GitHub Access Token became invalid

It seems like the GitHub access token used for retrieving details about this repository from GitHub became invalid. This might prevent certain types of inspections from being run (in particular, everything related to pull requests).
Please ask an admin of your repository to re-new the access token on this website.
Completed
Push — master ( d33e12...a6a2a3 )
by Marco
01:43
created
list.php 1 patch
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -13,7 +13,7 @@
 block discarded – undo
13 13
 $err = NULL;
14 14
 
15 15
 if ( ($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE )
16
-                exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error);
16
+				exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error);
17 17
 
18 18
 if (addtolist ($mysqli,$user,$_POST['value'],$tables["$typedesc"],$_POST['unit'],$_POST['quantity'],$_POST['reason'],$err))
19 19
  print 'OK '.$_POST["type"].' <'.$_POST['value'].'> first time listed for '.$_POST['quantity'].$_POST['unit'].'.';
Please login to merge, or discard this patch.
remove.php 1 patch
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -10,7 +10,7 @@
 block discarded – undo
10 10
 $user = username();
11 11
 
12 12
 if ( ($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE )
13
-                exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error);
13
+				exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error);
14 14
 if (remove ($mysqli,$user,$_POST['value'],$type,$table))
15 15
  print 'OK '.$typedesc.' <'.$_POST['value'].'> permanently REMOVED!';
16 16
 else
Please login to merge, or discard this patch.
delist.php 1 patch
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -12,7 +12,7 @@
 block discarded – undo
12 12
 $user = username();
13 13
 
14 14
 if ( ($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE )
15
-                exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error);
15
+				exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error);
16 16
 
17 17
 if (changestatus($mysqli,username(),$_POST['value'],'0',$type,$table))
18 18
  print 'OK '.$_POST["type"].' <'.$_POST['value'].'> delisted.';
Please login to merge, or discard this patch.
contrib/splunk/webhook/readPost.php 1 patch
Indentation   +49 added lines, -49 removed lines patch added patch discarded remove patch
@@ -26,17 +26,17 @@  discard block
 block discarded – undo
26 26
 
27 27
  /* Conf */
28 28
 if (!isset($_GET['conf'])) {
29
-        syslog(LOG_ALERT,
30
-        sprintf('%s: you must insert the config file name as a GET parameter, such as %s?conf=listEmail.conf',
31
-                $user, $_SERVER['SCRIPT_NAME']) );
32
-        exit(254);
29
+		syslog(LOG_ALERT,
30
+		sprintf('%s: you must insert the config file name as a GET parameter, such as %s?conf=listEmail.conf',
31
+				$user, $_SERVER['SCRIPT_NAME']) );
32
+		exit(254);
33 33
 }
34 34
 $fileconf = $_GET['conf'];
35 35
 if ( !file_exists(dirname(__FILE__) . '/../' . $fileconf) ) {
36
-        syslog(LOG_ALERT,
37
-        sprintf('%s: the configuration file <%s> doesn\'t exist.',
38
-                $user, $fileconf ));
39
-        exit(254);
36
+		syslog(LOG_ALERT,
37
+		sprintf('%s: the configuration file <%s> doesn\'t exist.',
38
+				$user, $fileconf ));
39
+		exit(254);
40 40
 }
41 41
 
42 42
 closelog();
@@ -64,8 +64,8 @@  discard block
 block discarded – undo
64 64
 
65 65
 /* check you select a blocklist */
66 66
 if ( !$tables["$typedesc"]['bl'] ) {
67
-        syslog(LOG_EMERG,"$user: <$typedesc> is not a blocklist. Are you stupid? Do you want to whitelist a spammer? I refuse to continue.");
68
-        exit (254);
67
+		syslog(LOG_EMERG,"$user: <$typedesc> is not a blocklist. Are you stupid? Do you want to whitelist a spammer? I refuse to continue.");
68
+		exit (254);
69 69
 }
70 70
 
71 71
 
@@ -95,15 +95,15 @@  discard block
 block discarded – undo
95 95
 if (preg_match_all('/^https?\:\/\/(?<splunkhost>[\w\.\-]+)\:8000\/app\/(?<splunkapp>[\w\.\-]+)\/\@go\?sid=(?<job>[\w\.\-\d]+)$/',
96 96
 	$webhook['results_link'], $out, PREG_PATTERN_ORDER) === FALSE) {
97 97
 	syslog(LOG_ALERT,
98
-        	sprintf('%s: unexpected error: can\'t parse the results link returned by webhook (<%s>).',
98
+			sprintf('%s: unexpected error: can\'t parse the results link returned by webhook (<%s>).',
99 99
 		$user, $webhook['results_link']) );
100 100
 	return 255;
101 101
 }
102 102
 
103 103
 if ( $webhook['app'] != $out['splunkapp'][0] ) {
104 104
 	syslog(LOG_ALERT,
105
-        	sprintf('%s: unexpected error: the APP returned by webhook (<%s>) doesn\'t match the app (<%s>) in result link.',
106
-                $user, $webhook['app'], $out['splunkapp'][0] ) );
105
+			sprintf('%s: unexpected error: the APP returned by webhook (<%s>) doesn\'t match the app (<%s>) in result link.',
106
+				$user, $webhook['app'], $out['splunkapp'][0] ) );
107 107
 	return 255;
108 108
 }
109 109
 
@@ -137,14 +137,14 @@  discard block
 block discarded – undo
137 137
 
138 138
 $nr = count ($results);
139 139
 for ($i=1; $i<$nr; $i++) {	/* We skip first header line (i=0) */
140
-        $data = str_getcsv($results[$i], ',');
141
-        $thisVal = $data[1];
142
-        unset($data[1]);
143
-        $data = array_values($data);
144
-        if ( !in_array($thisVal,array_keys($tolist))  )
145
-	        $tolist["$thisVal"] = $data;
146
-        else if ($data[3]>$tolist[$thisVal][3])
147
-	        $tolist["$thisVal"] = $data;
140
+		$data = str_getcsv($results[$i], ',');
141
+		$thisVal = $data[1];
142
+		unset($data[1]);
143
+		$data = array_values($data);
144
+		if ( !in_array($thisVal,array_keys($tolist))  )
145
+			$tolist["$thisVal"] = $data;
146
+		else if ($data[3]>$tolist[$thisVal][3])
147
+			$tolist["$thisVal"] = $data;
148 148
 }
149 149
 
150 150
 /* Make MYSQL connection */
@@ -154,34 +154,34 @@  discard block
 block discarded – undo
154 154
 	exit (254);
155 155
 
156 156
 foreach ( array_keys($tolist) as $value) {
157
-        $quantity = $conf['quantity'];
158
-        $reason = 'On ['.$tolist["$value"][0]."] <$value> sent ".$tolist["$value"][1].' messages to '.$tolist["$value"][2].' recipients.';
159
-        if ( $tolist["$value"][3] >= $threshold ) {
160
-                if ( searchAndList ($mysqli,$user,$tables,$typedesc,$value,$unit,$quantity,$reason) ) {
161
-                        syslog (LOG_INFO, "$user: ".'Listing reason: '.$reason);
162
-                        /* Send a email to domain admin if you list an email */
163
-                        if ( ( $tables["$typedesc"]['field'] == 'email' ) OR ( $tables["$typedesc"]['field'] == 'username' ) ) {
164
-                                /* Sometime uid are in the form of <user>@<domain> ... */
165
-                                if ( strpos($value, '@') !== FALSE ) {
166
-                                        $domain = substr(strrchr($value, '@'), 1);
167
-                                        if ( strpos($domain, '@') === FALSE ) {
168
-                                                $recip = emailToNotify($domainNotify_file,$domain);
169
-                                                $subject = sprintf('%s <%s> is now blocked because exceedes limits on outgoing emails',
170
-                                                                $tables["$typedesc"]['field'], $value);
171
-                                                if (!empty($recip))
172
-                                                        if ( sendEmailWarn($tplfile,'[email protected]',$recip,
173
-                                                                $subject,$value,"$quantity $unit",$reason) )
174
-                                                                syslog(LOG_INFO, "$user: \"$recip\" was notified about the \"$value\" abuse.");
175
-                                        }
176
-                                        else syslog(LOG_ERR,"$user: <$domain> contains the '@' char. Notification cannot be sent.");
177
-                                }
178
-                        }
179
-                }
180
-        }
181
-        else {
182
-                $reason .= " But it has NOT been listed because it doesn't apply to the trigger condition.";
183
-                syslog (LOG_INFO, "$user: ".$reason);
184
-        }
157
+		$quantity = $conf['quantity'];
158
+		$reason = 'On ['.$tolist["$value"][0]."] <$value> sent ".$tolist["$value"][1].' messages to '.$tolist["$value"][2].' recipients.';
159
+		if ( $tolist["$value"][3] >= $threshold ) {
160
+				if ( searchAndList ($mysqli,$user,$tables,$typedesc,$value,$unit,$quantity,$reason) ) {
161
+						syslog (LOG_INFO, "$user: ".'Listing reason: '.$reason);
162
+						/* Send a email to domain admin if you list an email */
163
+						if ( ( $tables["$typedesc"]['field'] == 'email' ) OR ( $tables["$typedesc"]['field'] == 'username' ) ) {
164
+								/* Sometime uid are in the form of <user>@<domain> ... */
165
+								if ( strpos($value, '@') !== FALSE ) {
166
+										$domain = substr(strrchr($value, '@'), 1);
167
+										if ( strpos($domain, '@') === FALSE ) {
168
+												$recip = emailToNotify($domainNotify_file,$domain);
169
+												$subject = sprintf('%s <%s> is now blocked because exceedes limits on outgoing emails',
170
+																$tables["$typedesc"]['field'], $value);
171
+												if (!empty($recip))
172
+														if ( sendEmailWarn($tplfile,'[email protected]',$recip,
173
+																$subject,$value,"$quantity $unit",$reason) )
174
+																syslog(LOG_INFO, "$user: \"$recip\" was notified about the \"$value\" abuse.");
175
+										}
176
+										else syslog(LOG_ERR,"$user: <$domain> contains the '@' char. Notification cannot be sent.");
177
+								}
178
+						}
179
+				}
180
+		}
181
+		else {
182
+				$reason .= " But it has NOT been listed because it doesn't apply to the trigger condition.";
183
+				syslog (LOG_INFO, "$user: ".$reason);
184
+		}
185 185
 }
186 186
 
187 187
 /* Close connection */
Please login to merge, or discard this patch.
function.php 1 patch
Indentation   +158 added lines, -158 removed lines patch added patch discarded remove patch
@@ -4,8 +4,8 @@  discard block
 block discarded – undo
4 4
 
5 5
 function username() {
6 6
 	if (isset ($_SERVER['REMOTE_USER'])) $user = $_SERVER['REMOTE_USER'];
7
-        	else if (isset ($_SERVER['USER'])) $user = $_SERVER['USER'];
8
-                	else $user='unknown';
7
+			else if (isset ($_SERVER['USER'])) $user = $_SERVER['USER'];
8
+					else $user='unknown';
9 9
 	return $user;
10 10
 }
11 11
 
@@ -21,11 +21,11 @@  discard block
 block discarded – undo
21 21
 }
22 22
 
23 23
 function myConnect($host, $user, $pass, $db, $port, $tablelist, $typedesc, $loguser) {
24
-        $db = ( $tablelist["$typedesc"]['milter'] ) ? $tablelist["$typedesc"]['name'] : $db;
24
+		$db = ( $tablelist["$typedesc"]['milter'] ) ? $tablelist["$typedesc"]['name'] : $db;
25 25
 	$mysqli = new mysqli($host, $user, $pass, $db, $port);
26
-        if ($mysqli->connect_error) {
27
-           	syslog (LOG_EMERG, $loguser.': Connect Error to DB <'.$db.'> (' . $mysqli->connect_errno . ') '
28
-                    		. $mysqli->connect_error);
26
+		if ($mysqli->connect_error) {
27
+		   	syslog (LOG_EMERG, $loguser.': Connect Error to DB <'.$db.'> (' . $mysqli->connect_errno . ') '
28
+							. $mysqli->connect_error);
29 29
 		return FALSE;
30 30
 	}
31 31
 	syslog(LOG_INFO, $loguser.': Successfully MySQL connected at DB <'.$db.'> to ' . $mysqli->host_info) ;
@@ -66,7 +66,7 @@  discard block
 block discarded – undo
66 66
 			}
67 67
 		}
68 68
 		list($sub['net'],$sub['mask'])=explode('/',$value);
69
-                $query= sprintf("INSERT INTO `$table` (
69
+				$query= sprintf("INSERT INTO `$table` (
70 70
                         `$type` ,
71 71
 			`netmask`,
72 72
                         `date` ,
@@ -79,10 +79,10 @@  discard block
 block discarded – undo
79 79
                         INET_ATON( '%s' ) , INET_ATON( '%s' ) ,
80 80
                         CURRENT_TIMESTAMP , TIMESTAMPADD(%s,%d,CURRENT_TIMESTAMP), '1', '%s', '%s'
81 81
                 )" ,$sub['net'],$sub['mask'],$expUnit,$expQ,$user,$myreason);
82
-                break;
82
+				break;
83 83
 
84 84
 	  default:
85
-                $query= sprintf("INSERT INTO `$table` (
85
+				$query= sprintf("INSERT INTO `$table` (
86 86
                         `$type` ,
87 87
                         `date` ,
88 88
                         `exp` ,
@@ -97,8 +97,8 @@  discard block
 block discarded – undo
97 97
 	}
98 98
 
99 99
 	if ($myconn->query($query) === TRUE) {
100
-	    syslog(LOG_INFO, "$user: $type <$value> successfully listed on <$table> for $expQ $expUnit.");
101
-	    $result=TRUE;
100
+		syslog(LOG_INFO, "$user: $type <$value> successfully listed on <$table> for $expQ $expUnit.");
101
+		$result=TRUE;
102 102
 	}
103 103
 	else syslog(LOG_ERR, "$user: Error: ".$myconn->error);
104 104
 	return $result;
@@ -116,9 +116,9 @@  discard block
 block discarded – undo
116 116
 		$nlist = '`nlist` + 1';
117 117
 	}
118 118
 
119
-        switch ($type) {
119
+		switch ($type) {
120 120
 	  case 'ip':
121
-                $query= sprintf("UPDATE `$table` SET
121
+				$query= sprintf("UPDATE `$table` SET
122 122
 			`active` = '1',
123 123
 			`user` = '%s',
124 124
 			`exp` = TIMESTAMPADD(%s,%d,%s),
@@ -126,9 +126,9 @@  discard block
 block discarded – undo
126 126
 			`reason` = '%s'
127 127
 			WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$value);
128 128
 		break;
129
-          case 'network':
129
+		  case 'network':
130 130
 		list($sub['net'],$sub['mask'])=explode('/',$value);
131
-                $query= sprintf("UPDATE `$table` SET
131
+				$query= sprintf("UPDATE `$table` SET
132 132
                         `active` = '1',
133 133
                         `user` = '%s',
134 134
                         `exp` = TIMESTAMPADD(%s,%d,%s),
@@ -137,7 +137,7 @@  discard block
 block discarded – undo
137 137
                         WHERE (`$table`.`$type` = INET_ATON('%s') AND `$table`.`netmask` = INET_ATON('%s')) LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$sub['net'],$sub['mask']);
138 138
 		break;
139 139
 	  default:
140
-                $query= sprintf("UPDATE `$table` SET
140
+				$query= sprintf("UPDATE `$table` SET
141 141
                         `active` = '1',
142 142
                         `user` = '%s',
143 143
                         `exp` = TIMESTAMPADD(%s,%d,%s),
@@ -146,18 +146,18 @@  discard block
 block discarded – undo
146 146
 			WHERE `$table`.`$type` = '%s' LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$value);
147 147
 	}
148 148
 
149
-        if ($myconn->query($query) === TRUE) {
150
-            syslog(LOG_INFO, "$user: relist $type <$value> on <$table> for $expQ $expUnit from $exptime.");
149
+		if ($myconn->query($query) === TRUE) {
150
+			syslog(LOG_INFO, "$user: relist $type <$value> on <$table> for $expQ $expUnit from $exptime.");
151 151
 		$result=TRUE;
152
-        }
153
-        else syslog (LOG_ERR, "$user: Error: ". $myconn->error);
152
+		}
153
+		else syslog (LOG_ERR, "$user: Error: ". $myconn->error);
154 154
 	return $result;
155 155
 }
156 156
 
157 157
 function remove ($myconn,$user,$value,$type,$table) {
158 158
 
159
-        switch ($type) {
160
-          case 'ip':
159
+		switch ($type) {
160
+		  case 'ip':
161 161
 		$query = sprintf("DELETE FROM `$table` WHERE
162 162
                         `$table`.`$type` = INET_ATON('%s') LIMIT 1", $value);
163 163
 		break;
@@ -173,18 +173,18 @@  discard block
 block discarded – undo
173 173
 	}
174 174
 
175 175
 
176
-        if ($return=$myconn->query($query) === TRUE) 
177
-            syslog(LOG_INFO, "$user: permanently DELETED $type <$value> from <$table>.");
178
-        else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
176
+		if ($return=$myconn->query($query) === TRUE) 
177
+			syslog(LOG_INFO, "$user: permanently DELETED $type <$value> from <$table>.");
178
+		else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
179 179
 
180
-        return $return;
180
+		return $return;
181 181
 }
182 182
 
183 183
 
184 184
 function changestatus ($myconn,$user,$value,$status,$type,$table) {
185 185
 
186 186
 	switch ($type) {
187
-          case 'ip':
187
+		  case 'ip':
188 188
 		$query= sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1" ,$user, $value);
189 189
 		break;
190 190
 	  case 'network':
@@ -195,16 +195,16 @@  discard block
 block discarded – undo
195 195
 		$query= sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = '%s' LIMIT 1" ,$user, $value);
196 196
 	}
197 197
 
198
-        if ($return=$myconn->query($query) === TRUE) {
199
-            syslog(LOG_INFO, "$user: change status of $type <$value>. The status is now <$status>");
200
-        }
201
-        else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
198
+		if ($return=$myconn->query($query) === TRUE) {
199
+			syslog(LOG_INFO, "$user: change status of $type <$value>. The status is now <$status>");
200
+		}
201
+		else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
202 202
 	return $return;	
203 203
 }
204 204
 
205 205
 
206 206
 function expire ($myconn,$user,$tables,$expireTime) {
207
-        $return=TRUE;
207
+		$return=TRUE;
208 208
 	$log=array();
209 209
 	$desc = array_keys($tables);
210 210
 	foreach ($desc as $tdesc) { 
@@ -214,11 +214,11 @@  discard block
 block discarded – undo
214 214
 		/* END OF QUERY */
215 215
 		$log[0] = 'expired for';
216 216
 		$log[1] = 'disabled for';
217
-        	if ($myconn->multi_query($query)) {
217
+			if ($myconn->multi_query($query)) {
218 218
 			$j = 0;
219 219
 			do {
220
-		    		$numdel = $myconn->affected_rows;
221
-	            		syslog(LOG_INFO, "Expire job - <$user> Permanently DELETED $numdel records ".$log[$j]." $expireTime YEARS from <".$tables["$tdesc"]['name'].'>.');
220
+					$numdel = $myconn->affected_rows;
221
+						syslog(LOG_INFO, "Expire job - <$user> Permanently DELETED $numdel records ".$log[$j]." $expireTime YEARS from <".$tables["$tdesc"]['name'].'>.');
222 222
 				$j++;
223 223
 
224 224
 			} while ($myconn->next_result());
@@ -230,7 +230,7 @@  discard block
 block discarded – undo
230 230
 	}
231 231
 	if ( !($return) ) syslog(LOG_EMERG, 'End of Expire job with error. See above logs. SQL Connection terminated');
232 232
 	else  syslog(LOG_INFO, 'Successfully End of Expire job. SQL Connection successfully terminated.');
233
-        return $return;
233
+		return $return;
234 234
 }
235 235
 
236 236
 
@@ -303,7 +303,7 @@  discard block
 block discarded – undo
303 303
 		if ( $entry->num_rows ) {
304 304
 			if ( $entry->num_rows == 1 ) {
305 305
 				$riga = $entry->fetch_array(MYSQLI_ASSOC);
306
-                        	if (isListed($riga)) {
306
+							if (isListed($riga)) {
307 307
 					$warn = "<$value> is already present in <$listdep> list!";
308 308
 					$entry->free();
309 309
 					return FALSE;
@@ -320,7 +320,7 @@  discard block
 block discarded – undo
320 320
 function searchentry ($myconn,$value,$tablelist) {
321 321
 /* Make a MYSQL query and return result */
322 322
 
323
-        $type = $tablelist['field'];
323
+		$type = $tablelist['field'];
324 324
 	
325 325
 	if ( $tablelist['milter'] ) {
326 326
 		$table = milterTable($type);
@@ -344,7 +344,7 @@  discard block
 block discarded – undo
344 344
 				case 'ip':
345 345
 					$query = sprintf('SELECT * FROM (
346 346
 							SELECT *, GROUP_CONCAT(milt.name) as miltnames FROM `%s` LEFT JOIN milt ON (%s.idmilt=milt.id)' .
347
-                                                		'WHERE `ip` =  INET_ATON(\'%s\')
347
+														'WHERE `ip` =  INET_ATON(\'%s\')
348 348
 							 ) AS val WHERE val.ip IS NOT null', $table, $table, $value);
349 349
 					break;
350 350
 				default:
@@ -355,33 +355,33 @@  discard block
 block discarded – undo
355 355
 	}
356 356
 
357 357
 	else {
358
-	        $table = $tablelist['name'];
359
-	        if ($value == 'ALL') $query = 'select * from '.$table;
360
-	        else {
361
-	                switch ($type) {
362
-	                  case 'ip':
363
-	                        $query= "select * from $table where $type =  INET_ATON('$value')";
364
-	                        break;
365
-	                  case 'network':
366
-	                        list($sub['net'],$sub['mask'])=explode('/',$value);
367
-	                        $query= sprintf('select * from `%s`
358
+			$table = $tablelist['name'];
359
+			if ($value == 'ALL') $query = 'select * from '.$table;
360
+			else {
361
+					switch ($type) {
362
+					  case 'ip':
363
+							$query= "select * from $table where $type =  INET_ATON('$value')";
364
+							break;
365
+					  case 'network':
366
+							list($sub['net'],$sub['mask'])=explode('/',$value);
367
+							$query= sprintf('select * from `%s`
368 368
 						WHERE (
369 369
 							inet_aton(\'%s\') >= network AND
370 370
 							( inet_aton(\'%s\') | ( inet_aton(\'%s\') ^ (power(2,32)-1) ) )
371 371
 								<= network | ( netmask ^ (power(2,32)-1) )
372 372
 						)', $table, $sub['net'], $sub['net'], $sub['mask']);
373 373
 ;
374
-	                        break;
375
-	                  default:
376
-	                        $query= "select * from $table where $type = '$value'";
377
-	                }
378
-	        }
374
+							break;
375
+					  default:
376
+							$query= "select * from $table where $type = '$value'";
377
+					}
378
+			}
379 379
 	}
380 380
 
381 381
 	$result = $myconn->query($query);
382 382
 	if($result === false)
383 383
 		syslog(LOG_EMERG, "ALERT: Query <$query> failed: ".$myconn->error);
384
-        return $result;
384
+		return $result;
385 385
 }
386 386
 
387 387
 function countListed ($myconn,$table) {
@@ -396,14 +396,14 @@  discard block
 block discarded – undo
396 396
 
397 397
 
398 398
 function isFull($myconn,$typedesc,$alltables) {
399
-        if (isset($alltables["$typedesc"]['limit'])) {
399
+		if (isset($alltables["$typedesc"]['limit'])) {
400 400
 		if ( $alltables["$typedesc"]['milter'] )
401 401
 			$tab = 'net';
402 402
 		else
403 403
 			$tab = $alltables["$typedesc"]['name'];
404
-                if ( countListed($myconn,$tab) >= $alltables["$typedesc"]['limit'] ) 
405
-                        return TRUE;
406
-        }
404
+				if ( countListed($myconn,$tab) >= $alltables["$typedesc"]['limit'] ) 
405
+						return TRUE;
406
+		}
407 407
 	return FALSE;
408 408
 }
409 409
 
@@ -423,14 +423,14 @@  discard block
 block discarded – undo
423 423
 	if ($result) {
424 424
 		printf("<pre>Your request for $type &lt;$value&gt; returned %d items.\n</pre>", $result->num_rows);
425 425
 
426
-        /* Check for limit in number of listed items */
426
+		/* Check for limit in number of listed items */
427 427
 	$full = isFull($myconn,$typedesc,$tables);
428 428
 	if ($full) print '<p>'.htmlspecialchars("$typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items.').'</p>';
429 429
 
430 430
 		if ($result->num_rows) {
431 431
 			print $tabhtm;
432 432
 			$i=0;
433
-        		while ($riga = $result->fetch_array(MYSQLI_ASSOC)) {
433
+				while ($riga = $result->fetch_array(MYSQLI_ASSOC)) {
434 434
 				if (isListed($riga)) {
435 435
 					if ($tables["$typedesc"]['bl']) $listed='Listed';
436 436
 					else $listed='WhiteListed';
@@ -456,7 +456,7 @@  discard block
 block discarded – undo
456 456
 					 printf ("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
457 457
 					$element, $riga['date'], $riga['datemod'], $riga['exp'], $riga['active'], $riga['nlist'], $riga['user'],htmlspecialchars($riga['reason']),ask($myconn,$i,$listed,$tables,$typedesc,$element,$full,$user,$adm));
458 458
 				$i++;
459
-        		}
459
+				}
460 460
 			print '</tbody></table>';
461 461
 		}
462 462
 		else {
@@ -476,15 +476,15 @@  discard block
 block discarded – undo
476 476
         
477 477
 function sendEmailWarn($tplf,$from,$to,$sbj,$emailListed,$intervalToExpire,$detail) {
478 478
 	$now = time();
479
-        setlocale (LC_TIME, 'it_IT');
480
-        $date = date("r",$now);
479
+		setlocale (LC_TIME, 'it_IT');
480
+		$date = date("r",$now);
481 481
 	$messageID = md5(uniqid($now,1)) . '@' . gethostname();
482 482
 	$mua = 'PHP/' . phpversion();
483 483
 
484 484
 	/* Parsing headers */
485 485
 	if (!file_exists($tplf['header'])) {
486
-    		syslog(LOG_ERR, 'Sending email... template file <'.$tplf['header'].'> not found!');
487
-    		exit;
486
+			syslog(LOG_ERR, 'Sending email... template file <'.$tplf['header'].'> not found!');
487
+			exit;
488 488
 	}
489 489
 
490 490
 	$head_tmpl = file_get_contents($tplf['header']);
@@ -493,35 +493,35 @@  discard block
 block discarded – undo
493 493
 	$headers = str_replace($arr_tpl_vars, $arr_tpl_data, $head_tmpl);
494 494
 	$headers = preg_replace( '/\r|\n/', "\r\n", $headers );
495 495
 
496
-        /* Parsing body */
496
+		/* Parsing body */
497 497
 
498
-        if (!file_exists($tplf['body'])) {
499
-                syslog(LOG_ERR, 'Sending email... template file <'.$tplf['body'].'> not found!');
500
-                exit;
501
-        }
498
+		if (!file_exists($tplf['body'])) {
499
+				syslog(LOG_ERR, 'Sending email... template file <'.$tplf['body'].'> not found!');
500
+				exit;
501
+		}
502 502
 
503
-        $body_tmpl = file_get_contents($tplf['body']);
504
-        $arr_tpl_vars = array('{emailListed}','{expInterval}','{reason}');
505
-        $arr_tpl_data = array($emailListed,$intervalToExpire,$detail);
506
-        $body = str_replace($arr_tpl_vars, $arr_tpl_data, $body_tmpl);
507
-        $body = preg_replace( "/\r|\n/", "\r\n", $body );
503
+		$body_tmpl = file_get_contents($tplf['body']);
504
+		$arr_tpl_vars = array('{emailListed}','{expInterval}','{reason}');
505
+		$arr_tpl_data = array($emailListed,$intervalToExpire,$detail);
506
+		$body = str_replace($arr_tpl_vars, $arr_tpl_data, $body_tmpl);
507
+		$body = preg_replace( "/\r|\n/", "\r\n", $body );
508 508
 	$body = wordwrap ( $body, 75 , "\r\n" );	
509 509
 
510 510
 	/* Send the mail! */
511
-        if ( strlen(ini_get("safe_mode"))< 1) {
512
-                $old_mailfrom = ini_get("sendmail_from");
513
-                ini_set("sendmail_from", $from);
514
-                $params = sprintf("-oi -f %s", '<>');
515
-                if (!(mail($to,$sbj, $body,$headers,$params))) $flag=FALSE;
516
-                else $flag=TRUE;
517
-                if (isset($old_mailfrom))
518
-                        ini_set("sendmail_from", $old_mailfrom);
519
-        }
520
-        else {
521
-                if (!(mail($to,$sbj, $body,$headers))) $flag=FALSE;
522
-                else $flag=TRUE;
523
-        }
524
-        return $flag;
511
+		if ( strlen(ini_get("safe_mode"))< 1) {
512
+				$old_mailfrom = ini_get("sendmail_from");
513
+				ini_set("sendmail_from", $from);
514
+				$params = sprintf("-oi -f %s", '<>');
515
+				if (!(mail($to,$sbj, $body,$headers,$params))) $flag=FALSE;
516
+				else $flag=TRUE;
517
+				if (isset($old_mailfrom))
518
+						ini_set("sendmail_from", $old_mailfrom);
519
+		}
520
+		else {
521
+				if (!(mail($to,$sbj, $body,$headers))) $flag=FALSE;
522
+				else $flag=TRUE;
523
+		}
524
+		return $flag;
525 525
 }
526 526
 
527 527
 function emailToNotify($notify_file,$dom) {
@@ -535,62 +535,62 @@  discard block
 block discarded – undo
535 535
 function searchAndList ($myconn,$loguser,$tables,$typedesc,$value,$unit,&$quantity,&$reason) {
536 536
 
537 537
 /* Search and list value */
538
-        $type = $tables["$typedesc"]['field'];
539
-        $table = $tables["$typedesc"]['name'];
540
-        $result = searchentry ($myconn,$value,$tables["$typedesc"]);
541
-
542
-        /* Manage abnormal conditions */
543
-        /* Value already present in db more than once. This is absurd. Panic! */
544
-        if ($result->num_rows > 1) {
545
-                syslog(LOG_EMERG,"$loguser: PANIC! Select for $type '$value' returned ". $result->num_rows ." items instead of one. Abnormal. Contact a sysadmin or a developer.");
546
-                $result->free();
547
-                return FALSE;
548
-        }
538
+		$type = $tables["$typedesc"]['field'];
539
+		$table = $tables["$typedesc"]['name'];
540
+		$result = searchentry ($myconn,$value,$tables["$typedesc"]);
541
+
542
+		/* Manage abnormal conditions */
543
+		/* Value already present in db more than once. This is absurd. Panic! */
544
+		if ($result->num_rows > 1) {
545
+				syslog(LOG_EMERG,"$loguser: PANIC! Select for $type '$value' returned ". $result->num_rows ." items instead of one. Abnormal. Contact a sysadmin or a developer.");
546
+				$result->free();
547
+				return FALSE;
548
+		}
549 549
 
550
-        /* Value already present in db or not present: to list anyway */
551
-        if ($result->num_rows >= 0) {
552
-                /* First, check for limit in number of listed items */
553
-                if (isFull($myconn,$typedesc,$tables)) {
554
-                        syslog(LOG_EMERG,"$loguser: $typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items. Abnormal exit.');
555
-                        $result->free();
556
-                        return FALSE;
557
-                }
558
-                /* Second, check if the (re)list would be consistent now */
559
-                if (! consistentListing($myconn,$tables,$typedesc,$value,$whynot) ) {
560
-                        syslog(LOG_ERR, $loguser.': '.$whynot);
561
-                        $result->free();
562
-                        return FALSE;
563
-                }
564
-        }
565
-        /* End of abnormal conditions */
550
+		/* Value already present in db or not present: to list anyway */
551
+		if ($result->num_rows >= 0) {
552
+				/* First, check for limit in number of listed items */
553
+				if (isFull($myconn,$typedesc,$tables)) {
554
+						syslog(LOG_EMERG,"$loguser: $typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items. Abnormal exit.');
555
+						$result->free();
556
+						return FALSE;
557
+				}
558
+				/* Second, check if the (re)list would be consistent now */
559
+				if (! consistentListing($myconn,$tables,$typedesc,$value,$whynot) ) {
560
+						syslog(LOG_ERR, $loguser.': '.$whynot);
561
+						$result->free();
562
+						return FALSE;
563
+				}
564
+		}
565
+		/* End of abnormal conditions */
566 566
 
567 567
 
568
-        /* Finally, here I can list the value! */
568
+		/* Finally, here I can list the value! */
569 569
 	$thisentry = $result->fetch_array(MYSQLI_ASSOC);
570
-        switch ($result->num_rows) {
571
-                /* Relist value if already present */
572
-                case 1:
573
-                        if ( isListed($thisentry) ) {
570
+		switch ($result->num_rows) {
571
+				/* Relist value if already present */
572
+				case 1:
573
+						if ( isListed($thisentry) ) {
574 574
 				/* Entry already listed */
575 575
 				$expdate = $thisentry['exp'];
576 576
 				$reason = sprintf('%s. Already listed. Adding 1 DAY to previous expire date.',
577 577
 					 $reason);
578 578
 				$quantity = 1;
579 579
 				$unit = 'DAY';
580
-                        }
580
+						}
581 581
 			else {
582
-                        	/* Entry delisted */
582
+							/* Entry delisted */
583 583
 				$quantity *= $thisentry['nlist'];
584 584
 				$expdate = 0; /* This forces expiration from CURRENT_TIMESTAMP */
585 585
 			}
586 586
 			$result->free();
587
-                        return relist ($myconn,$loguser,$value,$type,$table,$unit,$quantity,$reason, $expdate);
587
+						return relist ($myconn,$loguser,$value,$type,$table,$unit,$quantity,$reason, $expdate);
588 588
 
589
-                /* First time list value */
590
-                case 0:
591
-                        $result->free();
592
-                        return addtolist ($myconn,$loguser,$value,$tables["$typedesc"],$unit,$quantity,$reason,$_);
593
-        }
589
+				/* First time list value */
590
+				case 0:
591
+						$result->free();
592
+						return addtolist ($myconn,$loguser,$value,$tables["$typedesc"],$unit,$quantity,$reason,$_);
593
+		}
594 594
 }
595 595
 
596 596
 
@@ -623,7 +623,7 @@  discard block
 block discarded – undo
623 623
 		return FALSE;
624 624
 	}
625 625
 	$result = searchentry ($myconn,'ALL',$tabletype);
626
-        if ($result->num_rows) {
626
+		if ($result->num_rows) {
627 627
 		while ($row = $result->fetch_array(MYSQLI_ASSOC)) {
628 628
 			$thisNet = long2ip($row['network']).'/'.long2ip($row['netmask']);
629 629
 			if ( isIn($thisNet, $net) ) {
@@ -643,7 +643,7 @@  discard block
 block discarded – undo
643 643
 /* For miltermap */
644 644
 function checkMilterConf($table) {
645 645
 	if (isset($table['milter'])) {
646
-        	if ($table['milter'] ===  TRUE) {
646
+			if ($table['milter'] ===  TRUE) {
647 647
 			switch ( $table['field'] ) {
648 648
 				case 'network':
649 649
 				case 'ip':
@@ -666,15 +666,15 @@  discard block
 block discarded – undo
666 666
 
667 667
 function milterTable($t) {
668 668
 	/* Return the milter object table for type t  or FALSE on error */
669
-        switch ($t) {
670
-                case 'network':
671
-                        return 'net';
672
-                case 'ip':
673
-                        return 'ips';
674
-                default:
669
+		switch ($t) {
670
+				case 'network':
671
+						return 'net';
672
+				case 'ip':
673
+						return 'ips';
674
+				default:
675 675
 			syslog(LOG_EMERG, "ALERT: type <$t> not allowed in configuration. ");
676
-                        return FALSE;
677
-        }
676
+						return FALSE;
677
+		}
678 678
 }
679 679
 
680 680
 
@@ -682,9 +682,9 @@  discard block
 block discarded – undo
682 682
 	$milters=array();
683 683
 	$query = 'SELECT `name` FROM `config`';
684 684
 
685
-        $result = $myconn->query($query);
686
-        if($result === false) {
687
-                syslog(LOG_EMERG, "$loguser: ALERT: Query <$query> failed: ".$myconn->error);
685
+		$result = $myconn->query($query);
686
+		if($result === false) {
687
+				syslog(LOG_EMERG, "$loguser: ALERT: Query <$query> failed: ".$myconn->error);
688 688
 		return FALSE;
689 689
 	}
690 690
 	if ($result->num_rows) {
@@ -754,21 +754,21 @@  discard block
 block discarded – undo
754 754
 
755 755
 function curl_get($url, array $get = NULL, array $options = array(), $loguser)
756 756
 {
757
-    $defaults = array(
758
-        CURLOPT_URL => $url. (strpos($url, '?') === FALSE ? '?' : ''). http_build_query($get),
759
-        CURLOPT_HEADER => 0,
760
-        CURLOPT_RETURNTRANSFER => TRUE,
761
-        CURLOPT_TIMEOUT => 4
762
-    );
763
-
764
-    $ch = curl_init();
765
-    curl_setopt_array($ch, ($options + $defaults));
766
-    if( ! $result = curl_exec($ch))
767
-    {
768
-        syslog(LOG_ERR, sprintf('%s: CURL Error: <%s>', $loguser, curl_error($ch)));
769
-    }
770
-    curl_close($ch);
771
-    return $result;
757
+	$defaults = array(
758
+		CURLOPT_URL => $url. (strpos($url, '?') === FALSE ? '?' : ''). http_build_query($get),
759
+		CURLOPT_HEADER => 0,
760
+		CURLOPT_RETURNTRANSFER => TRUE,
761
+		CURLOPT_TIMEOUT => 4
762
+	);
763
+
764
+	$ch = curl_init();
765
+	curl_setopt_array($ch, ($options + $defaults));
766
+	if( ! $result = curl_exec($ch))
767
+	{
768
+		syslog(LOG_ERR, sprintf('%s: CURL Error: <%s>', $loguser, curl_error($ch)));
769
+	}
770
+	curl_close($ch);
771
+	return $result;
772 772
 }
773 773
 
774 774
 /*
Please login to merge, or discard this patch.
contrib/mailClassifier/result.php 1 patch
Indentation   +26 added lines, -26 removed lines patch added patch discarded remove patch
@@ -27,32 +27,32 @@
 block discarded – undo
27 27
 
28 28
 
29 29
 $data = array(
30
-                'date' => NULL,
31
-                'from' => NULL,
32
-                'messageid' => NULL,
33
-                'dmarc' => array(
34
-                        'result' => NULL,
35
-                        'dom'   => NULL
36
-                        ),
37
-                'spf' => array(
38
-                        'result' => NULL,
39
-                        'dom'   => NULL
40
-                        ),
41
-                'dkim' => array(
42
-                        'result' => NULL,
43
-                        'dom'   => NULL
44
-                        ),
45
-                'spam' => array(
46
-                        'status' => NULL,
47
-                        'score' => NULL,
48
-                        'th'    => NULL,
49
-                        ),
50
-                'dspam' => array(
51
-                        'type' => NULL,
52
-                        'level' => NULL,
53
-                        'learn' => NULL
54
-                        ),
55
-                'warn' => NULL
30
+				'date' => NULL,
31
+				'from' => NULL,
32
+				'messageid' => NULL,
33
+				'dmarc' => array(
34
+						'result' => NULL,
35
+						'dom'   => NULL
36
+						),
37
+				'spf' => array(
38
+						'result' => NULL,
39
+						'dom'   => NULL
40
+						),
41
+				'dkim' => array(
42
+						'result' => NULL,
43
+						'dom'   => NULL
44
+						),
45
+				'spam' => array(
46
+						'status' => NULL,
47
+						'score' => NULL,
48
+						'th'    => NULL,
49
+						),
50
+				'dspam' => array(
51
+						'type' => NULL,
52
+						'level' => NULL,
53
+						'learn' => NULL
54
+						),
55
+				'warn' => NULL
56 56
 );
57 57
 
58 58
 if (empty($folder)) exit ('<p>No folder found.</p>'); /* This should not occur */
Please login to merge, or discard this patch.
contrib/mailClassifier/index.php 1 patch
Indentation   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -16,10 +16,10 @@
 block discarded – undo
16 16
 require_once('function.php');
17 17
 
18 18
 if ( !isset($version) ) {
19
-        openlog('mailClassifierEmergency', LOG_PID, LOG_LOCAL0);
20
-        syslog (LOG_EMERG, sprintf('unknown: I can\'t read the config files. Do you have configured the $path in %s?', __FILE__));
21
-        closelog();
22
-        exit(255);
19
+		openlog('mailClassifierEmergency', LOG_PID, LOG_LOCAL0);
20
+		syslog (LOG_EMERG, sprintf('unknown: I can\'t read the config files. Do you have configured the $path in %s?', __FILE__));
21
+		closelog();
22
+		exit(255);
23 23
 }
24 24
 
25 25
 checkSSL();
Please login to merge, or discard this patch.
contrib/mailClassifier/learn.php 1 patch
Indentation   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -26,12 +26,12 @@
 block discarded – undo
26 26
 if ( preg_match ('/^X-DSPAM-Result:\s+(?P<user>[\w\.\@]+);\s+result="(?P<result>\w+)";\s+class="(?P<class>\w+)";\s+probability=(?P<prob>[\d\.]+);\s+confidence=(?P<conf>[\d\.]+);\s+signature=(?P<sig>[\w\,]+)$/',$out[0],$received) != 1) {
27 27
 		$err = 'DSPAM Client returned an unparseable result.';
28 28
 		syslog(LOG_ERR, $username.': Learn Error: '.$err);
29
-                exit (sprintf('<p>%s</p>',htmlentities($err)));
29
+				exit (sprintf('<p>%s</p>',htmlentities($err)));
30 30
 }
31 31
 
32 32
 printf('<p>Message learned successfully with following result:</p><ul><li>Owner: <b>%s</b></li><li>Result: <b>%s</b></li><li>Class: <b>%s</b></li></ul>',
33 33
 	htmlentities($received['user']),
34
-        $received['result'], $received['class']);
34
+		$received['result'], $received['class']);
35 35
 ?>
36 36
 closelog();
37 37
 </div>
Please login to merge, or discard this patch.
contrib/mailClassifier/function.php 1 patch
Indentation   +85 added lines, -85 removed lines patch added patch discarded remove patch
@@ -3,13 +3,13 @@  discard block
 block discarded – undo
3 3
 function imapFolder($cf, $username) {
4 4
 	$return = array();
5 5
 	$open='{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}';
6
-        $m_mail = imap_open($open, $username, $cf['authpassword'], OP_READONLY)
7
-                or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
8
-        if ( !$m_mail ) exit(254);
6
+		$m_mail = imap_open($open, $username, $cf['authpassword'], OP_READONLY)
7
+				or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
8
+		if ( !$m_mail ) exit(254);
9 9
 
10 10
 
11
-        syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].'>; Listing folders of account <'.$username.'>...');
12
-        //get all folder
11
+		syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].'>; Listing folders of account <'.$username.'>...');
12
+		//get all folder
13 13
 	$list = imap_list($m_mail, $open, "*");
14 14
 	imap_close($m_mail);
15 15
 	if (is_array($list))
@@ -23,7 +23,7 @@  discard block
 block discarded – undo
23 23
 function imapFind ($cf, $username, $folder) {
24 24
 	$head=array();
25 25
 	$m_mail = imap_open('{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}'.$folder, $username,$cf['authpassword'], OP_READONLY)
26
-        	or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
26
+			or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
27 27
 	if ( !$m_mail ) exit(254);
28 28
 		
29 29
 
@@ -36,12 +36,12 @@  discard block
 block discarded – undo
36 36
 	// Order results starting from newest message
37 37
 	if ( empty($m_search) ) {
38 38
 		syslog (LOG_INFO,$cf['user'].": No suitable mail found in <$folder> folder.");
39
-	        if ( $ierr = imap_errors() )
40
-	                foreach ( $ierr as $thiserr )
41
-	                        syslog (LOG_ERR, $cf['user'].": IMAP Error: $thiserr");
42
-	        if ( $ierr = imap_alerts() )
43
-	                foreach ( $ierr as $thiserr )
44
-	                        syslog (LOG_ALERT, $cf['user'].": IMAP Alert: $thiserr");
39
+			if ( $ierr = imap_errors() )
40
+					foreach ( $ierr as $thiserr )
41
+							syslog (LOG_ERR, $cf['user'].": IMAP Error: $thiserr");
42
+			if ( $ierr = imap_alerts() )
43
+					foreach ( $ierr as $thiserr )
44
+							syslog (LOG_ALERT, $cf['user'].": IMAP Alert: $thiserr");
45 45
 		imap_close( $m_mail );
46 46
 		return FALSE;
47 47
 	}
@@ -49,7 +49,7 @@  discard block
 block discarded – undo
49 49
 	syslog (LOG_INFO,$cf['user'].": Found $nmes mail in <$folder> folder.");
50 50
 	if ($nmes>0) rsort($m_search);
51 51
 
52
-        // loop for each message
52
+		// loop for each message
53 53
 	foreach ($m_search as $onem) 
54 54
 		$head[] = imap_fetchheader($m_mail, $onem );
55 55
 	imap_close($m_mail);
@@ -68,52 +68,52 @@  discard block
 block discarded – undo
68 68
 /* Each line must end with /r/n         */
69 69
 
70 70
 	$result = array(
71
-                'date' => NULL,
72
-                'from' => NULL,
73
-                'messageid' => NULL,
71
+				'date' => NULL,
72
+				'from' => NULL,
73
+				'messageid' => NULL,
74 74
 		'dmarc' => array(
75 75
 			'result' => NULL,
76 76
 			'dom'	=> NULL
77 77
 			),
78 78
 		'spf' => array(
79
-                        'result' => NULL,
80
-                        'dom'   => NULL
81
-                        ),
79
+						'result' => NULL,
80
+						'dom'   => NULL
81
+						),
82 82
 		'dkim' => array(
83
-                        'result' => NULL,
84
-                        'dom'   => NULL
85
-                        ),
86
-                'spam' => array(
87
-                        'status' => NULL,
88
-                        'score' => NULL,
89
-                        'th'    => NULL,
90
-                        ),
91
-                'dspam' => array(
92
-                        'type' => NULL,
93
-                        'level' => NULL,
83
+						'result' => NULL,
84
+						'dom'   => NULL
85
+						),
86
+				'spam' => array(
87
+						'status' => NULL,
88
+						'score' => NULL,
89
+						'th'    => NULL,
90
+						),
91
+				'dspam' => array(
92
+						'type' => NULL,
93
+						'level' => NULL,
94 94
 			'learn' => NULL
95
-                        ),
95
+						),
96 96
 		'warn' => NULL
97
-        );
97
+		);
98 98
 		
99 99
 
100
-        if ( preg_match_all ('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dmarc=(?<dmarc>\w+)\s+\(p=\w+\s+dis=\w+\)\s+header\.from=(?<DMARCfrom>[\w\.]+)/m',$header,$received) ) {
100
+		if ( preg_match_all ('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dmarc=(?<dmarc>\w+)\s+\(p=\w+\s+dis=\w+\)\s+header\.from=(?<DMARCfrom>[\w\.]+)/m',$header,$received) ) {
101 101
 		$k=0;
102
-                for ($i = count($received[0])-1;$i>=0;$i--) {
103
-	                foreach ($ARhosts as $mx) {
102
+				for ($i = count($received[0])-1;$i>=0;$i--) {
103
+					foreach ($ARhosts as $mx) {
104 104
 				if ($mx == $received['host'][$i]) {
105 105
 					/* This is a trusted AR result */
106 106
 					$result['dmarc']['result']=$received['dmarc'][$i];
107 107
 					$result['dmarc']['dom'] = $received['DMARCfrom'][$i];
108 108
 					$k++;
109 109
 				}
110
-                	}
110
+					}
111
+		}
111 112
 		}
112
-        }
113 113
 	$received=NULL;
114 114
 	if ($k>1) $result['warn'][] = 'The trusted DMARC AR Headers are present more than once. Something wrong.';
115 115
 
116
-        if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)spf=(?<spf>\w+)\s+smtp\.(?:mailfrom|helo)=(?<SPFfrom>[\w\.]+)/m',$header,$received) ) {
116
+		if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)spf=(?<spf>\w+)\s+smtp\.(?:mailfrom|helo)=(?<SPFfrom>[\w\.]+)/m',$header,$received) ) {
117 117
 		$k=0;
118 118
 		for ($i = count($received[0])-1;$i>=0;$i--) {
119 119
 			foreach ($ARhosts as $mx) {
@@ -122,25 +122,25 @@  discard block
 block discarded – undo
122 122
 					$result['spf']['result']=$received['spf'][$i];
123 123
 					$result['spf']['dom'] = $received['SPFfrom'][$i];
124 124
 					$k++;
125
-                        	}
126
-                	}
127
-        	}
125
+							}
126
+					}
127
+			}
128 128
 	}
129 129
 	$received=NULL;
130 130
 	if ($k>1) $result['warn'][] = 'The trusted SPF AR Headers are present more than once. Something wrong.';
131 131
 
132 132
 	$k=0;
133
-        if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dkim=(?<dkim>\w+)\s+[\w\s\(\)\-]+header\.d=(?<DKIMdom>[\w\.]+)/m',$header,$received) ) {
133
+		if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dkim=(?<dkim>\w+)\s+[\w\s\(\)\-]+header\.d=(?<DKIMdom>[\w\.]+)/m',$header,$received) ) {
134 134
 		for ($i = count($received[0])-1;$i>=0;$i--) {
135
-	                foreach ($ARhosts as $mx) {
136
-        	                if ($mx == $received['host'][$i]) {
137
-                	                /* This is a trusted AR result */
138
-                        	        $result['dkim']['result']=$received['dkim'][$i];
139
-                                	$result['dkim']['dom'] = $received['DKIMdom'][$i];
135
+					foreach ($ARhosts as $mx) {
136
+							if ($mx == $received['host'][$i]) {
137
+									/* This is a trusted AR result */
138
+									$result['dkim']['result']=$received['dkim'][$i];
139
+									$result['dkim']['dom'] = $received['DKIMdom'][$i];
140 140
 					$k++;
141
-                        	}
142
-                	}
143
-        	}
141
+							}
142
+					}
143
+			}
144 144
 	}
145 145
 	$received=NULL;
146 146
 	if ($k>1) $result['warn'][] = 'The trusted DKIM AR Headers are present more than once. Something wrong.';
@@ -148,59 +148,59 @@  discard block
 block discarded – undo
148 148
 	if ($dpl) { /* Use Spamassassin Plugin */
149 149
 		if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*DSPAM_(?P<dtype>SPAM|HAM)_(?P<dlevel>\d\d)(?:.|\r\n\s+)*\]/m',$header,$received) ) {
150 150
 			$result['spam']['status']=$received['spamstatus'][0];
151
-                	$result['spam']['score'] = $received['score'][0];
151
+					$result['spam']['score'] = $received['score'][0];
152 152
 			$result['spam']['th'] = $received['th'][0];
153 153
 			$result['dspam']['type'] = $received['dtype'][0];
154 154
 			$result['dspam']['level'] =$received['dlevel'][0];
155
-        	}
156
-        	if (count($received[0])>1) $result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.';
155
+			}
156
+			if (count($received[0])>1) $result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.';
157 157
 	}
158 158
 	else { /* Parse apart all DSPAM Header and calculate a level */
159 159
 		if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*\]/m',$header,$received) ) {
160
-                        $result['spam']['status']=$received['spamstatus'][0];
161
-                        $result['spam']['score'] = $received['score'][0];
162
-                        $result['spam']['th'] = $received['th'][0];
160
+						$result['spam']['status']=$received['spamstatus'][0];
161
+						$result['spam']['score'] = $received['score'][0];
162
+						$result['spam']['th'] = $received['th'][0];
163 163
 			if (count($received[0])>1)
164 164
 				$result['warn'][]= 'The Spamassassin Headers are present more than once. I consider only the last one.';
165 165
 		}
166 166
 		if ( preg_match ('/\r\nX\-DSPAM\-Result:\s(?P<result>.*)\r\n/',$header,$received) != 1)
167
-	                $result['warn'] = 'DSPAM Result invalid, not present or present more than once.';
168
-	        else
169
-                	$result['dspam']['type']=$received['result'];
167
+					$result['warn'] = 'DSPAM Result invalid, not present or present more than once.';
168
+			else
169
+					$result['dspam']['type']=$received['result'];
170 170
 		$prob = NULL;
171 171
 		$conf = NULL;
172
-                if ( preg_match ('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/',$header,$received) != 1)
173
-                        $result['warn'][] = 'DSPAM Probability invalid, not present or present more than once.';
172
+				if ( preg_match ('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/',$header,$received) != 1)
173
+						$result['warn'][] = 'DSPAM Probability invalid, not present or present more than once.';
174 174
 		else
175 175
 			$prob = $received['prob'];
176 176
 		if ( preg_match ('/\r\nX\-DSPAM\-Confidence:\s(?P<conf>.*)\r\n/',$header,$received) != 1)
177
-                        $result['warn'][] = 'DSPAM Confidence invalid, not present or present more than once.';
177
+						$result['warn'][] = 'DSPAM Confidence invalid, not present or present more than once.';
178 178
 		else
179 179
 			$conf = $received['conf'];
180 180
 		$result['dspam']['level'] = dspamLevel($prob,$conf);
181 181
 	}
182 182
 	$received=NULL;
183 183
 	if ( preg_match ('/\r\nFrom:\s(?P<from>.*)\r\n/',$header,$received) != 1)
184
-                $result['warn'][] = 'From header invalid or not present';
185
-        else
186
-                $result['from'] = $received['from'];
184
+				$result['warn'][] = 'From header invalid or not present';
185
+		else
186
+				$result['from'] = $received['from'];
187 187
 
188
-        if ( preg_match ('/\r\nDate:\s(?P<date>.*)\r\n/',$header,$received) != 1)
189
-                $result['warn'][] = 'Date header invalid or not present';
188
+		if ( preg_match ('/\r\nDate:\s(?P<date>.*)\r\n/',$header,$received) != 1)
189
+				$result['warn'][] = 'Date header invalid or not present';
190 190
 	else
191 191
 		$result['date'] = $received['date'];
192 192
 
193 193
 	$received=NULL;
194
-        if ( preg_match ('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/',$header,$received) != 1)
195
-                $result['warn'][] = 'Message-ID invalid, not present or present more than once.';
194
+		if ( preg_match ('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/',$header,$received) != 1)
195
+				$result['warn'][] = 'Message-ID invalid, not present or present more than once.';
196 196
 	else
197 197
 		$result['messageid']=$received['mid'];
198 198
 
199
-        $received=NULL;
199
+		$received=NULL;
200 200
 
201
-        switch ($learn) {
201
+		switch ($learn) {
202 202
 		case 'dspamc':
203
-        		if ( preg_match ('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/',$header,$received) != 1)
203
+				if ( preg_match ('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/',$header,$received) != 1)
204 204
 				$result['warn'] = 'DSPAM Signature invalid, not present or present more than once.';
205 205
 			else
206 206
 				$result['dspam']['learn']=$received['sig'];			
@@ -211,23 +211,23 @@  discard block
 block discarded – undo
211 211
 			syslog (LOG_INFO,$user.': Error in "learn" imap configuration value. Please, set "dspamc" or "false".');
212 212
 	}
213 213
 	
214
-        return $result;
214
+		return $result;
215 215
 }
216 216
 
217 217
 
218 218
 
219 219
 
220 220
 function printTableHeader($title,$content,$footer=FALSE,$fcontent) {
221
-        print <<<END
221
+		print <<<END
222 222
 	<caption>$title</caption>
223 223
 	<thead>
224 224
 	<tr>
225 225
 END;
226 226
 	$kcontent = array_keys($content);
227
-        $cols = count($kcontent);
228
-        for ($i=0; $i<$cols; $i++) {
227
+		$cols = count($kcontent);
228
+		for ($i=0; $i<$cols; $i++) {
229 229
 		$key = $kcontent[$i];
230
-                printf ('<th colspan="%d" rowspan="%d">%s</th>',
230
+				printf ('<th colspan="%d" rowspan="%d">%s</th>',
231 231
 			!is_array($content[$key]) ?:
232 232
 			count(array_keys($content[$key])) ?: '1',
233 233
 			!is_array($content[$key]) ?:
@@ -243,13 +243,13 @@  discard block
 block discarded – undo
243 243
 		}
244 244
 	}
245 245
 		
246
-        print '</tr></thead>';
247
-        if ($footer) {
248
-                print '<tfoot><tr>';
249
-                print "<th colspan=\"$cols\">".$fcontent.'</th>';
250
-                print '</tr></tfoot>';
251
-        }
252
-        return TRUE;
246
+		print '</tr></thead>';
247
+		if ($footer) {
248
+				print '<tfoot><tr>';
249
+				print "<th colspan=\"$cols\">".$fcontent.'</th>';
250
+				print '</tr></tfoot>';
251
+		}
252
+		return TRUE;
253 253
 }
254 254
 
255 255
 
@@ -324,7 +324,7 @@  discard block
 block discarded – undo
324 324
 				}
325 325
 			/* Spamassassin format */
326 326
 			if (isset($row['status']))
327
-	                        switch($row['status']) {
327
+							switch($row['status']) {
328 328
 					case 'No':
329 329
 						$color = 'rgba(0,255,0, %.1f)';
330 330
 						break;
Please login to merge, or discard this patch.