GitHub Access Token became invalid

It seems like the GitHub access token used for retrieving details about this repository from GitHub became invalid. This might prevent certain types of inspections from being run (in particular, everything related to pull requests).
Please ask an admin of your repository to re-new the access token on this website.
Completed
Push — master ( a6a2a3...83b34a )
by Marco
01:56
created
delist.php 3 patches
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -12,7 +12,7 @@
 block discarded – undo
12 12
 $user = username();
13 13
 
14 14
 if ( ($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE )
15
-                exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error);
15
+				exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error);
16 16
 
17 17
 if (changestatus($mysqli,username(),$_POST['value'],'0',$type,$table))
18 18
  print 'OK '.$_POST["type"].' <'.$_POST['value'].'> delisted.';
Please login to merge, or discard this patch.
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -1,7 +1,7 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 require_once('config.php');
3 3
 require_once('function.php');
4
-$typedesc=$_POST['type'];
4
+$typedesc = $_POST['type'];
5 5
 $type = $tables["$typedesc"]['field'];
6 6
 $table = ($tables["$typedesc"]['milter']) ? milterTable($type) : $tables["$typedesc"]['name'];
7 7
 $cl = ($tables["$typedesc"]['milter']) ? 10 : 9;
@@ -11,10 +11,10 @@  discard block
 block discarded – undo
11 11
 openlog($tag, LOG_PID, $fac);
12 12
 $user = username();
13 13
 
14
-if ( ($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE )
15
-                exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error);
14
+if (($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE)
15
+                exit ($user.': Connect Error ('.$mysqli->connect_errno.') '.$mysqli->connect_error);
16 16
 
17
-if (changestatus($mysqli,username(),$_POST['value'],'0',$type,$table))
17
+if (changestatus($mysqli, username(), $_POST['value'], '0', $type, $table))
18 18
  print 'OK '.$_POST["type"].' &lt;'.$_POST['value'].'&gt; delisted.';
19 19
 else
20 20
  print 'ERROR in delist &lt;'.$_POST['value'].'&gt;; check log';
Please login to merge, or discard this patch.
Braces   +5 added lines, -3 removed lines patch added patch discarded remove patch
@@ -11,13 +11,15 @@
 block discarded – undo
11 11
 openlog($tag, LOG_PID, $fac);
12 12
 $user = username();
13 13
 
14
-if ( ($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE )
14
+if ( ($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE ) {
15 15
                 exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error);
16
+}
16 17
 
17
-if (changestatus($mysqli,username(),$_POST['value'],'0',$type,$table))
18
+if (changestatus($mysqli,username(),$_POST['value'],'0',$type,$table)) {
18 19
  print 'OK '.$_POST["type"].' &lt;'.$_POST['value'].'&gt; delisted.';
19
-else
20
+} else {
20 21
  print 'ERROR in delist &lt;'.$_POST['value'].'&gt;; check log';
22
+}
21 23
 print '</td>';
22 24
 $mysqli->close();
23 25
 closelog();
Please login to merge, or discard this patch.
function.php 4 patches
Doc Comments   +14 added lines patch added patch discarded remove patch
@@ -234,6 +234,9 @@  discard block
 block discarded – undo
234 234
 }
235 235
 
236 236
 
237
+/**
238
+ * @param integer $id
239
+ */
237 240
 function askMilter($myconn,$id,$obj,$typedesc,$miltId,$value,$user,$adm)  {
238 241
 	$milts = readMiltName($myconn,$user);
239 242
 	$size = count($milts);
@@ -264,6 +267,11 @@  discard block
 block discarded – undo
264 267
 }
265 268
 
266 269
 
270
+/**
271
+ * @param integer $id
272
+ * @param string $what
273
+ * @param boolean $lock
274
+ */
267 275
 function ask($myconn,$id,$what,$alltables,$typedesc,$value,$lock,$user,$adm) {
268 276
 
269 277
 	$whynot=NULL;
@@ -522,6 +530,9 @@  discard block
 block discarded – undo
522 530
 }
523 531
 
524 532
 
533
+/**
534
+ * @param string $reason
535
+ */
525 536
 function searchAndList ($myconn,$loguser,$tables,$typedesc,$value,$unit,&$quantity,&$reason) {
526 537
 
527 538
 /* Search and list value */
@@ -591,6 +602,9 @@  discard block
 block discarded – undo
591 602
 	return array_map('long2ip', range( ip2long($range[0]), ip2long($range[1]) ) );
592 603
 }
593 604
 
605
+/**
606
+ * @param string $netA
607
+ */
594 608
 function isIn($netA, $netB) {
595 609
 /* TRUE if an IP of $netA is contained in netB */
596 610
 	list($addressA,$maskA) = explode('/', $netA);
Please login to merge, or discard this patch.
Indentation   +158 added lines, -158 removed lines patch added patch discarded remove patch
@@ -4,8 +4,8 @@  discard block
 block discarded – undo
4 4
 
5 5
 function username() {
6 6
 	if (isset ($_SERVER['REMOTE_USER'])) $user = $_SERVER['REMOTE_USER'];
7
-        	else if (isset ($_SERVER['USER'])) $user = $_SERVER['USER'];
8
-                	else $user='unknown';
7
+			else if (isset ($_SERVER['USER'])) $user = $_SERVER['USER'];
8
+					else $user='unknown';
9 9
 	return $user;
10 10
 }
11 11
 
@@ -21,11 +21,11 @@  discard block
 block discarded – undo
21 21
 }
22 22
 
23 23
 function myConnect($host, $user, $pass, $db, $port, $tablelist, $typedesc, $loguser) {
24
-        $db = ( $tablelist["$typedesc"]['milter'] ) ? $tablelist["$typedesc"]['name'] : $db;
24
+		$db = ( $tablelist["$typedesc"]['milter'] ) ? $tablelist["$typedesc"]['name'] : $db;
25 25
 	$mysqli = new mysqli($host, $user, $pass, $db, $port);
26
-        if ($mysqli->connect_error) {
27
-           	syslog (LOG_EMERG, $loguser.': Connect Error to DB <'.$db.'> (' . $mysqli->connect_errno . ') '
28
-                    		. $mysqli->connect_error);
26
+		if ($mysqli->connect_error) {
27
+		   	syslog (LOG_EMERG, $loguser.': Connect Error to DB <'.$db.'> (' . $mysqli->connect_errno . ') '
28
+							. $mysqli->connect_error);
29 29
 		return FALSE;
30 30
 	}
31 31
 	syslog(LOG_INFO, $loguser.': Successfully MySQL connected at DB <'.$db.'> to ' . $mysqli->host_info) ;
@@ -66,7 +66,7 @@  discard block
 block discarded – undo
66 66
 			}
67 67
 		}
68 68
 		list($sub['net'],$sub['mask'])=explode('/',$value);
69
-                $query= sprintf("INSERT INTO `$table` (
69
+				$query= sprintf("INSERT INTO `$table` (
70 70
                         `$type` ,
71 71
 			`netmask`,
72 72
                         `date` ,
@@ -79,10 +79,10 @@  discard block
 block discarded – undo
79 79
                         INET_ATON( '%s' ) , INET_ATON( '%s' ) ,
80 80
                         CURRENT_TIMESTAMP , TIMESTAMPADD(%s,%d,CURRENT_TIMESTAMP), '1', '%s', '%s'
81 81
                 )" ,$sub['net'],$sub['mask'],$expUnit,$expQ,$user,$myreason);
82
-                break;
82
+				break;
83 83
 
84 84
 	  default:
85
-                $query= sprintf("INSERT INTO `$table` (
85
+				$query= sprintf("INSERT INTO `$table` (
86 86
                         `$type` ,
87 87
                         `date` ,
88 88
                         `exp` ,
@@ -97,8 +97,8 @@  discard block
 block discarded – undo
97 97
 	}
98 98
 
99 99
 	if ($myconn->query($query) === TRUE) {
100
-	    syslog(LOG_INFO, "$user: $type <$value> successfully listed on <$table> for $expQ $expUnit.");
101
-	    $result=TRUE;
100
+		syslog(LOG_INFO, "$user: $type <$value> successfully listed on <$table> for $expQ $expUnit.");
101
+		$result=TRUE;
102 102
 	}
103 103
 	else syslog(LOG_ERR, "$user: Error: ".$myconn->error);
104 104
 	return $result;
@@ -116,9 +116,9 @@  discard block
 block discarded – undo
116 116
 		$nlist = '`nlist` + 1';
117 117
 	}
118 118
 
119
-        switch ($type) {
119
+		switch ($type) {
120 120
 	  case 'ip':
121
-                $query= sprintf("UPDATE `$table` SET
121
+				$query= sprintf("UPDATE `$table` SET
122 122
 			`active` = '1',
123 123
 			`user` = '%s',
124 124
 			`exp` = TIMESTAMPADD(%s,%d,%s),
@@ -126,9 +126,9 @@  discard block
 block discarded – undo
126 126
 			`reason` = '%s'
127 127
 			WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$value);
128 128
 		break;
129
-          case 'network':
129
+		  case 'network':
130 130
 		list($sub['net'],$sub['mask'])=explode('/',$value);
131
-                $query= sprintf("UPDATE `$table` SET
131
+				$query= sprintf("UPDATE `$table` SET
132 132
                         `active` = '1',
133 133
                         `user` = '%s',
134 134
                         `exp` = TIMESTAMPADD(%s,%d,%s),
@@ -137,7 +137,7 @@  discard block
 block discarded – undo
137 137
                         WHERE (`$table`.`$type` = INET_ATON('%s') AND `$table`.`netmask` = INET_ATON('%s')) LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$sub['net'],$sub['mask']);
138 138
 		break;
139 139
 	  default:
140
-                $query= sprintf("UPDATE `$table` SET
140
+				$query= sprintf("UPDATE `$table` SET
141 141
                         `active` = '1',
142 142
                         `user` = '%s',
143 143
                         `exp` = TIMESTAMPADD(%s,%d,%s),
@@ -146,18 +146,18 @@  discard block
 block discarded – undo
146 146
 			WHERE `$table`.`$type` = '%s' LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$value);
147 147
 	}
148 148
 
149
-        if ($myconn->query($query) === TRUE) {
150
-            syslog(LOG_INFO, "$user: relist $type <$value> on <$table> for $expQ $expUnit from $exptime.");
149
+		if ($myconn->query($query) === TRUE) {
150
+			syslog(LOG_INFO, "$user: relist $type <$value> on <$table> for $expQ $expUnit from $exptime.");
151 151
 		$result=TRUE;
152
-        }
153
-        else syslog (LOG_ERR, "$user: Error: ". $myconn->error);
152
+		}
153
+		else syslog (LOG_ERR, "$user: Error: ". $myconn->error);
154 154
 	return $result;
155 155
 }
156 156
 
157 157
 function remove ($myconn,$user,$value,$type,$table) {
158 158
 
159
-        switch ($type) {
160
-          case 'ip':
159
+		switch ($type) {
160
+		  case 'ip':
161 161
 		$query = sprintf("DELETE FROM `$table` WHERE
162 162
                         `$table`.`$type` = INET_ATON('%s') LIMIT 1", $value);
163 163
 		break;
@@ -173,18 +173,18 @@  discard block
 block discarded – undo
173 173
 	}
174 174
 
175 175
 
176
-        if ($return=$myconn->query($query) === TRUE) 
177
-            syslog(LOG_INFO, "$user: permanently DELETED $type <$value> from <$table>.");
178
-        else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
176
+		if ($return=$myconn->query($query) === TRUE) 
177
+			syslog(LOG_INFO, "$user: permanently DELETED $type <$value> from <$table>.");
178
+		else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
179 179
 
180
-        return $return;
180
+		return $return;
181 181
 }
182 182
 
183 183
 
184 184
 function changestatus ($myconn,$user,$value,$status,$type,$table) {
185 185
 
186 186
 	switch ($type) {
187
-          case 'ip':
187
+		  case 'ip':
188 188
 		$query= sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1" ,$user, $value);
189 189
 		break;
190 190
 	  case 'network':
@@ -195,16 +195,16 @@  discard block
 block discarded – undo
195 195
 		$query= sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = '%s' LIMIT 1" ,$user, $value);
196 196
 	}
197 197
 
198
-        if ($return=$myconn->query($query) === TRUE) {
199
-            syslog(LOG_INFO, "$user: change status of $type <$value>. The status is now <$status>");
200
-        }
201
-        else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
198
+		if ($return=$myconn->query($query) === TRUE) {
199
+			syslog(LOG_INFO, "$user: change status of $type <$value>. The status is now <$status>");
200
+		}
201
+		else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
202 202
 	return $return;	
203 203
 }
204 204
 
205 205
 
206 206
 function expire ($myconn,$user,$tables,$expireTime) {
207
-        $return=TRUE;
207
+		$return=TRUE;
208 208
 	$log=array();
209 209
 	$desc = array_keys($tables);
210 210
 	foreach ($desc as $tdesc) { 
@@ -214,11 +214,11 @@  discard block
 block discarded – undo
214 214
 		/* END OF QUERY */
215 215
 		$log[0] = 'expired for';
216 216
 		$log[1] = 'disabled for';
217
-        	if ($myconn->multi_query($query)) {
217
+			if ($myconn->multi_query($query)) {
218 218
 			$j = 0;
219 219
 			do {
220
-		    		$numdel = $myconn->affected_rows;
221
-	            		syslog(LOG_INFO, "Expire job - <$user> Permanently DELETED $numdel records ".$log[$j]." $expireTime YEARS from <".$tables["$tdesc"]['name'].'>.');
220
+					$numdel = $myconn->affected_rows;
221
+						syslog(LOG_INFO, "Expire job - <$user> Permanently DELETED $numdel records ".$log[$j]." $expireTime YEARS from <".$tables["$tdesc"]['name'].'>.');
222 222
 				$j++;
223 223
 
224 224
 			} while ($myconn->next_result());
@@ -230,7 +230,7 @@  discard block
 block discarded – undo
230 230
 	}
231 231
 	if ( !($return) ) syslog(LOG_EMERG, 'End of Expire job with error. See above logs. SQL Connection terminated');
232 232
 	else  syslog(LOG_INFO, 'Successfully End of Expire job. SQL Connection successfully terminated.');
233
-        return $return;
233
+		return $return;
234 234
 }
235 235
 
236 236
 
@@ -303,7 +303,7 @@  discard block
 block discarded – undo
303 303
 		if ( $entry->num_rows ) {
304 304
 			if ( $entry->num_rows == 1 ) {
305 305
 				$riga = $entry->fetch_array(MYSQLI_ASSOC);
306
-                        	if (isListed($riga)) {
306
+							if (isListed($riga)) {
307 307
 					$warn = "<$value> is already present in <$listdep> list!";
308 308
 					$entry->free();
309 309
 					return FALSE;
@@ -320,7 +320,7 @@  discard block
 block discarded – undo
320 320
 function searchentry ($myconn,$value,$tablelist) {
321 321
 /* Make a MYSQL query and return result */
322 322
 
323
-        $type = $tablelist['field'];
323
+		$type = $tablelist['field'];
324 324
 	
325 325
 	if ( $tablelist['milter'] ) {
326 326
 		$table = milterTable($type);
@@ -344,7 +344,7 @@  discard block
 block discarded – undo
344 344
 				case 'ip':
345 345
 					$query = sprintf('SELECT * FROM (
346 346
 							SELECT *, GROUP_CONCAT(milt.name) as miltnames FROM `%s` LEFT JOIN milt ON (%s.idmilt=milt.id)' .
347
-                                                		'WHERE `ip` =  INET_ATON(\'%s\')
347
+														'WHERE `ip` =  INET_ATON(\'%s\')
348 348
 							 ) AS val WHERE val.ip IS NOT null', $table, $table, $value);
349 349
 					break;
350 350
 				default:
@@ -355,33 +355,33 @@  discard block
 block discarded – undo
355 355
 	}
356 356
 
357 357
 	else {
358
-	        $table = $tablelist['name'];
359
-	        if ($value == 'ALL') $query = 'select * from '.$table;
360
-	        else {
361
-	                switch ($type) {
362
-	                  case 'ip':
363
-	                        $query= "select * from $table where $type =  INET_ATON('$value')";
364
-	                        break;
365
-	                  case 'network':
366
-	                        list($sub['net'],$sub['mask'])=explode('/',$value);
367
-	                        $query= sprintf('select * from `%s`
358
+			$table = $tablelist['name'];
359
+			if ($value == 'ALL') $query = 'select * from '.$table;
360
+			else {
361
+					switch ($type) {
362
+					  case 'ip':
363
+							$query= "select * from $table where $type =  INET_ATON('$value')";
364
+							break;
365
+					  case 'network':
366
+							list($sub['net'],$sub['mask'])=explode('/',$value);
367
+							$query= sprintf('select * from `%s`
368 368
 						WHERE (
369 369
 							inet_aton(\'%s\') >= network AND
370 370
 							( inet_aton(\'%s\') | ( inet_aton(\'%s\') ^ (power(2,32)-1) ) )
371 371
 								<= network | ( netmask ^ (power(2,32)-1) )
372 372
 						)', $table, $sub['net'], $sub['net'], $sub['mask']);
373 373
 ;
374
-	                        break;
375
-	                  default:
376
-	                        $query= "select * from $table where $type = '$value'";
377
-	                }
378
-	        }
374
+							break;
375
+					  default:
376
+							$query= "select * from $table where $type = '$value'";
377
+					}
378
+			}
379 379
 	}
380 380
 
381 381
 	$result = $myconn->query($query);
382 382
 	if($result === false)
383 383
 		syslog(LOG_EMERG, "ALERT: Query <$query> failed: ".$myconn->error);
384
-        return $result;
384
+		return $result;
385 385
 }
386 386
 
387 387
 function countListed ($myconn,$table) {
@@ -396,14 +396,14 @@  discard block
 block discarded – undo
396 396
 
397 397
 
398 398
 function isFull($myconn,$typedesc,$alltables) {
399
-        if (isset($alltables["$typedesc"]['limit'])) {
399
+		if (isset($alltables["$typedesc"]['limit'])) {
400 400
 		if ( $alltables["$typedesc"]['milter'] )
401 401
 			$tab = 'net';
402 402
 		else
403 403
 			$tab = $alltables["$typedesc"]['name'];
404
-                if ( countListed($myconn,$tab) >= $alltables["$typedesc"]['limit'] ) 
405
-                        return TRUE;
406
-        }
404
+				if ( countListed($myconn,$tab) >= $alltables["$typedesc"]['limit'] ) 
405
+						return TRUE;
406
+		}
407 407
 	return FALSE;
408 408
 }
409 409
 
@@ -423,14 +423,14 @@  discard block
 block discarded – undo
423 423
 	if ($result) {
424 424
 		printf("<pre>Your request for $type &lt;$value&gt; returned %d items.\n</pre>", $result->num_rows);
425 425
 
426
-        /* Check for limit in number of listed items */
426
+		/* Check for limit in number of listed items */
427 427
 	$full = isFull($myconn,$typedesc,$tables);
428 428
 	if ($full) print '<p>'.htmlspecialchars("$typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items.').'</p>';
429 429
 
430 430
 		if ($result->num_rows) {
431 431
 			print $tabhtm;
432 432
 			$i=0;
433
-        		while ($riga = $result->fetch_array(MYSQLI_ASSOC)) {
433
+				while ($riga = $result->fetch_array(MYSQLI_ASSOC)) {
434 434
 				if (isListed($riga)) {
435 435
 					if ($tables["$typedesc"]['bl']) $listed='Listed';
436 436
 					else $listed='WhiteListed';
@@ -456,7 +456,7 @@  discard block
 block discarded – undo
456 456
 					 printf ("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
457 457
 					$element, $riga['date'], $riga['datemod'], $riga['exp'], $riga['active'], $riga['nlist'], $riga['user'],htmlspecialchars($riga['reason']),ask($myconn,$i,$listed,$tables,$typedesc,$element,$full,$user,$adm));
458 458
 				$i++;
459
-        		}
459
+				}
460 460
 			print '</tbody></table>';
461 461
 		}
462 462
 		else {
@@ -476,15 +476,15 @@  discard block
 block discarded – undo
476 476
         
477 477
 function sendEmailWarn($tplf,$from,$to,$sbj,$emailListed,$intervalToExpire,$detail) {
478 478
 	$now = time();
479
-        setlocale (LC_TIME, 'it_IT');
480
-        $date = date("r",$now);
479
+		setlocale (LC_TIME, 'it_IT');
480
+		$date = date("r",$now);
481 481
 	$messageID = md5(uniqid($now,1)) . '@' . gethostname();
482 482
 	$mua = 'PHP/' . phpversion();
483 483
 
484 484
 	/* Parsing headers */
485 485
 	if (!file_exists($tplf['header'])) {
486
-    		syslog(LOG_ERR, 'Sending email... template file <'.$tplf['header'].'> not found!');
487
-    		exit;
486
+			syslog(LOG_ERR, 'Sending email... template file <'.$tplf['header'].'> not found!');
487
+			exit;
488 488
 	}
489 489
 
490 490
 	$head_tmpl = file_get_contents($tplf['header']);
@@ -493,35 +493,35 @@  discard block
 block discarded – undo
493 493
 	$headers = str_replace($arr_tpl_vars, $arr_tpl_data, $head_tmpl);
494 494
 	$headers = preg_replace( '/\r|\n/', "\r\n", $headers );
495 495
 
496
-        /* Parsing body */
496
+		/* Parsing body */
497 497
 
498
-        if (!file_exists($tplf['body'])) {
499
-                syslog(LOG_ERR, 'Sending email... template file <'.$tplf['body'].'> not found!');
500
-                exit;
501
-        }
498
+		if (!file_exists($tplf['body'])) {
499
+				syslog(LOG_ERR, 'Sending email... template file <'.$tplf['body'].'> not found!');
500
+				exit;
501
+		}
502 502
 
503
-        $body_tmpl = file_get_contents($tplf['body']);
504
-        $arr_tpl_vars = array('{emailListed}','{expInterval}','{reason}');
505
-        $arr_tpl_data = array($emailListed,$intervalToExpire,$detail);
506
-        $body = str_replace($arr_tpl_vars, $arr_tpl_data, $body_tmpl);
507
-        $body = preg_replace( "/\r|\n/", "\r\n", $body );
503
+		$body_tmpl = file_get_contents($tplf['body']);
504
+		$arr_tpl_vars = array('{emailListed}','{expInterval}','{reason}');
505
+		$arr_tpl_data = array($emailListed,$intervalToExpire,$detail);
506
+		$body = str_replace($arr_tpl_vars, $arr_tpl_data, $body_tmpl);
507
+		$body = preg_replace( "/\r|\n/", "\r\n", $body );
508 508
 	$body = wordwrap ( $body, 75 , "\r\n" );	
509 509
 
510 510
 	/* Send the mail! */
511
-        if ( strlen(ini_get("safe_mode"))< 1) {
512
-                $old_mailfrom = ini_get("sendmail_from");
513
-                ini_set("sendmail_from", $from);
514
-                $params = sprintf("-oi -f %s", '<>');
515
-                if (!(mail($to,$sbj, $body,$headers,$params))) $flag=FALSE;
516
-                else $flag=TRUE;
517
-                if (isset($old_mailfrom))
518
-                        ini_set("sendmail_from", $old_mailfrom);
519
-        }
520
-        else {
521
-                if (!(mail($to,$sbj, $body,$headers))) $flag=FALSE;
522
-                else $flag=TRUE;
523
-        }
524
-        return $flag;
511
+		if ( strlen(ini_get("safe_mode"))< 1) {
512
+				$old_mailfrom = ini_get("sendmail_from");
513
+				ini_set("sendmail_from", $from);
514
+				$params = sprintf("-oi -f %s", '<>');
515
+				if (!(mail($to,$sbj, $body,$headers,$params))) $flag=FALSE;
516
+				else $flag=TRUE;
517
+				if (isset($old_mailfrom))
518
+						ini_set("sendmail_from", $old_mailfrom);
519
+		}
520
+		else {
521
+				if (!(mail($to,$sbj, $body,$headers))) $flag=FALSE;
522
+				else $flag=TRUE;
523
+		}
524
+		return $flag;
525 525
 }
526 526
 
527 527
 function emailToNotify($notify_file,$dom) {
@@ -535,62 +535,62 @@  discard block
 block discarded – undo
535 535
 function searchAndList ($myconn,$loguser,$tables,$typedesc,$value,$unit,&$quantity,&$reason) {
536 536
 
537 537
 /* Search and list value */
538
-        $type = $tables["$typedesc"]['field'];
539
-        $table = $tables["$typedesc"]['name'];
540
-        $result = searchentry ($myconn,$value,$tables["$typedesc"]);
541
-
542
-        /* Manage abnormal conditions */
543
-        /* Value already present in db more than once. This is absurd. Panic! */
544
-        if ($result->num_rows > 1) {
545
-                syslog(LOG_EMERG,"$loguser: PANIC! Select for $type '$value' returned ". $result->num_rows ." items instead of one. Abnormal. Contact a sysadmin or a developer.");
546
-                $result->free();
547
-                return FALSE;
548
-        }
538
+		$type = $tables["$typedesc"]['field'];
539
+		$table = $tables["$typedesc"]['name'];
540
+		$result = searchentry ($myconn,$value,$tables["$typedesc"]);
541
+
542
+		/* Manage abnormal conditions */
543
+		/* Value already present in db more than once. This is absurd. Panic! */
544
+		if ($result->num_rows > 1) {
545
+				syslog(LOG_EMERG,"$loguser: PANIC! Select for $type '$value' returned ". $result->num_rows ." items instead of one. Abnormal. Contact a sysadmin or a developer.");
546
+				$result->free();
547
+				return FALSE;
548
+		}
549 549
 
550
-        /* Value already present in db or not present: to list anyway */
551
-        if ($result->num_rows >= 0) {
552
-                /* First, check for limit in number of listed items */
553
-                if (isFull($myconn,$typedesc,$tables)) {
554
-                        syslog(LOG_EMERG,"$loguser: $typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items. Abnormal exit.');
555
-                        $result->free();
556
-                        return FALSE;
557
-                }
558
-                /* Second, check if the (re)list would be consistent now */
559
-                if (! consistentListing($myconn,$tables,$typedesc,$value,$whynot) ) {
560
-                        syslog(LOG_ERR, $loguser.': '.$whynot);
561
-                        $result->free();
562
-                        return FALSE;
563
-                }
564
-        }
565
-        /* End of abnormal conditions */
550
+		/* Value already present in db or not present: to list anyway */
551
+		if ($result->num_rows >= 0) {
552
+				/* First, check for limit in number of listed items */
553
+				if (isFull($myconn,$typedesc,$tables)) {
554
+						syslog(LOG_EMERG,"$loguser: $typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items. Abnormal exit.');
555
+						$result->free();
556
+						return FALSE;
557
+				}
558
+				/* Second, check if the (re)list would be consistent now */
559
+				if (! consistentListing($myconn,$tables,$typedesc,$value,$whynot) ) {
560
+						syslog(LOG_ERR, $loguser.': '.$whynot);
561
+						$result->free();
562
+						return FALSE;
563
+				}
564
+		}
565
+		/* End of abnormal conditions */
566 566
 
567 567
 
568
-        /* Finally, here I can list the value! */
568
+		/* Finally, here I can list the value! */
569 569
 	$thisentry = $result->fetch_array(MYSQLI_ASSOC);
570
-        switch ($result->num_rows) {
571
-                /* Relist value if already present */
572
-                case 1:
573
-                        if ( isListed($thisentry) ) {
570
+		switch ($result->num_rows) {
571
+				/* Relist value if already present */
572
+				case 1:
573
+						if ( isListed($thisentry) ) {
574 574
 				/* Entry already listed */
575 575
 				$expdate = $thisentry['exp'];
576 576
 				$reason = sprintf('%s. Already listed. Adding 1 DAY to previous expire date.',
577 577
 					 $reason);
578 578
 				$quantity = 1;
579 579
 				$unit = 'DAY';
580
-                        }
580
+						}
581 581
 			else {
582
-                        	/* Entry delisted */
582
+							/* Entry delisted */
583 583
 				$quantity *= $thisentry['nlist'];
584 584
 				$expdate = 0; /* This forces expiration from CURRENT_TIMESTAMP */
585 585
 			}
586 586
 			$result->free();
587
-                        return relist ($myconn,$loguser,$value,$type,$table,$unit,$quantity,$reason, $expdate);
587
+						return relist ($myconn,$loguser,$value,$type,$table,$unit,$quantity,$reason, $expdate);
588 588
 
589
-                /* First time list value */
590
-                case 0:
591
-                        $result->free();
592
-                        return addtolist ($myconn,$loguser,$value,$tables["$typedesc"],$unit,$quantity,$reason,$_);
593
-        }
589
+				/* First time list value */
590
+				case 0:
591
+						$result->free();
592
+						return addtolist ($myconn,$loguser,$value,$tables["$typedesc"],$unit,$quantity,$reason,$_);
593
+		}
594 594
 }
595 595
 
596 596
 
@@ -623,7 +623,7 @@  discard block
 block discarded – undo
623 623
 		return FALSE;
624 624
 	}
625 625
 	$result = searchentry ($myconn,'ALL',$tabletype);
626
-        if ($result->num_rows) {
626
+		if ($result->num_rows) {
627 627
 		while ($row = $result->fetch_array(MYSQLI_ASSOC)) {
628 628
 			$thisNet = long2ip($row['network']).'/'.long2ip($row['netmask']);
629 629
 			if ( isIn($thisNet, $net) ) {
@@ -643,7 +643,7 @@  discard block
 block discarded – undo
643 643
 /* For miltermap */
644 644
 function checkMilterConf($table) {
645 645
 	if (isset($table['milter'])) {
646
-        	if ($table['milter'] ===  TRUE) {
646
+			if ($table['milter'] ===  TRUE) {
647 647
 			switch ( $table['field'] ) {
648 648
 				case 'network':
649 649
 				case 'ip':
@@ -666,15 +666,15 @@  discard block
 block discarded – undo
666 666
 
667 667
 function milterTable($t) {
668 668
 	/* Return the milter object table for type t  or FALSE on error */
669
-        switch ($t) {
670
-                case 'network':
671
-                        return 'net';
672
-                case 'ip':
673
-                        return 'ips';
674
-                default:
669
+		switch ($t) {
670
+				case 'network':
671
+						return 'net';
672
+				case 'ip':
673
+						return 'ips';
674
+				default:
675 675
 			syslog(LOG_EMERG, "ALERT: type <$t> not allowed in configuration. ");
676
-                        return FALSE;
677
-        }
676
+						return FALSE;
677
+		}
678 678
 }
679 679
 
680 680
 
@@ -682,9 +682,9 @@  discard block
 block discarded – undo
682 682
 	$milters=array();
683 683
 	$query = 'SELECT `name` FROM `config`';
684 684
 
685
-        $result = $myconn->query($query);
686
-        if($result === false) {
687
-                syslog(LOG_EMERG, "$loguser: ALERT: Query <$query> failed: ".$myconn->error);
685
+		$result = $myconn->query($query);
686
+		if($result === false) {
687
+				syslog(LOG_EMERG, "$loguser: ALERT: Query <$query> failed: ".$myconn->error);
688 688
 		return FALSE;
689 689
 	}
690 690
 	if ($result->num_rows) {
@@ -754,21 +754,21 @@  discard block
 block discarded – undo
754 754
 
755 755
 function curl_get($url, array $get = NULL, array $options = array(), $loguser)
756 756
 {
757
-    $defaults = array(
758
-        CURLOPT_URL => $url. (strpos($url, '?') === FALSE ? '?' : ''). http_build_query($get),
759
-        CURLOPT_HEADER => 0,
760
-        CURLOPT_RETURNTRANSFER => TRUE,
761
-        CURLOPT_TIMEOUT => 4
762
-    );
763
-
764
-    $ch = curl_init();
765
-    curl_setopt_array($ch, ($options + $defaults));
766
-    if( ! $result = curl_exec($ch))
767
-    {
768
-        syslog(LOG_ERR, sprintf('%s: CURL Error: <%s>', $loguser, curl_error($ch)));
769
-    }
770
-    curl_close($ch);
771
-    return $result;
757
+	$defaults = array(
758
+		CURLOPT_URL => $url. (strpos($url, '?') === FALSE ? '?' : ''). http_build_query($get),
759
+		CURLOPT_HEADER => 0,
760
+		CURLOPT_RETURNTRANSFER => TRUE,
761
+		CURLOPT_TIMEOUT => 4
762
+	);
763
+
764
+	$ch = curl_init();
765
+	curl_setopt_array($ch, ($options + $defaults));
766
+	if( ! $result = curl_exec($ch))
767
+	{
768
+		syslog(LOG_ERR, sprintf('%s: CURL Error: <%s>', $loguser, curl_error($ch)));
769
+	}
770
+	curl_close($ch);
771
+	return $result;
772 772
 }
773 773
 
774 774
 /*
Please login to merge, or discard this patch.
Spacing   +161 added lines, -161 removed lines patch added patch discarded remove patch
@@ -5,46 +5,46 @@  discard block
 block discarded – undo
5 5
 function username() {
6 6
 	if (isset ($_SERVER['REMOTE_USER'])) $user = $_SERVER['REMOTE_USER'];
7 7
         	else if (isset ($_SERVER['USER'])) $user = $_SERVER['USER'];
8
-                	else $user='unknown';
8
+                	else $user = 'unknown';
9 9
 	return $user;
10 10
 }
11 11
 
12 12
 function checkSSL() {
13
-	if ( empty( $_SERVER['HTTPS'] ) )
14
-		printf ('<div id="content">Ehi sysadmin! Your site is not secure. Please enable SSL on your server and configure a redirect, such as' .
15
-			'<pre>' .
16
-			htmlspecialchars('<VirtualHost *:80>' . "\n" .
17
-			'  ServerName %s' . "\n" .
18
-			'  Redirect permanent / https://%s/' . "\n" .
19
-			'</VirtualHost>') .
13
+	if (empty($_SERVER['HTTPS']))
14
+		printf('<div id="content">Ehi sysadmin! Your site is not secure. Please enable SSL on your server and configure a redirect, such as'.
15
+			'<pre>'.
16
+			htmlspecialchars('<VirtualHost *:80>'."\n".
17
+			'  ServerName %s'."\n".
18
+			'  Redirect permanent / https://%s/'."\n".
19
+			'</VirtualHost>').
20 20
 			'</pre></div>', gethostname(), gethostname());
21 21
 }
22 22
 
23 23
 function myConnect($host, $user, $pass, $db, $port, $tablelist, $typedesc, $loguser) {
24
-        $db = ( $tablelist["$typedesc"]['milter'] ) ? $tablelist["$typedesc"]['name'] : $db;
24
+        $db = ($tablelist["$typedesc"]['milter']) ? $tablelist["$typedesc"]['name'] : $db;
25 25
 	$mysqli = new mysqli($host, $user, $pass, $db, $port);
26 26
         if ($mysqli->connect_error) {
27
-           	syslog (LOG_EMERG, $loguser.': Connect Error to DB <'.$db.'> (' . $mysqli->connect_errno . ') '
27
+           	syslog(LOG_EMERG, $loguser.': Connect Error to DB <'.$db.'> ('.$mysqli->connect_errno.') '
28 28
                     		. $mysqli->connect_error);
29 29
 		return FALSE;
30 30
 	}
31
-	syslog(LOG_INFO, $loguser.': Successfully MySQL connected at DB <'.$db.'> to ' . $mysqli->host_info) ;
31
+	syslog(LOG_INFO, $loguser.': Successfully MySQL connected at DB <'.$db.'> to '.$mysqli->host_info);
32 32
 	return $mysqli;
33 33
 }
34 34
 
35
-function addtolist ($myconn,$user,$value,$tabledesc,$expUnit,$expQ,$myreason,&$err) {
35
+function addtolist($myconn, $user, $value, $tabledesc, $expUnit, $expQ, $myreason, &$err) {
36 36
 // See MySQL manual for $expQ and $expUnit at
37 37
 // https://dev.mysql.com/doc/refman/5.5/en/date-and-time-functions.html#function_timestampadd
38 38
 
39
-	$result=FALSE;
40
-	$sub=array();
39
+	$result = FALSE;
40
+	$sub = array();
41 41
 	$type = $tabledesc['field'];
42 42
 	$milt = $tabledesc['milter'];
43 43
 	$table = ($milt) ? milterTable($type) : $tabledesc['name'];
44 44
 
45 45
 	switch ($type) {
46 46
 	  case 'ip':
47
-		$query= sprintf("INSERT INTO `$table` (
47
+		$query = sprintf("INSERT INTO `$table` (
48 48
 			`$type` ,
49 49
 			`date` ,
50 50
 			`exp` ,
@@ -55,18 +55,18 @@  discard block
 block discarded – undo
55 55
 		VALUES (
56 56
 			INET_ATON( '%s' ) ,
57 57
 			CURRENT_TIMESTAMP , TIMESTAMPADD(%s,%d,CURRENT_TIMESTAMP), '1', '%s', '%s'
58
-		)" ,$value,$expUnit,$expQ,$user,$myreason);
58
+		)", $value, $expUnit, $expQ, $user, $myreason);
59 59
 		break;
60 60
 
61 61
 	  case 'network':
62 62
 		if (!$milt) {
63
-			if ( netOverlap($myconn, $tabledesc, $value, $overlappedNet, $user) ) {
63
+			if (netOverlap($myconn, $tabledesc, $value, $overlappedNet, $user)) {
64 64
 				$err = "<$value> overlaps the existing network <$overlappedNet>";
65 65
 				return FALSE;
66 66
 			}
67 67
 		}
68
-		list($sub['net'],$sub['mask'])=explode('/',$value);
69
-                $query= sprintf("INSERT INTO `$table` (
68
+		list($sub['net'], $sub['mask']) = explode('/', $value);
69
+                $query = sprintf("INSERT INTO `$table` (
70 70
                         `$type` ,
71 71
 			`netmask`,
72 72
                         `date` ,
@@ -78,11 +78,11 @@  discard block
 block discarded – undo
78 78
                 VALUES (
79 79
                         INET_ATON( '%s' ) , INET_ATON( '%s' ) ,
80 80
                         CURRENT_TIMESTAMP , TIMESTAMPADD(%s,%d,CURRENT_TIMESTAMP), '1', '%s', '%s'
81
-                )" ,$sub['net'],$sub['mask'],$expUnit,$expQ,$user,$myreason);
81
+                )", $sub['net'], $sub['mask'], $expUnit, $expQ, $user, $myreason);
82 82
                 break;
83 83
 
84 84
 	  default:
85
-                $query= sprintf("INSERT INTO `$table` (
85
+                $query = sprintf("INSERT INTO `$table` (
86 86
                         `$type` ,
87 87
                         `date` ,
88 88
                         `exp` ,
@@ -93,23 +93,23 @@  discard block
 block discarded – undo
93 93
                 VALUES (
94 94
                         '%s' ,
95 95
                         CURRENT_TIMESTAMP , TIMESTAMPADD(%s,%d,CURRENT_TIMESTAMP), '1', '%s', '%s'
96
-                )" ,$value,$expUnit,$expQ,$user,$myreason);
96
+                )", $value, $expUnit, $expQ, $user, $myreason);
97 97
 	}
98 98
 
99 99
 	if ($myconn->query($query) === TRUE) {
100 100
 	    syslog(LOG_INFO, "$user: $type <$value> successfully listed on <$table> for $expQ $expUnit.");
101
-	    $result=TRUE;
101
+	    $result = TRUE;
102 102
 	}
103 103
 	else syslog(LOG_ERR, "$user: Error: ".$myconn->error);
104 104
 	return $result;
105 105
 }
106 106
 
107
-function relist ($myconn,$user,$value,$type,$table,$expUnit,$expQ,$myreason, $exptime = 0) {
107
+function relist($myconn, $user, $value, $type, $table, $expUnit, $expQ, $myreason, $exptime = 0) {
108 108
 
109
-	$result=FALSE;
110
-	if ( $exptime ) { /* Entry already listed */
109
+	$result = FALSE;
110
+	if ($exptime) { /* Entry already listed */
111 111
 		$nlist = '`nlist`';
112
-		$exptime = sprintf('\'%s\'', $exptime);  /* Eh MySQL... an hour lost to notice this */
112
+		$exptime = sprintf('\'%s\'', $exptime); /* Eh MySQL... an hour lost to notice this */
113 113
 	}
114 114
 	else {
115 115
 		$exptime = 'CURRENT_TIMESTAMP';
@@ -118,43 +118,43 @@  discard block
 block discarded – undo
118 118
 
119 119
         switch ($type) {
120 120
 	  case 'ip':
121
-                $query= sprintf("UPDATE `$table` SET
121
+                $query = sprintf("UPDATE `$table` SET
122 122
 			`active` = '1',
123 123
 			`user` = '%s',
124 124
 			`exp` = TIMESTAMPADD(%s,%d,%s),
125 125
 			`nlist` = %s,
126 126
 			`reason` = '%s'
127
-			WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$value);
127
+			WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1", $user, $expUnit, $expQ, $exptime, $nlist, $myreason, $value);
128 128
 		break;
129 129
           case 'network':
130
-		list($sub['net'],$sub['mask'])=explode('/',$value);
131
-                $query= sprintf("UPDATE `$table` SET
130
+		list($sub['net'], $sub['mask']) = explode('/', $value);
131
+                $query = sprintf("UPDATE `$table` SET
132 132
                         `active` = '1',
133 133
                         `user` = '%s',
134 134
                         `exp` = TIMESTAMPADD(%s,%d,%s),
135 135
                         `nlist` = %s,
136 136
                         `reason` = '%s'
137
-                        WHERE (`$table`.`$type` = INET_ATON('%s') AND `$table`.`netmask` = INET_ATON('%s')) LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$sub['net'],$sub['mask']);
137
+                        WHERE (`$table`.`$type` = INET_ATON('%s') AND `$table`.`netmask` = INET_ATON('%s')) LIMIT 1", $user, $expUnit, $expQ, $exptime, $nlist, $myreason, $sub['net'], $sub['mask']);
138 138
 		break;
139 139
 	  default:
140
-                $query= sprintf("UPDATE `$table` SET
140
+                $query = sprintf("UPDATE `$table` SET
141 141
                         `active` = '1',
142 142
                         `user` = '%s',
143 143
                         `exp` = TIMESTAMPADD(%s,%d,%s),
144 144
                         `nlist` = %s,
145 145
                         `reason` = '%s'
146
-			WHERE `$table`.`$type` = '%s' LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$value);
146
+			WHERE `$table`.`$type` = '%s' LIMIT 1", $user, $expUnit, $expQ, $exptime, $nlist, $myreason, $value);
147 147
 	}
148 148
 
149 149
         if ($myconn->query($query) === TRUE) {
150 150
             syslog(LOG_INFO, "$user: relist $type <$value> on <$table> for $expQ $expUnit from $exptime.");
151
-		$result=TRUE;
151
+		$result = TRUE;
152 152
         }
153
-        else syslog (LOG_ERR, "$user: Error: ". $myconn->error);
153
+        else syslog(LOG_ERR, "$user: Error: ".$myconn->error);
154 154
 	return $result;
155 155
 }
156 156
 
157
-function remove ($myconn,$user,$value,$type,$table) {
157
+function remove($myconn, $user, $value, $type, $table) {
158 158
 
159 159
         switch ($type) {
160 160
           case 'ip':
@@ -162,10 +162,10 @@  discard block
 block discarded – undo
162 162
                         `$table`.`$type` = INET_ATON('%s') LIMIT 1", $value);
163 163
 		break;
164 164
 	  case 'network':
165
-		list($sub['net'],$sub['mask'])=explode('/',$value);
165
+		list($sub['net'], $sub['mask']) = explode('/', $value);
166 166
 		$query = sprintf("DELETE FROM `$table` WHERE
167 167
 			`$table`.`$type` = INET_ATON('%s') AND `$table`.`netmask` = INET_ATON('%s') LIMIT 1",
168
-			$sub['net'],$sub['mask']);
168
+			$sub['net'], $sub['mask']);
169 169
 		break;
170 170
 	  default:
171 171
 		$query = sprintf("DELETE FROM `$table` WHERE
@@ -173,39 +173,39 @@  discard block
 block discarded – undo
173 173
 	}
174 174
 
175 175
 
176
-        if ($return=$myconn->query($query) === TRUE) 
176
+        if ($return = $myconn->query($query) === TRUE) 
177 177
             syslog(LOG_INFO, "$user: permanently DELETED $type <$value> from <$table>.");
178
-        else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
178
+        else syslog(LOG_ERR, "$user: Error: ".$myconn->error);
179 179
 
180 180
         return $return;
181 181
 }
182 182
 
183 183
 
184
-function changestatus ($myconn,$user,$value,$status,$type,$table) {
184
+function changestatus($myconn, $user, $value, $status, $type, $table) {
185 185
 
186 186
 	switch ($type) {
187 187
           case 'ip':
188
-		$query= sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1" ,$user, $value);
188
+		$query = sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1", $user, $value);
189 189
 		break;
190 190
 	  case 'network':
191
-		list($sub['net'],$sub['mask'])=explode('/',$value);
192
-		$query= sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE (`$table`.`$type` = INET_ATON('%s') AND `$table`.`netmask` = INET_ATON('%s')) LIMIT 1" ,$user, $sub['net'],$sub['mask']);
191
+		list($sub['net'], $sub['mask']) = explode('/', $value);
192
+		$query = sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE (`$table`.`$type` = INET_ATON('%s') AND `$table`.`netmask` = INET_ATON('%s')) LIMIT 1", $user, $sub['net'], $sub['mask']);
193 193
 		break;
194 194
 	  default:
195
-		$query= sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = '%s' LIMIT 1" ,$user, $value);
195
+		$query = sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = '%s' LIMIT 1", $user, $value);
196 196
 	}
197 197
 
198
-        if ($return=$myconn->query($query) === TRUE) {
198
+        if ($return = $myconn->query($query) === TRUE) {
199 199
             syslog(LOG_INFO, "$user: change status of $type <$value>. The status is now <$status>");
200 200
         }
201
-        else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
201
+        else syslog(LOG_ERR, "$user: Error: ".$myconn->error);
202 202
 	return $return;	
203 203
 }
204 204
 
205 205
 
206
-function expire ($myconn,$user,$tables,$expireTime) {
207
-        $return=TRUE;
208
-	$log=array();
206
+function expire($myconn, $user, $tables, $expireTime) {
207
+        $return = TRUE;
208
+	$log = array();
209 209
 	$desc = array_keys($tables);
210 210
 	foreach ($desc as $tdesc) { 
211 211
 		/* QUERY */
@@ -224,11 +224,11 @@  discard block
 block discarded – undo
224 224
 			} while ($myconn->next_result());
225 225
 		}
226 226
 		else {
227
-			syslog(LOG_ERR, "Expire job - Error: ". $myconn->error);
227
+			syslog(LOG_ERR, "Expire job - Error: ".$myconn->error);
228 228
 			$return = FALSE;
229 229
 		}
230 230
 	}
231
-	if ( !($return) ) syslog(LOG_EMERG, 'End of Expire job with error. See above logs. SQL Connection terminated');
231
+	if (!($return)) syslog(LOG_EMERG, 'End of Expire job with error. See above logs. SQL Connection terminated');
232 232
 	else  syslog(LOG_INFO, 'Successfully End of Expire job. SQL Connection successfully terminated.');
233 233
         return $return;
234 234
 }
@@ -236,18 +236,18 @@  discard block
 block discarded – undo
236 236
 
237 237
 function isListed($row) {
238 238
 
239
-	$exp=new DateTime($row['exp']);
240
-	$now=new DateTime('NOW');
241
-	if (($exp > $now) and ($row['active'])) return true;
239
+	$exp = new DateTime($row['exp']);
240
+	$now = new DateTime('NOW');
241
+	if (($exp>$now) and ($row['active'])) return true;
242 242
 	else return false;
243 243
 
244 244
 }
245 245
 
246 246
 
247
-function askMilter($myconn,$id,$obj,$typedesc,$miltId,$value,$user,$adm)  {
248
-	$milts = readMiltName($myconn,$user);
247
+function askMilter($myconn, $id, $obj, $typedesc, $miltId, $value, $user, $adm) {
248
+	$milts = readMiltName($myconn, $user);
249 249
 	$size = count($milts);
250
-	if (in_array($user,array_keys($adm))) {
250
+	if (in_array($user, array_keys($adm))) {
251 251
 		$button = <<<END
252 252
 		<form style="margin:0; display:inline;" name="Milter$id" enctype="text/plain" method="post" target="_self" action="changeMilter.php" onSubmit="xmlhttpPost('changeMilter.php', 'Milter$id', 'id$id', '<img src=\'/include/pleasewait.gif\'>'); return false;" />
253 253
 		<input name="object" type="hidden" value="$obj" /><input name="oldvalues" type="hidden" value="$value" />
@@ -257,12 +257,12 @@  discard block
 block discarded – undo
257 257
 		<div class="noscroll">
258 258
 		<select class="input_text" name="newvalues[]" multiple size="$size">
259 259
 END;
260
-		$activeMilts = explode(',',$value);
261
-		foreach ( $milts as $milter ) {
262
-			if ( in_array($milter, $activeMilts) )
263
-				$selected= 'selected';
260
+		$activeMilts = explode(',', $value);
261
+		foreach ($milts as $milter) {
262
+			if (in_array($milter, $activeMilts))
263
+				$selected = 'selected';
264 264
 			else
265
-				$selected= NULL;
265
+				$selected = NULL;
266 266
 			$button .= sprintf('<option value="%s" %s>%s</option>', $milter, $selected, $milter);
267 267
 		}	
268 268
 		$button .= '</select></div><input class="button" name="Change" type="submit" value="Change" /></form>';
@@ -274,14 +274,14 @@  discard block
 block discarded – undo
274 274
 }
275 275
 
276 276
 
277
-function ask($myconn,$id,$what,$alltables,$typedesc,$value,$lock,$user,$adm) {
277
+function ask($myconn, $id, $what, $alltables, $typedesc, $value, $lock, $user, $adm) {
278 278
 
279
-	$whynot=NULL;
279
+	$whynot = NULL;
280 280
 	switch ($what) {
281 281
 		case 'Ok':
282 282
 			if ($lock) return NULL;
283
-			if (in_array($user,array_keys($adm)))
284
-				if ( consistentListing($myconn,$alltables,$typedesc,$value,$whynot) ) return require('relistButton.php');
283
+			if (in_array($user, array_keys($adm)))
284
+				if (consistentListing($myconn, $alltables, $typedesc, $value, $whynot)) return require('relistButton.php');
285 285
 			return htmlspecialchars($whynot);
286 286
 		case 'Listed':
287 287
 		case 'WhiteListed':
@@ -290,18 +290,18 @@  discard block
 block discarded – undo
290 290
 }
291 291
 
292 292
 
293
-function consistentListing($myconn,$alltables,$typed,$value,&$warn) {
293
+function consistentListing($myconn, $alltables, $typed, $value, &$warn) {
294 294
 /* Check if there are no pending mislisting */
295 295
 	$warn = NULL;
296
-	if (! isset($alltables["$typed"]['depend']) ) return TRUE;
296
+	if (!isset($alltables["$typed"]['depend'])) return TRUE;
297 297
 	foreach ($alltables["$typed"]['depend'] as $listdep) {
298
-		if ($alltables["$typed"]['field'] != $alltables["$listdep"]['field'] ) {
298
+		if ($alltables["$typed"]['field'] != $alltables["$listdep"]['field']) {
299 299
 			$warn = "Config ERROR: <$typed> and <$listdep> are of different types! I can't check consistency!";
300 300
 			return FALSE;
301 301
 		}
302
-		$entry = searchentry($myconn,$value,$alltables["$listdep"]);
303
-		if ( $entry->num_rows ) {
304
-			if ( $entry->num_rows == 1 ) {
302
+		$entry = searchentry($myconn, $value, $alltables["$listdep"]);
303
+		if ($entry->num_rows) {
304
+			if ($entry->num_rows == 1) {
305 305
 				$riga = $entry->fetch_array(MYSQLI_ASSOC);
306 306
                         	if (isListed($riga)) {
307 307
 					$warn = "<$value> is already present in <$listdep> list!";
@@ -309,7 +309,7 @@  discard block
 block discarded – undo
309 309
 					return FALSE;
310 310
 				}
311 311
 			}
312
-			if ( $entry->num_rows > 1 ) {$warn = "<$value> seems to be present more than once in <$listdep>. Contact a sysadmin NOW!";}
312
+			if ($entry->num_rows>1) {$warn = "<$value> seems to be present more than once in <$listdep>. Contact a sysadmin NOW!"; }
313 313
 		}
314 314
 		$entry->free();
315 315
 	}
@@ -317,20 +317,20 @@  discard block
 block discarded – undo
317 317
 	return TRUE;
318 318
 }
319 319
 
320
-function searchentry ($myconn,$value,$tablelist) {
320
+function searchentry($myconn, $value, $tablelist) {
321 321
 /* Make a MYSQL query and return result */
322 322
 
323 323
         $type = $tablelist['field'];
324 324
 	
325
-	if ( $tablelist['milter'] ) {
325
+	if ($tablelist['milter']) {
326 326
 		$table = milterTable($type);
327 327
 		if ($value == 'ALL')
328 328
 			$query = sprintf('SELECT *, GROUP_CONCAT(milt.name) as miltnames FROM `%s` LEFT JOIN milt ON (%s.idmilt=milt.id) GROUP by idmilt',
329
-				$table,$table);
329
+				$table, $table);
330 330
 		else {
331 331
 			switch ($type) {
332 332
 				case 'network':
333
-					list($sub['net'],$sub['mask'])=explode('/',$value);
333
+					list($sub['net'], $sub['mask']) = explode('/', $value);
334 334
 					$query = sprintf('SELECT * FROM (
335 335
 							SELECT *, GROUP_CONCAT(milt.name) as miltnames FROM `%s` LEFT JOIN milt ON (%s.idmilt=milt.id)
336 336
 				 				WHERE (
@@ -348,7 +348,7 @@  discard block
 block discarded – undo
348 348
 							 ) AS val WHERE val.ip IS NOT null', $table, $table, $value);
349 349
 					break;
350 350
 				default:
351
-					syslog(LOG_EMERG, 'ALERT: The type <'.$type.'> is not allowed for milter lists.' );
351
+					syslog(LOG_EMERG, 'ALERT: The type <'.$type.'> is not allowed for milter lists.');
352 352
 					return FALSE;
353 353
 			}
354 354
 		}
@@ -360,11 +360,11 @@  discard block
 block discarded – undo
360 360
 	        else {
361 361
 	                switch ($type) {
362 362
 	                  case 'ip':
363
-	                        $query= "select * from $table where $type =  INET_ATON('$value')";
363
+	                        $query = "select * from $table where $type =  INET_ATON('$value')";
364 364
 	                        break;
365 365
 	                  case 'network':
366
-	                        list($sub['net'],$sub['mask'])=explode('/',$value);
367
-	                        $query= sprintf('select * from `%s`
366
+	                        list($sub['net'], $sub['mask']) = explode('/', $value);
367
+	                        $query = sprintf('select * from `%s`
368 368
 						WHERE (
369 369
 							inet_aton(\'%s\') >= network AND
370 370
 							( inet_aton(\'%s\') | ( inet_aton(\'%s\') ^ (power(2,32)-1) ) )
@@ -373,18 +373,18 @@  discard block
 block discarded – undo
373 373
 ;
374 374
 	                        break;
375 375
 	                  default:
376
-	                        $query= "select * from $table where $type = '$value'";
376
+	                        $query = "select * from $table where $type = '$value'";
377 377
 	                }
378 378
 	        }
379 379
 	}
380 380
 
381 381
 	$result = $myconn->query($query);
382
-	if($result === false)
382
+	if ($result === false)
383 383
 		syslog(LOG_EMERG, "ALERT: Query <$query> failed: ".$myconn->error);
384 384
         return $result;
385 385
 }
386 386
 
387
-function countListed ($myconn,$table) {
387
+function countListed($myconn, $table) {
388 388
 /* Return number of current listed items into a rbl table */
389 389
 	$query = "SELECT COUNT(*) as `count` FROM `$table` WHERE (`active`=1 AND TIMESTAMPDIFF(MICROSECOND,NOW(),`exp`)>0) GROUP BY `active` ORDER BY `count` DESC LIMIT 1";
390 390
 	$row = $myconn->query($query);
@@ -395,48 +395,48 @@  discard block
 block discarded – undo
395 395
 }
396 396
 
397 397
 
398
-function isFull($myconn,$typedesc,$alltables) {
398
+function isFull($myconn, $typedesc, $alltables) {
399 399
         if (isset($alltables["$typedesc"]['limit'])) {
400
-		if ( $alltables["$typedesc"]['milter'] )
400
+		if ($alltables["$typedesc"]['milter'])
401 401
 			$tab = 'net';
402 402
 		else
403 403
 			$tab = $alltables["$typedesc"]['name'];
404
-                if ( countListed($myconn,$tab) >= $alltables["$typedesc"]['limit'] ) 
404
+                if (countListed($myconn, $tab)>=$alltables["$typedesc"]['limit']) 
405 405
                         return TRUE;
406 406
         }
407 407
 	return FALSE;
408 408
 }
409 409
 
410
-function rlookup ($myconn,$user,$adm,$value,$typedesc,$tables) {
410
+function rlookup($myconn, $user, $adm, $value, $typedesc, $tables) {
411 411
 
412 412
 	$type = $tables["$typedesc"]['field'];
413
-	$whynot=NULL;
413
+	$whynot = NULL;
414 414
 
415 415
 	$tabhtm = <<<END
416 416
 	<table><thead><tr><th>$type</th><th title="The date this object has been listed for the first time">DateAdd</th><th>DateMod</th><th>Exp</th><th>Status</th><th title="Number of times this object has been listed">#List</th>
417 417
 END;
418
-	if ( $tables["$typedesc"]['milter'] )
418
+	if ($tables["$typedesc"]['milter'])
419 419
 		$tabhtm .= '<th title="Milter active for this object">Milters</th>';
420 420
 	$tabhtm .= '<th>Authored by</th><th width="250">Reason</th><th>Action</th></tr></thead><tfoot><tr></tr></tfoot><tbody>'."\n";
421 421
 
422
-	$result = searchentry ($myconn,$value,$tables["$typedesc"]);
422
+	$result = searchentry($myconn, $value, $tables["$typedesc"]);
423 423
 	if ($result) {
424 424
 		printf("<pre>Your request for $type &lt;$value&gt; returned %d items.\n</pre>", $result->num_rows);
425 425
 
426 426
         /* Check for limit in number of listed items */
427
-	$full = isFull($myconn,$typedesc,$tables);
427
+	$full = isFull($myconn, $typedesc, $tables);
428 428
 	if ($full) print '<p>'.htmlspecialchars("$typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items.').'</p>';
429 429
 
430 430
 		if ($result->num_rows) {
431 431
 			print $tabhtm;
432
-			$i=0;
432
+			$i = 0;
433 433
         		while ($riga = $result->fetch_array(MYSQLI_ASSOC)) {
434 434
 				if (isListed($riga)) {
435
-					if ($tables["$typedesc"]['bl']) $listed='Listed';
436
-					else $listed='WhiteListed';
435
+					if ($tables["$typedesc"]['bl']) $listed = 'Listed';
436
+					else $listed = 'WhiteListed';
437 437
 				}	
438 438
 				else
439
-					$listed='Ok';
439
+					$listed = 'Ok';
440 440
 
441 441
 				switch ($type) {
442 442
 				  case 'ip':
@@ -449,20 +449,20 @@  discard block
 block discarded – undo
449 449
 					$element = $riga["$type"];
450 450
 				}
451 451
 
452
-				if ( $tables["$typedesc"]['milter'] AND checkMilterConf($tables["$typedesc"]) )
453
-					printf ("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td nowrap id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
454
-					$element, $riga['date'], $riga['datemod'], $riga['exp'], $riga['active'], $riga['nlist'], askMilter($myconn,$i,$element,$typedesc,$riga['idmilt'],$riga['miltnames'],$user,$adm), $riga['user'],htmlspecialchars($riga['reason']),ask($myconn,$i,$listed,$tables,$typedesc,$element,$full,$user,$adm));
452
+				if ($tables["$typedesc"]['milter'] AND checkMilterConf($tables["$typedesc"]))
453
+					printf("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td nowrap id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
454
+					$element, $riga['date'], $riga['datemod'], $riga['exp'], $riga['active'], $riga['nlist'], askMilter($myconn, $i, $element, $typedesc, $riga['idmilt'], $riga['miltnames'], $user, $adm), $riga['user'], htmlspecialchars($riga['reason']), ask($myconn, $i, $listed, $tables, $typedesc, $element, $full, $user, $adm));
455 455
 				else
456
-					 printf ("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
457
-					$element, $riga['date'], $riga['datemod'], $riga['exp'], $riga['active'], $riga['nlist'], $riga['user'],htmlspecialchars($riga['reason']),ask($myconn,$i,$listed,$tables,$typedesc,$element,$full,$user,$adm));
456
+					 printf("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
457
+					$element, $riga['date'], $riga['datemod'], $riga['exp'], $riga['active'], $riga['nlist'], $riga['user'], htmlspecialchars($riga['reason']), ask($myconn, $i, $listed, $tables, $typedesc, $element, $full, $user, $adm));
458 458
 				$i++;
459 459
         		}
460 460
 			print '</tbody></table>';
461 461
 		}
462 462
 		else {
463 463
 			print "<pre>$type &lt;$value&gt; is not listed!\n</pre>";
464
-			if ( in_array($user,array_keys($adm)) AND ($value != 'ALL') )
465
-				if ( (!$full) AND (consistentListing($myconn,$tables,$typedesc,$value,$whynot)) ) require_once('listForm.php');
464
+			if (in_array($user, array_keys($adm)) AND ($value != 'ALL'))
465
+				if ((!$full) AND (consistentListing($myconn, $tables, $typedesc, $value, $whynot))) require_once('listForm.php');
466 466
 									else print '<p>'.htmlspecialchars($whynot).'</p>';
467 467
 				
468 468
 		}
@@ -474,12 +474,12 @@  discard block
 block discarded – undo
474 474
 
475 475
 
476 476
         
477
-function sendEmailWarn($tplf,$from,$to,$sbj,$emailListed,$intervalToExpire,$detail) {
477
+function sendEmailWarn($tplf, $from, $to, $sbj, $emailListed, $intervalToExpire, $detail) {
478 478
 	$now = time();
479
-        setlocale (LC_TIME, 'it_IT');
480
-        $date = date("r",$now);
481
-	$messageID = md5(uniqid($now,1)) . '@' . gethostname();
482
-	$mua = 'PHP/' . phpversion();
479
+        setlocale(LC_TIME, 'it_IT');
480
+        $date = date("r", $now);
481
+	$messageID = md5(uniqid($now, 1)).'@'.gethostname();
482
+	$mua = 'PHP/'.phpversion();
483 483
 
484 484
 	/* Parsing headers */
485 485
 	if (!file_exists($tplf['header'])) {
@@ -488,10 +488,10 @@  discard block
 block discarded – undo
488 488
 	}
489 489
 
490 490
 	$head_tmpl = file_get_contents($tplf['header']);
491
-	$arr_tpl_vars = array('{from}','{to}','{date}','{messageID}','{mua}');
492
-	$arr_tpl_data = array($from,$to,$date,$messageID,$mua);
491
+	$arr_tpl_vars = array('{from}', '{to}', '{date}', '{messageID}', '{mua}');
492
+	$arr_tpl_data = array($from, $to, $date, $messageID, $mua);
493 493
 	$headers = str_replace($arr_tpl_vars, $arr_tpl_data, $head_tmpl);
494
-	$headers = preg_replace( '/\r|\n/', "\r\n", $headers );
494
+	$headers = preg_replace('/\r|\n/', "\r\n", $headers);
495 495
 
496 496
         /* Parsing body */
497 497
 
@@ -501,62 +501,62 @@  discard block
 block discarded – undo
501 501
         }
502 502
 
503 503
         $body_tmpl = file_get_contents($tplf['body']);
504
-        $arr_tpl_vars = array('{emailListed}','{expInterval}','{reason}');
505
-        $arr_tpl_data = array($emailListed,$intervalToExpire,$detail);
504
+        $arr_tpl_vars = array('{emailListed}', '{expInterval}', '{reason}');
505
+        $arr_tpl_data = array($emailListed, $intervalToExpire, $detail);
506 506
         $body = str_replace($arr_tpl_vars, $arr_tpl_data, $body_tmpl);
507
-        $body = preg_replace( "/\r|\n/", "\r\n", $body );
508
-	$body = wordwrap ( $body, 75 , "\r\n" );	
507
+        $body = preg_replace("/\r|\n/", "\r\n", $body);
508
+	$body = wordwrap($body, 75, "\r\n");	
509 509
 
510 510
 	/* Send the mail! */
511
-        if ( strlen(ini_get("safe_mode"))< 1) {
511
+        if (strlen(ini_get("safe_mode"))<1) {
512 512
                 $old_mailfrom = ini_get("sendmail_from");
513 513
                 ini_set("sendmail_from", $from);
514 514
                 $params = sprintf("-oi -f %s", '<>');
515
-                if (!(mail($to,$sbj, $body,$headers,$params))) $flag=FALSE;
516
-                else $flag=TRUE;
515
+                if (!(mail($to, $sbj, $body, $headers, $params))) $flag = FALSE;
516
+                else $flag = TRUE;
517 517
                 if (isset($old_mailfrom))
518 518
                         ini_set("sendmail_from", $old_mailfrom);
519 519
         }
520 520
         else {
521
-                if (!(mail($to,$sbj, $body,$headers))) $flag=FALSE;
522
-                else $flag=TRUE;
521
+                if (!(mail($to, $sbj, $body, $headers))) $flag = FALSE;
522
+                else $flag = TRUE;
523 523
         }
524 524
         return $flag;
525 525
 }
526 526
 
527
-function emailToNotify($notify_file,$dom) {
527
+function emailToNotify($notify_file, $dom) {
528 528
 	$ini_array = parse_ini_file($notify_file);
529
-	if (in_array($dom,array_keys($ini_array)))
529
+	if (in_array($dom, array_keys($ini_array)))
530 530
 		return $ini_array["$dom"];
531 531
 	else return FALSE;
532 532
 }
533 533
 
534 534
 
535
-function searchAndList ($myconn,$loguser,$tables,$typedesc,$value,$unit,&$quantity,&$reason) {
535
+function searchAndList($myconn, $loguser, $tables, $typedesc, $value, $unit, &$quantity, &$reason) {
536 536
 
537 537
 /* Search and list value */
538 538
         $type = $tables["$typedesc"]['field'];
539 539
         $table = $tables["$typedesc"]['name'];
540
-        $result = searchentry ($myconn,$value,$tables["$typedesc"]);
540
+        $result = searchentry($myconn, $value, $tables["$typedesc"]);
541 541
 
542 542
         /* Manage abnormal conditions */
543 543
         /* Value already present in db more than once. This is absurd. Panic! */
544
-        if ($result->num_rows > 1) {
545
-                syslog(LOG_EMERG,"$loguser: PANIC! Select for $type '$value' returned ". $result->num_rows ." items instead of one. Abnormal. Contact a sysadmin or a developer.");
544
+        if ($result->num_rows>1) {
545
+                syslog(LOG_EMERG, "$loguser: PANIC! Select for $type '$value' returned ".$result->num_rows." items instead of one. Abnormal. Contact a sysadmin or a developer.");
546 546
                 $result->free();
547 547
                 return FALSE;
548 548
         }
549 549
 
550 550
         /* Value already present in db or not present: to list anyway */
551
-        if ($result->num_rows >= 0) {
551
+        if ($result->num_rows>=0) {
552 552
                 /* First, check for limit in number of listed items */
553
-                if (isFull($myconn,$typedesc,$tables)) {
554
-                        syslog(LOG_EMERG,"$loguser: $typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items. Abnormal exit.');
553
+                if (isFull($myconn, $typedesc, $tables)) {
554
+                        syslog(LOG_EMERG, "$loguser: $typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items. Abnormal exit.');
555 555
                         $result->free();
556 556
                         return FALSE;
557 557
                 }
558 558
                 /* Second, check if the (re)list would be consistent now */
559
-                if (! consistentListing($myconn,$tables,$typedesc,$value,$whynot) ) {
559
+                if (!consistentListing($myconn, $tables, $typedesc, $value, $whynot)) {
560 560
                         syslog(LOG_ERR, $loguser.': '.$whynot);
561 561
                         $result->free();
562 562
                         return FALSE;
@@ -570,7 +570,7 @@  discard block
 block discarded – undo
570 570
         switch ($result->num_rows) {
571 571
                 /* Relist value if already present */
572 572
                 case 1:
573
-                        if ( isListed($thisentry) ) {
573
+                        if (isListed($thisentry)) {
574 574
 				/* Entry already listed */
575 575
 				$expdate = $thisentry['exp'];
576 576
 				$reason = sprintf('%s. Already listed. Adding 1 DAY to previous expire date.',
@@ -584,33 +584,33 @@  discard block
 block discarded – undo
584 584
 				$expdate = 0; /* This forces expiration from CURRENT_TIMESTAMP */
585 585
 			}
586 586
 			$result->free();
587
-                        return relist ($myconn,$loguser,$value,$type,$table,$unit,$quantity,$reason, $expdate);
587
+                        return relist($myconn, $loguser, $value, $type, $table, $unit, $quantity, $reason, $expdate);
588 588
 
589 589
                 /* First time list value */
590 590
                 case 0:
591 591
                         $result->free();
592
-                        return addtolist ($myconn,$loguser,$value,$tables["$typedesc"],$unit,$quantity,$reason,$_);
592
+                        return addtolist($myconn, $loguser, $value, $tables["$typedesc"], $unit, $quantity, $reason, $_);
593 593
         }
594 594
 }
595 595
 
596 596
 
597 597
 /*************** Functions to check if two net overlap each other ********************/
598 598
 
599
-function ipRange ($range) {
599
+function ipRange($range) {
600 600
 /* List IP in range */
601
-	return array_map('long2ip', range( ip2long($range[0]), ip2long($range[1]) ) );
601
+	return array_map('long2ip', range(ip2long($range[0]), ip2long($range[1])));
602 602
 }
603 603
 
604 604
 function isIn($netA, $netB) {
605 605
 /* TRUE if an IP of $netA is contained in netB */
606
-	list($addressA,$maskA) = explode('/', $netA);
607
-	list($addressB,$maskB) = explode('/', $netB);
606
+	list($addressA, $maskA) = explode('/', $netA);
607
+	list($addressB, $maskB) = explode('/', $netB);
608 608
 	require_once 'vendor/autoload.php';
609 609
 	$net = new \dautkom\ipv4\IPv4();
610 610
 	$range = $net->address($addressA)->mask($maskA)->getRange();
611 611
 	$ips = ipRange($range);
612
-	foreach ( $ips as $ip )
613
-		if ( $net->address($addressB)->mask($maskB)->has($ip) )
612
+	foreach ($ips as $ip)
613
+		if ($net->address($addressB)->mask($maskB)->has($ip))
614 614
 			return TRUE;
615 615
 	return FALSE;
616 616
 }
@@ -622,11 +622,11 @@  discard block
 block discarded – undo
622 622
 		syslog(LOG_ERR, $loguser.': '.$tabletype['name'].' is not a network list.');
623 623
 		return FALSE;
624 624
 	}
625
-	$result = searchentry ($myconn,'ALL',$tabletype);
625
+	$result = searchentry($myconn, 'ALL', $tabletype);
626 626
         if ($result->num_rows) {
627 627
 		while ($row = $result->fetch_array(MYSQLI_ASSOC)) {
628 628
 			$thisNet = long2ip($row['network']).'/'.long2ip($row['netmask']);
629
-			if ( isIn($thisNet, $net) ) {
629
+			if (isIn($thisNet, $net)) {
630 630
 				$result->free();
631 631
 				syslog(LOG_INFO, "$loguser: the net <$net> overlaps the existing network <$thisNet>.");
632 632
 				return TRUE;
@@ -643,8 +643,8 @@  discard block
 block discarded – undo
643 643
 /* For miltermap */
644 644
 function checkMilterConf($table) {
645 645
 	if (isset($table['milter'])) {
646
-        	if ($table['milter'] ===  TRUE) {
647
-			switch ( $table['field'] ) {
646
+        	if ($table['milter'] === TRUE) {
647
+			switch ($table['field']) {
648 648
 				case 'network':
649 649
 				case 'ip':
650 650
 					return TRUE;
@@ -678,12 +678,12 @@  discard block
 block discarded – undo
678 678
 }
679 679
 
680 680
 
681
-function readMiltName($myconn,$loguser) {
682
-	$milters=array();
681
+function readMiltName($myconn, $loguser) {
682
+	$milters = array();
683 683
 	$query = 'SELECT `name` FROM `config`';
684 684
 
685 685
         $result = $myconn->query($query);
686
-        if($result === false) {
686
+        if ($result === false) {
687 687
                 syslog(LOG_EMERG, "$loguser: ALERT: Query <$query> failed: ".$myconn->error);
688 688
 		return FALSE;
689 689
 	}
@@ -695,27 +695,27 @@  discard block
 block discarded – undo
695 695
 	return $milters;
696 696
 }
697 697
 
698
-function changeMilter ($myconn,$loguser,$miltVal,$table,$miltID) {
698
+function changeMilter($myconn, $loguser, $miltVal, $table, $miltID) {
699 699
 	$query = array();
700
-	foreach ( $miltVal as $value => $action ) {
701
-		switch ( $action ) {
700
+	foreach ($miltVal as $value => $action) {
701
+		switch ($action) {
702 702
 			case 'keep':
703 703
 				break;
704 704
 			case 'add':
705
-				$query[] = sprintf( "INSERT INTO `milt` (
705
+				$query[] = sprintf("INSERT INTO `milt` (
706 706
                 		        	`id` ,
707 707
                         			`name` 
708 708
                 			)
709 709
                 			VALUES (
710 710
                         			%d ,
711 711
 						'%s'
712
-					)",$miltID,$value);
712
+					)",$miltID, $value);
713 713
 				break;
714 714
 			case 'del':
715 715
 				$query[] = "DELETE FROM  `milt` WHERE (`id` = '$miltID' AND `name` = '$value')";
716 716
 		}
717 717
 	}
718
-	if ( count($query) ) /* This "if" is redundant, because if I call this I already checked there is a change */
718
+	if (count($query)) /* This "if" is redundant, because if I call this I already checked there is a change */
719 719
 		/* I update datemod because the user couldn't change */
720 720
 		$query[] = sprintf('UPDATE `%s` SET
721 721
 						`user`=\'%s\',
@@ -727,18 +727,18 @@  discard block
 block discarded – undo
727 727
 	$myconn->autocommit(FALSE);
728 728
 	$myconn->begin_transaction(MYSQLI_TRANS_START_READ_ONLY);
729 729
 	$ok = TRUE;
730
-	foreach ( $query as $q ) {
730
+	foreach ($query as $q) {
731 731
 		if ($myconn->query($q) !== TRUE) {
732 732
 			$ok = FALSE;
733 733
 			syslog(LOG_ERR, "$loguser: Error: ".$myconn->error);
734 734
 		}
735 735
 	}
736
-	if ( $ok ) {
737
-		if ( $myconn->commit() )
736
+	if ($ok) {
737
+		if ($myconn->commit())
738 738
 			syslog(LOG_INFO, "$loguser: Milter setting changed successfully.");
739 739
 		else {
740 740
 			syslog(LOG_ERR, "$loguser: Milter setting NOT changed for an unpredictable COMMIT error.");
741
-			if ( $myconn->rollback() )
741
+			if ($myconn->rollback())
742 742
 				syslog(LOG_INFO, "$loguser: rollback succeeded.");
743 743
 			else
744 744
 				syslog(LOG_ERR, "$loguser: rollback failed. Your db could be compromized. Check it!");
@@ -755,15 +755,15 @@  discard block
 block discarded – undo
755 755
 function curl_get($url, array $get = NULL, array $options = array(), $loguser)
756 756
 {
757 757
     $defaults = array(
758
-        CURLOPT_URL => $url. (strpos($url, '?') === FALSE ? '?' : ''). http_build_query($get),
758
+        CURLOPT_URL => $url.(strpos($url, '?') === FALSE ? '?' : '').http_build_query($get),
759 759
         CURLOPT_HEADER => 0,
760 760
         CURLOPT_RETURNTRANSFER => TRUE,
761 761
         CURLOPT_TIMEOUT => 4
762 762
     );
763 763
 
764 764
     $ch = curl_init();
765
-    curl_setopt_array($ch, ($options + $defaults));
766
-    if( ! $result = curl_exec($ch))
765
+    curl_setopt_array($ch, ($options+$defaults));
766
+    if (!$result = curl_exec($ch))
767 767
     {
768 768
         syslog(LOG_ERR, sprintf('%s: CURL Error: <%s>', $loguser, curl_error($ch)));
769 769
     }
Please login to merge, or discard this patch.
Braces   +134 added lines, -91 removed lines patch added patch discarded remove patch
@@ -3,22 +3,27 @@  discard block
 block discarded – undo
3 3
 ini_set('error_log', 'syslog');
4 4
 
5 5
 function username() {
6
-	if (isset ($_SERVER['REMOTE_USER'])) $user = $_SERVER['REMOTE_USER'];
7
-        	else if (isset ($_SERVER['USER'])) $user = $_SERVER['USER'];
8
-                	else $user='unknown';
6
+	if (isset ($_SERVER['REMOTE_USER'])) {
7
+		$user = $_SERVER['REMOTE_USER'];
8
+	} else if (isset ($_SERVER['USER'])) {
9
+        		$user = $_SERVER['USER'];
10
+        	} else {
11
+                		$user='unknown';
12
+                	}
9 13
 	return $user;
10 14
 }
11 15
 
12 16
 function checkSSL() {
13
-	if ( empty( $_SERVER['HTTPS'] ) )
14
-		printf ('<div id="content">Ehi sysadmin! Your site is not secure. Please enable SSL on your server and configure a redirect, such as' .
17
+	if ( empty( $_SERVER['HTTPS'] ) ) {
18
+			printf ('<div id="content">Ehi sysadmin! Your site is not secure. Please enable SSL on your server and configure a redirect, such as' .
15 19
 			'<pre>' .
16 20
 			htmlspecialchars('<VirtualHost *:80>' . "\n" .
17 21
 			'  ServerName %s' . "\n" .
18 22
 			'  Redirect permanent / https://%s/' . "\n" .
19 23
 			'</VirtualHost>') .
20 24
 			'</pre></div>', gethostname(), gethostname());
21
-}
25
+	}
26
+	}
22 27
 
23 28
 function myConnect($host, $user, $pass, $db, $port, $tablelist, $typedesc, $loguser) {
24 29
         $db = ( $tablelist["$typedesc"]['milter'] ) ? $tablelist["$typedesc"]['name'] : $db;
@@ -99,8 +104,9 @@  discard block
 block discarded – undo
99 104
 	if ($myconn->query($query) === TRUE) {
100 105
 	    syslog(LOG_INFO, "$user: $type <$value> successfully listed on <$table> for $expQ $expUnit.");
101 106
 	    $result=TRUE;
107
+	} else {
108
+		syslog(LOG_ERR, "$user: Error: ".$myconn->error);
102 109
 	}
103
-	else syslog(LOG_ERR, "$user: Error: ".$myconn->error);
104 110
 	return $result;
105 111
 }
106 112
 
@@ -110,8 +116,7 @@  discard block
 block discarded – undo
110 116
 	if ( $exptime ) { /* Entry already listed */
111 117
 		$nlist = '`nlist`';
112 118
 		$exptime = sprintf('\'%s\'', $exptime);  /* Eh MySQL... an hour lost to notice this */
113
-	}
114
-	else {
119
+	} else {
115 120
 		$exptime = 'CURRENT_TIMESTAMP';
116 121
 		$nlist = '`nlist` + 1';
117 122
 	}
@@ -149,8 +154,9 @@  discard block
 block discarded – undo
149 154
         if ($myconn->query($query) === TRUE) {
150 155
             syslog(LOG_INFO, "$user: relist $type <$value> on <$table> for $expQ $expUnit from $exptime.");
151 156
 		$result=TRUE;
157
+        } else {
158
+        	syslog (LOG_ERR, "$user: Error: ". $myconn->error);
152 159
         }
153
-        else syslog (LOG_ERR, "$user: Error: ". $myconn->error);
154 160
 	return $result;
155 161
 }
156 162
 
@@ -173,9 +179,11 @@  discard block
 block discarded – undo
173 179
 	}
174 180
 
175 181
 
176
-        if ($return=$myconn->query($query) === TRUE) 
177
-            syslog(LOG_INFO, "$user: permanently DELETED $type <$value> from <$table>.");
178
-        else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
182
+        if ($return=$myconn->query($query) === TRUE) {
183
+                    syslog(LOG_INFO, "$user: permanently DELETED $type <$value> from <$table>.");
184
+        } else {
185
+        	syslog(LOG_ERR, "$user: Error: ". $myconn->error);
186
+        }
179 187
 
180 188
         return $return;
181 189
 }
@@ -197,8 +205,9 @@  discard block
 block discarded – undo
197 205
 
198 206
         if ($return=$myconn->query($query) === TRUE) {
199 207
             syslog(LOG_INFO, "$user: change status of $type <$value>. The status is now <$status>");
208
+        } else {
209
+        	syslog(LOG_ERR, "$user: Error: ". $myconn->error);
200 210
         }
201
-        else syslog(LOG_ERR, "$user: Error: ". $myconn->error);
202 211
 	return $return;	
203 212
 }
204 213
 
@@ -222,14 +231,16 @@  discard block
 block discarded – undo
222 231
 				$j++;
223 232
 
224 233
 			} while ($myconn->next_result());
225
-		}
226
-		else {
234
+		} else {
227 235
 			syslog(LOG_ERR, "Expire job - Error: ". $myconn->error);
228 236
 			$return = FALSE;
229 237
 		}
230 238
 	}
231
-	if ( !($return) ) syslog(LOG_EMERG, 'End of Expire job with error. See above logs. SQL Connection terminated');
232
-	else  syslog(LOG_INFO, 'Successfully End of Expire job. SQL Connection successfully terminated.');
239
+	if ( !($return) ) {
240
+		syslog(LOG_EMERG, 'End of Expire job with error. See above logs. SQL Connection terminated');
241
+	} else {
242
+		syslog(LOG_INFO, 'Successfully End of Expire job. SQL Connection successfully terminated.');
243
+	}
233 244
         return $return;
234 245
 }
235 246
 
@@ -238,8 +249,11 @@  discard block
 block discarded – undo
238 249
 
239 250
 	$exp=new DateTime($row['exp']);
240 251
 	$now=new DateTime('NOW');
241
-	if (($exp > $now) and ($row['active'])) return true;
242
-	else return false;
252
+	if (($exp > $now) and ($row['active'])) {
253
+		return true;
254
+	} else {
255
+		return false;
256
+	}
243 257
 
244 258
 }
245 259
 
@@ -259,10 +273,11 @@  discard block
 block discarded – undo
259 273
 END;
260 274
 		$activeMilts = explode(',',$value);
261 275
 		foreach ( $milts as $milter ) {
262
-			if ( in_array($milter, $activeMilts) )
263
-				$selected= 'selected';
264
-			else
265
-				$selected= NULL;
276
+			if ( in_array($milter, $activeMilts) ) {
277
+							$selected= 'selected';
278
+			} else {
279
+							$selected= NULL;
280
+			}
266 281
 			$button .= sprintf('<option value="%s" %s>%s</option>', $milter, $selected, $milter);
267 282
 		}	
268 283
 		$button .= '</select></div><input class="button" name="Change" type="submit" value="Change" /></form>';
@@ -279,9 +294,12 @@  discard block
 block discarded – undo
279 294
 	$whynot=NULL;
280 295
 	switch ($what) {
281 296
 		case 'Ok':
282
-			if ($lock) return NULL;
283
-			if (in_array($user,array_keys($adm)))
284
-				if ( consistentListing($myconn,$alltables,$typedesc,$value,$whynot) ) return require('relistButton.php');
297
+			if ($lock) {
298
+				return NULL;
299
+			}
300
+			if (in_array($user,array_keys($adm))) {
301
+							if ( consistentListing($myconn,$alltables,$typedesc,$value,$whynot) ) return require('relistButton.php');
302
+			}
285 303
 			return htmlspecialchars($whynot);
286 304
 		case 'Listed':
287 305
 		case 'WhiteListed':
@@ -293,7 +311,9 @@  discard block
 block discarded – undo
293 311
 function consistentListing($myconn,$alltables,$typed,$value,&$warn) {
294 312
 /* Check if there are no pending mislisting */
295 313
 	$warn = NULL;
296
-	if (! isset($alltables["$typed"]['depend']) ) return TRUE;
314
+	if (! isset($alltables["$typed"]['depend']) ) {
315
+		return TRUE;
316
+	}
297 317
 	foreach ($alltables["$typed"]['depend'] as $listdep) {
298 318
 		if ($alltables["$typed"]['field'] != $alltables["$listdep"]['field'] ) {
299 319
 			$warn = "Config ERROR: <$typed> and <$listdep> are of different types! I can't check consistency!";
@@ -324,10 +344,10 @@  discard block
 block discarded – undo
324 344
 	
325 345
 	if ( $tablelist['milter'] ) {
326 346
 		$table = milterTable($type);
327
-		if ($value == 'ALL')
328
-			$query = sprintf('SELECT *, GROUP_CONCAT(milt.name) as miltnames FROM `%s` LEFT JOIN milt ON (%s.idmilt=milt.id) GROUP by idmilt',
347
+		if ($value == 'ALL') {
348
+					$query = sprintf('SELECT *, GROUP_CONCAT(milt.name) as miltnames FROM `%s` LEFT JOIN milt ON (%s.idmilt=milt.id) GROUP by idmilt',
329 349
 				$table,$table);
330
-		else {
350
+		} else {
331 351
 			switch ($type) {
332 352
 				case 'network':
333 353
 					list($sub['net'],$sub['mask'])=explode('/',$value);
@@ -352,12 +372,11 @@  discard block
 block discarded – undo
352 372
 					return FALSE;
353 373
 			}
354 374
 		}
355
-	}
356
-
357
-	else {
375
+	} else {
358 376
 	        $table = $tablelist['name'];
359
-	        if ($value == 'ALL') $query = 'select * from '.$table;
360
-	        else {
377
+	        if ($value == 'ALL') {
378
+	        	$query = 'select * from '.$table;
379
+	        } else {
361 380
 	                switch ($type) {
362 381
 	                  case 'ip':
363 382
 	                        $query= "select * from $table where $type =  INET_ATON('$value')";
@@ -379,8 +398,9 @@  discard block
 block discarded – undo
379 398
 	}
380 399
 
381 400
 	$result = $myconn->query($query);
382
-	if($result === false)
383
-		syslog(LOG_EMERG, "ALERT: Query <$query> failed: ".$myconn->error);
401
+	if($result === false) {
402
+			syslog(LOG_EMERG, "ALERT: Query <$query> failed: ".$myconn->error);
403
+	}
384 404
         return $result;
385 405
 }
386 406
 
@@ -397,12 +417,14 @@  discard block
 block discarded – undo
397 417
 
398 418
 function isFull($myconn,$typedesc,$alltables) {
399 419
         if (isset($alltables["$typedesc"]['limit'])) {
400
-		if ( $alltables["$typedesc"]['milter'] )
401
-			$tab = 'net';
402
-		else
403
-			$tab = $alltables["$typedesc"]['name'];
404
-                if ( countListed($myconn,$tab) >= $alltables["$typedesc"]['limit'] ) 
405
-                        return TRUE;
420
+		if ( $alltables["$typedesc"]['milter'] ) {
421
+					$tab = 'net';
422
+		} else {
423
+					$tab = $alltables["$typedesc"]['name'];
424
+		}
425
+                if ( countListed($myconn,$tab) >= $alltables["$typedesc"]['limit'] ) {
426
+                                        return TRUE;
427
+                }
406 428
         }
407 429
 	return FALSE;
408 430
 }
@@ -415,8 +437,9 @@  discard block
 block discarded – undo
415 437
 	$tabhtm = <<<END
416 438
 	<table><thead><tr><th>$type</th><th title="The date this object has been listed for the first time">DateAdd</th><th>DateMod</th><th>Exp</th><th>Status</th><th title="Number of times this object has been listed">#List</th>
417 439
 END;
418
-	if ( $tables["$typedesc"]['milter'] )
419
-		$tabhtm .= '<th title="Milter active for this object">Milters</th>';
440
+	if ( $tables["$typedesc"]['milter'] ) {
441
+			$tabhtm .= '<th title="Milter active for this object">Milters</th>';
442
+	}
420 443
 	$tabhtm .= '<th>Authored by</th><th width="250">Reason</th><th>Action</th></tr></thead><tfoot><tr></tr></tfoot><tbody>'."\n";
421 444
 
422 445
 	$result = searchentry ($myconn,$value,$tables["$typedesc"]);
@@ -425,18 +448,23 @@  discard block
 block discarded – undo
425 448
 
426 449
         /* Check for limit in number of listed items */
427 450
 	$full = isFull($myconn,$typedesc,$tables);
428
-	if ($full) print '<p>'.htmlspecialchars("$typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items.').'</p>';
451
+	if ($full) {
452
+		print '<p>'.htmlspecialchars("$typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items.').'</p>';
453
+	}
429 454
 
430 455
 		if ($result->num_rows) {
431 456
 			print $tabhtm;
432 457
 			$i=0;
433 458
         		while ($riga = $result->fetch_array(MYSQLI_ASSOC)) {
434 459
 				if (isListed($riga)) {
435
-					if ($tables["$typedesc"]['bl']) $listed='Listed';
436
-					else $listed='WhiteListed';
437
-				}	
438
-				else
439
-					$listed='Ok';
460
+					if ($tables["$typedesc"]['bl']) {
461
+						$listed='Listed';
462
+					} else {
463
+						$listed='WhiteListed';
464
+					}
465
+				} else {
466
+									$listed='Ok';
467
+				}
440 468
 
441 469
 				switch ($type) {
442 470
 				  case 'ip':
@@ -449,27 +477,30 @@  discard block
 block discarded – undo
449 477
 					$element = $riga["$type"];
450 478
 				}
451 479
 
452
-				if ( $tables["$typedesc"]['milter'] AND checkMilterConf($tables["$typedesc"]) )
453
-					printf ("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td nowrap id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
480
+				if ( $tables["$typedesc"]['milter'] AND checkMilterConf($tables["$typedesc"]) ) {
481
+									printf ("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td nowrap id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
454 482
 					$element, $riga['date'], $riga['datemod'], $riga['exp'], $riga['active'], $riga['nlist'], askMilter($myconn,$i,$element,$typedesc,$riga['idmilt'],$riga['miltnames'],$user,$adm), $riga['user'],htmlspecialchars($riga['reason']),ask($myconn,$i,$listed,$tables,$typedesc,$element,$full,$user,$adm));
455
-				else
456
-					 printf ("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
483
+				} else {
484
+									 printf ("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n",
457 485
 					$element, $riga['date'], $riga['datemod'], $riga['exp'], $riga['active'], $riga['nlist'], $riga['user'],htmlspecialchars($riga['reason']),ask($myconn,$i,$listed,$tables,$typedesc,$element,$full,$user,$adm));
486
+				}
458 487
 				$i++;
459 488
         		}
460 489
 			print '</tbody></table>';
461
-		}
462
-		else {
490
+		} else {
463 491
 			print "<pre>$type &lt;$value&gt; is not listed!\n</pre>";
464
-			if ( in_array($user,array_keys($adm)) AND ($value != 'ALL') )
465
-				if ( (!$full) AND (consistentListing($myconn,$tables,$typedesc,$value,$whynot)) ) require_once('listForm.php');
466
-									else print '<p>'.htmlspecialchars($whynot).'</p>';
492
+			if ( in_array($user,array_keys($adm)) AND ($value != 'ALL') ) {
493
+							if ( (!$full) AND (consistentListing($myconn,$tables,$typedesc,$value,$whynot)) ) require_once('listForm.php');
494
+			} else {
495
+										print '<p>'.htmlspecialchars($whynot).'</p>';
496
+									}
467 497
 				
468 498
 		}
469 499
 		$result->free();
500
+	} else {
501
+		print '<pre>Query error or something wrong in DB schema'."\n</pre>";
502
+	}
470 503
 	}
471
-	else print '<pre>Query error or something wrong in DB schema'."\n</pre>";
472
-}
473 504
 
474 505
 
475 506
 
@@ -512,24 +543,32 @@  discard block
 block discarded – undo
512 543
                 $old_mailfrom = ini_get("sendmail_from");
513 544
                 ini_set("sendmail_from", $from);
514 545
                 $params = sprintf("-oi -f %s", '<>');
515
-                if (!(mail($to,$sbj, $body,$headers,$params))) $flag=FALSE;
516
-                else $flag=TRUE;
517
-                if (isset($old_mailfrom))
518
-                        ini_set("sendmail_from", $old_mailfrom);
519
-        }
520
-        else {
521
-                if (!(mail($to,$sbj, $body,$headers))) $flag=FALSE;
522
-                else $flag=TRUE;
546
+                if (!(mail($to,$sbj, $body,$headers,$params))) {
547
+                	$flag=FALSE;
548
+                } else {
549
+                	$flag=TRUE;
550
+                }
551
+                if (isset($old_mailfrom)) {
552
+                                        ini_set("sendmail_from", $old_mailfrom);
553
+                }
554
+        } else {
555
+                if (!(mail($to,$sbj, $body,$headers))) {
556
+                	$flag=FALSE;
557
+                } else {
558
+                	$flag=TRUE;
559
+                }
523 560
         }
524 561
         return $flag;
525 562
 }
526 563
 
527 564
 function emailToNotify($notify_file,$dom) {
528 565
 	$ini_array = parse_ini_file($notify_file);
529
-	if (in_array($dom,array_keys($ini_array)))
530
-		return $ini_array["$dom"];
531
-	else return FALSE;
532
-}
566
+	if (in_array($dom,array_keys($ini_array))) {
567
+			return $ini_array["$dom"];
568
+	} else {
569
+		return FALSE;
570
+	}
571
+	}
533 572
 
534 573
 
535 574
 function searchAndList ($myconn,$loguser,$tables,$typedesc,$value,$unit,&$quantity,&$reason) {
@@ -577,8 +616,7 @@  discard block
 block discarded – undo
577 616
 					 $reason);
578 617
 				$quantity = 1;
579 618
 				$unit = 'DAY';
580
-                        }
581
-			else {
619
+                        } else {
582 620
                         	/* Entry delisted */
583 621
 				$quantity *= $thisentry['nlist'];
584 622
 				$expdate = 0; /* This forces expiration from CURRENT_TIMESTAMP */
@@ -609,9 +647,10 @@  discard block
 block discarded – undo
609 647
 	$net = new \dautkom\ipv4\IPv4();
610 648
 	$range = $net->address($addressA)->mask($maskA)->getRange();
611 649
 	$ips = ipRange($range);
612
-	foreach ( $ips as $ip )
613
-		if ( $net->address($addressB)->mask($maskB)->has($ip) )
650
+	foreach ( $ips as $ip ) {
651
+			if ( $net->address($addressB)->mask($maskB)->has($ip) )
614 652
 			return TRUE;
653
+	}
615 654
 	return FALSE;
616 655
 }
617 656
 
@@ -688,8 +727,9 @@  discard block
 block discarded – undo
688 727
 		return FALSE;
689 728
 	}
690 729
 	if ($result->num_rows) {
691
-		while ($milt = $result->fetch_array(MYSQLI_ASSOC))
692
-			$milters[] = $milt['name'];
730
+		while ($milt = $result->fetch_array(MYSQLI_ASSOC)) {
731
+					$milters[] = $milt['name'];
732
+		}
693 733
 	}
694 734
 	$result->free();
695 735
 	return $milters;
@@ -715,12 +755,14 @@  discard block
 block discarded – undo
715 755
 				$query[] = "DELETE FROM  `milt` WHERE (`id` = '$miltID' AND `name` = '$value')";
716 756
 		}
717 757
 	}
718
-	if ( count($query) ) /* This "if" is redundant, because if I call this I already checked there is a change */
758
+	if ( count($query) ) {
759
+		/* This "if" is redundant, because if I call this I already checked there is a change */
719 760
 		/* I update datemod because the user couldn't change */
720 761
 		$query[] = sprintf('UPDATE `%s` SET
721 762
 						`user`=\'%s\',
722 763
 						`datemod`= CURRENT_TIMESTAMP
723 764
 					 WHERE `idmilt`=%d', $table, $loguser, $miltID);
765
+	}
724 766
 
725 767
 
726 768
 	/* Start a safe transaction: it commits only if all queries happen */
@@ -734,19 +776,20 @@  discard block
 block discarded – undo
734 776
 		}
735 777
 	}
736 778
 	if ( $ok ) {
737
-		if ( $myconn->commit() )
738
-			syslog(LOG_INFO, "$loguser: Milter setting changed successfully.");
739
-		else {
779
+		if ( $myconn->commit() ) {
780
+					syslog(LOG_INFO, "$loguser: Milter setting changed successfully.");
781
+		} else {
740 782
 			syslog(LOG_ERR, "$loguser: Milter setting NOT changed for an unpredictable COMMIT error.");
741
-			if ( $myconn->rollback() )
742
-				syslog(LOG_INFO, "$loguser: rollback succeeded.");
743
-			else
744
-				syslog(LOG_ERR, "$loguser: rollback failed. Your db could be compromized. Check it!");
783
+			if ( $myconn->rollback() ) {
784
+							syslog(LOG_INFO, "$loguser: rollback succeeded.");
785
+			} else {
786
+							syslog(LOG_ERR, "$loguser: rollback failed. Your db could be compromized. Check it!");
787
+			}
745 788
 			$ok = FALSE;
746 789
 		}
790
+	} else {
791
+			syslog(LOG_ERR, "$loguser: Error: Milter setting NOT changed. See at above errors.");
747 792
 	}
748
-	else
749
-		syslog(LOG_ERR, "$loguser: Error: Milter setting NOT changed. See at above errors.");
750 793
 	return $ok;
751 794
 		
752 795
 }
Please login to merge, or discard this patch.
contrib/splunk/webhook/readPost.php 3 patches
Indentation   +49 added lines, -49 removed lines patch added patch discarded remove patch
@@ -26,17 +26,17 @@  discard block
 block discarded – undo
26 26
 
27 27
  /* Conf */
28 28
 if (!isset($_GET['conf'])) {
29
-        syslog(LOG_ALERT,
30
-        sprintf('%s: you must insert the config file name as a GET parameter, such as %s?conf=listEmail.conf',
31
-                $user, $_SERVER['SCRIPT_NAME']) );
32
-        exit(254);
29
+		syslog(LOG_ALERT,
30
+		sprintf('%s: you must insert the config file name as a GET parameter, such as %s?conf=listEmail.conf',
31
+				$user, $_SERVER['SCRIPT_NAME']) );
32
+		exit(254);
33 33
 }
34 34
 $fileconf = $_GET['conf'];
35 35
 if ( !file_exists(dirname(__FILE__) . '/../' . $fileconf) ) {
36
-        syslog(LOG_ALERT,
37
-        sprintf('%s: the configuration file <%s> doesn\'t exist.',
38
-                $user, $fileconf ));
39
-        exit(254);
36
+		syslog(LOG_ALERT,
37
+		sprintf('%s: the configuration file <%s> doesn\'t exist.',
38
+				$user, $fileconf ));
39
+		exit(254);
40 40
 }
41 41
 
42 42
 closelog();
@@ -64,8 +64,8 @@  discard block
 block discarded – undo
64 64
 
65 65
 /* check you select a blocklist */
66 66
 if ( !$tables["$typedesc"]['bl'] ) {
67
-        syslog(LOG_EMERG,"$user: <$typedesc> is not a blocklist. Are you stupid? Do you want to whitelist a spammer? I refuse to continue.");
68
-        exit (254);
67
+		syslog(LOG_EMERG,"$user: <$typedesc> is not a blocklist. Are you stupid? Do you want to whitelist a spammer? I refuse to continue.");
68
+		exit (254);
69 69
 }
70 70
 
71 71
 
@@ -95,15 +95,15 @@  discard block
 block discarded – undo
95 95
 if (preg_match_all('/^https?\:\/\/(?<splunkhost>[\w\.\-]+)\:8000\/app\/(?<splunkapp>[\w\.\-]+)\/\@go\?sid=(?<job>[\w\.\-\d]+)$/',
96 96
 	$webhook['results_link'], $out, PREG_PATTERN_ORDER) === FALSE) {
97 97
 	syslog(LOG_ALERT,
98
-        	sprintf('%s: unexpected error: can\'t parse the results link returned by webhook (<%s>).',
98
+			sprintf('%s: unexpected error: can\'t parse the results link returned by webhook (<%s>).',
99 99
 		$user, $webhook['results_link']) );
100 100
 	return 255;
101 101
 }
102 102
 
103 103
 if ( $webhook['app'] != $out['splunkapp'][0] ) {
104 104
 	syslog(LOG_ALERT,
105
-        	sprintf('%s: unexpected error: the APP returned by webhook (<%s>) doesn\'t match the app (<%s>) in result link.',
106
-                $user, $webhook['app'], $out['splunkapp'][0] ) );
105
+			sprintf('%s: unexpected error: the APP returned by webhook (<%s>) doesn\'t match the app (<%s>) in result link.',
106
+				$user, $webhook['app'], $out['splunkapp'][0] ) );
107 107
 	return 255;
108 108
 }
109 109
 
@@ -137,14 +137,14 @@  discard block
 block discarded – undo
137 137
 
138 138
 $nr = count ($results);
139 139
 for ($i=1; $i<$nr; $i++) {	/* We skip first header line (i=0) */
140
-        $data = str_getcsv($results[$i], ',');
141
-        $thisVal = $data[1];
142
-        unset($data[1]);
143
-        $data = array_values($data);
144
-        if ( !in_array($thisVal,array_keys($tolist))  )
145
-	        $tolist["$thisVal"] = $data;
146
-        else if ($data[3]>$tolist[$thisVal][3])
147
-	        $tolist["$thisVal"] = $data;
140
+		$data = str_getcsv($results[$i], ',');
141
+		$thisVal = $data[1];
142
+		unset($data[1]);
143
+		$data = array_values($data);
144
+		if ( !in_array($thisVal,array_keys($tolist))  )
145
+			$tolist["$thisVal"] = $data;
146
+		else if ($data[3]>$tolist[$thisVal][3])
147
+			$tolist["$thisVal"] = $data;
148 148
 }
149 149
 
150 150
 /* Make MYSQL connection */
@@ -154,34 +154,34 @@  discard block
 block discarded – undo
154 154
 	exit (254);
155 155
 
156 156
 foreach ( array_keys($tolist) as $value) {
157
-        $quantity = $conf['quantity'];
158
-        $reason = 'On ['.$tolist["$value"][0]."] <$value> sent ".$tolist["$value"][1].' messages to '.$tolist["$value"][2].' recipients.';
159
-        if ( $tolist["$value"][3] >= $threshold ) {
160
-                if ( searchAndList ($mysqli,$user,$tables,$typedesc,$value,$unit,$quantity,$reason) ) {
161
-                        syslog (LOG_INFO, "$user: ".'Listing reason: '.$reason);
162
-                        /* Send a email to domain admin if you list an email */
163
-                        if ( ( $tables["$typedesc"]['field'] == 'email' ) OR ( $tables["$typedesc"]['field'] == 'username' ) ) {
164
-                                /* Sometime uid are in the form of <user>@<domain> ... */
165
-                                if ( strpos($value, '@') !== FALSE ) {
166
-                                        $domain = substr(strrchr($value, '@'), 1);
167
-                                        if ( strpos($domain, '@') === FALSE ) {
168
-                                                $recip = emailToNotify($domainNotify_file,$domain);
169
-                                                $subject = sprintf('%s <%s> is now blocked because exceedes limits on outgoing emails',
170
-                                                                $tables["$typedesc"]['field'], $value);
171
-                                                if (!empty($recip))
172
-                                                        if ( sendEmailWarn($tplfile,'[email protected]',$recip,
173
-                                                                $subject,$value,"$quantity $unit",$reason) )
174
-                                                                syslog(LOG_INFO, "$user: \"$recip\" was notified about the \"$value\" abuse.");
175
-                                        }
176
-                                        else syslog(LOG_ERR,"$user: <$domain> contains the '@' char. Notification cannot be sent.");
177
-                                }
178
-                        }
179
-                }
180
-        }
181
-        else {
182
-                $reason .= " But it has NOT been listed because it doesn't apply to the trigger condition.";
183
-                syslog (LOG_INFO, "$user: ".$reason);
184
-        }
157
+		$quantity = $conf['quantity'];
158
+		$reason = 'On ['.$tolist["$value"][0]."] <$value> sent ".$tolist["$value"][1].' messages to '.$tolist["$value"][2].' recipients.';
159
+		if ( $tolist["$value"][3] >= $threshold ) {
160
+				if ( searchAndList ($mysqli,$user,$tables,$typedesc,$value,$unit,$quantity,$reason) ) {
161
+						syslog (LOG_INFO, "$user: ".'Listing reason: '.$reason);
162
+						/* Send a email to domain admin if you list an email */
163
+						if ( ( $tables["$typedesc"]['field'] == 'email' ) OR ( $tables["$typedesc"]['field'] == 'username' ) ) {
164
+								/* Sometime uid are in the form of <user>@<domain> ... */
165
+								if ( strpos($value, '@') !== FALSE ) {
166
+										$domain = substr(strrchr($value, '@'), 1);
167
+										if ( strpos($domain, '@') === FALSE ) {
168
+												$recip = emailToNotify($domainNotify_file,$domain);
169
+												$subject = sprintf('%s <%s> is now blocked because exceedes limits on outgoing emails',
170
+																$tables["$typedesc"]['field'], $value);
171
+												if (!empty($recip))
172
+														if ( sendEmailWarn($tplfile,'[email protected]',$recip,
173
+																$subject,$value,"$quantity $unit",$reason) )
174
+																syslog(LOG_INFO, "$user: \"$recip\" was notified about the \"$value\" abuse.");
175
+										}
176
+										else syslog(LOG_ERR,"$user: <$domain> contains the '@' char. Notification cannot be sent.");
177
+								}
178
+						}
179
+				}
180
+		}
181
+		else {
182
+				$reason .= " But it has NOT been listed because it doesn't apply to the trigger condition.";
183
+				syslog (LOG_INFO, "$user: ".$reason);
184
+		}
185 185
 }
186 186
 
187 187
 /* Close connection */
Please login to merge, or discard this patch.
Spacing   +33 added lines, -33 removed lines patch added patch discarded remove patch
@@ -16,11 +16,11 @@  discard block
 block discarded – undo
16 16
 
17 17
 /************** Conf *******************/
18 18
 $base = '/var/www/html/RBL';
19
-require_once($base . '/config.php');
19
+require_once($base.'/config.php');
20 20
 
21 21
  /* Syslog basic */
22
-$tag            .= 'SplunkLister';
23
-$user		 = 'Splunk';
22
+$tag .= 'SplunkLister';
23
+$user = 'Splunk';
24 24
 
25 25
 openlog($tag, LOG_PID, $fac);
26 26
 
@@ -28,43 +28,43 @@  discard block
 block discarded – undo
28 28
 if (!isset($_GET['conf'])) {
29 29
         syslog(LOG_ALERT,
30 30
         sprintf('%s: you must insert the config file name as a GET parameter, such as %s?conf=listEmail.conf',
31
-                $user, $_SERVER['SCRIPT_NAME']) );
31
+                $user, $_SERVER['SCRIPT_NAME']));
32 32
         exit(254);
33 33
 }
34 34
 $fileconf = $_GET['conf'];
35
-if ( !file_exists(dirname(__FILE__) . '/../' . $fileconf) ) {
35
+if (!file_exists(dirname(__FILE__).'/../'.$fileconf)) {
36 36
         syslog(LOG_ALERT,
37 37
         sprintf('%s: the configuration file <%s> doesn\'t exist.',
38
-                $user, $fileconf ));
38
+                $user, $fileconf));
39 39
         exit(254);
40 40
 }
41 41
 
42 42
 closelog();
43
-$conf = parse_ini_file( dirname(__FILE__) . '/../' . $fileconf );
43
+$conf = parse_ini_file(dirname(__FILE__).'/../'.$fileconf);
44 44
 
45 45
  /* Splunk inherited parameters */
46
-$threshold = $conf['threshold'];         /* Threshold value on trigger condition; the same which engage the alert */
46
+$threshold = $conf['threshold']; /* Threshold value on trigger condition; the same which engage the alert */
47 47
 
48 48
  /* Blacklist name */
49 49
 $typedesc  = $conf['typedesc'];
50 50
 
51 51
  /* How long to list's parameters */
52
-$unit = $conf['unit'];          /* MySQL language ;) */
52
+$unit = $conf['unit']; /* MySQL language ;) */
53 53
 
54 54
  /* Syslog extended info */
55
-$tag            .= $conf['tag'];
55
+$tag .= $conf['tag'];
56 56
 
57 57
  /* Splunk password of alert owner*/
58 58
 $splpwd = $conf['splunkpassword'];
59 59
 /************** End of conf *************************/
60 60
 
61 61
 openlog($tag, LOG_PID, $fac);
62
-require_once($base . '/function.php');
62
+require_once($base.'/function.php');
63 63
 
64 64
 
65 65
 /* check you select a blocklist */
66
-if ( !$tables["$typedesc"]['bl'] ) {
67
-        syslog(LOG_EMERG,"$user: <$typedesc> is not a blocklist. Are you stupid? Do you want to whitelist a spammer? I refuse to continue.");
66
+if (!$tables["$typedesc"]['bl']) {
67
+        syslog(LOG_EMERG, "$user: <$typedesc> is not a blocklist. Are you stupid? Do you want to whitelist a spammer? I refuse to continue.");
68 68
         exit (254);
69 69
 }
70 70
 
@@ -96,14 +96,14 @@  discard block
 block discarded – undo
96 96
 	$webhook['results_link'], $out, PREG_PATTERN_ORDER) === FALSE) {
97 97
 	syslog(LOG_ALERT,
98 98
         	sprintf('%s: unexpected error: can\'t parse the results link returned by webhook (<%s>).',
99
-		$user, $webhook['results_link']) );
99
+		$user, $webhook['results_link']));
100 100
 	return 255;
101 101
 }
102 102
 
103
-if ( $webhook['app'] != $out['splunkapp'][0] ) {
103
+if ($webhook['app'] != $out['splunkapp'][0]) {
104 104
 	syslog(LOG_ALERT,
105 105
         	sprintf('%s: unexpected error: the APP returned by webhook (<%s>) doesn\'t match the app (<%s>) in result link.',
106
-                $user, $webhook['app'], $out['splunkapp'][0] ) );
106
+                $user, $webhook['app'], $out['splunkapp'][0]));
107 107
 	return 255;
108 108
 }
109 109
 
@@ -135,13 +135,13 @@  discard block
 block discarded – undo
135 135
 
136 136
 $tolist = array();
137 137
 
138
-$nr = count ($results);
139
-for ($i=1; $i<$nr; $i++) {	/* We skip first header line (i=0) */
138
+$nr = count($results);
139
+for ($i = 1; $i<$nr; $i++) {	/* We skip first header line (i=0) */
140 140
         $data = str_getcsv($results[$i], ',');
141 141
         $thisVal = $data[1];
142 142
         unset($data[1]);
143 143
         $data = array_values($data);
144
-        if ( !in_array($thisVal,array_keys($tolist))  )
144
+        if (!in_array($thisVal, array_keys($tolist)))
145 145
 	        $tolist["$thisVal"] = $data;
146 146
         else if ($data[3]>$tolist[$thisVal][3])
147 147
 	        $tolist["$thisVal"] = $data;
@@ -150,42 +150,42 @@  discard block
 block discarded – undo
150 150
 /* Make MYSQL connection */
151 151
 
152 152
 $mysqli = myConnect($host, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user);
153
-if ( $mysqli === FALSE )
153
+if ($mysqli === FALSE)
154 154
 	exit (254);
155 155
 
156
-foreach ( array_keys($tolist) as $value) {
156
+foreach (array_keys($tolist) as $value) {
157 157
         $quantity = $conf['quantity'];
158 158
         $reason = 'On ['.$tolist["$value"][0]."] <$value> sent ".$tolist["$value"][1].' messages to '.$tolist["$value"][2].' recipients.';
159
-        if ( $tolist["$value"][3] >= $threshold ) {
160
-                if ( searchAndList ($mysqli,$user,$tables,$typedesc,$value,$unit,$quantity,$reason) ) {
161
-                        syslog (LOG_INFO, "$user: ".'Listing reason: '.$reason);
159
+        if ($tolist["$value"][3]>=$threshold) {
160
+                if (searchAndList($mysqli, $user, $tables, $typedesc, $value, $unit, $quantity, $reason)) {
161
+                        syslog(LOG_INFO, "$user: ".'Listing reason: '.$reason);
162 162
                         /* Send a email to domain admin if you list an email */
163
-                        if ( ( $tables["$typedesc"]['field'] == 'email' ) OR ( $tables["$typedesc"]['field'] == 'username' ) ) {
163
+                        if (($tables["$typedesc"]['field'] == 'email') OR ($tables["$typedesc"]['field'] == 'username')) {
164 164
                                 /* Sometime uid are in the form of <user>@<domain> ... */
165
-                                if ( strpos($value, '@') !== FALSE ) {
165
+                                if (strpos($value, '@') !== FALSE) {
166 166
                                         $domain = substr(strrchr($value, '@'), 1);
167
-                                        if ( strpos($domain, '@') === FALSE ) {
168
-                                                $recip = emailToNotify($domainNotify_file,$domain);
167
+                                        if (strpos($domain, '@') === FALSE) {
168
+                                                $recip = emailToNotify($domainNotify_file, $domain);
169 169
                                                 $subject = sprintf('%s <%s> is now blocked because exceedes limits on outgoing emails',
170 170
                                                                 $tables["$typedesc"]['field'], $value);
171 171
                                                 if (!empty($recip))
172
-                                                        if ( sendEmailWarn($tplfile,'[email protected]',$recip,
173
-                                                                $subject,$value,"$quantity $unit",$reason) )
172
+                                                        if (sendEmailWarn($tplfile, '[email protected]', $recip,
173
+                                                                $subject, $value, "$quantity $unit", $reason))
174 174
                                                                 syslog(LOG_INFO, "$user: \"$recip\" was notified about the \"$value\" abuse.");
175 175
                                         }
176
-                                        else syslog(LOG_ERR,"$user: <$domain> contains the '@' char. Notification cannot be sent.");
176
+                                        else syslog(LOG_ERR, "$user: <$domain> contains the '@' char. Notification cannot be sent.");
177 177
                                 }
178 178
                         }
179 179
                 }
180 180
         }
181 181
         else {
182 182
                 $reason .= " But it has NOT been listed because it doesn't apply to the trigger condition.";
183
-                syslog (LOG_INFO, "$user: ".$reason);
183
+                syslog(LOG_INFO, "$user: ".$reason);
184 184
         }
185 185
 }
186 186
 
187 187
 /* Close connection */
188
-syslog (LOG_INFO, "$user: ".'Successfully end of session.');
188
+syslog(LOG_INFO, "$user: ".'Successfully end of session.');
189 189
 $mysqli->close();
190 190
 closelog();
191 191
 
Please login to merge, or discard this patch.
Braces   +14 added lines, -11 removed lines patch added patch discarded remove patch
@@ -141,17 +141,19 @@  discard block
 block discarded – undo
141 141
         $thisVal = $data[1];
142 142
         unset($data[1]);
143 143
         $data = array_values($data);
144
-        if ( !in_array($thisVal,array_keys($tolist))  )
145
-	        $tolist["$thisVal"] = $data;
146
-        else if ($data[3]>$tolist[$thisVal][3])
147
-	        $tolist["$thisVal"] = $data;
148
-}
144
+        if ( !in_array($thisVal,array_keys($tolist))  ) {
145
+        	        $tolist["$thisVal"] = $data;
146
+        } else if ($data[3]>$tolist[$thisVal][3]) {
147
+        	        $tolist["$thisVal"] = $data;
148
+        }
149
+        }
149 150
 
150 151
 /* Make MYSQL connection */
151 152
 
152 153
 $mysqli = myConnect($host, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user);
153
-if ( $mysqli === FALSE )
154
+if ( $mysqli === FALSE ) {
154 155
 	exit (254);
156
+}
155 157
 
156 158
 foreach ( array_keys($tolist) as $value) {
157 159
         $quantity = $conf['quantity'];
@@ -168,17 +170,18 @@  discard block
 block discarded – undo
168 170
                                                 $recip = emailToNotify($domainNotify_file,$domain);
169 171
                                                 $subject = sprintf('%s <%s> is now blocked because exceedes limits on outgoing emails',
170 172
                                                                 $tables["$typedesc"]['field'], $value);
171
-                                                if (!empty($recip))
172
-                                                        if ( sendEmailWarn($tplfile,'[email protected]',$recip,
173
+                                                if (!empty($recip)) {
174
+                                                                                                        if ( sendEmailWarn($tplfile,'[email protected]',$recip,
173 175
                                                                 $subject,$value,"$quantity $unit",$reason) )
174 176
                                                                 syslog(LOG_INFO, "$user: \"$recip\" was notified about the \"$value\" abuse.");
177
+                                                }
178
+                                        } else {
179
+                                        	syslog(LOG_ERR,"$user: <$domain> contains the '@' char. Notification cannot be sent.");
175 180
                                         }
176
-                                        else syslog(LOG_ERR,"$user: <$domain> contains the '@' char. Notification cannot be sent.");
177 181
                                 }
178 182
                         }
179 183
                 }
180
-        }
181
-        else {
184
+        } else {
182 185
                 $reason .= " But it has NOT been listed because it doesn't apply to the trigger condition.";
183 186
                 syslog (LOG_INFO, "$user: ".$reason);
184 187
         }
Please login to merge, or discard this patch.
index.php 2 patches
Spacing   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -14,11 +14,11 @@  discard block
 block discarded – undo
14 14
 require_once('function.php');
15 15
 
16 16
 checkSSL();
17
-if ( $require_auth )
18
-	if ( username() == 'unknown' ) exit ("<p>You MUST configure your server to use authentication.</p>");
17
+if ($require_auth)
18
+	if (username() == 'unknown') exit ("<p>You MUST configure your server to use authentication.</p>");
19 19
 
20 20
 
21
-if ( $imapListActive )
21
+if ($imapListActive)
22 22
 	print ' <p style="text-align: right"><a href="/spamreport" target="_new">SPAM Learn Observer</a></p>';
23 23
 
24 24
 print <<<END
@@ -27,10 +27,10 @@  discard block
 block discarded – undo
27 27
 END;
28 28
 
29 29
 
30
-$option=NULL;
30
+$option = NULL;
31 31
 $desc = array_keys($tables);
32 32
 foreach ($desc as $description) { 
33
-	$disabled = $tables["$description"]['active']==TRUE ? '' : ' disabled';  
33
+	$disabled = $tables["$description"]['active'] == TRUE ? '' : ' disabled';  
34 34
 	$option .= '<option value="'.$description."\"$disabled>$description</option>";
35 35
 	}
36 36
 
Please login to merge, or discard this patch.
Braces   +4 added lines, -2 removed lines patch added patch discarded remove patch
@@ -14,12 +14,14 @@
 block discarded – undo
14 14
 require_once('function.php');
15 15
 
16 16
 checkSSL();
17
-if ( $require_auth )
17
+if ( $require_auth ) {
18 18
 	if ( username() == 'unknown' ) exit ("<p>You MUST configure your server to use authentication.</p>");
19
+}
19 20
 
20 21
 
21
-if ( $imapListActive )
22
+if ( $imapListActive ) {
22 23
 	print ' <p style="text-align: right"><a href="/spamreport" target="_new">SPAM Learn Observer</a></p>';
24
+}
23 25
 
24 26
 print <<<END
25 27
 <form name="check" action="result.php" onSubmit="xmlhttpPost('result.php', 'check', 'Risultato', '<img src=\'/include/pleasewait.gif\'>'); return false;" enctype="text/plain" method="post" target="_self">
Please login to merge, or discard this patch.
contrib/mailClassifier/result.php 3 patches
Indentation   +26 added lines, -26 removed lines patch added patch discarded remove patch
@@ -27,32 +27,32 @@
 block discarded – undo
27 27
 
28 28
 
29 29
 $data = array(
30
-                'date' => NULL,
31
-                'from' => NULL,
32
-                'messageid' => NULL,
33
-                'dmarc' => array(
34
-                        'result' => NULL,
35
-                        'dom'   => NULL
36
-                        ),
37
-                'spf' => array(
38
-                        'result' => NULL,
39
-                        'dom'   => NULL
40
-                        ),
41
-                'dkim' => array(
42
-                        'result' => NULL,
43
-                        'dom'   => NULL
44
-                        ),
45
-                'spam' => array(
46
-                        'status' => NULL,
47
-                        'score' => NULL,
48
-                        'th'    => NULL,
49
-                        ),
50
-                'dspam' => array(
51
-                        'type' => NULL,
52
-                        'level' => NULL,
53
-                        'learn' => NULL
54
-                        ),
55
-                'warn' => NULL
30
+				'date' => NULL,
31
+				'from' => NULL,
32
+				'messageid' => NULL,
33
+				'dmarc' => array(
34
+						'result' => NULL,
35
+						'dom'   => NULL
36
+						),
37
+				'spf' => array(
38
+						'result' => NULL,
39
+						'dom'   => NULL
40
+						),
41
+				'dkim' => array(
42
+						'result' => NULL,
43
+						'dom'   => NULL
44
+						),
45
+				'spam' => array(
46
+						'status' => NULL,
47
+						'score' => NULL,
48
+						'th'    => NULL,
49
+						),
50
+				'dspam' => array(
51
+						'type' => NULL,
52
+						'level' => NULL,
53
+						'learn' => NULL
54
+						),
55
+				'warn' => NULL
56 56
 );
57 57
 
58 58
 if (empty($folder)) exit ('<p>No folder found.</p>'); /* This should not occur */
Please login to merge, or discard this patch.
Braces   +7 added lines, -2 removed lines patch added patch discarded remove patch
@@ -55,10 +55,15 @@
 block discarded – undo
55 55
                 'warn' => NULL
56 56
 );
57 57
 
58
-if (empty($folder)) exit ('<p>No folder found.</p>'); /* This should not occur */
58
+if (empty($folder)) {
59
+	exit ('<p>No folder found.</p>');
60
+}
61
+/* This should not occur */
59 62
 $confimap['user'] = $username;
60 63
 $headers = imapFind($confimap, $account, $folder);
61
-if (empty($headers)) exit (sprintf('<p>No suitable mail found in <b>%s</b> folder.</p>', htmlentities("<$folder>")));
64
+if (empty($headers)) {
65
+	exit (sprintf('<p>No suitable mail found in <b>%s</b> folder.</p>', htmlentities("<$folder>")));
66
+}
62 67
 print '<table>';
63 68
 printTableHeader($folder,$data,TRUE,sprintf('Found %d suitable mails.',count($headers)));
64 69
 
Please login to merge, or discard this patch.
Spacing   +7 added lines, -7 removed lines patch added patch discarded remove patch
@@ -1,5 +1,5 @@  discard block
 block discarded – undo
1 1
 <?php
2
-$path='/var/www/html/RBL/';
2
+$path = '/var/www/html/RBL/';
3 3
 include_once($path.'config.php');
4 4
 require_once($path.'function.php');
5 5
 
@@ -14,14 +14,14 @@  discard block
 block discarded – undo
14 14
 $tag .= $conf['syslog']['tag'];
15 15
 openlog($tag, LOG_PID, $fac);
16 16
 
17
-if ( $confimap['learn']=='dspamc' ) {
17
+if ($confimap['learn'] == 'dspamc') {
18 18
 	$cmd = escapeshellcmd('which dspamc');
19 19
 	$cmd = escapeshellcmd('which ls');
20
-	exec ( $cmd, $out, $ret );
20
+	exec($cmd, $out, $ret);
21 21
 	if ($ret != 0) {
22 22
 		$err = 'No DSPAM Client found on your system. Please, force your sysadmin to install "dspamc".';
23 23
 		syslog(LOG_ERR, $username.': Error: '.$err);
24
-		exit (sprintf('<p>%s</p>',htmlentities($err)));
24
+		exit (sprintf('<p>%s</p>', htmlentities($err)));
25 25
 	}
26 26
 }
27 27
 
@@ -60,10 +60,10 @@  discard block
 block discarded – undo
60 60
 $headers = imapFind($confimap, $account, $folder);
61 61
 if (empty($headers)) exit (sprintf('<p>No suitable mail found in <b>%s</b> folder.</p>', htmlentities("<$folder>")));
62 62
 print '<table>';
63
-printTableHeader($folder,$data,TRUE,sprintf('Found %d suitable mails.',count($headers)));
63
+printTableHeader($folder, $data, TRUE, sprintf('Found %d suitable mails.', count($headers)));
64 64
 
65
-foreach ( $headers AS $header ) {
66
-	$values = imapInfo($username, $header,$conf['host']['ar'],$confimap['dspamtospamass'],$confimap['learn']);
65
+foreach ($headers AS $header) {
66
+	$values = imapInfo($username, $header, $conf['host']['ar'], $confimap['dspamtospamass'], $confimap['learn']);
67 67
 	print '<tr>';
68 68
 	printTableRow($values, $confimap['learn']);
69 69
 	print '</tr>';
Please login to merge, or discard this patch.
contrib/mailClassifier/index.php 3 patches
Indentation   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -16,10 +16,10 @@
 block discarded – undo
16 16
 require_once('function.php');
17 17
 
18 18
 if ( !isset($version) ) {
19
-        openlog('mailClassifierEmergency', LOG_PID, LOG_LOCAL0);
20
-        syslog (LOG_EMERG, sprintf('unknown: I can\'t read the config files. Do you have configured the $path in %s?', __FILE__));
21
-        closelog();
22
-        exit(255);
19
+		openlog('mailClassifierEmergency', LOG_PID, LOG_LOCAL0);
20
+		syslog (LOG_EMERG, sprintf('unknown: I can\'t read the config files. Do you have configured the $path in %s?', __FILE__));
21
+		closelog();
22
+		exit(255);
23 23
 }
24 24
 
25 25
 checkSSL();
Please login to merge, or discard this patch.
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -10,24 +10,24 @@
 block discarded – undo
10 10
 <body>
11 11
 <h1> Mail Classifier</h1> 
12 12
 <?php
13
-$path='/var/www/html/RBL/';
13
+$path = '/var/www/html/RBL/';
14 14
 require_once($path.'config.php');
15 15
 require_once($path.'function.php');
16 16
 require_once('function.php');
17 17
 
18
-if ( !isset($version) ) {
18
+if (!isset($version)) {
19 19
         openlog('mailClassifierEmergency', LOG_PID, LOG_LOCAL0);
20
-        syslog (LOG_EMERG, sprintf('unknown: I can\'t read the config files. Do you have configured the $path in %s?', __FILE__));
20
+        syslog(LOG_EMERG, sprintf('unknown: I can\'t read the config files. Do you have configured the $path in %s?', __FILE__));
21 21
         closelog();
22 22
         exit(255);
23 23
 }
24 24
 
25 25
 checkSSL();
26 26
 $user = username();
27
-$isAdmin = in_array($user,array_keys($admins));
27
+$isAdmin = in_array($user, array_keys($admins));
28 28
 $canChange = ($isAdmin) ? '' : 'readonly';
29
-if ( $require_auth )
30
-	if ( $user == 'unknown' ) exit ("<p>You MUST configure your server to use authentication.</p>");
29
+if ($require_auth)
30
+	if ($user == 'unknown') exit ("<p>You MUST configure your server to use authentication.</p>");
31 31
 
32 32
 
33 33
 print <<<END
Please login to merge, or discard this patch.
Braces   +2 added lines, -1 removed lines patch added patch discarded remove patch
@@ -26,8 +26,9 @@
 block discarded – undo
26 26
 $user = username();
27 27
 $isAdmin = in_array($user,array_keys($admins));
28 28
 $canChange = ($isAdmin) ? '' : 'readonly';
29
-if ( $require_auth )
29
+if ( $require_auth ) {
30 30
 	if ( $user == 'unknown' ) exit ("<p>You MUST configure your server to use authentication.</p>");
31
+}
31 32
 
32 33
 
33 34
 print <<<END
Please login to merge, or discard this patch.
contrib/mailClassifier/learn.php 2 patches
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -1,7 +1,7 @@  discard block
 block discarded – undo
1 1
 <div id="content">
2 2
 <h3>Log</h3>
3 3
 <?php
4
-$path='/var/www/html/RBL/';
4
+$path = '/var/www/html/RBL/';
5 5
 require_once($path.'function.php');
6 6
 require_once($path.'config.php');
7 7
 $conf = parse_ini_file('imap.conf', TRUE);
@@ -16,17 +16,17 @@  discard block
 block discarded – undo
16 16
 
17 17
 syslog(LOG_INFO, sprintf('%s: Learn as <%s> on signature: <%s>', $username, $par->class, $par->learn));
18 18
 $cmd = escapeshellcmd($_POST['cmd']);
19
-exec ( $cmd, $out, $ret );
19
+exec($cmd, $out, $ret);
20 20
 if ($ret != 0) {
21 21
 	$err = 'DSPAM Client returns a bad exit state. Sorry, probably the learn was successful, but I don\'t know...';
22 22
 	syslog(LOG_ERR, $username.': Learn Error: '.$err);	
23
-	exit (sprintf('<p>%s</p>',htmlentities($err)));
23
+	exit (sprintf('<p>%s</p>', htmlentities($err)));
24 24
 }
25
-syslog(LOG_INFO,'%s: Learn result: "%s"',$username, $out[0]);  
26
-if ( preg_match ('/^X-DSPAM-Result:\s+(?P<user>[\w\.\@]+);\s+result="(?P<result>\w+)";\s+class="(?P<class>\w+)";\s+probability=(?P<prob>[\d\.]+);\s+confidence=(?P<conf>[\d\.]+);\s+signature=(?P<sig>[\w\,]+)$/',$out[0],$received) != 1) {
25
+syslog(LOG_INFO, '%s: Learn result: "%s"', $username, $out[0]);  
26
+if (preg_match('/^X-DSPAM-Result:\s+(?P<user>[\w\.\@]+);\s+result="(?P<result>\w+)";\s+class="(?P<class>\w+)";\s+probability=(?P<prob>[\d\.]+);\s+confidence=(?P<conf>[\d\.]+);\s+signature=(?P<sig>[\w\,]+)$/', $out[0], $received) != 1) {
27 27
 		$err = 'DSPAM Client returned an unparseable result.';
28 28
 		syslog(LOG_ERR, $username.': Learn Error: '.$err);
29
-                exit (sprintf('<p>%s</p>',htmlentities($err)));
29
+                exit (sprintf('<p>%s</p>', htmlentities($err)));
30 30
 }
31 31
 
32 32
 printf('<p>Message learned successfully with following result:</p><ul><li>Owner: <b>%s</b></li><li>Result: <b>%s</b></li><li>Class: <b>%s</b></li></ul>',
Please login to merge, or discard this patch.
Indentation   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -26,12 +26,12 @@
 block discarded – undo
26 26
 if ( preg_match ('/^X-DSPAM-Result:\s+(?P<user>[\w\.\@]+);\s+result="(?P<result>\w+)";\s+class="(?P<class>\w+)";\s+probability=(?P<prob>[\d\.]+);\s+confidence=(?P<conf>[\d\.]+);\s+signature=(?P<sig>[\w\,]+)$/',$out[0],$received) != 1) {
27 27
 		$err = 'DSPAM Client returned an unparseable result.';
28 28
 		syslog(LOG_ERR, $username.': Learn Error: '.$err);
29
-                exit (sprintf('<p>%s</p>',htmlentities($err)));
29
+				exit (sprintf('<p>%s</p>',htmlentities($err)));
30 30
 }
31 31
 
32 32
 printf('<p>Message learned successfully with following result:</p><ul><li>Owner: <b>%s</b></li><li>Result: <b>%s</b></li><li>Class: <b>%s</b></li></ul>',
33 33
 	htmlentities($received['user']),
34
-        $received['result'], $received['class']);
34
+		$received['result'], $received['class']);
35 35
 closelog();
36 36
 ?>
37 37
 </div>
Please login to merge, or discard this patch.
contrib/mailClassifier/list.php 3 patches
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -15,7 +15,7 @@
 block discarded – undo
15 15
 if (is_array($folders)) {
16 16
 	print '<option  value="" selected disabled>Choose a folder</option>';
17 17
 	foreach ( $folders as $folder )
18
-        	printf('<option  value="%s">%s</option>',
18
+			printf('<option  value="%s">%s</option>',
19 19
 			$folder,
20 20
 			htmlspecialchars(mb_convert_encoding($folder, "UTF-8", "UTF7-IMAP")));
21 21
 }
Please login to merge, or discard this patch.
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <select name="folder" style="width:215px" onChange="xmlhttpPost('result.php', 'Classify', 'Result', '<img src=\'/include/pleasewait.gif\'>', true); return false;">
2 2
 <?php
3
-$path='/var/www/html/RBL/';
3
+$path = '/var/www/html/RBL/';
4 4
 require_once($path.'function.php');
5 5
 require_once($path.'config.php');
6 6
 require_once('function.php');
@@ -11,10 +11,10 @@  discard block
 block discarded – undo
11 11
 openlog($tag, LOG_PID, $fac);
12 12
 
13 13
 $conf['imap']['user'] = username();
14
-$folders=imapFolder($conf['imap'], $_POST['username']);
14
+$folders = imapFolder($conf['imap'], $_POST['username']);
15 15
 if (is_array($folders)) {
16 16
 	print '<option  value="" selected disabled>Choose a folder</option>';
17
-	foreach ( $folders as $folder )
17
+	foreach ($folders as $folder)
18 18
         	printf('<option  value="%s">%s</option>',
19 19
 			$folder,
20 20
 			htmlspecialchars(mb_convert_encoding($folder, "UTF-8", "UTF7-IMAP")));
Please login to merge, or discard this patch.
Braces   +4 added lines, -3 removed lines patch added patch discarded remove patch
@@ -14,11 +14,12 @@
 block discarded – undo
14 14
 $folders=imapFolder($conf['imap'], $_POST['username']);
15 15
 if (is_array($folders)) {
16 16
 	print '<option  value="" selected disabled>Choose a folder</option>';
17
-	foreach ( $folders as $folder )
18
-        	printf('<option  value="%s">%s</option>',
17
+	foreach ( $folders as $folder ) {
18
+	        	printf('<option  value="%s">%s</option>',
19 19
 			$folder,
20 20
 			htmlspecialchars(mb_convert_encoding($folder, "UTF-8", "UTF7-IMAP")));
21
-}
21
+	}
22
+	}
22 23
 closelog();
23 24
 ?>
24 25
 </select>
Please login to merge, or discard this patch.
contrib/mailClassifier/function.php 4 patches
Doc Comments   +7 added lines patch added patch discarded remove patch
@@ -56,6 +56,10 @@  discard block
 block discarded – undo
56 56
 	return $head;
57 57
 }
58 58
 
59
+/**
60
+ * @param null|string $prob
61
+ * @param null|string $conf
62
+ */
59 63
 function dspamLevel($prob, $conf) {
60 64
 /* Calculate DSPAM Level as the Spamassassin Plugin */
61 65
 	if (is_null($prob) or is_null($conf)) return '-';
@@ -63,6 +67,9 @@  discard block
 block discarded – undo
63 67
 	return round(($t_prob + ($conf*100)) / 2);
64 68
 }
65 69
 
70
+/**
71
+ * @param string $classSpam
72
+ */
66 73
 function dspamType($classSpam) {
67 74
 	switch($classSpam) {
68 75
 		case 'HAM':
Please login to merge, or discard this patch.
Indentation   +85 added lines, -85 removed lines patch added patch discarded remove patch
@@ -3,13 +3,13 @@  discard block
 block discarded – undo
3 3
 function imapFolder($cf, $username) {
4 4
 	$return = array();
5 5
 	$open='{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}';
6
-        $m_mail = imap_open($open, $username, $cf['authpassword'], OP_READONLY)
7
-                or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
8
-        if ( !$m_mail ) exit(254);
6
+		$m_mail = imap_open($open, $username, $cf['authpassword'], OP_READONLY)
7
+				or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
8
+		if ( !$m_mail ) exit(254);
9 9
 
10 10
 
11
-        syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].'>; Listing folders of account <'.$username.'>...');
12
-        //get all folder
11
+		syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].'>; Listing folders of account <'.$username.'>...');
12
+		//get all folder
13 13
 	$list = imap_list($m_mail, $open, "*");
14 14
 	imap_close($m_mail);
15 15
 	if (is_array($list))
@@ -23,7 +23,7 @@  discard block
 block discarded – undo
23 23
 function imapFind ($cf, $username, $folder) {
24 24
 	$head=array();
25 25
 	$m_mail = imap_open('{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}'.$folder, $username,$cf['authpassword'], OP_READONLY)
26
-        	or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
26
+			or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
27 27
 	if ( !$m_mail ) exit(254);
28 28
 		
29 29
 
@@ -36,12 +36,12 @@  discard block
 block discarded – undo
36 36
 	// Order results starting from newest message
37 37
 	if ( empty($m_search) ) {
38 38
 		syslog (LOG_INFO,$cf['user'].": No suitable mail found in <$folder> folder.");
39
-	        if ( $ierr = imap_errors() )
40
-	                foreach ( $ierr as $thiserr )
41
-	                        syslog (LOG_ERR, $cf['user'].": IMAP Error: $thiserr");
42
-	        if ( $ierr = imap_alerts() )
43
-	                foreach ( $ierr as $thiserr )
44
-	                        syslog (LOG_ALERT, $cf['user'].": IMAP Alert: $thiserr");
39
+			if ( $ierr = imap_errors() )
40
+					foreach ( $ierr as $thiserr )
41
+							syslog (LOG_ERR, $cf['user'].": IMAP Error: $thiserr");
42
+			if ( $ierr = imap_alerts() )
43
+					foreach ( $ierr as $thiserr )
44
+							syslog (LOG_ALERT, $cf['user'].": IMAP Alert: $thiserr");
45 45
 		imap_close( $m_mail );
46 46
 		return FALSE;
47 47
 	}
@@ -49,7 +49,7 @@  discard block
 block discarded – undo
49 49
 	syslog (LOG_INFO,$cf['user'].": Found $nmes mail in <$folder> folder.");
50 50
 	if ($nmes>0) rsort($m_search);
51 51
 
52
-        // loop for each message
52
+		// loop for each message
53 53
 	foreach ($m_search as $onem) 
54 54
 		$head[] = imap_fetchheader($m_mail, $onem );
55 55
 	imap_close($m_mail);
@@ -80,52 +80,52 @@  discard block
 block discarded – undo
80 80
 /* Each line must end with /r/n         */
81 81
 
82 82
 	$result = array(
83
-                'date' => NULL,
84
-                'from' => NULL,
85
-                'messageid' => NULL,
83
+				'date' => NULL,
84
+				'from' => NULL,
85
+				'messageid' => NULL,
86 86
 		'dmarc' => array(
87 87
 			'result' => NULL,
88 88
 			'dom'	=> NULL
89 89
 			),
90 90
 		'spf' => array(
91
-                        'result' => NULL,
92
-                        'dom'   => NULL
93
-                        ),
91
+						'result' => NULL,
92
+						'dom'   => NULL
93
+						),
94 94
 		'dkim' => array(
95
-                        'result' => NULL,
96
-                        'dom'   => NULL
97
-                        ),
98
-                'spam' => array(
99
-                        'status' => NULL,
100
-                        'score' => NULL,
101
-                        'th'    => NULL,
102
-                        ),
103
-                'dspam' => array(
104
-                        'type' => NULL,
105
-                        'level' => NULL,
95
+						'result' => NULL,
96
+						'dom'   => NULL
97
+						),
98
+				'spam' => array(
99
+						'status' => NULL,
100
+						'score' => NULL,
101
+						'th'    => NULL,
102
+						),
103
+				'dspam' => array(
104
+						'type' => NULL,
105
+						'level' => NULL,
106 106
 			'learn' => NULL
107
-                        ),
107
+						),
108 108
 		'warn' => NULL
109
-        );
109
+		);
110 110
 		
111 111
 
112
-        if ( preg_match_all ('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dmarc=(?<dmarc>\w+)\s+\(p=\w+\s+dis=\w+\)\s+header\.from=(?<DMARCfrom>[\w\.]+)/m',$header,$received) ) {
112
+		if ( preg_match_all ('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dmarc=(?<dmarc>\w+)\s+\(p=\w+\s+dis=\w+\)\s+header\.from=(?<DMARCfrom>[\w\.]+)/m',$header,$received) ) {
113 113
 		$k=0;
114
-                for ($i = count($received[0])-1;$i>=0;$i--) {
115
-	                foreach ($ARhosts as $mx) {
114
+				for ($i = count($received[0])-1;$i>=0;$i--) {
115
+					foreach ($ARhosts as $mx) {
116 116
 				if ($mx == $received['host'][$i]) {
117 117
 					/* This is a trusted AR result */
118 118
 					$result['dmarc']['result']=$received['dmarc'][$i];
119 119
 					$result['dmarc']['dom'] = $received['DMARCfrom'][$i];
120 120
 					$k++;
121 121
 				}
122
-                	}
122
+					}
123
+		}
123 124
 		}
124
-        }
125 125
 	$received=NULL;
126 126
 	if ($k>1) $result['warn'][] = 'The trusted DMARC AR Headers are present more than once. Something wrong.';
127 127
 
128
-        if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)spf=(?<spf>\w+)\s+smtp\.(?:mailfrom|helo)=(?<SPFfrom>[\w\.]+)/m',$header,$received) ) {
128
+		if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)spf=(?<spf>\w+)\s+smtp\.(?:mailfrom|helo)=(?<SPFfrom>[\w\.]+)/m',$header,$received) ) {
129 129
 		$k=0;
130 130
 		for ($i = count($received[0])-1;$i>=0;$i--) {
131 131
 			foreach ($ARhosts as $mx) {
@@ -134,25 +134,25 @@  discard block
 block discarded – undo
134 134
 					$result['spf']['result']=$received['spf'][$i];
135 135
 					$result['spf']['dom'] = $received['SPFfrom'][$i];
136 136
 					$k++;
137
-                        	}
138
-                	}
139
-        	}
137
+							}
138
+					}
139
+			}
140 140
 	}
141 141
 	$received=NULL;
142 142
 	if ($k>1) $result['warn'][] = 'The trusted SPF AR Headers are present more than once. Something wrong.';
143 143
 
144 144
 	$k=0;
145
-        if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dkim=(?<dkim>\w+)\s+[\w\s\(\)\-]+header\.d=(?<DKIMdom>[\w\.]+)/m',$header,$received) ) {
145
+		if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dkim=(?<dkim>\w+)\s+[\w\s\(\)\-]+header\.d=(?<DKIMdom>[\w\.]+)/m',$header,$received) ) {
146 146
 		for ($i = count($received[0])-1;$i>=0;$i--) {
147
-	                foreach ($ARhosts as $mx) {
148
-        	                if ($mx == $received['host'][$i]) {
149
-                	                /* This is a trusted AR result */
150
-                        	        $result['dkim']['result']=$received['dkim'][$i];
151
-                                	$result['dkim']['dom'] = $received['DKIMdom'][$i];
147
+					foreach ($ARhosts as $mx) {
148
+							if ($mx == $received['host'][$i]) {
149
+									/* This is a trusted AR result */
150
+									$result['dkim']['result']=$received['dkim'][$i];
151
+									$result['dkim']['dom'] = $received['DKIMdom'][$i];
152 152
 					$k++;
153
-                        	}
154
-                	}
155
-        	}
153
+							}
154
+					}
155
+			}
156 156
 	}
157 157
 	$received=NULL;
158 158
 	if ($k>1) $result['warn'][] = 'The trusted DKIM AR Headers are present more than once. Something wrong.';
@@ -160,59 +160,59 @@  discard block
 block discarded – undo
160 160
 	if ($dpl) { /* Use Spamassassin Plugin */
161 161
 		if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*DSPAM_(?P<dtype>SPAM|HAM)_(?P<dlevel>\d\d)(?:.|\r\n\s+)*\]/m',$header,$received) ) {
162 162
 			$result['spam']['status']=$received['spamstatus'][0];
163
-                	$result['spam']['score'] = $received['score'][0];
163
+					$result['spam']['score'] = $received['score'][0];
164 164
 			$result['spam']['th'] = $received['th'][0];
165 165
 			$result['dspam']['type'] = dspamType($received['dtype'][0]);
166 166
 			$result['dspam']['level'] =$received['dlevel'][0];
167
-        	}
168
-        	if (count($received[0])>1) $result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.';
167
+			}
168
+			if (count($received[0])>1) $result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.';
169 169
 	}
170 170
 	else { /* Parse apart all DSPAM Header and calculate a level */
171 171
 		if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*\]/m',$header,$received) ) {
172
-                        $result['spam']['status']=$received['spamstatus'][0];
173
-                        $result['spam']['score'] = $received['score'][0];
174
-                        $result['spam']['th'] = $received['th'][0];
172
+						$result['spam']['status']=$received['spamstatus'][0];
173
+						$result['spam']['score'] = $received['score'][0];
174
+						$result['spam']['th'] = $received['th'][0];
175 175
 			if (count($received[0])>1)
176 176
 				$result['warn'][]= 'The Spamassassin Headers are present more than once. I consider only the last one.';
177 177
 		}
178 178
 		if ( preg_match ('/\r\nX\-DSPAM\-Result:\s(?P<result>.*)\r\n/',$header,$received) != 1)
179
-	                $result['warn'] = 'DSPAM Result invalid, not present or present more than once.';
180
-	        else
181
-                	$result['dspam']['type']=$received['result'];
179
+					$result['warn'] = 'DSPAM Result invalid, not present or present more than once.';
180
+			else
181
+					$result['dspam']['type']=$received['result'];
182 182
 		$prob = NULL;
183 183
 		$conf = NULL;
184
-                if ( preg_match ('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/',$header,$received) != 1)
185
-                        $result['warn'][] = 'DSPAM Probability invalid, not present or present more than once.';
184
+				if ( preg_match ('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/',$header,$received) != 1)
185
+						$result['warn'][] = 'DSPAM Probability invalid, not present or present more than once.';
186 186
 		else
187 187
 			$prob = $received['prob'];
188 188
 		if ( preg_match ('/\r\nX\-DSPAM\-Confidence:\s(?P<conf>.*)\r\n/',$header,$received) != 1)
189
-                        $result['warn'][] = 'DSPAM Confidence invalid, not present or present more than once.';
189
+						$result['warn'][] = 'DSPAM Confidence invalid, not present or present more than once.';
190 190
 		else
191 191
 			$conf = $received['conf'];
192 192
 		$result['dspam']['level'] = dspamLevel($prob,$conf);
193 193
 	}
194 194
 	$received=NULL;
195 195
 	if ( preg_match ('/\r\nFrom:\s(?P<from>.*)\r\n/',$header,$received) != 1)
196
-                $result['warn'][] = 'From header invalid or not present';
197
-        else
198
-                $result['from'] = $received['from'];
196
+				$result['warn'][] = 'From header invalid or not present';
197
+		else
198
+				$result['from'] = $received['from'];
199 199
 
200
-        if ( preg_match ('/\r\nDate:\s(?P<date>.*)\r\n/',$header,$received) != 1)
201
-                $result['warn'][] = 'Date header invalid or not present';
200
+		if ( preg_match ('/\r\nDate:\s(?P<date>.*)\r\n/',$header,$received) != 1)
201
+				$result['warn'][] = 'Date header invalid or not present';
202 202
 	else
203 203
 		$result['date'] = $received['date'];
204 204
 
205 205
 	$received=NULL;
206
-        if ( preg_match ('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/',$header,$received) != 1)
207
-                $result['warn'][] = 'Message-ID invalid, not present or present more than once.';
206
+		if ( preg_match ('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/',$header,$received) != 1)
207
+				$result['warn'][] = 'Message-ID invalid, not present or present more than once.';
208 208
 	else
209 209
 		$result['messageid']=$received['mid'];
210 210
 
211
-        $received=NULL;
211
+		$received=NULL;
212 212
 
213
-        switch ($learn) {
213
+		switch ($learn) {
214 214
 		case 'dspamc':
215
-        		if ( preg_match ('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/',$header,$received) != 1)
215
+				if ( preg_match ('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/',$header,$received) != 1)
216 216
 				$result['warn'] = 'DSPAM Signature invalid, not present or present more than once.';
217 217
 			else
218 218
 				$result['dspam']['learn']=$received['sig'];			
@@ -223,23 +223,23 @@  discard block
 block discarded – undo
223 223
 			syslog (LOG_INFO,$user.': Error in "learn" imap configuration value. Please, set "dspamc" or "false".');
224 224
 	}
225 225
 	
226
-        return $result;
226
+		return $result;
227 227
 }
228 228
 
229 229
 
230 230
 
231 231
 
232 232
 function printTableHeader($title,$content,$footer=FALSE,$fcontent) {
233
-        print <<<END
233
+		print <<<END
234 234
 	<caption>$title</caption>
235 235
 	<thead>
236 236
 	<tr>
237 237
 END;
238 238
 	$kcontent = array_keys($content);
239
-        $cols = count($kcontent);
240
-        for ($i=0; $i<$cols; $i++) {
239
+		$cols = count($kcontent);
240
+		for ($i=0; $i<$cols; $i++) {
241 241
 		$key = $kcontent[$i];
242
-                printf ('<th colspan="%d" rowspan="%d">%s</th>',
242
+				printf ('<th colspan="%d" rowspan="%d">%s</th>',
243 243
 			!is_array($content[$key]) ?:
244 244
 			count(array_keys($content[$key])) ?: '1',
245 245
 			!is_array($content[$key]) ?:
@@ -255,13 +255,13 @@  discard block
 block discarded – undo
255 255
 		}
256 256
 	}
257 257
 		
258
-        print '</tr></thead>';
259
-        if ($footer) {
260
-                print '<tfoot><tr>';
261
-                print "<th colspan=\"$cols\">".$fcontent.'</th>';
262
-                print '</tr></tfoot>';
263
-        }
264
-        return TRUE;
258
+		print '</tr></thead>';
259
+		if ($footer) {
260
+				print '<tfoot><tr>';
261
+				print "<th colspan=\"$cols\">".$fcontent.'</th>';
262
+				print '</tr></tfoot>';
263
+		}
264
+		return TRUE;
265 265
 }
266 266
 
267 267
 
@@ -336,7 +336,7 @@  discard block
 block discarded – undo
336 336
 				}
337 337
 			/* Spamassassin format */
338 338
 			if (isset($row['status']))
339
-	                        switch($row['status']) {
339
+							switch($row['status']) {
340 340
 					case 'No':
341 341
 						$color = 'rgba(0,255,0, %.1f)';
342 342
 						break;
Please login to merge, or discard this patch.
Spacing   +86 added lines, -88 removed lines patch added patch discarded remove patch
@@ -2,56 +2,56 @@  discard block
 block discarded – undo
2 2
 
3 3
 function imapFolder($cf, $username) {
4 4
 	$return = array();
5
-	$open='{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}';
5
+	$open = '{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}';
6 6
         $m_mail = imap_open($open, $username, $cf['authpassword'], OP_READONLY)
7
-                or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
8
-        if ( !$m_mail ) exit(254);
7
+                or syslog(LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: '.imap_last_error());
8
+        if (!$m_mail) exit(254);
9 9
 
10 10
 
11
-        syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].'>; Listing folders of account <'.$username.'>...');
11
+        syslog(LOG_INFO, $cf['user'].': Successfully connected to <'.$cf['mailhost'].'>; Listing folders of account <'.$username.'>...');
12 12
         //get all folder
13 13
 	$list = imap_list($m_mail, $open, "*");
14 14
 	imap_close($m_mail);
15 15
 	if (is_array($list))
16 16
 		foreach ($list as $mbox)
17
-			$return[] = explode($open,$mbox,2)[1];
17
+			$return[] = explode($open, $mbox, 2)[1];
18 18
 	else
19
-		syslog (LOG_INFO,$cf['user'] . ': imap_list failed: ' . imap_last_error() );
19
+		syslog(LOG_INFO, $cf['user'].': imap_list failed: '.imap_last_error());
20 20
 	return $return;
21 21
 }
22 22
 
23
-function imapFind ($cf, $username, $folder) {
24
-	$head=array();
25
-	$m_mail = imap_open('{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}'.$folder, $username,$cf['authpassword'], OP_READONLY)
26
-        	or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
27
-	if ( !$m_mail ) exit(254);
23
+function imapFind($cf, $username, $folder) {
24
+	$head = array();
25
+	$m_mail = imap_open('{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}'.$folder, $username, $cf['authpassword'], OP_READONLY)
26
+        	or syslog(LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: '.imap_last_error());
27
+	if (!$m_mail) exit(254);
28 28
 		
29 29
 
30
-	syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].">; Reading <$folder> messages of last ".$cf['oldestday'].' days on account <'.$username.'>...');
30
+	syslog(LOG_INFO, $cf['user'].': Successfully connected to <'.$cf['mailhost'].">; Reading <$folder> messages of last ".$cf['oldestday'].' days on account <'.$username.'>...');
31 31
 	//get all messages
32
-	$dateTh = date ( "d-M-Y", strToTime ( '-'.$cf['oldestday'].' days' ) );
33
-	$m_search=imap_search ($m_mail, "SINCE \"$dateTh\" TEXT \"Authentication-Results: \"" );
32
+	$dateTh = date("d-M-Y", strToTime('-'.$cf['oldestday'].' days'));
33
+	$m_search = imap_search($m_mail, "SINCE \"$dateTh\" TEXT \"Authentication-Results: \"");
34 34
 
35 35
 
36 36
 	// Order results starting from newest message
37
-	if ( empty($m_search) ) {
38
-		syslog (LOG_INFO,$cf['user'].": No suitable mail found in <$folder> folder.");
39
-	        if ( $ierr = imap_errors() )
40
-	                foreach ( $ierr as $thiserr )
41
-	                        syslog (LOG_ERR, $cf['user'].": IMAP Error: $thiserr");
42
-	        if ( $ierr = imap_alerts() )
43
-	                foreach ( $ierr as $thiserr )
44
-	                        syslog (LOG_ALERT, $cf['user'].": IMAP Alert: $thiserr");
45
-		imap_close( $m_mail );
37
+	if (empty($m_search)) {
38
+		syslog(LOG_INFO, $cf['user'].": No suitable mail found in <$folder> folder.");
39
+	        if ($ierr = imap_errors())
40
+	                foreach ($ierr as $thiserr)
41
+	                        syslog(LOG_ERR, $cf['user'].": IMAP Error: $thiserr");
42
+	        if ($ierr = imap_alerts())
43
+	                foreach ($ierr as $thiserr)
44
+	                        syslog(LOG_ALERT, $cf['user'].": IMAP Alert: $thiserr");
45
+		imap_close($m_mail);
46 46
 		return FALSE;
47 47
 	}
48
-	$nmes = count ($m_search);
49
-	syslog (LOG_INFO,$cf['user'].": Found $nmes mail in <$folder> folder.");
48
+	$nmes = count($m_search);
49
+	syslog(LOG_INFO, $cf['user'].": Found $nmes mail in <$folder> folder.");
50 50
 	if ($nmes>0) rsort($m_search);
51 51
 
52 52
         // loop for each message
53 53
 	foreach ($m_search as $onem) 
54
-		$head[] = imap_fetchheader($m_mail, $onem );
54
+		$head[] = imap_fetchheader($m_mail, $onem);
55 55
 	imap_close($m_mail);
56 56
 	return $head;
57 57
 }
@@ -59,12 +59,12 @@  discard block
 block discarded – undo
59 59
 function dspamLevel($prob, $conf) {
60 60
 /* Calculate DSPAM Level as the Spamassassin Plugin */
61 61
 	if (is_null($prob) or is_null($conf)) return '-';
62
-	$t_prob = abs((($prob - 0.5) * 2) * 100);
63
-	return round(($t_prob + ($conf*100)) / 2);
62
+	$t_prob = abs((($prob-0.5) * 2) * 100);
63
+	return round(($t_prob+($conf * 100)) / 2);
64 64
 }
65 65
 
66 66
 function dspamType($classSpam) {
67
-	switch($classSpam) {
67
+	switch ($classSpam) {
68 68
 		case 'HAM':
69 69
 			return 'Innocent';
70 70
 		case 'SPAM':
@@ -75,7 +75,7 @@  discard block
 block discarded – undo
75 75
 	}
76 76
 }
77 77
 
78
-function imapInfo($user,$header,$ARhosts,$dpl=false, $learn=false) {
78
+function imapInfo($user, $header, $ARhosts, $dpl = false, $learn = false) {
79 79
 /* Get relevant Info from header's mail */
80 80
 /* Each line must end with /r/n         */
81 81
 
@@ -109,118 +109,118 @@  discard block
 block discarded – undo
109 109
         );
110 110
 		
111 111
 
112
-        if ( preg_match_all ('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dmarc=(?<dmarc>\w+)\s+\(p=\w+\s+dis=\w+\)\s+header\.from=(?<DMARCfrom>[\w\.]+)/m',$header,$received) ) {
113
-		$k=0;
114
-                for ($i = count($received[0])-1;$i>=0;$i--) {
112
+        if (preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dmarc=(?<dmarc>\w+)\s+\(p=\w+\s+dis=\w+\)\s+header\.from=(?<DMARCfrom>[\w\.]+)/m', $header, $received)) {
113
+		$k = 0;
114
+                for ($i = count($received[0])-1; $i>=0; $i--) {
115 115
 	                foreach ($ARhosts as $mx) {
116 116
 				if ($mx == $received['host'][$i]) {
117 117
 					/* This is a trusted AR result */
118
-					$result['dmarc']['result']=$received['dmarc'][$i];
118
+					$result['dmarc']['result'] = $received['dmarc'][$i];
119 119
 					$result['dmarc']['dom'] = $received['DMARCfrom'][$i];
120 120
 					$k++;
121 121
 				}
122 122
                 	}
123 123
 		}
124 124
         }
125
-	$received=NULL;
125
+	$received = NULL;
126 126
 	if ($k>1) $result['warn'][] = 'The trusted DMARC AR Headers are present more than once. Something wrong.';
127 127
 
128
-        if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)spf=(?<spf>\w+)\s+smtp\.(?:mailfrom|helo)=(?<SPFfrom>[\w\.]+)/m',$header,$received) ) {
129
-		$k=0;
130
-		for ($i = count($received[0])-1;$i>=0;$i--) {
128
+        if (preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)spf=(?<spf>\w+)\s+smtp\.(?:mailfrom|helo)=(?<SPFfrom>[\w\.]+)/m', $header, $received)) {
129
+		$k = 0;
130
+		for ($i = count($received[0])-1; $i>=0; $i--) {
131 131
 			foreach ($ARhosts as $mx) {
132 132
 				if ($mx == $received['host'][$i]) {
133 133
 					/* This is a trusted AR result */
134
-					$result['spf']['result']=$received['spf'][$i];
134
+					$result['spf']['result'] = $received['spf'][$i];
135 135
 					$result['spf']['dom'] = $received['SPFfrom'][$i];
136 136
 					$k++;
137 137
                         	}
138 138
                 	}
139 139
         	}
140 140
 	}
141
-	$received=NULL;
141
+	$received = NULL;
142 142
 	if ($k>1) $result['warn'][] = 'The trusted SPF AR Headers are present more than once. Something wrong.';
143 143
 
144
-	$k=0;
145
-        if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dkim=(?<dkim>\w+)\s+[\w\s\(\)\-]+header\.d=(?<DKIMdom>[\w\.]+)/m',$header,$received) ) {
146
-		for ($i = count($received[0])-1;$i>=0;$i--) {
144
+	$k = 0;
145
+        if (preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dkim=(?<dkim>\w+)\s+[\w\s\(\)\-]+header\.d=(?<DKIMdom>[\w\.]+)/m', $header, $received)) {
146
+		for ($i = count($received[0])-1; $i>=0; $i--) {
147 147
 	                foreach ($ARhosts as $mx) {
148 148
         	                if ($mx == $received['host'][$i]) {
149 149
                 	                /* This is a trusted AR result */
150
-                        	        $result['dkim']['result']=$received['dkim'][$i];
150
+                        	        $result['dkim']['result'] = $received['dkim'][$i];
151 151
                                 	$result['dkim']['dom'] = $received['DKIMdom'][$i];
152 152
 					$k++;
153 153
                         	}
154 154
                 	}
155 155
         	}
156 156
 	}
157
-	$received=NULL;
157
+	$received = NULL;
158 158
 	if ($k>1) $result['warn'][] = 'The trusted DKIM AR Headers are present more than once. Something wrong.';
159 159
 
160 160
 	if ($dpl) { /* Use Spamassassin Plugin */
161
-		if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*DSPAM_(?P<dtype>SPAM|HAM)_(?P<dlevel>\d\d)(?:.|\r\n\s+)*\]/m',$header,$received) ) {
162
-			$result['spam']['status']=$received['spamstatus'][0];
161
+		if (preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*DSPAM_(?P<dtype>SPAM|HAM)_(?P<dlevel>\d\d)(?:.|\r\n\s+)*\]/m', $header, $received)) {
162
+			$result['spam']['status'] = $received['spamstatus'][0];
163 163
                 	$result['spam']['score'] = $received['score'][0];
164 164
 			$result['spam']['th'] = $received['th'][0];
165 165
 			$result['dspam']['type'] = dspamType($received['dtype'][0]);
166
-			$result['dspam']['level'] =$received['dlevel'][0];
166
+			$result['dspam']['level'] = $received['dlevel'][0];
167 167
         	}
168 168
         	if (count($received[0])>1) $result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.';
169 169
 	}
170 170
 	else { /* Parse apart all DSPAM Header and calculate a level */
171
-		if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*\]/m',$header,$received) ) {
172
-                        $result['spam']['status']=$received['spamstatus'][0];
171
+		if (preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*\]/m', $header, $received)) {
172
+                        $result['spam']['status'] = $received['spamstatus'][0];
173 173
                         $result['spam']['score'] = $received['score'][0];
174 174
                         $result['spam']['th'] = $received['th'][0];
175 175
 			if (count($received[0])>1)
176
-				$result['warn'][]= 'The Spamassassin Headers are present more than once. I consider only the last one.';
176
+				$result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.';
177 177
 		}
178
-		if ( preg_match ('/\r\nX\-DSPAM\-Result:\s(?P<result>.*)\r\n/',$header,$received) != 1)
178
+		if (preg_match('/\r\nX\-DSPAM\-Result:\s(?P<result>.*)\r\n/', $header, $received) != 1)
179 179
 	                $result['warn'] = 'DSPAM Result invalid, not present or present more than once.';
180 180
 	        else
181
-                	$result['dspam']['type']=$received['result'];
181
+                	$result['dspam']['type'] = $received['result'];
182 182
 		$prob = NULL;
183 183
 		$conf = NULL;
184
-                if ( preg_match ('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/',$header,$received) != 1)
184
+                if (preg_match('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/', $header, $received) != 1)
185 185
                         $result['warn'][] = 'DSPAM Probability invalid, not present or present more than once.';
186 186
 		else
187 187
 			$prob = $received['prob'];
188
-		if ( preg_match ('/\r\nX\-DSPAM\-Confidence:\s(?P<conf>.*)\r\n/',$header,$received) != 1)
188
+		if (preg_match('/\r\nX\-DSPAM\-Confidence:\s(?P<conf>.*)\r\n/', $header, $received) != 1)
189 189
                         $result['warn'][] = 'DSPAM Confidence invalid, not present or present more than once.';
190 190
 		else
191 191
 			$conf = $received['conf'];
192
-		$result['dspam']['level'] = dspamLevel($prob,$conf);
192
+		$result['dspam']['level'] = dspamLevel($prob, $conf);
193 193
 	}
194
-	$received=NULL;
195
-	if ( preg_match ('/\r\nFrom:\s(?P<from>.*)\r\n/',$header,$received) != 1)
194
+	$received = NULL;
195
+	if (preg_match('/\r\nFrom:\s(?P<from>.*)\r\n/', $header, $received) != 1)
196 196
                 $result['warn'][] = 'From header invalid or not present';
197 197
         else
198 198
                 $result['from'] = $received['from'];
199 199
 
200
-        if ( preg_match ('/\r\nDate:\s(?P<date>.*)\r\n/',$header,$received) != 1)
200
+        if (preg_match('/\r\nDate:\s(?P<date>.*)\r\n/', $header, $received) != 1)
201 201
                 $result['warn'][] = 'Date header invalid or not present';
202 202
 	else
203 203
 		$result['date'] = $received['date'];
204 204
 
205
-	$received=NULL;
206
-        if ( preg_match ('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/',$header,$received) != 1)
205
+	$received = NULL;
206
+        if (preg_match('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/', $header, $received) != 1)
207 207
                 $result['warn'][] = 'Message-ID invalid, not present or present more than once.';
208 208
 	else
209
-		$result['messageid']=$received['mid'];
209
+		$result['messageid'] = $received['mid'];
210 210
 
211
-        $received=NULL;
211
+        $received = NULL;
212 212
 
213 213
         switch ($learn) {
214 214
 		case 'dspamc':
215
-        		if ( preg_match ('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/',$header,$received) != 1)
215
+        		if (preg_match('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/', $header, $received) != 1)
216 216
 				$result['warn'] = 'DSPAM Signature invalid, not present or present more than once.';
217 217
 			else
218
-				$result['dspam']['learn']=$received['sig'];			
218
+				$result['dspam']['learn'] = $received['sig'];			
219 219
 			break;
220 220
 		case false:
221 221
 			break;
222 222
 		default:
223
-			syslog (LOG_INFO,$user.': Error in "learn" imap configuration value. Please, set "dspamc" or "false".');
223
+			syslog(LOG_INFO, $user.': Error in "learn" imap configuration value. Please, set "dspamc" or "false".');
224 224
 	}
225 225
 	
226 226
         return $result;
@@ -229,7 +229,7 @@  discard block
 block discarded – undo
229 229
 
230 230
 
231 231
 
232
-function printTableHeader($title,$content,$footer=FALSE,$fcontent) {
232
+function printTableHeader($title, $content, $footer = FALSE, $fcontent) {
233 233
         print <<<END
234 234
 	<caption>$title</caption>
235 235
 	<thead>
@@ -237,21 +237,19 @@  discard block
 block discarded – undo
237 237
 END;
238 238
 	$kcontent = array_keys($content);
239 239
         $cols = count($kcontent);
240
-        for ($i=0; $i<$cols; $i++) {
240
+        for ($i = 0; $i<$cols; $i++) {
241 241
 		$key = $kcontent[$i];
242
-                printf ('<th colspan="%d" rowspan="%d">%s</th>',
243
-			!is_array($content[$key]) ?:
244
-			count(array_keys($content[$key])) ?: '1',
245
-			!is_array($content[$key]) ?:
246
-			empty(array_keys($content[$key])) ? '2' : '1',
242
+                printf('<th colspan="%d" rowspan="%d">%s</th>',
243
+			!is_array($content[$key]) ?: count(array_keys($content[$key])) ?: '1',
244
+			!is_array($content[$key]) ?: empty(array_keys($content[$key])) ? '2' : '1',
247 245
 			$kcontent[$i]);
248 246
 	}
249 247
 	print '</tr><tr>';
250
-	for ($i=0; $i<$cols; $i++) {
248
+	for ($i = 0; $i<$cols; $i++) {
251 249
 		$key = $kcontent[$i];
252
-		if (is_array($content[$key])&&($hs = array_keys($content[$key]))) {
250
+		if (is_array($content[$key]) && ($hs = array_keys($content[$key]))) {
253 251
 			foreach ($hs as $h)
254
-				printf('<th>%s</th>',$h);
252
+				printf('<th>%s</th>', $h);
255 253
 		}
256 254
 	}
257 255
 		
@@ -267,7 +265,7 @@  discard block
 block discarded – undo
267 265
 
268 266
 function formatVal($val, $learn) {
269 267
 	foreach (array_keys($val) as $key) {
270
-		if (is_array($val["$key"]) and ($key!='warn'))
268
+		if (is_array($val["$key"]) and ($key != 'warn'))
271 269
 			$val["$key"] = formatVal($val["$key"], $learn);
272 270
 		else {
273 271
 			switch ($key) {
@@ -275,7 +273,7 @@  discard block
 block discarded – undo
275 273
 					if (empty($val["$key"]))
276 274
 						$val["$key"] = '-';
277 275
 					else 
278
-						$val["$key"] = sprintf('<div title="%s">Y</div>',implode($val["$key"],"\n"));
276
+						$val["$key"] = sprintf('<div title="%s">Y</div>', implode($val["$key"], "\n"));
279 277
 					break;
280 278
 				case 'learn':
281 279
 					$val["$key"] = formLearn($learn, $val);
@@ -297,26 +295,26 @@  discard block
 block discarded – undo
297 295
 				$par['class'] = $class;
298 296
 				$val["$class"] = sprintf('dspamc --user dspam --deliver=summary --class=%s --source=error --signature=%s',
299 297
 							strtolower($class), $par['learn']);
300
-				if (($class != $par['type'])||($par['level']<99))
298
+				if (($class != $par['type']) || ($par['level']<99))
301 299
 					$return .= sprintf(file_get_contents('formLearnDSPAM.htm'),
302
-						$class,$class,$val["$class"],base64_encode(json_encode($par)),$class);
300
+						$class, $class, $val["$class"], base64_encode(json_encode($par)), $class);
303 301
 			}
304 302
 		default:
305 303
 			return $return;
306 304
 	}
307 305
 }
308 306
 
309
-function printTableRow($row, $learn, $init=true) {
307
+function printTableRow($row, $learn, $init = true) {
310 308
 	$color = 'inherit';
311 309
 	if ($init) 
312
-		$row=formatVal($row,$learn);
313
-	foreach( $row as $key => $val) {
310
+		$row = formatVal($row, $learn);
311
+	foreach ($row as $key => $val) {
314 312
 		if (is_array($val))
315 313
 			printTableRow($val, $learn, false);
316 314
 		else {
317 315
 			/* DSPAM format */
318 316
 			if (isset($row['type']))
319
-				switch($row['type']) {
317
+				switch ($row['type']) {
320 318
 					case 'Innocent':
321 319
 					case 'HAM':
322 320
 						$color = 'rgba(0,255,0, %.1f)';
@@ -327,7 +325,7 @@  discard block
 block discarded – undo
327 325
 			}
328 326
 			/* DMARC, DKIM, SPF format */
329 327
 			if (isset($row['result']))
330
-				switch($row['result']) {
328
+				switch ($row['result']) {
331 329
 					case 'pass':
332 330
 						$color = 'rgba(0,255,0, %.1f)';
333 331
 						break;
@@ -336,7 +334,7 @@  discard block
 block discarded – undo
336 334
 				}
337 335
 			/* Spamassassin format */
338 336
 			if (isset($row['status']))
339
-	                        switch($row['status']) {
337
+	                        switch ($row['status']) {
340 338
 					case 'No':
341 339
 						$color = 'rgba(0,255,0, %.1f)';
342 340
 						break;
@@ -344,9 +342,9 @@  discard block
 block discarded – undo
344 342
 						$color = 'rgba(255,0,0,%.1f)';
345 343
 				}	
346 344
 				
347
-			$alpha = (is_numeric($val)AND($key=='type')) ? round($val/100,1) : 1.0;
345
+			$alpha = (is_numeric($val) AND ($key == 'type')) ? round($val / 100, 1) : 1.0;
348 346
 			$bg = sprintf(" style=\"background-color: $color\"", $alpha);		
349
-			printf ('<td%s>%s</td>',$bg, $val);
347
+			printf('<td%s>%s</td>', $bg, $val);
350 348
 		}
351 349
 	}
352 350
 }
Please login to merge, or discard this patch.
Braces   +106 added lines, -72 removed lines patch added patch discarded remove patch
@@ -5,18 +5,21 @@  discard block
 block discarded – undo
5 5
 	$open='{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}';
6 6
         $m_mail = imap_open($open, $username, $cf['authpassword'], OP_READONLY)
7 7
                 or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
8
-        if ( !$m_mail ) exit(254);
8
+        if ( !$m_mail ) {
9
+        	exit(254);
10
+        }
9 11
 
10 12
 
11 13
         syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].'>; Listing folders of account <'.$username.'>...');
12 14
         //get all folder
13 15
 	$list = imap_list($m_mail, $open, "*");
14 16
 	imap_close($m_mail);
15
-	if (is_array($list))
16
-		foreach ($list as $mbox)
17
+	if (is_array($list)) {
18
+			foreach ($list as $mbox)
17 19
 			$return[] = explode($open,$mbox,2)[1];
18
-	else
19
-		syslog (LOG_INFO,$cf['user'] . ': imap_list failed: ' . imap_last_error() );
20
+	} else {
21
+			syslog (LOG_INFO,$cf['user'] . ': imap_list failed: ' . imap_last_error() );
22
+	}
20 23
 	return $return;
21 24
 }
22 25
 
@@ -24,7 +27,9 @@  discard block
 block discarded – undo
24 27
 	$head=array();
25 28
 	$m_mail = imap_open('{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}'.$folder, $username,$cf['authpassword'], OP_READONLY)
26 29
         	or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error());
27
-	if ( !$m_mail ) exit(254);
30
+	if ( !$m_mail ) {
31
+		exit(254);
32
+	}
28 33
 		
29 34
 
30 35
 	syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].">; Reading <$folder> messages of last ".$cf['oldestday'].' days on account <'.$username.'>...');
@@ -36,29 +41,36 @@  discard block
 block discarded – undo
36 41
 	// Order results starting from newest message
37 42
 	if ( empty($m_search) ) {
38 43
 		syslog (LOG_INFO,$cf['user'].": No suitable mail found in <$folder> folder.");
39
-	        if ( $ierr = imap_errors() )
40
-	                foreach ( $ierr as $thiserr )
44
+	        if ( $ierr = imap_errors() ) {
45
+	        	                foreach ( $ierr as $thiserr )
41 46
 	                        syslog (LOG_ERR, $cf['user'].": IMAP Error: $thiserr");
42
-	        if ( $ierr = imap_alerts() )
43
-	                foreach ( $ierr as $thiserr )
47
+	        }
48
+	        if ( $ierr = imap_alerts() ) {
49
+	        	                foreach ( $ierr as $thiserr )
44 50
 	                        syslog (LOG_ALERT, $cf['user'].": IMAP Alert: $thiserr");
51
+	        }
45 52
 		imap_close( $m_mail );
46 53
 		return FALSE;
47 54
 	}
48 55
 	$nmes = count ($m_search);
49 56
 	syslog (LOG_INFO,$cf['user'].": Found $nmes mail in <$folder> folder.");
50
-	if ($nmes>0) rsort($m_search);
57
+	if ($nmes>0) {
58
+		rsort($m_search);
59
+	}
51 60
 
52 61
         // loop for each message
53
-	foreach ($m_search as $onem) 
54
-		$head[] = imap_fetchheader($m_mail, $onem );
62
+	foreach ($m_search as $onem) {
63
+			$head[] = imap_fetchheader($m_mail, $onem );
64
+	}
55 65
 	imap_close($m_mail);
56 66
 	return $head;
57 67
 }
58 68
 
59 69
 function dspamLevel($prob, $conf) {
60 70
 /* Calculate DSPAM Level as the Spamassassin Plugin */
61
-	if (is_null($prob) or is_null($conf)) return '-';
71
+	if (is_null($prob) or is_null($conf)) {
72
+		return '-';
73
+	}
62 74
 	$t_prob = abs((($prob - 0.5) * 2) * 100);
63 75
 	return round(($t_prob + ($conf*100)) / 2);
64 76
 }
@@ -123,7 +135,9 @@  discard block
 block discarded – undo
123 135
 		}
124 136
         }
125 137
 	$received=NULL;
126
-	if ($k>1) $result['warn'][] = 'The trusted DMARC AR Headers are present more than once. Something wrong.';
138
+	if ($k>1) {
139
+		$result['warn'][] = 'The trusted DMARC AR Headers are present more than once. Something wrong.';
140
+	}
127 141
 
128 142
         if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)spf=(?<spf>\w+)\s+smtp\.(?:mailfrom|helo)=(?<SPFfrom>[\w\.]+)/m',$header,$received) ) {
129 143
 		$k=0;
@@ -139,7 +153,9 @@  discard block
 block discarded – undo
139 153
         	}
140 154
 	}
141 155
 	$received=NULL;
142
-	if ($k>1) $result['warn'][] = 'The trusted SPF AR Headers are present more than once. Something wrong.';
156
+	if ($k>1) {
157
+		$result['warn'][] = 'The trusted SPF AR Headers are present more than once. Something wrong.';
158
+	}
143 159
 
144 160
 	$k=0;
145 161
         if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dkim=(?<dkim>\w+)\s+[\w\s\(\)\-]+header\.d=(?<DKIMdom>[\w\.]+)/m',$header,$received) ) {
@@ -155,7 +171,9 @@  discard block
 block discarded – undo
155 171
         	}
156 172
 	}
157 173
 	$received=NULL;
158
-	if ($k>1) $result['warn'][] = 'The trusted DKIM AR Headers are present more than once. Something wrong.';
174
+	if ($k>1) {
175
+		$result['warn'][] = 'The trusted DKIM AR Headers are present more than once. Something wrong.';
176
+	}
159 177
 
160 178
 	if ($dpl) { /* Use Spamassassin Plugin */
161 179
 		if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*DSPAM_(?P<dtype>SPAM|HAM)_(?P<dlevel>\d\d)(?:.|\r\n\s+)*\]/m',$header,$received) ) {
@@ -165,57 +183,66 @@  discard block
 block discarded – undo
165 183
 			$result['dspam']['type'] = dspamType($received['dtype'][0]);
166 184
 			$result['dspam']['level'] =$received['dlevel'][0];
167 185
         	}
168
-        	if (count($received[0])>1) $result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.';
169
-	}
170
-	else { /* Parse apart all DSPAM Header and calculate a level */
186
+        	if (count($received[0])>1) {
187
+        		$result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.';
188
+        	}
189
+	} else { /* Parse apart all DSPAM Header and calculate a level */
171 190
 		if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*\]/m',$header,$received) ) {
172 191
                         $result['spam']['status']=$received['spamstatus'][0];
173 192
                         $result['spam']['score'] = $received['score'][0];
174 193
                         $result['spam']['th'] = $received['th'][0];
175
-			if (count($received[0])>1)
176
-				$result['warn'][]= 'The Spamassassin Headers are present more than once. I consider only the last one.';
194
+			if (count($received[0])>1) {
195
+							$result['warn'][]= 'The Spamassassin Headers are present more than once. I consider only the last one.';
196
+			}
177 197
 		}
178
-		if ( preg_match ('/\r\nX\-DSPAM\-Result:\s(?P<result>.*)\r\n/',$header,$received) != 1)
179
-	                $result['warn'] = 'DSPAM Result invalid, not present or present more than once.';
180
-	        else
181
-                	$result['dspam']['type']=$received['result'];
198
+		if ( preg_match ('/\r\nX\-DSPAM\-Result:\s(?P<result>.*)\r\n/',$header,$received) != 1) {
199
+			                $result['warn'] = 'DSPAM Result invalid, not present or present more than once.';
200
+		} else {
201
+	                        	$result['dspam']['type']=$received['result'];
202
+	        }
182 203
 		$prob = NULL;
183 204
 		$conf = NULL;
184
-                if ( preg_match ('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/',$header,$received) != 1)
185
-                        $result['warn'][] = 'DSPAM Probability invalid, not present or present more than once.';
186
-		else
187
-			$prob = $received['prob'];
188
-		if ( preg_match ('/\r\nX\-DSPAM\-Confidence:\s(?P<conf>.*)\r\n/',$header,$received) != 1)
189
-                        $result['warn'][] = 'DSPAM Confidence invalid, not present or present more than once.';
190
-		else
191
-			$conf = $received['conf'];
205
+                if ( preg_match ('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/',$header,$received) != 1) {
206
+                                        $result['warn'][] = 'DSPAM Probability invalid, not present or present more than once.';
207
+                } else {
208
+					$prob = $received['prob'];
209
+		}
210
+		if ( preg_match ('/\r\nX\-DSPAM\-Confidence:\s(?P<conf>.*)\r\n/',$header,$received) != 1) {
211
+		                        $result['warn'][] = 'DSPAM Confidence invalid, not present or present more than once.';
212
+		} else {
213
+					$conf = $received['conf'];
214
+		}
192 215
 		$result['dspam']['level'] = dspamLevel($prob,$conf);
193 216
 	}
194 217
 	$received=NULL;
195
-	if ( preg_match ('/\r\nFrom:\s(?P<from>.*)\r\n/',$header,$received) != 1)
196
-                $result['warn'][] = 'From header invalid or not present';
197
-        else
198
-                $result['from'] = $received['from'];
218
+	if ( preg_match ('/\r\nFrom:\s(?P<from>.*)\r\n/',$header,$received) != 1) {
219
+	                $result['warn'][] = 'From header invalid or not present';
220
+	} else {
221
+                        $result['from'] = $received['from'];
222
+        }
199 223
 
200
-        if ( preg_match ('/\r\nDate:\s(?P<date>.*)\r\n/',$header,$received) != 1)
201
-                $result['warn'][] = 'Date header invalid or not present';
202
-	else
203
-		$result['date'] = $received['date'];
224
+        if ( preg_match ('/\r\nDate:\s(?P<date>.*)\r\n/',$header,$received) != 1) {
225
+                        $result['warn'][] = 'Date header invalid or not present';
226
+        } else {
227
+			$result['date'] = $received['date'];
228
+	}
204 229
 
205 230
 	$received=NULL;
206
-        if ( preg_match ('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/',$header,$received) != 1)
207
-                $result['warn'][] = 'Message-ID invalid, not present or present more than once.';
208
-	else
209
-		$result['messageid']=$received['mid'];
231
+        if ( preg_match ('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/',$header,$received) != 1) {
232
+                        $result['warn'][] = 'Message-ID invalid, not present or present more than once.';
233
+        } else {
234
+			$result['messageid']=$received['mid'];
235
+	}
210 236
 
211 237
         $received=NULL;
212 238
 
213 239
         switch ($learn) {
214 240
 		case 'dspamc':
215
-        		if ( preg_match ('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/',$header,$received) != 1)
216
-				$result['warn'] = 'DSPAM Signature invalid, not present or present more than once.';
217
-			else
218
-				$result['dspam']['learn']=$received['sig'];			
241
+        		if ( preg_match ('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/',$header,$received) != 1) {
242
+        						$result['warn'] = 'DSPAM Signature invalid, not present or present more than once.';
243
+        		} else {
244
+							$result['dspam']['learn']=$received['sig'];
245
+			}
219 246
 			break;
220 247
 		case false:
221 248
 			break;
@@ -250,8 +277,9 @@  discard block
 block discarded – undo
250 277
 	for ($i=0; $i<$cols; $i++) {
251 278
 		$key = $kcontent[$i];
252 279
 		if (is_array($content[$key])&&($hs = array_keys($content[$key]))) {
253
-			foreach ($hs as $h)
254
-				printf('<th>%s</th>',$h);
280
+			foreach ($hs as $h) {
281
+							printf('<th>%s</th>',$h);
282
+			}
255 283
 		}
256 284
 	}
257 285
 		
@@ -267,15 +295,16 @@  discard block
 block discarded – undo
267 295
 
268 296
 function formatVal($val, $learn) {
269 297
 	foreach (array_keys($val) as $key) {
270
-		if (is_array($val["$key"]) and ($key!='warn'))
271
-			$val["$key"] = formatVal($val["$key"], $learn);
272
-		else {
298
+		if (is_array($val["$key"]) and ($key!='warn')) {
299
+					$val["$key"] = formatVal($val["$key"], $learn);
300
+		} else {
273 301
 			switch ($key) {
274 302
 				case 'warn':
275
-					if (empty($val["$key"]))
276
-						$val["$key"] = '-';
277
-					else 
278
-						$val["$key"] = sprintf('<div title="%s">Y</div>',implode($val["$key"],"\n"));
303
+					if (empty($val["$key"])) {
304
+											$val["$key"] = '-';
305
+					} else {
306
+											$val["$key"] = sprintf('<div title="%s">Y</div>',implode($val["$key"],"\n"));
307
+					}
279 308
 					break;
280 309
 				case 'learn':
281 310
 					$val["$key"] = formLearn($learn, $val);
@@ -297,9 +326,10 @@  discard block
 block discarded – undo
297 326
 				$par['class'] = $class;
298 327
 				$val["$class"] = sprintf('dspamc --user dspam --deliver=summary --class=%s --source=error --signature=%s',
299 328
 							strtolower($class), $par['learn']);
300
-				if (($class != $par['type'])||($par['level']<99))
301
-					$return .= sprintf(file_get_contents('formLearnDSPAM.htm'),
329
+				if (($class != $par['type'])||($par['level']<99)) {
330
+									$return .= sprintf(file_get_contents('formLearnDSPAM.htm'),
302 331
 						$class,$class,$val["$class"],base64_encode(json_encode($par)),$class);
332
+				}
303 333
 			}
304 334
 		default:
305 335
 			return $return;
@@ -308,37 +338,41 @@  discard block
 block discarded – undo
308 338
 
309 339
 function printTableRow($row, $learn, $init=true) {
310 340
 	$color = 'inherit';
311
-	if ($init) 
312
-		$row=formatVal($row,$learn);
341
+	if ($init) {
342
+			$row=formatVal($row,$learn);
343
+	}
313 344
 	foreach( $row as $key => $val) {
314
-		if (is_array($val))
315
-			printTableRow($val, $learn, false);
316
-		else {
345
+		if (is_array($val)) {
346
+					printTableRow($val, $learn, false);
347
+		} else {
317 348
 			/* DSPAM format */
318
-			if (isset($row['type']))
319
-				switch($row['type']) {
349
+			if (isset($row['type'])) {
350
+							switch($row['type']) {
320 351
 					case 'Innocent':
321 352
 					case 'HAM':
322 353
 						$color = 'rgba(0,255,0, %.1f)';
354
+			}
323 355
 						break;
324 356
 					case 'Spam':
325 357
 					case 'SPAM':
326 358
 						$color = 'rgba(255,0,0,%.1f)';
327 359
 			}
328 360
 			/* DMARC, DKIM, SPF format */
329
-			if (isset($row['result']))
330
-				switch($row['result']) {
361
+			if (isset($row['result'])) {
362
+							switch($row['result']) {
331 363
 					case 'pass':
332 364
 						$color = 'rgba(0,255,0, %.1f)';
365
+			}
333 366
 						break;
334 367
 					case 'fail':
335 368
 						$color = 'rgba(255,0,0,%.1f)';
336 369
 				}
337 370
 			/* Spamassassin format */
338
-			if (isset($row['status']))
339
-	                        switch($row['status']) {
371
+			if (isset($row['status'])) {
372
+				                        switch($row['status']) {
340 373
 					case 'No':
341 374
 						$color = 'rgba(0,255,0, %.1f)';
375
+			}
342 376
 						break;
343 377
 					case 'Yes':
344 378
 						$color = 'rgba(255,0,0,%.1f)';
Please login to merge, or discard this patch.