canChange = ($isAdmin) ? '' : 'readonly';
29
-if ( $require_auth )
30
-	if ( $user == 'unknown' ) exit ("<p>You MUST configure your server to use authentication.</p>");
29
+if ($require_auth)
30
+	if ($user == 'unknown') exit ("<p>You MUST configure your server to use authentication.</p>");
31 31
 
32 32
 
33 33
 print <<<END
Please login to merge, or discard this patch.
Braces   +2 added lines, -1 removed lines patch added patch discarded remove patch
@@ -26,8 +26,9 @@
 block discarded – undo
26 26
 $user = username();
27 27
 $isAdmin = in_array($user,array_keys($admins));
28 28
 $canChange = ($isAdmin) ? '' : 'readonly';
29
-if ( $require_auth )
29
+if ( $require_auth ) {
30 30
 	if ( $user == 'unknown' ) exit ("<p>You MUST configure your server to use authentication.</p>");
31
+}
31 32
 
32 33
 
33 34
 print <<<END
Please login to merge, or discard this patch.
contrib/mailClassifier/list.php 3 patches
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -15,7 +15,7 @@
 block discarded – undo
15 15
 if (is_array($folders)) {
16 16
 	print '<option  value="" selected disabled>Choose a folder</option>';
17 17
 	foreach ( $folders as $folder )
18
-        	printf('<option  value="%s">%s</option>',
18
+			printf('<option  value="%s">%s</option>',
19 19
 			$folder,
20 20
 			htmlspecialchars(mb_convert_encoding($folder, "UTF-8", "UTF7-IMAP")));
21 21
 }
Please login to merge, or discard this patch.
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <select name="folder" style="width:215px" onChange="xmlhttpPost('result.php', 'Classify', 'Result', '<img src=\'/include/pleasewait.gif\'>', true); return false;">
2 2
 <?php
3
-$path='/var/www/html/RBL/';
3
+$path = '/var/www/html/RBL/';
4 4
 require_once($path.'function.php');
5 5
 require_once($path.'config.php');
6 6
 require_once('function.php');
@@ -11,10 +11,10 @@  discard block
 block discarded – undo
11 11
 openlog($tag, LOG_PID, $fac);
12 12
 
13 13
 $conf['imap']['user'] = username();
14
-$folders=imapFolder($conf['imap'], $_POST['username']);
14
+$folders = imapFolder($conf['imap'], $_POST['username']);
15 15
 if (is_array($folders)) {
16 16
 	print '<option  value="" selected disabled>Choose a folder</option>';
17
-	foreach ( $folders as $folder )
17
+	foreach ($folders as $folder)
18 18
         	printf('<option  value="%s">%s</option>',
19 19
 			$folder,
20 20
 			htmlspecialchars(mb_convert_encoding($folder, "UTF-8", "UTF7-IMAP")));
Please login to merge, or discard this patch.
Braces   +4 added lines, -3 removed lines patch added patch discarded remove patch
@@ -14,11 +14,12 @@
 block discarded – undo
14 14
 $folders=imapFolder($conf['imap'], $_POST['username']);
15 15
 if (is_array($folders)) {
16 16
 	print '<option  value="" selected disabled>Choose a folder</option>';
17
-	foreach ( $folders as $folder )
18
-        	printf('<option  value="%s">%s</option>',
17
+	foreach ( $folders as $folder ) {
18
+	        	printf('<option  value="%s">%s</option>',
19 19
 			$folder,
20 20
 			htmlspecialchars(mb_convert_encoding($folder, "UTF-8", "UTF7-IMAP")));
21
-}
21
+	}
22
+	}
22 23
 closelog();
23 24
 ?>
24 25
 </select>
Please login to merge, or discard this patch.
contrib/mailClassifier/function.php 4 patches
Doc Comments   +7 added lines patch added patch discarded remove patch
@@ -56,6 +56,10 @@  discard block
 block discarded – undo
56 56
 	return $head;
57 57
 }
58 58
 
59
+/**
60
+ * @param null|string $prob
61
+ * @param null|string $conf
62
+ */
59 63
 function dspamLevel($prob, $conf) {
60 64
 /* Calculate DSPAM Level as the Spamassassin Plugin */
61 65
 	if (is_null($prob) or is_null($conf)) return '-';
@@ -63,6 +67,9 @@  discard block
 block discarded – undo
63 67
 	return round(($t_prob + ($conf*100)) / 2);
64 68
 }
65 69
 
70
+/**
71
+ * @param string $classSpam
72
+ */
66 73
 function dspamType($classSpam) {
67 74
 	switch($classSpam) {
68 75
 		case 'HAM':
Please login to merge, or discard this patch.
Indentation   +85 added lines, -85 removed lines patch added patch discarded remove patch
@@ -3,13 +3,13 @@  discard block
 block discarded – undo
3 3
 function imapFolder($cf, $username) {
4 4
 	$return = array();
5 5
 	$open='{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}';
6
-        $m_mail = imap_open($open, $username, $cf['authpassword'], OP_READONLY)
7
-                or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
8
-        if ( !$m_mail ) exit(254);
6
+		$m_mail = imap_open($open, $username, $cf['authpassword'], OP_READONLY)
7
+				or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
8
+		if ( !$m_mail ) exit(254);
9 9
 
10 10
 
11
-        syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].'>; Listing folders of account <'.$username.'>...');
12
-        //get all folder
11
+		syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].'>; Listing folders of account <'.$username.'>...');
12
+		//get all folder
13 13
 	$list = imap_list($m_mail, $open, "*");
14 14
 	imap_close($m_mail);
15 15
 	if (is_array($list))
@@ -23,7 +23,7 @@  discard block
 block discarded – undo
23 23
 function imapFind ($cf, $username, $folder) {
24 24
 	$head=array();
25 25
 	$m_mail = imap_open('{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}'.$folder, $username,$cf['authpassword'], OP_READONLY)
26
-        	or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
26
+			or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
27 27
 	if ( !$m_mail ) exit(254);
28 28
 		
29 29
 
@@ -36,12 +36,12 @@  discard block
 block discarded – undo
36 36
 	// Order results starting from newest message
37 37
 	if ( empty($m_search) ) {
38 38
 		syslog (LOG_INFO,$cf['user'].": No suitable mail found in <$folder> folder.");
39
-	        if ( $ierr = imap_errors() )
40
-	                foreach ( $ierr as $thiserr )
41
-	                        syslog (LOG_ERR, $cf['user'].": IMAP Error: $thiserr");
42
-	        if ( $ierr = imap_alerts() )
43
-	                foreach ( $ierr as $thiserr )
44
-	                        syslog (LOG_ALERT, $cf['user'].": IMAP Alert: $thiserr");
39
+			if ( $ierr = imap_errors() )
40
+					foreach ( $ierr as $thiserr )
41
+							syslog (LOG_ERR, $cf['user'].": IMAP Error: $thiserr");
42
+			if ( $ierr = imap_alerts() )
43
+					foreach ( $ierr as $thiserr )
44
+							syslog (LOG_ALERT, $cf['user'].": IMAP Alert: $thiserr");
45 45
 		imap_close( $m_mail );
46 46
 		return FALSE;
47 47
 	}
@@ -49,7 +49,7 @@  discard block
 block discarded – undo
49 49
 	syslog (LOG_INFO,$cf['user'].": Found $nmes mail in <$folder> folder.");
50 50
 	if ($nmes>0) rsort($m_search);
51 51
 
52
-        // loop for each message
52
+		// loop for each message
53 53
 	foreach ($m_search as $onem) 
54 54
 		$head[] = imap_fetchheader($m_mail, $onem );
55 55
 	imap_close($m_mail);
@@ -80,52 +80,52 @@  discard block
 block discarded – undo
80 80
 /* Each line must end with /r/n         */
81 81
 
82 82
 	$result = array(
83
-                'date' => NULL,
84
-                'from' => NULL,
85
-                'messageid' => NULL,
83
+				'date' => NULL,
84
+				'from' => NULL,
85
+				'messageid' => NULL,
86 86
 		'dmarc' => array(
87 87
 			'result' => NULL,
88 88
 			'dom'	=> NULL
89 89
 			),
90 90
 		'spf' => array(
91
-                        'result' => NULL,
92
-                        'dom'   => NULL
93
-                        ),
91
+						'result' => NULL,
92
+						'dom'   => NULL
93
+						),
94 94
 		'dkim' => array(
95
-                        'result' => NULL,
96
-                        'dom'   => NULL
97
-                        ),
98
-                'spam' => array(
99
-                        'status' => NULL,
100
-                        'score' => NULL,
101
-                        'th'    => NULL,
102
-                        ),
103
-                'dspam' => array(
104
-                        'type' => NULL,
105
-                        'level' => NULL,
95
+						'result' => NULL,
96
+						'dom'   => NULL
97
+						),
98
+				'spam' => array(
99
+						'status' => NULL,
100
+						'score' => NULL,
101
+						'th'    => NULL,
102
+						),
103
+				'dspam' => array(
104
+						'type' => NULL,
105
+						'level' => NULL,
106 106
 			'learn' => NULL
107
-                        ),
107
+						),
108 108
 		'warn' => NULL
109
-        );
109
+		);
110 110
 		
111 111
 
112
-        if ( preg_match_all ('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dmarc=(?<dmarc>\w+)\s+\(p=\w+\s+dis=\w+\)\s+header\.from=(?<DMARCfrom>[\w\.]+)/m',$header,$received) ) {
112
+		if ( preg_match_all ('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dmarc=(?<dmarc>\w+)\s+\(p=\w+\s+dis=\w+\)\s+header\.from=(?<DMARCfrom>[\w\.]+)/m',$header,$received) ) {
113 113
 		$k=0;
114
-                for ($i = count($received[0])-1;$i>=0;$i--) {
115
-	                foreach ($ARhosts as $mx) {
114
+				for ($i = count($received[0])-1;$i>=0;$i--) {
115
+					foreach ($ARhosts as $mx) {
116 116
 				if ($mx == $received['host'][$i]) {
117 117
 					/* This is a trusted AR result */
118 118
 					$result['dmarc']['result']=$received['dmarc'][$i];
119 119
 					$result['dmarc']['dom'] = $received['DMARCfrom'][$i];
120 120
 					$k++;
121 121
 				}
122
-                	}
122
+					}
123
+		}
123 124
 		}
124
-        }
125 125
 	$received=NULL;
126 126
 	if ($k>1) $result['warn'][] = 'The trusted DMARC AR Headers are present more than once. Something wrong.';
127 127
 
128
-        if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)spf=(?<spf>\w+)\s+smtp\.(?:mailfrom|helo)=(?<SPFfrom>[\w\.]+)/m',$header,$received) ) {
128
+		if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)spf=(?<spf>\w+)\s+smtp\.(?:mailfrom|helo)=(?<SPFfrom>[\w\.]+)/m',$header,$received) ) {
129 129
 		$k=0;
130 130
 		for ($i = count($received[0])-1;$i>=0;$i--) {
131 131
 			foreach ($ARhosts as $mx) {
@@ -134,25 +134,25 @@  discard block
 block discarded – undo
134 134
 					$result['spf']['result']=$received['spf'][$i];
135 135
 					$result['spf']['dom'] = $received['SPFfrom'][$i];
136 136
 					$k++;
137
-                        	}
138
-                	}
139
-        	}
137
+							}
138
+					}
139
+			}
140 140
 	}
141 141
 	$received=NULL;
142 142
 	if ($k>1) $result['warn'][] = 'The trusted SPF AR Headers are present more than once. Something wrong.';
143 143
 
144 144
 	$k=0;
145
-        if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dkim=(?<dkim>\w+)\s+[\w\s\(\)\-]+header\.d=(?<DKIMdom>[\w\.]+)/m',$header,$received) ) {
145
+		if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dkim=(?<dkim>\w+)\s+[\w\s\(\)\-]+header\.d=(?<DKIMdom>[\w\.]+)/m',$header,$received) ) {
146 146
 		for ($i = count($received[0])-1;$i>=0;$i--) {
147
-	                foreach ($ARhosts as $mx) {
148
-        	                if ($mx == $received['host'][$i]) {
149
-                	                /* This is a trusted AR result */
150
-                        	        $result['dkim']['result']=$received['dkim'][$i];
151
-                                	$result['dkim']['dom'] = $received['DKIMdom'][$i];
147
+					foreach ($ARhosts as $mx) {
148
+							if ($mx == $received['host'][$i]) {
149
+									/* This is a trusted AR result */
150
+									$result['dkim']['result']=$received['dkim'][$i];
151
+									$result['dkim']['dom'] = $received['DKIMdom'][$i];
152 152
 					$k++;
153
-                        	}
154
-                	}
155
-        	}
153
+							}
154
+					}
155
+			}
156 156
 	}
157 157
 	$received=NULL;
158 158
 	if ($k>1) $result['warn'][] = 'The trusted DKIM AR Headers are present more than once. Something wrong.';
@@ -160,59 +160,59 @@  discard block
 block discarded – undo
160 160
 	if ($dpl) { /* Use Spamassassin Plugin */
161 161
 		if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*DSPAM_(?P<dtype>SPAM|HAM)_(?P<dlevel>\d\d)(?:.|\r\n\s+)*\]/m',$header,$received) ) {
162 162
 			$result['spam']['status']=$received['spamstatus'][0];
163
-                	$result['spam']['score'] = $received['score'][0];
163
+					$result['spam']['score'] = $received['score'][0];
164 164
 			$result['spam']['th'] = $received['th'][0];
165 165
 			$result['dspam']['type'] = dspamType($received['dtype'][0]);
166 166
 			$result['dspam']['level'] =$received['dlevel'][0];
167
-        	}
168
-        	if (count($received[0])>1) $result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.';
167
+			}
168
+			if (count($received[0])>1) $result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.';
169 169
 	}
170 170
 	else { /* Parse apart all DSPAM Header and calculate a level */
171 171
 		if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*\]/m',$header,$received) ) {
172
-                        $result['spam']['status']=$received['spamstatus'][0];
173
-                        $result['spam']['score'] = $received['score'][0];
174
-                        $result['spam']['th'] = $received['th'][0];
172
+						$result['spam']['status']=$received['spamstatus'][0];
173
+						$result['spam']['score'] = $received['score'][0];
174
+						$result['spam']['th'] = $received['th'][0];
175 175
 			if (count($received[0])>1)
176 176
 				$result['warn'][]= 'The Spamassassin Headers are present more than once. I consider only the last one.';
177 177
 		}
178 178
 		if ( preg_match ('/\r\nX\-DSPAM\-Result:\s(?P<result>.*)\r\n/',$header,$received) != 1)
179
-	                $result['warn'] = 'DSPAM Result invalid, not present or present more than once.';
180
-	        else
181
-                	$result['dspam']['type']=$received['result'];
179
+					$result['warn'] = 'DSPAM Result invalid, not present or present more than once.';
180
+			else
181
+					$result['dspam']['type']=$received['result'];
182 182
 		$prob = NULL;
183 183
 		$conf = NULL;
184
-                if ( preg_match ('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/',$header,$received) != 1)
185
-                        $result['warn'][] = 'DSPAM Probability invalid, not present or present more than once.';
184
+				if ( preg_match ('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/',$header,$received) != 1)
185
+						$result['warn'][] = 'DSPAM Probability invalid, not present or present more than once.';
186 186
 		else
187 187
 			$prob = $received['prob'];
188 188
 		if ( preg_match ('/\r\nX\-DSPAM\-Confidence:\s(?P<conf>.*)\r\n/',$header,$received) != 1)
189
-                        $result['warn'][] = 'DSPAM Confidence invalid, not present or present more than once.';
189
+						$result['warn'][] = 'DSPAM Confidence invalid, not present or present more than once.';
190 190
 		else
191 191
 			$conf = $received['conf'];
192 192
 		$result['dspam']['level'] = dspamLevel($prob,$conf);
193 193
 	}
194 194
 	$received=NULL;
195 195
 	if ( preg_match ('/\r\nFrom:\s(?P<from>.*)\r\n/',$header,$received) != 1)
196
-                $result['warn'][] = 'From header invalid or not present';
197
-        else
198
-                $result['from'] = $received['from'];
196
+				$result['warn'][] = 'From header invalid or not present';
197
+		else
198
+				$result['from'] = $received['from'];
199 199
 
200
-        if ( preg_match ('/\r\nDate:\s(?P<date>.*)\r\n/',$header,$received) != 1)
201
-                $result['warn'][] = 'Date header invalid or not present';
200
+		if ( preg_match ('/\r\nDate:\s(?P<date>.*)\r\n/',$header,$received) != 1)
201
+				$result['warn'][] = 'Date header invalid or not present';
202 202
 	else
203 203
 		$result['date'] = $received['date'];
204 204
 
205 205
 	$received=NULL;
206
-        if ( preg_match ('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/',$header,$received) != 1)
207
-                $result['warn'][] = 'Message-ID invalid, not present or present more than once.';
206
+		if ( preg_match ('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/',$header,$received) != 1)
207
+				$result['warn'][] = 'Message-ID invalid, not present or present more than once.';
208 208
 	else
209 209
 		$result['messageid']=$received['mid'];
210 210
 
211
-        $received=NULL;
211
+		$received=NULL;
212 212
 
213
-        switch ($learn) {
213
+		switch ($learn) {
214 214
 		case 'dspamc':
215
-        		if ( preg_match ('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/',$header,$received) != 1)
215
+				if ( preg_match ('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/',$header,$received) != 1)
216 216
 				$result['warn'] = 'DSPAM Signature invalid, not present or present more than once.';
217 217
 			else
218 218
 				$result['dspam']['learn']=$received['sig'];			
@@ -223,23 +223,23 @@  discard block
 block discarded – undo
223 223
 			syslog (LOG_INFO,$user.': Error in "learn" imap configuration value. Please, set "dspamc" or "false".');
224 224
 	}
225 225
 	
226
-        return $result;
226
+		return $result;
227 227
 }
228 228
 
229 229
 
230 230
 
231 231
 
232 232
 function printTableHeader($title,$content,$footer=FALSE,$fcontent) {
233
-        print <<<END
233
+		print <<<END
234 234
 	<caption>$title</caption>
235 235
 	<thead>
236 236
 	<tr>
237 237
 END;
238 238
 	$kcontent = array_keys($content);
239
-        $cols = count($kcontent);
240
-        for ($i=0; $i<$cols; $i++) {
239
+		$cols = count($kcontent);
240
+		for ($i=0; $i<$cols; $i++) {
241 241
 		$key = $kcontent[$i];
242
-                printf ('<th colspan="%d" rowspan="%d">%s</th>',
242
+				printf ('<th colspan="%d" rowspan="%d">%s</th>',
243 243
 			!is_array($content[$key]) ?:
244 244
 			count(array_keys($content[$key])) ?: '1',
245 245
 			!is_array($content[$key]) ?:
@@ -255,13 +255,13 @@  discard block
 block discarded – undo
255 255
 		}
256 256
 	}
257 257
 		
258
-        print '</tr></thead>';
259
-        if ($footer) {
260
-                print '<tfoot><tr>';
261
-                print "<th colspan=\"$cols\">".$fcontent.'</th>';
262
-                print '</tr></tfoot>';
263
-        }
264
-        return TRUE;
258
+		print '</tr></thead>';
259
+		if ($footer) {
260
+				print '<tfoot><tr>';
261
+				print "<th colspan=\"$cols\">".$fcontent.'</th>';
262
+				print '</tr></tfoot>';
263
+		}
264
+		return TRUE;
265 265
 }
266 266
 
267 267
 
@@ -336,7 +336,7 @@  discard block
 block discarded – undo
336 336
 				}
337 337
 			/* Spamassassin format */
338 338
 			if (isset($row['status']))
339
-	                        switch($row['status']) {
339
+							switch($row['status']) {
340 340
 					case 'No':
341 341
 						$color = 'rgba(0,255,0, %.1f)';
342 342
 						break;
Please login to merge, or discard this patch.
Braces   +106 added lines, -72 removed lines patch added patch discarded remove patch
@@ -5,18 +5,21 @@  discard block
 block discarded – undo
5 5
 	$open='{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}';
6 6
         $m_mail = imap_open($open, $username, $cf['authpassword'], OP_READONLY)
7 7
                 or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
8
-        if ( !$m_mail ) exit(254);
8
+        if ( !$m_mail ) {
9
+        	exit(254);
10
+        }
9 11
 
10 12
 
11 13
         syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].'>; Listing folders of account <'.$username.'>...');
12 14
         //get all folder
13 15
 	$list = imap_list($m_mail, $open, "*");
14 16
 	imap_close($m_mail);
15
-	if (is_array($list))
16
-		foreach ($list as $mbox)
17
+	if (is_array($list)) {
18
+			foreach ($list as $mbox)
17 19
 			$return[] = explode($open,$mbox,2)[1];
18
-	else
19
-		syslog (LOG_INFO,$cf['user'] . ': imap_list failed: ' . imap_last_error() );
20
+	} else {
21
+			syslog (LOG_INFO,$cf['user'] . ': imap_list failed: ' . imap_last_error() );
22
+	}
20 23
 	return $return;
21 24
 }
22 25
 
@@ -24,7 +27,9 @@  discard block
 block discarded – undo
24 27
 	$head=array();
25 28
 	$m_mail = imap_open('{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}'.$folder, $username,$cf['authpassword'], OP_READONLY)
26 29
         	or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
27
-	if ( !$m_mail ) exit(254);
30
+	if ( !$m_mail ) {
31
+		exit(254);
32
+	}
28 33
 		
29 34
 
30 35
 	syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].">; Reading <$folder> messages of last ".$cf['oldestday'].' days on account <'.$username.'>...');
@@ -36,29 +41,36 @@  discard block
 block discarded – undo
36 41
 	// Order results starting from newest message
37 42
 	if ( empty($m_search) ) {
38 43
 		syslog (LOG_INFO,$cf['user'].": No suitable mail found in <$folder> folder.");
39
-	        if ( $ierr = imap_errors() )
40
-	                foreach ( $ierr as $thiserr )
44
+	        if ( $ierr = imap_errors() ) {
45
+	        	                foreach ( $ierr as $thiserr )
41 46
 	                        syslog (LOG_ERR, $cf['user'].": IMAP Error: $thiserr");
42
-	        if ( $ierr = imap_alerts() )
43
-	                foreach ( $ierr as $thiserr )
47
+	        }
48
+	        if ( $ierr = imap_alerts() ) {
49
+	        	                foreach ( $ierr as $thiserr )
44 50
 	                        syslog (LOG_ALERT, $cf['user'].": IMAP Alert: $thiserr");
51
+	        }
45 52
 		imap_close( $m_mail );
46 53
 		return FALSE;
47 54
 	}
48 55
 	$nmes = count ($m_search);
49 56
 	syslog (LOG_INFO,$cf['user'].": Found $nmes mail in <$folder> folder.");
50
-	if ($nmes>0) rsort($m_search);
57
+	if ($nmes>0) {
58
+		rsort($m_search);
59
+	}
51 60
 
52 61
         // loop for each message
53
-	foreach ($m_search as $onem) 
54
-		$head[] = imap_fetchheader($m_mail, $onem );
62
+	foreach ($m_search as $onem) {
63
+			$head[] = imap_fetchheader($m_mail, $onem );
64
+	}
55 65
 	imap_close($m_mail);
56 66
 	return $head;
57 67
 }
58 68
 
59 69
 function dspamLevel($prob, $conf) {
60 70
 /* Calculate DSPAM Level as the Spamassassin Plugin */
61
-	if (is_null($prob) or is_null($conf)) return '-';
71
+	if (is_null($prob) or is_null($conf)) {
72
+		return '-';
73
+	}
62 74
 	$t_prob = abs((($prob - 0.5) * 2) * 100);
63 75
 	return round(($t_prob + ($conf*100)) / 2);
64 76
 }
@@ -123,7 +135,9 @@  discard block
 block discarded – undo
123 135
 		}
124 136
         }
125 137
 	$received=NULL;
126
-	if ($k>1) $result['warn'][] = 'The trusted DMARC AR Headers are present more than once. Something wrong.';
138
+	if ($k>1) {
139
+		$result['warn'][] = 'The trusted DMARC AR Headers are present more than once. Something wrong.';
140
+	}
127 141
 
128 142
         if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)spf=(?<spf>\w+)\s+smtp\.(?:mailfrom|helo)=(?<SPFfrom>[\w\.]+)/m',$header,$received) ) {
129 143
 		$k=0;
@@ -139,7 +153,9 @@  discard block
 block discarded – undo
139 153
         	}
140 154
 	}
141 155
 	$received=NULL;
142
-	if ($k>1) $result['warn'][] = 'The trusted SPF AR Headers are present more than once. Something wrong.';
156
+	if ($k>1) {
157
+		$result['warn'][] = 'The trusted SPF AR Headers are present more than once. Something wrong.';
158
+	}
143 159
 
144 160
 	$k=0;
145 161
         if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dkim=(?<dkim>\w+)\s+[\w\s\(\)\-]+header\.d=(?<DKIMdom>[\w\.]+)/m',$header,$received) ) {
@@ -155,7 +171,9 @@  discard block
 block discarded – undo
155 171
         	}
156 172
 	}
157 173
 	$received=NULL;
158
-	if ($k>1) $result['warn'][] = 'The trusted DKIM AR Headers are present more than once. Something wrong.';
174
+	if ($k>1) {
175
+		$result['warn'][] = 'The trusted DKIM AR Headers are present more than once. Something wrong.';
176
+	}
159 177
 
160 178
 	if ($dpl) { /* Use Spamassassin Plugin */
161 179
 		if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*DSPAM_(?P<dtype>SPAM|HAM)_(?P<dlevel>\d\d)(?:.|\r\n\s+)*\]/m',$header,$received) ) {
@@ -165,57 +183,66 @@  discard block
 block discarded – undo
165 183
 			$result['dspam']['type'] = dspamType($received['dtype'][0]);
166 184
 			$result['dspam']['level'] =$received['dlevel'][0];
167 185
         	}
168
-        	if (count($received[0])>1) $result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.';
169
-	}
170
-	else { /* Parse apart all DSPAM Header and calculate a level */
186
+        	if (count($received[0])>1) {
187
+        		$result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.';
188
+        	}
189
+	} else { /* Parse apart all DSPAM Header and calculate a level */
171 190
 		if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*\]/m',$header,$received) ) {
172 191
                         $result['spam']['status']=$received['spamstatus'][0];
173 192
                         $result['spam']['score'] = $received['score'][0];
174 193
                         $result['spam']['th'] = $received['th'][0];
175
-			if (count($received[0])>1)
176
-				$result['warn'][]= 'The Spamassassin Headers are present more than once. I consider only the last one.';
194
+			if (count($received[0])>1) {
195
+							$result['warn'][]= 'The Spamassassin Headers are present more than once. I consider only the last one.';
196
+			}
177 197
 		}
178
-		if ( preg_match ('/\r\nX\-DSPAM\-Result:\s(?P<result>.*)\r\n/',$header,$received) != 1)
179
-	                $result['warn'] = 'DSPAM Result invalid, not present or present more than once.';
180
-	        else
181
-                	$result['dspam']['type']=$received['result'];
198
+		if ( preg_match ('/\r\nX\-DSPAM\-Result:\s(?P<result>.*)\r\n/',$header,$received) != 1) {
199
+			                $result['warn'] = 'DSPAM Result invalid, not present or present more than once.';
200
+		} else {
201
+	                        	$result['dspam']['type']=$received['result'];
202
+	        }
182 203
 		$prob = NULL;
183 204
 		$conf = NULL;
184
-                if ( preg_match ('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/',$header,$received) != 1)
185
-                        $result['warn'][] = 'DSPAM Probability invalid, not present or present more than once.';
186
-		else
187
-			$prob = $received['prob'];
188
-		if ( preg_match ('/\r\nX\-DSPAM\-Confidence:\s(?P<conf>.*)\r\n/',$header,$received) != 1)
189
-                        $result['warn'][] = 'DSPAM Confidence invalid, not present or present more than once.';
190
-		else
191
-			$conf = $received['conf'];
205
+                if ( preg_match ('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/',$header,$received) != 1) {
206
+                                        $result['warn'][] = 'DSPAM Probability invalid, not present or present more than once.';
207
+                } else {
208
+					$prob = $received['prob'];
209
+		}
210
+		if ( preg_match ('/\r\nX\-DSPAM\-Confidence:\s(?P<conf>.*)\r\n/',$header,$received) != 1) {
211
+		                        $result['warn'][] = 'DSPAM Confidence invalid, not present or present more than once.';
212
+		} else {
213
+					$conf = $received['conf'];
214
+		}
192 215
 		$result['dspam']['level'] = dspamLevel($prob,$conf);
193 216
 	}
194 217
 	$received=NULL;
195
-	if ( preg_match ('/\r\nFrom:\s(?P<from>.*)\r\n/',$header,$received) != 1)
196
-                $result['warn'][] = 'From header invalid or not present';
197
-        else
198
-                $result['from'] = $received['from'];
218
+	if ( preg_match ('/\r\nFrom:\s(?P<from>.*)\r\n/',$header,$received) != 1) {
219
+	                $result['warn'][] = 'From header invalid or not present';
220
+	} else {
221
+                        $result['from'] = $received['from'];
222
+        }
199 223
 
200
-        if ( preg_match ('/\r\nDate:\s(?P<date>.*)\r\n/',$header,$received) != 1)
201
-                $result['warn'][] = 'Date header invalid or not present';
202
-	else
203
-		$result['date'] = $received['date'];
224
+        if ( preg_match ('/\r\nDate:\s(?P<date>.*)\r\n/',$header,$received) != 1) {
225
+                        $result['warn'][] = 'Date header invalid or not present';
226
+        } else {
227
+			$result['date'] = $received['date'];
228
+	}
204 229
 
205 230
 	$received=NULL;
206
-        if ( preg_match ('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/',$header,$received) != 1)
207
-                $result['warn'][] = 'Message-ID invalid, not present or present more than once.';
208
-	else
209
-		$result['messageid']=$received['mid'];
231
+        if ( preg_match ('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/',$header,$received) != 1) {
232
+                        $result['warn'][] = 'Message-ID invalid, not present or present more than once.';
233
+        } else {
234
+			$result['messageid']=$received['mid'];
235
+	}
210 236
 
211 237
         $received=NULL;
212 238
 
213 239
         switch ($learn) {
214 240
 		case 'dspamc':
215
-        		if ( preg_match ('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/',$header,$received) != 1)
216
-				$result['warn'] = 'DSPAM Signature invalid, not present or present more than once.';
217
-			else
218
-				$result['dspam']['learn']=$received['sig'];			
241
+        		if ( preg_match ('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/',$header,$received) != 1) {
242
+        						$result['warn'] = 'DSPAM Signature invalid, not present or present more than once.';
243
+        		} else {
244
+							$result['dspam']['learn']=$received['sig'];
245
+			}
219 246
 			break;
220 247
 		case false:
221 248
 			break;
@@ -250,8 +277,9 @@  discard block
 block discarded – undo
250 277
 	for ($i=0; $i<$cols; $i++) {
251 278
 		$key = $kcontent[$i];
252 279
 		if (is_array($content[$key])&&($hs = array_keys($content[$key]))) {
253
-			foreach ($hs as $h)
254
-				printf('<th>%s</th>',$h);
280
+			foreach ($hs as $h) {
281
+							printf('<th>%s</th>',$h);
282
+			}
255 283
 		}
256 284
 	}
257 285
 		
@@ -267,15 +295,16 @@  discard block
 block discarded – undo
267 295
 
268 296
 function formatVal($val, $learn) {
269 297
 	foreach (array_keys($val) as $key) {
270
-		if (is_array($val["$key"]) and ($key!='warn'))
271
-			$val["$key"] = formatVal($val["$key"], $learn);
272
-		else {
298
+		if (is_array($val["$key"]) and ($key!='warn')) {
299
+					$val["$key"] = formatVal($val["$key"], $learn);
300
+		} else {
273 301
 			switch ($key) {
274 302
 				case 'warn':
275
-					if (empty($val["$key"]))
276
-						$val["$key"] = '-';
277
-					else 
278
-						$val["$key"] = sprintf('<div title="%s">Y</div>',implode($val["$key"],"\n"));
303
+					if (empty($val["$key"])) {
304
+											$val["$key"] = '-';
305
+					} else {
306
+											$val["$key"] = sprintf('<div title="%s">Y</div>',implode($val["$key"],"\n"));
307
+					}
279 308
 					break;
280 309
 				case 'learn':
281 310
 					$val["$key"] = formLearn($learn, $val);
@@ -297,9 +326,10 @@  discard block
 block discarded – undo
297 326
 				$par['class'] = $class;
298 327
 				$val["$class"] = sprintf('dspamc --user dspam --deliver=summary --class=%s --source=error --signature=%s',
299 328
 							strtolower($class), $par['learn']);
300
-				if (($class != $par['type'])||($par['level']<99))
301
-					$return .= sprintf(file_get_contents('formLearnDSPAM.htm'),
329
+				if (($class != $par['type'])||($par['level']<99)) {
330
+									$return .= sprintf(file_get_contents('formLearnDSPAM.htm'),
302 331
 						$class,$class,$val["$class"],base64_encode(json_encode($par)),$class);
332
+				}
303 333
 			}
304 334
 		default:
305 335
 			return $return;
@@ -308,37 +338,41 @@  discard block
 block discarded – undo
308 338
 
309 339
 function printTableRow($row, $learn, $init=true) {
310 340
 	$color = 'inherit';
311
-	if ($init) 
312
-		$row=formatVal($row,$learn);
341
+	if ($init) {
342
+			$row=formatVal($row,$learn);
343
+	}
313 344
 	foreach( $row as $key => $val) {
314
-		if (is_array($val))
315
-			printTableRow($val, $learn, false);
316
-		else {
345
+		if (is_array($val)) {
346
+					printTableRow($val, $learn, false);
347
+		} else {
317 348
 			/* DSPAM format */
318
-			if (isset($row['type']))
319
-				switch($row['type']) {
349
+			if (isset($row['type'])) {
350
+							switch($row['type']) {
320 351
 					case 'Innocent':
321 352
 					case 'HAM':
322 353
 						$color = 'rgba(0,255,0, %.1f)';
354
+			}
323 355
 						break;
324 356
 					case 'Spam':
325 357
 					case 'SPAM':
326 358
 						$color = 'rgba(255,0,0,%.1f)';
327 359
 			}
328 360
 			/* DMARC, DKIM, SPF format */
329
-			if (isset($row['result']))
330
-				switch($row['result']) {
361
+			if (isset($row['result'])) {
362
+							switch($row['result']) {
331 363
 					case 'pass':
332 364
 						$color = 'rgba(0,255,0, %.1f)';
365
+			}
333 366
 						break;
334 367
 					case 'fail':
335 368
 						$color = 'rgba(255,0,0,%.1f)';
336 369
 				}
337 370
 			/* Spamassassin format */
338
-			if (isset($row['status']))
339
-	                        switch($row['status']) {
371
+			if (isset($row['status'])) {
372
+				                        switch($row['status']) {
340 373
 					case 'No':
341 374
 						$color = 'rgba(0,255,0, %.1f)';
375
+			}
342 376
 						break;
343 377
 					case 'Yes':
344 378
 						$color = 'rgba(255,0,0,%.1f)';
Please login to merge, or discard this patch.
Spacing   +86 added lines, -88 removed lines patch added patch discarded remove patch
@@ -2,56 +2,56 @@  discard block
 block discarded – undo
2 2
 
3 3
 function imapFolder($cf, $username) {
4 4
 	$return = array();
5
-	$open='{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}';
5
+	$open = '{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}';
6 6
         $m_mail = imap_open($open, $username, $cf['authpassword'], OP_READONLY)
7
-                or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
8
-        if ( !$m_mail ) exit(254);
7
+                or syslog(LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: '.imap_last_error());
8
+        if (!$m_mail) exit(254);
9 9
 
10 10
 
11
-        syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].'>; Listing folders of account <'.$username.'>...');
11
+        syslog(LOG_INFO, $cf['user'].': Successfully connected to <'.$cf['mailhost'].'>; Listing folders of account <'.$username.'>...');
12 12
         //get all folder
13 13
 	$list = imap_list($m_mail, $open, "*");
14 14
 	imap_close($m_mail);
15 15
 	if (is_array($list))
16 16
 		foreach ($list as $mbox)
17
-			$return[] = explode($open,$mbox,2)[1];
17
+			$return[] = explode($open, $mbox, 2)[1];
18 18
 	else
19
-		syslog (LOG_INFO,$cf['user'] . ': imap_list failed: ' . imap_last_error() );
19
+		syslog(LOG_INFO, $cf['user'].': imap_list failed: '.imap_last_error());
20 20
 	return $return;
21 21
 }
22 22
 
23
-function imapFind ($cf, $username, $folder) {
24
-	$head=array();
25
-	$m_mail = imap_open('{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}'.$folder, $username,$cf['authpassword'], OP_READONLY)
26
-        	or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
27
-	if ( !$m_mail ) exit(254);
23
+function imapFind($cf, $username, $folder) {
24
+	$head = array();
25
+	$m_mail = imap_open('{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}'.$folder, $username, $cf['authpassword'], OP_READONLY)
26
+        	or syslog(LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: '.imap_last_error());
27
+	if (!$m_mail) exit(254);
28 28
 		
29 29
 
30
-	syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].">; Reading <$folder> messages of last ".$cf['oldestday'].' days on account <'.$username.'>...');
30
+	syslog(LOG_INFO, $cf['user'].': Successfully connected to <'.$cf['mailhost'].">; Reading <$folder> messages of last ".$cf['oldestday'].' days on account <'.$username.'>...');
31 31
 	//get all messages
32
-	$dateTh = date ( "d-M-Y", strToTime ( '-'.$cf['oldestday'].' days' ) );
33
-	$m_search=imap_search ($m_mail, "SINCE \"$dateTh\" TEXT \"Authentication-Results: \"" );
32
+	$dateTh = date("d-M-Y", strToTime('-'.$cf['oldestday'].' days'));
33
+	$m_search = imap_search($m_mail, "SINCE \"$dateTh\" TEXT \"Authentication-Results: \"");
34 34
 
35 35
 
36 36
 	// Order results starting from newest message
37
-	if ( empty($m_search) ) {
38
-		syslog (LOG_INFO,$cf['user'].": No suitable mail found in <$folder> folder.");
39
-	        if ( $ierr = imap_errors() )
40
-	                foreach ( $ierr as $thiserr )
41
-	                        syslog (LOG_ERR, $cf['user'].": IMAP Error: $thiserr");
42
-	        if ( $ierr = imap_alerts() )
43
-	                foreach ( $ierr as $thiserr )
44
-	                        syslog (LOG_ALERT, $cf['user'].": IMAP Alert: $thiserr");
45
-		imap_close( $m_mail );
37
+	if (empty($m_search)) {
38
+		syslog(LOG_INFO, $cf['user'].": No suitable mail found in <$folder> folder.");
39
+	        if ($ierr = imap_errors())
40
+	                foreach ($ierr as $thiserr)
41
+	                        syslog(LOG_ERR, $cf['user'].": IMAP Error: $thiserr");
42
+	        if ($ierr = imap_alerts())
43
+	                foreach ($ierr as $thiserr)
44
+	                        syslog(LOG_ALERT, $cf['user'].": IMAP Alert: $thiserr");
45
+		imap_close($m_mail);
46 46
 		return FALSE;
47 47
 	}
48
-	$nmes = count ($m_search);
49
-	syslog (LOG_INFO,$cf['user'].": Found $nmes mail in <$folder> folder.");
48
+	$nmes = count($m_search);
49
+	syslog(LOG_INFO, $cf['user'].": Found $nmes mail in <$folder> folder.");
50 50
 	if ($nmes>0) rsort($m_search);
51 51
 
52 52
         // loop for each message
53 53
 	foreach ($m_search as $onem) 
54
-		$head[] = imap_fetchheader($m_mail, $onem );
54
+		$head[] = imap_fetchheader($m_mail, $onem);
55 55
 	imap_close($m_mail);
56 56
 	return $head;
57 57
 }
@@ -59,12 +59,12 @@  discard block
 block discarded – undo
59 59
 function dspamLevel($prob, $conf) {
60 60
 /* Calculate DSPAM Level as the Spamassassin Plugin */
61 61
 	if (is_null($prob) or is_null($conf)) return '-';
62
-	$t_prob = abs((($prob - 0.5) * 2) * 100);
63
-	return round(($t_prob + ($conf*100)) / 2);
62
+	$t_prob = abs((($prob-0.5) * 2) * 100);
63
+	return round(($t_prob+($conf * 100)) / 2);
64 64
 }
65 65
 
66 66
 function dspamType($classSpam) {
67
-	switch($classSpam) {
67
+	switch ($classSpam) {
68 68
 		case 'HAM':
69 69
 			return 'Innocent';
70 70
 		case 'SPAM':
@@ -75,7 +75,7 @@  discard block
 block discarded – undo
75 75
 	}
76 76
 }
77 77
 
78
-function imapInfo($user,$header,$ARhosts,$dpl=false, $learn=false) {
78
+function imapInfo($user, $header, $ARhosts, $dpl = false, $learn = false) {
79 79
 /* Get relevant Info from header's mail */
80 80
 /* Each line must end with /r/n         */
81 81
 
@@ -109,118 +109,118 @@  discard block
 block discarded – undo
109 109
         );
110 110
 		
111 111
 
112
-        if ( preg_match_all ('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dmarc=(?<dmarc>\w+)\s+\(p=\w+\s+dis=\w+\)\s+header\.from=(?<DMARCfrom>[\w\.]+)/m',$header,$received) ) {
113
-		$k=0;
114
-                for ($i = count($received[0])-1;$i>=0;$i--) {
112
+        if (preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dmarc=(?<dmarc>\w+)\s+\(p=\w+\s+dis=\w+\)\s+header\.from=(?<DMARCfrom>[\w\.]+)/m', $header, $received)) {
113
+		$k = 0;
114
+                for ($i = count($received[0])-1; $i>=0; $i--) {
115 115
 	                foreach ($ARhosts as $mx) {
116 116
 				if ($mx == $received['host'][$i]) {
117 117
 					/* This is a trusted AR result */
118
-					$result['dmarc']['result']=$received['dmarc'][$i];
118
+					$result['dmarc']['result'] = $received['dmarc'][$i];
119 119
 					$result['dmarc']['dom'] = $received['DMARCfrom'][$i];
120 120
 					$k++;
121 121
 				}
122 122
                 	}
123 123
 		}
124 124
         }
125
-	$received=NULL;
125
+	$received = NULL;
126 126
 	if ($k>1) $result['warn'][] = 'The trusted DMARC AR Headers are present more than once. Something wrong.';
127 127
 
128
-        if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)spf=(?<spf>\w+)\s+smtp\.(?:mailfrom|helo)=(?<SPFfrom>[\w\.]+)/m',$header,$received) ) {
129
-		$k=0;
130
-		for ($i = count($received[0])-1;$i>=0;$i--) {
128
+        if (preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)spf=(?<spf>\w+)\s+smtp\.(?:mailfrom|helo)=(?<SPFfrom>[\w\.]+)/m', $header, $received)) {
129
+		$k = 0;
130
+		for ($i = count($received[0])-1; $i>=0; $i--) {
131 131
 			foreach ($ARhosts as $mx) {
132 132
 				if ($mx == $received['host'][$i]) {
133 133
 					/* This is a trusted AR result */
134
-					$result['spf']['result']=$received['spf'][$i];
134
+					$result['spf']['result'] = $received['spf'][$i];
135 135
 					$result['spf']['dom'] = $received['SPFfrom'][$i];
136 136
 					$k++;
137 137
                         	}
138 138
                 	}
139 139
         	}
140 140
 	}
141
-	$received=NULL;
141
+	$received = NULL;
142 142
 	if ($k>1) $result['warn'][] = 'The trusted SPF AR Headers are present more than once. Something wrong.';
143 143
 
144
-	$k=0;
145
-        if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dkim=(?<dkim>\w+)\s+[\w\s\(\)\-]+header\.d=(?<DKIMdom>[\w\.]+)/m',$header,$received) ) {
146
-		for ($i = count($received[0])-1;$i>=0;$i--) {
144
+	$k = 0;
145
+        if (preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dkim=(?<dkim>\w+)\s+[\w\s\(\)\-]+header\.d=(?<DKIMdom>[\w\.]+)/m', $header, $received)) {
146
+		for ($i = count($received[0])-1; $i>=0; $i--) {
147 147
 	                foreach ($ARhosts as $mx) {
148 148
         	                if ($mx == $received['host'][$i]) {
149 149
                 	                /* This is a trusted AR result */
150
-                        	        $result['dkim']['result']=$received['dkim'][$i];
150
+                        	        $result['dkim']['result'] = $received['dkim'][$i];
151 151
                                 	$result['dkim']['dom'] = $received['DKIMdom'][$i];
152 152
 					$k++;
153 153
                         	}
154 154
                 	}
155 155
         	}
156 156
 	}
157
-	$received=NULL;
157
+	$received = NULL;
158 158
 	if ($k>1) $result['warn'][] = 'The trusted DKIM AR Headers are present more than once. Something wrong.';
159 159
 
160 160
 	if ($dpl) { /* Use Spamassassin Plugin */
161
-		if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*DSPAM_(?P<dtype>SPAM|HAM)_(?P<dlevel>\d\d)(?:.|\r\n\s+)*\]/m',$header,$received) ) {
162
-			$result['spam']['status']=$received['spamstatus'][0];
161
+		if (preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*DSPAM_(?P<dtype>SPAM|HAM)_(?P<dlevel>\d\d)(?:.|\r\n\s+)*\]/m', $header, $received)) {
162
+			$result['spam']['status'] = $received['spamstatus'][0];
163 163
                 	$result['spam']['score'] = $received['score'][0];
164 164
 			$result['spam']['th'] = $received['th'][0];
165 165
 			$result['dspam']['type'] = dspamType($received['dtype'][0]);
166
-			$result['dspam']['level'] =$received['dlevel'][0];
166
+			$result['dspam']['level'] = $received['dlevel'][0];
167 167
         	}
168 168
         	if (count($received[0])>1) $result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.';
169 169
 	}
170 170
 	else { /* Parse apart all DSPAM Header and calculate a level */
171
-		if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*\]/m',$header,$received) ) {
172
-                        $result['spam']['status']=$received['spamstatus'][0];
171
+		if (preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*\]/m', $header, $received)) {
172
+                        $result['spam']['status'] = $received['spamstatus'][0];
173 173
                         $result['spam']['score'] = $received['score'][0];
174 174
                         $result['spam']['th'] = $received['th'][0];
175 175
 			if (count($received[0])>1)
176
-				$result['warn'][]= 'The Spamassassin Headers are present more than once. I consider only the last one.';
176
+				$result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.';
177 177
 		}
178
-		if ( preg_match ('/\r\nX\-DSPAM\-Result:\s(?P<result>.*)\r\n/',$header,$received) != 1)
178
+		if (preg_match('/\r\nX\-DSPAM\-Result:\s(?P<result>.*)\r\n/', $header, $received) != 1)
179 179
 	                $result['warn'] = 'DSPAM Result invalid, not present or present more than once.';
180 180
 	        else
181
-                	$result['dspam']['type']=$received['result'];
181
+                	$result['dspam']['type'] = $received['result'];
182 182
 		$prob = NULL;
183 183
 		$conf = NULL;
184
-                if ( preg_match ('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/',$header,$received) != 1)
184
+                if (preg_match('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/', $header, $received) != 1)
185 185
                         $result['warn'][] = 'DSPAM Probability invalid, not present or present more than once.';
186 186
 		else
187 187
 			$prob = $received['prob'];
188
-		if ( preg_match ('/\r\nX\-DSPAM\-Confidence:\s(?P<conf>.*)\r\n/',$header,$received) != 1)
188
+		if (preg_match('/\r\nX\-DSPAM\-Confidence:\s(?P<conf>.*)\r\n/', $header, $received) != 1)
189 189
                         $result['warn'][] = 'DSPAM Confidence invalid, not present or present more than once.';
190 190
 		else
191 191
 			$conf = $received['conf'];
192
-		$result['dspam']['level'] = dspamLevel($prob,$conf);
192
+		$result['dspam']['level'] = dspamLevel($prob, $conf);
193 193
 	}
194
-	$received=NULL;
195
-	if ( preg_match ('/\r\nFrom:\s(?P<from>.*)\r\n/',$header,$received) != 1)
194
+	$received = NULL;
195
+	if (preg_match('/\r\nFrom:\s(?P<from>.*)\r\n/', $header, $received) != 1)
196 196
                 $result['warn'][] = 'From header invalid or not present';
197 197
         else
198 198
                 $result['from'] = $received['from'];
199 199
 
200
-        if ( preg_match ('/\r\nDate:\s(?P<date>.*)\r\n/',$header,$received) != 1)
200
+        if (preg_match('/\r\nDate:\s(?P<date>.*)\r\n/', $header, $received) != 1)
201 201
                 $result['warn'][] = 'Date header invalid or not present';
202 202
 	else
203 203
 		$result['date'] = $received['date'];
204 204
 
205
-	$received=NULL;
206
-        if ( preg_match ('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/',$header,$received) != 1)
205
+	$received = NULL;
206
+        if (preg_match('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/', $header, $received) != 1)
207 207
                 $result['warn'][] = 'Message-ID invalid, not present or present more than once.';
208 208
 	else
209
-		$result['messageid']=$received['mid'];
209
+		$result['messageid'] = $received['mid'];
210 210
 
211
-        $received=NULL;
211
+        $received = NULL;
212 212
 
213 213
         switch ($learn) {
214 214
 		case 'dspamc':
215
-        		if ( preg_match ('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/',$header,$received) != 1)
215
+        		if (preg_match('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/', $header, $received) != 1)
216 216
 				$result['warn'] = 'DSPAM Signature invalid, not present or present more than once.';
217 217
 			else
218
-				$result['dspam']['learn']=$received['sig'];			
218
+				$result['dspam']['learn'] = $received['sig'];			
219 219
 			break;
220 220
 		case false:
221 221
 			break;
222 222
 		default:
223
-			syslog (LOG_INFO,$user.': Error in "learn" imap configuration value. Please, set "dspamc" or "false".');
223
+			syslog(LOG_INFO, $user.': Error in "learn" imap configuration value. Please, set "dspamc" or "false".');
224 224
 	}
225 225
 	
226 226
         return $result;
@@ -229,7 +229,7 @@  discard block
 block discarded – undo
229 229
 
230 230
 
231 231
 
232
-function printTableHeader($title,$content,$footer=FALSE,$fcontent) {
232
+function printTableHeader($title, $content, $footer = FALSE, $fcontent) {
233 233
         print <<<END
234 234
 	<caption>$title</caption>
235 235
 	<thead>
@@ -237,21 +237,19 @@  discard block
 block discarded – undo
237 237
 END;
238 238
 	$kcontent = array_keys($content);
239 239
         $cols = count($kcontent);
240
-        for ($i=0; $i<$cols; $i++) {
240
+        for ($i = 0; $i<$cols; $i++) {
241 241
 		$key = $kcontent[$i];
242
-                printf ('<th colspan="%d" rowspan="%d">%s</th>',
243
-			!is_array($content[$key]) ?:
244
-			count(array_keys($content[$key])) ?: '1',
245
-			!is_array($content[$key]) ?:
246
-			empty(array_keys($content[$key])) ? '2' : '1',
242
+                printf('<th colspan="%d" rowspan="%d">%s</th>',
243
+			!is_array($content[$key]) ?: count(array_keys($content[$key])) ?: '1',
244
+			!is_array($content[$key]) ?: empty(array_keys($content[$key])) ? '2' : '1',
247 245
 			$kcontent[$i]);
248 246
 	}
249 247
 	print '</tr><tr>';
250
-	for ($i=0; $i<$cols; $i++) {
248
+	for ($i = 0; $i<$cols; $i++) {
251 249
 		$key = $kcontent[$i];
252
-		if (is_array($content[$key])&&($hs = array_keys($content[$key]))) {
250
+		if (is_array($content[$key]) && ($hs = array_keys($content[$key]))) {
253 251
 			foreach ($hs as $h)
254
-				printf('<th>%s</th>',$h);
252
+				printf('<th>%s</th>', $h);
255 253
 		}
256 254
 	}
257 255
 		
@@ -267,7 +265,7 @@  discard block
 block discarded – undo
267 265
 
268 266
 function formatVal($val, $learn) {
269 267
 	foreach (array_keys($val) as $key) {
270
-		if (is_array($val["$key"]) and ($key!='warn'))
268
+		if (is_array($val["$key"]) and ($key != 'warn'))
271 269
 			$val["$key"] = formatVal($val["$key"], $learn);
272 270
 		else {
273 271
 			switch ($key) {
@@ -275,7 +273,7 @@  discard block
 block discarded – undo
275 273
 					if (empty($val["$key"]))
276 274
 						$val["$key"] = '-';
277 275
 					else 
278
-						$val["$key"] = sprintf('<div title="%s">Y</div>',implode($val["$key"],"\n"));
276
+						$val["$key"] = sprintf('<div title="%s">Y</div>', implode($val["$key"], "\n"));
279 277
 					break;
280 278
 				case 'learn':
281 279
 					$val["$key"] = formLearn($learn, $val);
@@ -297,26 +295,26 @@  discard block
 block discarded – undo
297 295
 				$par['class'] = $class;
298 296
 				$val["$class"] = sprintf('dspamc --user dspam --deliver=summary --class=%s --source=error --signature=%s',
299 297
 							strtolower($class), $par['learn']);
300
-				if (($class != $par['type'])||($par['level']<99))
298
+				if (($class != $par['type']) || ($par['level']<99))
301 299
 					$return .= sprintf(file_get_contents('formLearnDSPAM.htm'),
302
-						$class,$class,$val["$class"],base64_encode(json_encode($par)),$class);
300
+						$class, $class, $val["$class"], base64_encode(json_encode($par)), $class);
303 301
 			}
304 302
 		default:
305 303
 			return $return;
306 304
 	}
307 305
 }
308 306
 
309
-function printTableRow($row, $learn, $init=true) {
307
+function printTableRow($row, $learn, $init = true) {
310 308
 	$color = 'inherit';
311 309
 	if ($init) 
312
-		$row=formatVal($row,$learn);
313
-	foreach( $row as $key => $val) {
310
+		$row = formatVal($row, $learn);
311
+	foreach ($row as $key => $val) {
314 312
 		if (is_array($val))
315 313
 			printTableRow($val, $learn, false);
316 314
 		else {
317 315
 			/* DSPAM format */
318 316
 			if (isset($row['type']))
319
-				switch($row['type']) {
317
+				switch ($row['type']) {
320 318
 					case 'Innocent':
321 319
 					case 'HAM':
322 320
 						$color = 'rgba(0,255,0, %.1f)';
@@ -327,7 +325,7 @@  discard block
 block discarded – undo
327 325
 			}
328 326
 			/* DMARC, DKIM, SPF format */
329 327
 			if (isset($row['result']))
330
-				switch($row['result']) {
328
+				switch ($row['result']) {
331 329
 					case 'pass':
332 330
 						$color = 'rgba(0,255,0, %.1f)';
333 331
 						break;
@@ -336,7 +334,7 @@  discard block
 block discarded – undo
336 334
 				}
337 335
 			/* Spamassassin format */
338 336
 			if (isset($row['status']))
339
-	                        switch($row['status']) {
337
+	                        switch ($row['status']) {
340 338
 					case 'No':
341 339
 						$color = 'rgba(0,255,0, %.1f)';
342 340
 						break;
@@ -344,9 +342,9 @@  discard block
 block discarded – undo
344 342
 						$color = 'rgba(255,0,0,%.1f)';
345 343
 				}	
346 344
 				
347
-			$alpha = (is_numeric($val)AND($key=='type')) ? round($val/100,1) : 1.0;
345
+			$alpha = (is_numeric($val) AND ($key == 'type')) ? round($val / 100, 1) : 1.0;
348 346
 			$bg = sprintf(" style=\"background-color: $color\"", $alpha);		
349
-			printf ('<td class="cellfix"%s>%s</td>',$bg, $val);
347
+			printf('<td class="cellfix"%s>%s</td>', $bg, $val);
350 348
 		}
351 349
 	}
352 350
 }
Please login to merge, or discard this patch.
contrib/mailClassifier/learn.php 2 patches
Indentation   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -26,12 +26,12 @@
 block discarded – undo
26 26
 if ( preg_match ('/^X-DSPAM-Result:\s+(?P<user>[\w\.\-\_\+\%\@]+);\s+result="(?P<result>\w+)";\s+class="(?P<class>\w+)";\s+probability=(?P<prob>[\d\.]+);\s+confidence=(?P<conf>[\d\.]+);\s+signature=(?P<sig>[\w\,]+)$/',$out[0],$received) != 1) {
27 27
 		$err = 'DSPAM Client returned an unparseable result.';
28 28
 		syslog(LOG_ERR, $username.': Learn Error: '.$err);
29
-                exit (sprintf('<p>%s</p>',htmlentities($err)));
29
+				exit (sprintf('<p>%s</p>',htmlentities($err)));
30 30
 }
31 31
 
32 32
 printf('<p>Message learned successfully with following result:</p><ul><li>Owner: <b>%s</b></li><li>Result: <b>%s</b></li><li>Class: <b>%s</b></li></ul>',
33 33
 	htmlentities($received['user']),
34
-        $received['result'], $received['class']);
34
+		$received['result'], $received['class']);
35 35
 closelog();
36 36
 ?>
37 37
 </div>
Please login to merge, or discard this patch.
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -1,7 +1,7 @@  discard block
 block discarded – undo
1 1
 <div id="content">
2 2
 <h3>Log</h3>
3 3
 <?php
4
-$path='/var/www/html/RBL/';
4
+$path = '/var/www/html/RBL/';
5 5
 require_once($path.'function.php');
6 6
 require_once($path.'config.php');
7 7
 $conf = parse_ini_file('imap.conf', TRUE);
@@ -16,17 +16,17 @@  discard block
 block discarded – undo
16 16
 
17 17
 syslog(LOG_INFO, sprintf('%s: Learn as <%s> on signature: <%s>', $username, $par->class, $par->learn));
18 18
 $cmd = escapeshellcmd($_POST['cmd']);
19
-exec ( $cmd, $out, $ret );
19
+exec($cmd, $out, $ret);
20 20
 if ($ret != 0) {
21 21
 	$err = 'DSPAM Client returns a bad exit state. Sorry, probably the learn was successful, but I don\'t know...';
22 22
 	syslog(LOG_ERR, $username.': Learn Error: '.$err);	
23
-	exit (sprintf('<p>%s</p>',htmlentities($err)));
23
+	exit (sprintf('<p>%s</p>', htmlentities($err)));
24 24
 }
25
-syslog(LOG_INFO, sprintf('%s: Learn result: "%s"',$username, $out[0]));  
26
-if ( preg_match ('/^X-DSPAM-Result:\s+(?P<user>[\w\.\-\_\+\%\@]+);\s+result="(?P<result>\w+)";\s+class="(?P<class>\w+)";\s+probability=(?P<prob>[\d\.]+);\s+confidence=(?P<conf>[\d\.]+);\s+signature=(?P<sig>[\w\,]+)$/',$out[0],$received) != 1) {
25
+syslog(LOG_INFO, sprintf('%s: Learn result: "%s"', $username, $out[0]));  
26
+if (preg_match('/^X-DSPAM-Result:\s+(?P<user>[\w\.\-\_\+\%\@]+);\s+result="(?P<result>\w+)";\s+class="(?P<class>\w+)";\s+probability=(?P<prob>[\d\.]+);\s+confidence=(?P<conf>[\d\.]+);\s+signature=(?P<sig>[\w\,]+)$/', $out[0], $received) != 1) {
27 27
 		$err = 'DSPAM Client returned an unparseable result.';
28 28
 		syslog(LOG_ERR, $username.': Learn Error: '.$err);
29
-                exit (sprintf('<p>%s</p>',htmlentities($err)));
29
+                exit (sprintf('<p>%s</p>', htmlentities($err)));
30 30
 }
31 31
 
32 32
 printf('<p>Message learned successfully with following result:</p><ul><li>Owner: <b>%s</b></li><li>Result: <b>%s</b></li><li>Class: <b>%s</b></li></ul>',
Please login to merge, or discard this patch.