@@ -124,7 +124,9 @@ |
||
| 124 | 124 | |
| 125 | 125 | $cid = Filter::get('cid'); |
| 126 | 126 | $certificate = null; |
| 127 | - if(!empty($cid)) $certificate = Certificate::getInstance($cid, $WT_TREE, null, $this->provider); |
|
| 127 | + if(!empty($cid)) { |
|
| 128 | + $certificate = Certificate::getInstance($cid, $WT_TREE, null, $this->provider); |
|
| 129 | + } |
|
| 128 | 130 | |
| 129 | 131 | $imageBuilder = new ImageBuilder($certificate); |
| 130 | 132 | |
@@ -45,7 +45,9 @@ |
||
| 45 | 45 | * @return int Level of sources |
| 46 | 46 | * */ |
| 47 | 47 | function isMarriageSourced(){ |
| 48 | - if($this->is_marriage_sourced !== null) return $this->is_marriage_sourced; |
|
| 48 | + if($this->is_marriage_sourced !== null) { |
|
| 49 | + return $this->is_marriage_sourced; |
|
| 50 | + } |
|
| 49 | 51 | $this->is_marriage_sourced = $this->isFactSourced(WT_EVENTS_MARR.'|MARC'); |
| 50 | 52 | return $this->is_marriage_sourced; |
| 51 | 53 | } |
@@ -65,8 +65,7 @@ discard block |
||
| 65 | 65 | $ct2 = preg_match_all($pattern, $titlefact->getValue(), $match2); |
| 66 | 66 | if($ct2>0){ |
| 67 | 67 | $this->titles[$match2[1][0]][]= trim($match2[2][0]); |
| 68 | - } |
|
| 69 | - else{ |
|
| 68 | + } else{ |
|
| 70 | 69 | $this->titles[$titlefact->getValue()][]=''; |
| 71 | 70 | } |
| 72 | 71 | } |
@@ -98,8 +97,7 @@ discard block |
||
| 98 | 97 | if($bplace = $this->gedcomrecord->getBirthPlace()){ |
| 99 | 98 | if($perc){ |
| 100 | 99 | return array ($bplace, 1); |
| 101 | - } |
|
| 102 | - else{ |
|
| 100 | + } else{ |
|
| 103 | 101 | return $bplace; |
| 104 | 102 | } |
| 105 | 103 | } |
@@ -168,7 +166,9 @@ discard block |
||
| 168 | 166 | * @return int Level of sources |
| 169 | 167 | * */ |
| 170 | 168 | public function isBirthSourced(){ |
| 171 | - if($this->is_birth_sourced !== null) return $this->is_birth_sourced; |
|
| 169 | + if($this->is_birth_sourced !== null) { |
|
| 170 | + return $this->is_birth_sourced; |
|
| 171 | + } |
|
| 172 | 172 | $this->is_birth_sourced = $this->isFactSourced(WT_EVENTS_BIRT); |
| 173 | 173 | return $this->is_birth_sourced; |
| 174 | 174 | } |
@@ -179,7 +179,9 @@ discard block |
||
| 179 | 179 | * @return int Level of sources |
| 180 | 180 | * */ |
| 181 | 181 | public function isDeathSourced(){ |
| 182 | - if($this->is_death_sourced !== null) return $this->is_death_sourced; |
|
| 182 | + if($this->is_death_sourced !== null) { |
|
| 183 | + return $this->is_death_sourced; |
|
| 184 | + } |
|
| 183 | 185 | $this->is_death_sourced = $this->isFactSourced(WT_EVENTS_DEAT); |
| 184 | 186 | return $this->is_death_sourced; |
| 185 | 187 | } |
@@ -114,16 +114,18 @@ discard block |
||
| 114 | 114 | $len_chars = count($chars); |
| 115 | 115 | $token = ''; |
| 116 | 116 | |
| 117 | - for ($i = 0; $i < $length; $i++) |
|
| 118 | - $token .= $chars[ mt_rand(0, $len_chars - 1) ]; |
|
| 117 | + for ($i = 0; $i < $length; $i++) { |
|
| 118 | + $token .= $chars[ mt_rand(0, $len_chars - 1) ]; |
|
| 119 | + } |
|
| 119 | 120 | |
| 120 | 121 | # Number of 32 char chunks |
| 121 | 122 | $chunks = ceil( strlen($token) / 32 ); |
| 122 | 123 | $md5token = ''; |
| 123 | 124 | |
| 124 | 125 | # Run each chunk through md5 |
| 125 | - for ( $i=1; $i<=$chunks; $i++ ) |
|
| 126 | - $md5token .= md5( substr($token, $i * 32 - 32, 32) ); |
|
| 126 | + for ( $i=1; $i<=$chunks; $i++ ) { |
|
| 127 | + $md5token .= md5( substr($token, $i * 32 - 32, 32) ); |
|
| 128 | + } |
|
| 127 | 129 | |
| 128 | 130 | # Trim the token |
| 129 | 131 | return substr($md5token, 0, $length); |
@@ -146,12 +148,14 @@ discard block |
||
| 146 | 148 | * @return string Encrypted and encoded text |
| 147 | 149 | */ |
| 148 | 150 | public static function encryptToSafeBase64($data){ |
| 149 | - if(!self::isEncryptionCompatible()) |
|
| 150 | - throw new \Exception('MCrypt PHP extension is required to use encryption.'); |
|
| 151 | + if(!self::isEncryptionCompatible()) { |
|
| 152 | + throw new \Exception('MCrypt PHP extension is required to use encryption.'); |
|
| 153 | + } |
|
| 151 | 154 | |
| 152 | 155 | $key = 'STANDARDKEYIFNOSERVER'; |
| 153 | - if(!empty(Filter::server('SERVER_NAME')) && !empty(Filter::server('SERVER_SOFTWARE'))) |
|
| 154 | - $key = md5(Filter::server('SERVER_NAME').Filter::server('SERVER_SOFTWARE')); |
|
| 156 | + if(!empty(Filter::server('SERVER_NAME')) && !empty(Filter::server('SERVER_SOFTWARE'))) { |
|
| 157 | + $key = md5(Filter::server('SERVER_NAME').Filter::server('SERVER_SOFTWARE')); |
|
| 158 | + } |
|
| 155 | 159 | $iv = mcrypt_create_iv(self::ENCRYPTION_IV_SIZE, MCRYPT_RAND); |
| 156 | 160 | $id = mcrypt_encrypt(MCRYPT_RIJNDAEL_128, $key, $data, MCRYPT_MODE_CBC,$iv); |
| 157 | 161 | $encrypted = base64_encode($iv.$id); |
@@ -169,20 +173,24 @@ discard block |
||
| 169 | 173 | * @return string Decrypted text |
| 170 | 174 | */ |
| 171 | 175 | public static function decryptFromSafeBase64($encrypted){ |
| 172 | - if(!self::isEncryptionCompatible()) |
|
| 173 | - throw new \Exception('MCrypt PHP extension is required to use encryption.'); |
|
| 176 | + if(!self::isEncryptionCompatible()) { |
|
| 177 | + throw new \Exception('MCrypt PHP extension is required to use encryption.'); |
|
| 178 | + } |
|
| 174 | 179 | |
| 175 | 180 | $key = 'STANDARDKEYIFNOSERVER'; |
| 176 | - if(!empty(Filter::server('SERVER_NAME')) && !empty(Filter::server('SERVER_SOFTWARE'))) |
|
| 177 | - $key = md5(Filter::server('SERVER_NAME').Filter::server('SERVER_SOFTWARE')); |
|
| 181 | + if(!empty(Filter::server('SERVER_NAME')) && !empty(Filter::server('SERVER_SOFTWARE'))) { |
|
| 182 | + $key = md5(Filter::server('SERVER_NAME').Filter::server('SERVER_SOFTWARE')); |
|
| 183 | + } |
|
| 178 | 184 | $encrypted = str_replace('-', '+', $encrypted); |
| 179 | 185 | $encrypted = str_replace('_', '/', $encrypted); |
| 180 | 186 | $encrypted = str_replace('*', '=', $encrypted); |
| 181 | 187 | $encrypted = base64_decode($encrypted); |
| 182 | - if(!$encrypted) |
|
| 183 | - throw new \InvalidArgumentException('The encrypted value is not in correct base64 format.'); |
|
| 184 | - if(strlen($encrypted) < self::ENCRYPTION_IV_SIZE) |
|
| 185 | - throw new \InvalidArgumentException('The encrypted value does not contain enough characters for the key.'); |
|
| 188 | + if(!$encrypted) { |
|
| 189 | + throw new \InvalidArgumentException('The encrypted value is not in correct base64 format.'); |
|
| 190 | + } |
|
| 191 | + if(strlen($encrypted) < self::ENCRYPTION_IV_SIZE) { |
|
| 192 | + throw new \InvalidArgumentException('The encrypted value does not contain enough characters for the key.'); |
|
| 193 | + } |
|
| 186 | 194 | $iv_dec = substr($encrypted, 0, self::ENCRYPTION_IV_SIZE); |
| 187 | 195 | $encrypted = substr($encrypted, self::ENCRYPTION_IV_SIZE); |
| 188 | 196 | $decrypted = mcrypt_decrypt(MCRYPT_RIJNDAEL_128, $key, $encrypted, MCRYPT_MODE_CBC, $iv_dec); |
@@ -223,7 +231,9 @@ discard block |
||
| 223 | 231 | * @return boolean True if path valid |
| 224 | 232 | */ |
| 225 | 233 | public static function isValidPath($filename, $acceptfolder = FALSE) { |
| 226 | - if(strpbrk($filename, $acceptfolder ? '?%*:|"<>' : '\\/?%*:|"<>') === FALSE) return true; |
|
| 234 | + if(strpbrk($filename, $acceptfolder ? '?%*:|"<>' : '\\/?%*:|"<>') === FALSE) { |
|
| 235 | + return true; |
|
| 236 | + } |
|
| 227 | 237 | return false; |
| 228 | 238 | } |
| 229 | 239 | |
@@ -71,19 +71,16 @@ |
||
| 71 | 71 | if(method_exists($ctrl, $method)) { |
| 72 | 72 | try { |
| 73 | 73 | call_user_func_array(array($ctrl, $method), array()); |
| 74 | - } |
|
| 75 | - catch (MvcException $ex) { |
|
| 74 | + } catch (MvcException $ex) { |
|
| 76 | 75 | if(!headers_sent()) { |
| 77 | 76 | http_response_code($ex->getHttpCode()); |
| 78 | 77 | } |
| 79 | 78 | echo $ex->getMessage(); |
| 80 | 79 | } |
| 81 | - } |
|
| 82 | - else { |
|
| 80 | + } else { |
|
| 83 | 81 | throw new \Exception('The page requested does not exist'); |
| 84 | 82 | } |
| 85 | - } |
|
| 86 | - else { |
|
| 83 | + } else { |
|
| 87 | 84 | throw new \Exception('The page requested does not exist'); |
| 88 | 85 | } |
| 89 | 86 | } |
@@ -58,8 +58,9 @@ |
||
| 58 | 58 | * @throws InvalidArgumentException Thrown if not valid Http code |
| 59 | 59 | */ |
| 60 | 60 | public function setHttpCode($http_code) { |
| 61 | - if(!in_array($http_code, self::$VALID_HTTP)) |
|
| 62 | - throw new \InvalidArgumentException('Invalid HTTP code'); |
|
| 61 | + if(!in_array($http_code, self::$VALID_HTTP)) { |
|
| 62 | + throw new \InvalidArgumentException('Invalid HTTP code'); |
|
| 63 | + } |
|
| 63 | 64 | $this->http_code= $http_code; |
| 64 | 65 | } |
| 65 | 66 | |
@@ -68,8 +68,7 @@ |
||
| 68 | 68 | try { |
| 69 | 69 | Database::updateSchema(self::SCHEMA_MIGRATION_PREFIX, self::SCHEMA_SETTING_NAME, self::SCHEMA_TARGET_VERSION); |
| 70 | 70 | return true; |
| 71 | - } |
|
| 72 | - catch (\Exception $ex) { } |
|
| 71 | + } catch (\Exception $ex) { } |
|
| 73 | 72 | return false; |
| 74 | 73 | } |
| 75 | 74 | |
@@ -79,8 +79,7 @@ |
||
| 79 | 79 | Database::updateSchema(self::SCHEMA_MIGRATION_PREFIX, self::SCHEMA_SETTING_NAME, self::SCHEMA_TARGET_VERSION); |
| 80 | 80 | |
| 81 | 81 | return !is_null(Module::getModuleByName(Constants::MODULE_MAJ_SOSA_NAME)); |
| 82 | - } |
|
| 83 | - catch (\Exception $ex) { } |
|
| 82 | + } catch (\Exception $ex) { } |
|
| 84 | 83 | return false; |
| 85 | 84 | } |
| 86 | 85 | |
@@ -93,16 +93,14 @@ |
||
| 93 | 93 | if(is_int($key)) { |
| 94 | 94 | $hook_item = $value; |
| 95 | 95 | $priority = self::DEFAULT_PRIORITY; |
| 96 | - } |
|
| 97 | - else{ |
|
| 96 | + } else{ |
|
| 98 | 97 | $hook_item = explode('#', $key, 2); |
| 99 | 98 | $priority = $value; |
| 100 | 99 | } |
| 101 | 100 | if($hook_item && count($hook_item) == 2){ |
| 102 | 101 | $hook_func = $hook_item[0]; |
| 103 | 102 | $hook_cont = $hook_item[1]; |
| 104 | - } |
|
| 105 | - else{ |
|
| 103 | + } else{ |
|
| 106 | 104 | $hook_func = $hook_item[0]; |
| 107 | 105 | $hook_cont = 'all'; |
| 108 | 106 | } |