Passed
Branch — 3.1.3-preparation (56a0b7)
by Nils
12:02
created
pages/tasks.js.php 1 patch
Spacing   +7 added lines, -7 removed lines patch added patch discarded remove patch
@@ -73,7 +73,7 @@  discard block
 block discarded – undo
73 73
 if ($checkUserAccess->checkSession() === false || $checkUserAccess->userAccessPage('tasks') === false) {
74 74
     // Not allowed page
75 75
     $session->set('system-error_code', ERR_NOT_ALLOWED);
76
-    include $SETTINGS['cpassman_dir'] . '/error.php';
76
+    include $SETTINGS['cpassman_dir'].'/error.php';
77 77
     exit;
78 78
 }
79 79
 ?>
@@ -370,7 +370,7 @@  discard block
 block discarded – undo
370 370
                         // error
371 371
                         toastr.remove();
372 372
                         toastr.error(
373
-                            '<?php echo $lang->get('server_answer_error') . '<br />' . $lang->get('server_returned_data') . ':<br />'; ?>' + data.error,
373
+                            '<?php echo $lang->get('server_answer_error').'<br />'.$lang->get('server_returned_data').':<br />'; ?>' + data.error,
374 374
                             '', {
375 375
                                 closeButton: true,
376 376
                                 positionClass: 'toast-bottom-right'
@@ -393,11 +393,11 @@  discard block
 block discarded – undo
393 393
                         $('#'+field+'_parameter_value').val(frequency === null ? '' : frequency + ';' +value,);
394 394
                         param = value.split(';');
395 395
                         if (param.length === 1) {
396
-                            txt = ' <?php echo $lang->get('at');?> ' + param[0];
396
+                            txt = ' <?php echo $lang->get('at'); ?> ' + param[0];
397 397
                         } else {
398
-                            txt = ' <?php echo $lang->get('day');?> ' + param[1] + ' <?php echo $lang->get('at');?> ' + param[0];
398
+                            txt = ' <?php echo $lang->get('day'); ?> ' + param[1] + ' <?php echo $lang->get('at'); ?> ' + param[0];
399 399
                         }
400
-                        $('#'+field+'_parameter').val(frequency === null ? '<?php echo $lang->get('not_defined');?>' : (data.message + txt));
400
+                        $('#'+field+'_parameter').val(frequency === null ? '<?php echo $lang->get('not_defined'); ?>' : (data.message + txt));
401 401
                         $("#task-define-modal").modal('hide');
402 402
                         $('#task-define-modal-type, #task-define-modal-parameter-hourly-value, #task-define-modal-parameter-daily-value, #task-define-modal-frequency').val('');
403 403
                     }
@@ -503,7 +503,7 @@  discard block
 block discarded – undo
503 503
                         // error
504 504
                         toastr.remove();
505 505
                         toastr.error(
506
-                            '<?php echo $lang->get('server_answer_error') . '<br />' . $lang->get('server_returned_data') . ':<br />'; ?>' + data.error,
506
+                            '<?php echo $lang->get('server_answer_error').'<br />'.$lang->get('server_returned_data').':<br />'; ?>' + data.error,
507 507
                             '', {
508 508
                                 closeButton: true,
509 509
                                 positionClass: 'toast-bottom-right'
@@ -564,7 +564,7 @@  discard block
 block discarded – undo
564 564
                     // error
565 565
                     toastr.remove();
566 566
                     toastr.error(
567
-                        '<?php echo $lang->get('server_answer_error') . '<br />' . $lang->get('server_returned_data') . ':<br />'; ?>' + data.error,
567
+                        '<?php echo $lang->get('server_answer_error').'<br />'.$lang->get('server_returned_data').':<br />'; ?>' + data.error,
568 568
                         '', {
569 569
                             closeButton: true,
570 570
                             positionClass: 'toast-bottom-right'
Please login to merge, or discard this patch.
sources/ldap.queries.php 1 patch
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -80,7 +80,7 @@  discard block
 block discarded – undo
80 80
 ) {
81 81
     // Not allowed page
82 82
     $session->set('system-error_code', ERR_NOT_ALLOWED);
83
-    include $SETTINGS['cpassman_dir'] . '/error.php';
83
+    include $SETTINGS['cpassman_dir'].'/error.php';
84 84
     exit;
85 85
 }
86 86
 
@@ -154,7 +154,7 @@  discard block
 block discarded – undo
154 154
                     $openLdapExtra = new OpenLdapExtra();
155 155
                     break;
156 156
                 default:
157
-                    throw new Exception("Unsupported LDAP type: " . $SETTINGS['ldap_type']);
157
+                    throw new Exception("Unsupported LDAP type: ".$SETTINGS['ldap_type']);
158 158
             }
159 159
         } catch (Exception $e) {
160 160
             error_log('TEAMPASS Error - ldap - '.$e->getMessage());
@@ -171,7 +171,7 @@  discard block
 block discarded – undo
171 171
             // 2- Get user info from AD
172 172
             // We want to isolate attribute ldap_user_attribute or mostly samAccountName
173 173
             $userADInfos = $ldapConnection->query()
174
-                ->where((isset($SETTINGS['ldap_user_attribute']) ===true && empty($SETTINGS['ldap_user_attribute']) === false) ? $SETTINGS['ldap_user_attribute'] : 'samaccountname', '=', $post_username)
174
+                ->where((isset($SETTINGS['ldap_user_attribute']) === true && empty($SETTINGS['ldap_user_attribute']) === false) ? $SETTINGS['ldap_user_attribute'] : 'samaccountname', '=', $post_username)
175 175
                 ->firstOrFail();
176 176
 
177 177
             // Is user enabled? Only ActiveDirectory
@@ -192,7 +192,7 @@  discard block
 block discarded – undo
192 192
         } catch (\LdapRecord\Query\ObjectNotFoundException $e) {
193 193
             $error = $e->getDetailedError();
194 194
             if ($error) {
195
-                error_log('TEAMPASS Error - LDAP - '.$error->getErrorCode()." - ".$error->getErrorMessage(). " - ".$error->getDiagnosticMessage());
195
+                error_log('TEAMPASS Error - LDAP - '.$error->getErrorCode()." - ".$error->getErrorMessage()." - ".$error->getDiagnosticMessage());
196 196
             } else {
197 197
                 error_log('TEAMPASS Error - LDAP - Code: '.$e->getCode().' - Message: '.$e->getMessage());
198 198
             }
@@ -213,7 +213,7 @@  discard block
 block discarded – undo
213 213
             // For OpenLDAP and others, we use attribute dn
214 214
             $userAuthAttempt = $ldapConnection->auth()->attempt(
215 215
                 $SETTINGS['ldap_type'] === 'ActiveDirectory' ?
216
-                    $userADInfos['userprincipalname'][0] :  // refering to https://ldaprecord.com/docs/core/v2/authentication#basic-authentication
216
+                    $userADInfos['userprincipalname'][0] : // refering to https://ldaprecord.com/docs/core/v2/authentication#basic-authentication
217 217
                     $userADInfos['dn'],
218 218
                 $post_password
219 219
             );
@@ -232,7 +232,7 @@  discard block
 block discarded – undo
232 232
         } catch (\LdapRecord\Query\ObjectNotFoundException $e) {
233 233
             $error = $e->getDetailedError();
234 234
             if ($error) {
235
-                error_log('TEAMPASS Error - LDAP - '.$error->getErrorCode()." - ".$error->getErrorMessage(). " - ".$error->getDiagnosticMessage());
235
+                error_log('TEAMPASS Error - LDAP - '.$error->getErrorCode()." - ".$error->getErrorMessage()." - ".$error->getDiagnosticMessage());
236 236
             } else {
237 237
                 error_log('TEAMPASS Error - LDAP - Code: '.$e->getCode().' - Message: '.$e->getMessage());
238 238
             }
Please login to merge, or discard this patch.
pages/profile.js.php 1 patch
Spacing   +15 added lines, -15 removed lines patch added patch discarded remove patch
@@ -73,7 +73,7 @@  discard block
 block discarded – undo
73 73
 if ($checkUserAccess->checkSession() === false || $checkUserAccess->userAccessPage('profile') === false) {
74 74
     // Not allowed page
75 75
     $session->set('system-error_code', ERR_NOT_ALLOWED);
76
-    include $SETTINGS['cpassman_dir'] . '/error.php';
76
+    include $SETTINGS['cpassman_dir'].'/error.php';
77 77
     exit;
78 78
 }
79 79
 ?>
@@ -97,7 +97,7 @@  discard block
 block discarded – undo
97 97
     })
98 98
 
99 99
     // Select user properties
100
-    $('#profile-user-language option[value=<?php echo $session->get('user-language');?>').attr('selected','selected');
100
+    $('#profile-user-language option[value=<?php echo $session->get('user-language'); ?>').attr('selected','selected');
101 101
 
102 102
 
103 103
     // AVATAR IMPORT
@@ -297,7 +297,7 @@  discard block
 block discarded – undo
297 297
                     console.log(store.get('teampassUser'));
298 298
 
299 299
                     // reload page in case of language change
300
-                    if ($('#profile-user-language').val().toLowerCase() !== '<?php echo $session->get('user-language');?>') {
300
+                    if ($('#profile-user-language').val().toLowerCase() !== '<?php echo $session->get('user-language'); ?>') {
301 301
                         // prepare reload
302 302
                         $(this).delay(3000).queue(function() {
303 303
                             document.location.href = "index.php?page=profile";
@@ -308,7 +308,7 @@  discard block
 block discarded – undo
308 308
                         // Inform user
309 309
                         toastr.remove();
310 310
                         toastr.info(
311
-                            '<?php echo $lang->get('alert_page_will_reload') . ' ... ' . $lang->get('please_wait'); ?>',
311
+                            '<?php echo $lang->get('alert_page_will_reload').' ... '.$lang->get('please_wait'); ?>',
312 312
                             '', {
313 313
                                 timeOut: 3000,
314 314
                                 progressBar: true
@@ -412,27 +412,27 @@  discard block
 block discarded – undo
412 412
         "defaultText": "<?php echo $lang->get('index_pw_level_txt'); ?>",
413 413
         "ratings": [
414 414
             {
415
-                "minScore": <?php echo TP_PW_STRENGTH_1;?>,
415
+                "minScore": <?php echo TP_PW_STRENGTH_1; ?>,
416 416
                 "className": "meterWarn",
417 417
                 "text": "<?php echo $lang->get('complex_level1'); ?>"
418 418
             },
419 419
             {
420
-                "minScore": <?php echo TP_PW_STRENGTH_2;?>,
420
+                "minScore": <?php echo TP_PW_STRENGTH_2; ?>,
421 421
                 "className": "meterWarn",
422 422
                 "text": "<?php echo $lang->get('complex_level2'); ?>"
423 423
             },
424 424
             {
425
-                "minScore": <?php echo TP_PW_STRENGTH_3;?>,
425
+                "minScore": <?php echo TP_PW_STRENGTH_3; ?>,
426 426
                 "className": "meterGood",
427 427
                 "text": "<?php echo $lang->get('complex_level3'); ?>"
428 428
             },
429 429
             {
430
-                "minScore": <?php echo TP_PW_STRENGTH_4;?>,
430
+                "minScore": <?php echo TP_PW_STRENGTH_4; ?>,
431 431
                 "className": "meterGood",
432 432
                 "text": "<?php echo $lang->get('complex_level4'); ?>"
433 433
             },
434 434
             {
435
-                "minScore": <?php echo TP_PW_STRENGTH_5;?>,
435
+                "minScore": <?php echo TP_PW_STRENGTH_5; ?>,
436 436
                 "className": "meterExcel",
437 437
                 "text": "<?php echo $lang->get('complex_level5'); ?>"
438 438
             }
@@ -525,27 +525,27 @@  discard block
 block discarded – undo
525 525
         "defaultText": "<?php echo $lang->get('index_pw_level_txt'); ?>",
526 526
         "ratings": [
527 527
             {
528
-                "minScore": <?php echo TP_PW_STRENGTH_1;?>,
528
+                "minScore": <?php echo TP_PW_STRENGTH_1; ?>,
529 529
                 "className": "meterWarn",
530 530
                 "text": "<?php echo $lang->get('complex_level1'); ?>"
531 531
             },
532 532
             {
533
-                "minScore": <?php echo TP_PW_STRENGTH_2;?>,
533
+                "minScore": <?php echo TP_PW_STRENGTH_2; ?>,
534 534
                 "className": "meterWarn",
535 535
                 "text": "<?php echo $lang->get('complex_level2'); ?>"
536 536
             },
537 537
             {
538
-                "minScore": <?php echo TP_PW_STRENGTH_3;?>,
538
+                "minScore": <?php echo TP_PW_STRENGTH_3; ?>,
539 539
                 "className": "meterGood",
540 540
                 "text": "<?php echo $lang->get('complex_level3'); ?>"
541 541
             },
542 542
             {
543
-                "minScore": <?php echo TP_PW_STRENGTH_4;?>,
543
+                "minScore": <?php echo TP_PW_STRENGTH_4; ?>,
544 544
                 "className": "meterGood",
545 545
                 "text": "<?php echo $lang->get('complex_level4'); ?>"
546 546
             },
547 547
             {
548
-                "minScore": <?php echo TP_PW_STRENGTH_5;?>,
548
+                "minScore": <?php echo TP_PW_STRENGTH_5; ?>,
549 549
                 "className": "meterExcel",
550 550
                 "text": "<?php echo $lang->get('complex_level5'); ?>"
551 551
             }
@@ -561,7 +561,7 @@  discard block
 block discarded – undo
561 561
         }
562 562
     });
563 563
 
564
-    $('#profile-keys_download-date').text('<?php echo null === $session->get('user-keys_recovery_time') ? $lang->get('none') : date($SETTINGS['date_format'] . ' ' . $SETTINGS['time_format'], (int) $session->get('user-keys_recovery_time')); ?>');
564
+    $('#profile-keys_download-date').text('<?php echo null === $session->get('user-keys_recovery_time') ? $lang->get('none') : date($SETTINGS['date_format'].' '.$SETTINGS['time_format'], (int) $session->get('user-keys_recovery_time')); ?>');
565 565
 
566 566
     $("#open-dialog-keys-download").on('click', function(event) {
567 567
         event.preventDefault();
Please login to merge, or discard this patch.
sources/identify.php 2 patches
Spacing   +48 added lines, -48 removed lines patch added patch discarded remove patch
@@ -123,7 +123,7 @@  discard block
 block discarded – undo
123 123
      * @param array $SETTINGS
124 124
      * @return bool|string
125 125
      */
126
-    function handleAuthAttempts($post_data, $SETTINGS): bool|string
126
+    function handleAuthAttempts($post_data, $SETTINGS): bool | string
127 127
     {
128 128
         $session = SessionManager::getSession();
129 129
         $lang = new Language($session->get('user-language') ?? 'english');
@@ -297,7 +297,7 @@  discard block
 block discarded – undo
297 297
     $sessionPwdAttempts = $session->get('pwd_attempts');
298 298
     $sessionUrl = $session->get('user-initial_url');
299 299
     $server = [];
300
-    $server['PHP_AUTH_USER'] =  $request->getUser();
300
+    $server['PHP_AUTH_USER'] = $request->getUser();
301 301
     $server['PHP_AUTH_PW'] = $request->getPassword();
302 302
     
303 303
     // decrypt and retreive data in JSON format
@@ -312,18 +312,18 @@  discard block
 block discarded – undo
312 312
     }
313 313
 
314 314
     // Check if Duo auth is in progress and pass the pw and login back to the standard login process
315
-    if(
315
+    if (
316 316
         isKeyExistingAndEqual('duo', 1, $SETTINGS) === true
317 317
         && $dataReceived['user_2fa_selection'] === 'duo'
318 318
         && $session->get('user-duo_status') === 'IN_PROGRESS'
319 319
         && !empty($dataReceived['duo_state'])
320
-    ){
320
+    ) {
321 321
         $key = hash('sha256', $dataReceived['duo_state']);
322 322
         $iv = substr(hash('sha256', $dataReceived['duo_state']), 0, 16);
323 323
         $duo_data_dec = openssl_decrypt(base64_decode($session->get('user-duo_data')), 'AES-256-CBC', $key, 0, $iv);
324 324
         // Clear the data from the Duo process to continue clean with the standard login process
325
-        $session->set('user-duo_data','');
326
-        if($duo_data_dec === false){
325
+        $session->set('user-duo_data', '');
326
+        if ($duo_data_dec === false) {
327 327
             echo prepareExchangedData(
328 328
                 [
329 329
                     'error' => true,
@@ -338,7 +338,7 @@  discard block
 block discarded – undo
338 338
         $dataReceived['login'] = $duo_data['duo_login'];
339 339
     }
340 340
 
341
-    if(isset($dataReceived['pw']) === false || isset($dataReceived['login']) === false) {
341
+    if (isset($dataReceived['pw']) === false || isset($dataReceived['login']) === false) {
342 342
         echo json_encode([
343 343
             'data' => prepareExchangedData(
344 344
                 [
@@ -647,7 +647,7 @@  discard block
 block discarded – undo
647 647
         }
648 648
         // Append with roles from AD groups
649 649
         if (is_null($userInfo['roles_from_ad_groups']) === false) {
650
-            $userInfo['fonction_id'] = empty($userInfo['fonction_id'])  === true ? $userInfo['roles_from_ad_groups'] : $userInfo['fonction_id']. ';' . $userInfo['roles_from_ad_groups'];
650
+            $userInfo['fonction_id'] = empty($userInfo['fonction_id']) === true ? $userInfo['roles_from_ad_groups'] : $userInfo['fonction_id'].';'.$userInfo['roles_from_ad_groups'];
651 651
         }
652 652
         // store
653 653
         $session->set('user-roles', $userInfo['fonction_id']);
@@ -659,7 +659,7 @@  discard block
 block discarded – undo
659 659
         if (count($session->get('user-roles_array')) > 0) {
660 660
             $rolesList = DB::query(
661 661
                 'SELECT id, title, complexity
662
-                FROM ' . prefixTable('roles_title') . '
662
+                FROM ' . prefixTable('roles_title').'
663 663
                 WHERE id IN %li',
664 664
                 $session->get('user-roles_array')
665 665
             );
@@ -705,7 +705,7 @@  discard block
 block discarded – undo
705 705
             if ($adjustPermissions) {
706 706
                 $session->set('user-admin', (int) $userInfo['admin']);
707 707
                 $session->set('user-manager', (int) $userInfo['gestionnaire']);
708
-                $session->set('user-can_manage_all_users',(int)  $userInfo['can_manage_all_users']);
708
+                $session->set('user-can_manage_all_users', (int) $userInfo['can_manage_all_users']);
709 709
                 $session->set('user-read_only', (int) $userInfo['read_only']);
710 710
                 DB::update(
711 711
                     prefixTable('users'),
@@ -777,10 +777,10 @@  discard block
 block discarded – undo
777 777
         $session->set('user-latest_items_tab', []);
778 778
         $session->set('user-nb_roles', 0);
779 779
         foreach ($session->get('user-latest_items') as $item) {
780
-            if (! empty($item)) {
780
+            if (!empty($item)) {
781 781
                 $dataLastItems = DB::queryFirstRow(
782 782
                     'SELECT id,label,id_tree
783
-                    FROM ' . prefixTable('items') . '
783
+                    FROM ' . prefixTable('items').'
784 784
                     WHERE id=%i',
785 785
                     $item
786 786
                 );
@@ -789,7 +789,7 @@  discard block
 block discarded – undo
789 789
                     [
790 790
                         'id' => $item,
791 791
                         'label' => $dataLastItems['label'],
792
-                        'url' => 'index.php?page=items&amp;group=' . $dataLastItems['id_tree'] . '&amp;id=' . $item,
792
+                        'url' => 'index.php?page=items&amp;group='.$dataLastItems['id_tree'].'&amp;id='.$item,
793 793
                     ],
794 794
                     'add'
795 795
                 );
@@ -799,7 +799,7 @@  discard block
 block discarded – undo
799 799
         // Get cahce tree info
800 800
         $cacheTreeData = DB::queryFirstRow(
801 801
             'SELECT visible_folders
802
-            FROM ' . prefixTable('cache_tree') . '
802
+            FROM ' . prefixTable('cache_tree').'
803 803
             WHERE user_id=%i',
804 804
             (int) $session->get('user-id')
805 805
         );
@@ -831,7 +831,7 @@  discard block
 block discarded – undo
831 831
             && (int) $sessionAdmin !== 1
832 832
         ) {
833 833
             // get all Admin users
834
-            $val = DB::queryfirstrow('SELECT email FROM ' . prefixTable('users') . " WHERE admin = %i and email != ''", 1);
834
+            $val = DB::queryfirstrow('SELECT email FROM '.prefixTable('users')." WHERE admin = %i and email != ''", 1);
835 835
             if (DB::count() > 0) {
836 836
                 // Add email to table
837 837
                 prepareSendingEmail(
@@ -843,7 +843,7 @@  discard block
 block discarded – undo
843 843
                             '#tp_time#',
844 844
                         ],
845 845
                         [
846
-                            ' ' . $session->get('user-login') . ' (IP: ' . getClientIpServer() . ')',
846
+                            ' '.$session->get('user-login').' (IP: '.getClientIpServer().')',
847 847
                             date($SETTINGS['date_format'], (int) $session->get('user-last_connection')),
848 848
                             date($SETTINGS['time_format'], (int) $session->get('user-last_connection')),
849 849
                         ],
@@ -991,7 +991,7 @@  discard block
 block discarded – undo
991 991
 {
992 992
     $rows = DB::query(
993 993
         'SELECT date
994
-        FROM ' . prefixTable('log_system') . "
994
+        FROM ' . prefixTable('log_system')."
995 995
         WHERE field_1 = %s
996 996
         AND type = 'failed_auth'
997 997
         AND label = 'password_is_not_correct'
@@ -1005,7 +1005,7 @@  discard block
 block discarded – undo
1005 1005
         foreach ($rows as $record) {
1006 1006
             array_push(
1007 1007
                 $arrAttempts,
1008
-                date($SETTINGS['date_format'] . ' ' . $SETTINGS['time_format'], (int) $record['date'])
1008
+                date($SETTINGS['date_format'].' '.$SETTINGS['time_format'], (int) $record['date'])
1009 1009
             );
1010 1010
         }
1011 1011
     }
@@ -1059,7 +1059,7 @@  discard block
 block discarded – undo
1059 1059
     $ldapConnection
1060 1060
 ) : bool
1061 1061
 {
1062
-    include_once $SETTINGS['cpassman_dir'] . '/sources/main.functions.php';
1062
+    include_once $SETTINGS['cpassman_dir'].'/sources/main.functions.php';
1063 1063
 
1064 1064
     if ((int) $userInfoDisabled === 1) {
1065 1065
         return false;
@@ -1268,7 +1268,7 @@  discard block
 block discarded – undo
1268 1268
                 $openLdapExtra = new OpenLdapExtra();
1269 1269
                 break;
1270 1270
             default:
1271
-                throw new Exception("Unsupported LDAP type: " . $SETTINGS['ldap_type']);
1271
+                throw new Exception("Unsupported LDAP type: ".$SETTINGS['ldap_type']);
1272 1272
         }
1273 1273
     } catch (Exception $e) {
1274 1274
         return [
@@ -1281,7 +1281,7 @@  discard block
 block discarded – undo
1281 1281
         // 2- Get user info from AD
1282 1282
         // We want to isolate attribute ldap_user_attribute or mostly samAccountName
1283 1283
         $userADInfos = $ldapConnection->query()
1284
-            ->where((isset($SETTINGS['ldap_user_attribute']) ===true && empty($SETTINGS['ldap_user_attribute']) === false) ? $SETTINGS['ldap_user_attribute'] : 'samaccountname', '=', $username)
1284
+            ->where((isset($SETTINGS['ldap_user_attribute']) === true && empty($SETTINGS['ldap_user_attribute']) === false) ? $SETTINGS['ldap_user_attribute'] : 'samaccountname', '=', $username)
1285 1285
             ->firstOrFail();
1286 1286
 
1287 1287
         // Is user enabled? Only ActiveDirectory
@@ -1299,7 +1299,7 @@  discard block
 block discarded – undo
1299 1299
         // For OpenLDAP and others, we use attribute dn
1300 1300
         $userAuthAttempt = $ldapConnection->auth()->attempt(
1301 1301
             $SETTINGS['ldap_type'] === 'ActiveDirectory' ?
1302
-                $userADInfos['userprincipalname'][0] :  // refering to https://ldaprecord.com/docs/core/v2/authentication#basic-authentication
1302
+                $userADInfos['userprincipalname'][0] : // refering to https://ldaprecord.com/docs/core/v2/authentication#basic-authentication
1303 1303
                 $userADInfos['dn'],
1304 1304
             $passwordClear
1305 1305
         );
@@ -1382,7 +1382,7 @@  discard block
 block discarded – undo
1382 1382
         // error
1383 1383
         return [
1384 1384
             'error' => true,
1385
-            'message' => "Error: Unsupported LDAP type: " . $SETTINGS['ldap_type'],
1385
+            'message' => "Error: Unsupported LDAP type: ".$SETTINGS['ldap_type'],
1386 1386
         ];
1387 1387
     }
1388 1388
     
@@ -1417,12 +1417,12 @@  discard block
 block discarded – undo
1417 1417
     if (isset($SETTINGS['enable_ad_users_with_ad_groups']) === true && (int) $SETTINGS['enable_ad_users_with_ad_groups'] === 1) {
1418 1418
         // Get user groups from AD
1419 1419
         $user_ad_groups = [];
1420
-        foreach($groups as $group) {
1420
+        foreach ($groups as $group) {
1421 1421
             //print_r($group);
1422 1422
             // get relation role id for AD group
1423 1423
             $role = DB::queryFirstRow(
1424 1424
                 'SELECT lgr.role_id
1425
-                FROM ' . prefixTable('ldap_groups_roles') . ' AS lgr
1425
+                FROM ' . prefixTable('ldap_groups_roles').' AS lgr
1426 1426
                 WHERE lgr.ldap_group_id = %s',
1427 1427
                 $group
1428 1428
             );
@@ -1516,7 +1516,7 @@  discard block
 block discarded – undo
1516 1516
             $userInfo['id']
1517 1517
         );
1518 1518
     }
1519
-    if (WIP === true) error_log("finalizeAuthentication - hashedPassword: " . $hashedPassword. " | ".$passwordManager->verifyPassword($userInfo['pw'], $passwordClear)." || ".$passwordClear);
1519
+    if (WIP === true) error_log("finalizeAuthentication - hashedPassword: ".$hashedPassword." | ".$passwordManager->verifyPassword($userInfo['pw'], $passwordClear)." || ".$passwordClear);
1520 1520
 }
1521 1521
 
1522 1522
 /**
@@ -1568,7 +1568,7 @@  discard block
 block discarded – undo
1568 1568
     }
1569 1569
 
1570 1570
     // Now check yubico validity
1571
-    include_once $SETTINGS['cpassman_dir'] . '/includes/libraries/Authentication/Yubico/Yubico.php';
1571
+    include_once $SETTINGS['cpassman_dir'].'/includes/libraries/Authentication/Yubico/Yubico.php';
1572 1572
     $yubi = new Auth_Yubico($yubico_user_id, $yubico_user_key);
1573 1573
     $auth = $yubi->verify($yubico_key);
1574 1574
     //, null, null, null, 60
@@ -1627,7 +1627,7 @@  discard block
 block discarded – undo
1627 1627
             // Check if exists in DB
1628 1628
             $groupData = DB::queryFirstRow(
1629 1629
                 'SELECT id
1630
-                FROM ' . prefixTable('roles_title') . '
1630
+                FROM ' . prefixTable('roles_title').'
1631 1631
                 WHERE title = %s',
1632 1632
                 $group["displayName"]
1633 1633
             );
@@ -1756,7 +1756,7 @@  discard block
 block discarded – undo
1756 1756
             
1757 1757
             // generate new QR
1758 1758
             $new_2fa_qr = $tfa->getQRCodeImageAsDataUri(
1759
-                'Teampass - ' . $username,
1759
+                'Teampass - '.$username,
1760 1760
                 $userInfo['ga']
1761 1761
             );
1762 1762
             // clear temporary code from DB
@@ -1769,7 +1769,7 @@  discard block
 block discarded – undo
1769 1769
                 $userInfo['id']
1770 1770
             );
1771 1771
             $firstTime = [
1772
-                'value' => '<img src="' . $new_2fa_qr . '">',
1772
+                'value' => '<img src="'.$new_2fa_qr.'">',
1773 1773
                 'user_admin' => isset($sessionAdmin) ? (int) $sessionAdmin : '',
1774 1774
                 'initial_url' => isset($sessionUrl) === true ? $sessionUrl : '',
1775 1775
                 'pwd_attempts' => (int) $sessionPwdAttempts,
@@ -1925,7 +1925,7 @@  discard block
 block discarded – undo
1925 1925
         }*/
1926 1926
         return [
1927 1927
             'error' => true,
1928
-            'message' => $duo_error . $lang->get('duo_error_check_config'),
1928
+            'message' => $duo_error.$lang->get('duo_error_check_config'),
1929 1929
             'pwd_attempts' => (int) $sessionPwdAttempts,
1930 1930
             'debug_message' => $e->getMessage(),
1931 1931
             'proceedIdentification' => false,
@@ -1941,7 +1941,7 @@  discard block
 block discarded – undo
1941 1941
         } catch (DuoException $e) {
1942 1942
             return [
1943 1943
                 'error' => true,
1944
-                'message' => $duo_error . $lang->get('duo_error_url'),
1944
+                'message' => $duo_error.$lang->get('duo_error_url'),
1945 1945
                 'pwd_attempts' => (int) $sessionPwdAttempts,
1946 1946
                 'debug_message' => $e->getMessage(),
1947 1947
                 'proceedIdentification' => false,
@@ -1949,7 +1949,7 @@  discard block
 block discarded – undo
1949 1949
         }
1950 1950
         
1951 1951
         // Somethimes Duo return success but fail to return a URL, double check if the URL has been created
1952
-        if (!empty($duo_redirect_url) && isset($duo_redirect_url) && filter_var($duo_redirect_url,FILTER_SANITIZE_URL)) {
1952
+        if (!empty($duo_redirect_url) && isset($duo_redirect_url) && filter_var($duo_redirect_url, FILTER_SANITIZE_URL)) {
1953 1953
             // Since Duo Universal requires a redirect, let's store some info when the user get's back after completing the Duo prompt
1954 1954
             $key = hash('sha256', $duo_state);
1955 1955
             $iv = substr(hash('sha256', $duo_state), 0, 16);
@@ -1977,7 +1977,7 @@  discard block
 block discarded – undo
1977 1977
         } else {
1978 1978
             return [
1979 1979
                 'error' => true,
1980
-                'message' => $duo_error . $lang->get('duo_error_url'),
1980
+                'message' => $duo_error.$lang->get('duo_error_url'),
1981 1981
                 'pwd_attempts' => (int) $sessionPwdAttempts,
1982 1982
                 'proceedIdentification' => false,
1983 1983
             ];
@@ -1998,8 +1998,8 @@  discard block
 block discarded – undo
1998 1998
         // return the response (which should be the user name)
1999 1999
         if ($decoded_token['preferred_username'] === $username) {
2000 2000
             $session->set('user-duo_status', 'COMPLET');
2001
-            $session->set('user-duo_state','');
2002
-            $session->set('user-duo_data','');
2001
+            $session->set('user-duo_state', '');
2002
+            $session->set('user-duo_data', '');
2003 2003
             $session->set('user-login', $username);
2004 2004
 
2005 2005
             return [
@@ -2010,9 +2010,9 @@  discard block
 block discarded – undo
2010 2010
             ];
2011 2011
         } else {
2012 2012
             // Something wrong, username from the original Duo request is different than the one received now
2013
-            $session->set('user-duo_status','');
2014
-            $session->set('user-duo_state','');
2015
-            $session->set('user-duo_data','');
2013
+            $session->set('user-duo_status', '');
2014
+            $session->set('user-duo_state', '');
2015
+            $session->set('user-duo_data', '');
2016 2016
 
2017 2017
             return [
2018 2018
                 'error' => true,
@@ -2023,9 +2023,9 @@  discard block
 block discarded – undo
2023 2023
         }
2024 2024
     }
2025 2025
     // If we are here something wrong
2026
-    $session->set('user-duo_status','');
2027
-    $session->set('user-duo_state','');
2028
-    $session->set('user-duo_data','');
2026
+    $session->set('user-duo_status', '');
2027
+    $session->set('user-duo_state', '');
2028
+    $session->set('user-duo_data', '');
2029 2029
     return [
2030 2030
         'error' => true,
2031 2031
         'message' => $lang->get('duo_login_mismatch'),
@@ -2141,8 +2141,8 @@  discard block
 block discarded – undo
2141 2141
         // Get user info from DB
2142 2142
         $data = DB::queryFirstRow(
2143 2143
             'SELECT u.*, a.value AS api_key
2144
-            FROM ' . prefixTable('users') . ' AS u
2145
-            LEFT JOIN ' . prefixTable('api') . ' AS a ON (u.id = a.user_id)
2144
+            FROM ' . prefixTable('users').' AS u
2145
+            LEFT JOIN ' . prefixTable('api').' AS a ON (u.id = a.user_id)
2146 2146
             WHERE login = %s AND deleted_at IS NULL',
2147 2147
             $login
2148 2148
         );
@@ -2578,15 +2578,15 @@  discard block
 block discarded – undo
2578 2578
 
2579 2579
             if ($ret['error'] !== false) {
2580 2580
                 logEvents($SETTINGS, 'failed_auth', 'bad_duo_mfa', '', stripslashes($username), stripslashes($username));
2581
-                $session->set('user-duo_status','');
2582
-                $session->set('user-duo_state','');
2583
-                $session->set('user-duo_data','');
2581
+                $session->set('user-duo_status', '');
2582
+                $session->set('user-duo_state', '');
2583
+                $session->set('user-duo_data', '');
2584 2584
                 return [
2585 2585
                     'error' => true,
2586 2586
                     'mfaData' => $ret,
2587 2587
                     'mfaQRCodeInfos' => false,
2588 2588
                 ];
2589
-            } else if ($ret['duo_url_ready'] === true){
2589
+            } else if ($ret['duo_url_ready'] === true) {
2590 2590
                 return [
2591 2591
                     'error' => false,
2592 2592
                     'mfaData' => $ret,
Please login to merge, or discard this patch.
Braces   +4 added lines, -2 removed lines patch added patch discarded remove patch
@@ -1457,8 +1457,10 @@
 block discarded – undo
1457 1457
             $userInfo['id']
1458 1458
         );
1459 1459
     }
1460
-    if (WIP === true) error_log("finalizeAuthentication - hashedPassword: " . $hashedPassword. " | ".$passwordManager->verifyPassword($userInfo['pw'], $passwordClear)." || ".$passwordClear);
1461
-}
1460
+    if (WIP === true) {
1461
+        error_log("finalizeAuthentication - hashedPassword: " . $hashedPassword. " | ".$passwordManager->verifyPassword($userInfo['pw'], $passwordClear)." || ".$passwordClear);
1462
+    }
1463
+    }
1462 1464
 
1463 1465
 /**
1464 1466
  * Undocumented function.
Please login to merge, or discard this patch.
includes/core/login.php 2 patches
Spacing   +40 added lines, -41 removed lines patch added patch discarded remove patch
@@ -48,7 +48,7 @@  discard block
 block discarded – undo
48 48
 $postType = $request->query->get('post_type', '');
49 49
 $postType = filter_var($postType, FILTER_SANITIZE_SPECIAL_CHARS);
50 50
 $get['post_type'] = $postType;
51
-if (isset($SETTINGS['duo']) === true && (int) $SETTINGS['duo'] === 1 && $get['post_type'] === 'duo' ) {
51
+if (isset($SETTINGS['duo']) === true && (int) $SETTINGS['duo'] === 1 && $get['post_type'] === 'duo') {
52 52
     $get['duo_state'] = $request->query->get('state');
53 53
     $get['duo_code'] = $request->query->get('duo_code');
54 54
 }
@@ -78,7 +78,7 @@  discard block
 block discarded – undo
78 78
         exit;
79 79
     } else {
80 80
         // Gérer les erreurs
81
-        echo 'Erreur lors de la récupération des informations utilisateur : ' . $userInfo['message'];
81
+        echo 'Erreur lors de la récupération des informations utilisateur : '.$userInfo['message'];
82 82
     };
83 83
 }
84 84
 
@@ -99,8 +99,7 @@  discard block
 block discarded – undo
99 99
 <div class="login-box">
100 100
     <div class="login-logo"><div style="margin:30px;">',
101 101
     isset($SETTINGS['custom_logo']) === true && empty($SETTINGS['custom_logo']) === false ?
102
-        '<img src="' . (string) $SETTINGS['custom_logo'] . '" alt="" style="text-align:center; max-width:100px;" />' :
103
-        '<img src="includes/images/teampass-logo2-login.png" alt="Teampass Logo">',
102
+        '<img src="'.(string) $SETTINGS['custom_logo'].'" alt="" style="text-align:center; max-width:100px;" />' : '<img src="includes/images/teampass-logo2-login.png" alt="Teampass Logo">',
104 103
         '
105 104
         </div>
106 105
         <div style="font-weight:bold;">
@@ -120,14 +119,14 @@  discard block
 block discarded – undo
120 119
 
121 120
         <div class="card-body login-card-body1">
122 121
             <div class="input-group has-feedback mb-2">
123
-                <div class="input-group-prepend infotip" title="' . $lang->get('login') . '">
122
+                <div class="input-group-prepend infotip" title="' . $lang->get('login').'">
124 123
                     <span class="input-group-text"><i class="fa-solid fa-user fa-fw"></i></span>
125 124
                 </div>';
126 125
 if (
127 126
     isset($SETTINGS['enable_http_request_login']) === true
128 127
     && (int) $SETTINGS['enable_http_request_login'] === 1
129 128
     && $request->getUser() !== null
130
-    && ! (isset($SETTINGS['maintenance_mode']) === true
129
+    && !(isset($SETTINGS['maintenance_mode']) === true
131 130
         && (int) $SETTINGS['maintenance_mode'] === 1)
132 131
 ) {
133 132
     if (strpos($request->getUser(), '@') !== false) {
@@ -141,42 +140,42 @@  discard block
 block discarded – undo
141 140
             <input type="text" id="login" class="form-control" placeholder="', filter_var($username, FILTER_SANITIZE_FULL_SPECIAL_CHARS), '" readonly>';
142 141
 } else {
143 142
     echo '
144
-            <input type="text" id="login" class="form-control" placeholder="' . $lang->get('index_login') . '" value="'.(null !== $session->get('user-login') && empty($session->get('user-login')) === false ? filter_var($session->get('user-login'), FILTER_SANITIZE_FULL_SPECIAL_CHARS) : '').'">';
143
+            <input type="text" id="login" class="form-control" placeholder="' . $lang->get('index_login').'" value="'.(null !== $session->get('user-login') && empty($session->get('user-login')) === false ? filter_var($session->get('user-login'), FILTER_SANITIZE_FULL_SPECIAL_CHARS) : '').'">';
145 144
 }
146 145
 
147 146
 echo '
148 147
         </div>';
149
-if (! (isset($SETTINGS['enable_http_request_login']) === true
148
+if (!(isset($SETTINGS['enable_http_request_login']) === true
150 149
     && (int) $SETTINGS['enable_http_request_login'] === 1
151 150
     && $request->getUser() !== null
152
-    && ! (isset($SETTINGS['maintenance_mode']) === true
151
+    && !(isset($SETTINGS['maintenance_mode']) === true
153 152
         && (int) $SETTINGS['maintenance_mode'] === 1))) {
154 153
     echo '
155 154
         <div class="input-group has-feedback mb-2">
156
-            <div class="input-group-prepend infotip" title="' . $lang->get('password') . '">
155
+            <div class="input-group-prepend infotip" title="' . $lang->get('password').'">
157 156
                 <span class="input-group-text"><i class="fa-solid fa-lock fa-fw"></i></span>
158 157
             </div>
159
-            <input type="password" id="pw" class="form-control submit-button" placeholder="' . $lang->get('index_password') . '">
158
+            <input type="password" id="pw" class="form-control submit-button" placeholder="' . $lang->get('index_password').'">
160 159
         </div>';
161 160
 }
162 161
 
163 162
 echo '
164 163
         <div class="input-group has-feedback mb-2">
165
-            <div class="input-group-prepend infotip" title="' . $lang->get('session_expiration_in_minutes') . '">
164
+            <div class="input-group-prepend infotip" title="' . $lang->get('session_expiration_in_minutes').'">
166 165
                 <span class="input-group-text"><i class="fa-solid fa-clock fa-fw"></i></span>
167 166
             </div>
168 167
             <input type="text" id="session_duration" class="form-control submit-button" 
169
-            placeholder="' . $lang->get('index_session_duration') .'&nbsp;(' . $lang->get('minutes') . ')" 
168
+            placeholder="' . $lang->get('index_session_duration').'&nbsp;('.$lang->get('minutes').')" 
170 169
             value="', isset($SETTINGS['default_session_expiration_time']) === true ? $SETTINGS['default_session_expiration_time'] : '', '">
171 170
         </div>';
172 171
 // 2FA auth selector
173 172
 $mfaHtmlPart = '
174
-        <input type="hidden" id="2fa_user_selection" value="'.htmlspecialchars((isset($get['post_type']) === true && $get['post_type'] === 'duo') ? 'duo' : ''). '">
175
-        <input type="hidden" id="duo_code" value="'.htmlspecialchars(isset($get['duo_code']) === true && is_null($get['duo_code']) === false ? $get['duo_code'] : ''). '">
176
-        <input type="hidden" id="duo_state" value="'.htmlspecialchars(isset($get['duo_state']) === true && is_null($get['duo_state']) === false ? $get['duo_state'] : ''). '">
173
+        <input type="hidden" id="2fa_user_selection" value="'.htmlspecialchars((isset($get['post_type']) === true && $get['post_type'] === 'duo') ? 'duo' : '').'">
174
+        <input type="hidden" id="duo_code" value="'.htmlspecialchars(isset($get['duo_code']) === true && is_null($get['duo_code']) === false ? $get['duo_code'] : '').'">
175
+        <input type="hidden" id="duo_state" value="'.htmlspecialchars(isset($get['duo_state']) === true && is_null($get['duo_state']) === false ? $get['duo_state'] : '').'">
177 176
         <div class="row mb-3 hidden" id="2fa_methods_selector">
178 177
             <div class="col-12">
179
-                <h8 class="login-box-msg">' . $lang->get('2fa_authentication_selector') . '</h8>
178
+                <h8 class="login-box-msg">' . $lang->get('2fa_authentication_selector').'</h8>
180 179
                 <div class="2fa-methods text-center mt-2">'.
181 180
                 (isset($SETTINGS['google_authentication']) === true && (int) $SETTINGS['google_authentication'] === 1 ?
182 181
         '
@@ -209,14 +208,14 @@  discard block
 block discarded – undo
209 208
     echo '
210 209
         <div id="div-2fa-google" class="mb-3 div-2fa-method hidden">
211 210
             <div class="input-group has-feedback mb-2">
212
-                <div class="input-group-prepend infotip" title="' . $lang->get('mfa_unique_code') . '">
211
+                <div class="input-group-prepend infotip" title="' . $lang->get('mfa_unique_code').'">
213 212
                     <span class="input-group-text"><i class="fa-solid fa-key fa-fw"></i></span>
214 213
                 </div>
215
-                <input type="text" id="ga_code" class="form-control submit-button" placeholder="' . $lang->get('ga_identification_code') . '" />
214
+                <input type="text" id="ga_code" class="form-control submit-button" placeholder="' . $lang->get('ga_identification_code').'" />
216 215
                 <span class="input-group-append">
217 216
                     <button type="button" class="btn btn-info btn-flat" onclick="send_user_new_temporary_ga_code()">
218 217
                         <i class="fa-solid fa-envelope form-control-feedback pointer infotip" 
219
-                    title="' . $lang->get('i_need_to_generate_new_ga_code') . '"></i>
218
+                    title="' . $lang->get('i_need_to_generate_new_ga_code').'"></i>
220 219
                     </button>
221 220
                 </span>
222 221
             </div>
@@ -234,7 +233,7 @@  discard block
 block discarded – undo
234 233
 <script>
235 234
 var seconds = 1;
236 235
 function updateLogonButton(timeToGo){
237
-    document.getElementById("but_identify_user").value = "' . $lang->get('duration_login_attempt') . ' " + timeToGo;
236
+    document.getElementById("but_identify_user").value = "' . $lang->get('duration_login_attempt').' " + timeToGo;
238 237
 }
239 238
 $( window ).on( "load", function() {
240 239
     updateLogonButton(seconds);
@@ -243,7 +242,7 @@  discard block
 block discarded – undo
243 242
         if (seconds >= 0) {
244 243
             updateLogonButton(seconds);
245 244
         } else if(seconds === 0) {
246
-            launchIdentify("", "' . $nextUrl . '");
245
+            launchIdentify("", "' . $nextUrl.'");
247 246
         }
248 247
         updateLogonButton(seconds);
249 248
     },
@@ -264,15 +263,15 @@  discard block
 block discarded – undo
264 263
             <div class="col-8">
265 264
                 <div id="yubiko-new-key" class="alert alert-info hidden">
266 265
                     <p>
267
-                        <input type="text" size="10" id="yubico_user_id" class="form-control" placeholder="' . $lang->get('yubico_user_id') . '">
266
+                        <input type="text" size="10" id="yubico_user_id" class="form-control" placeholder="' . $lang->get('yubico_user_id').'">
268 267
                     </p>
269 268
                     <p>
270
-                    <input type="text" size="10" id="yubico_user_key" class="form-control" placeholder="' . $lang->get('yubico_user_key') . '">
269
+                    <input type="text" size="10" id="yubico_user_key" class="form-control" placeholder="' . $lang->get('yubico_user_key').'">
271 270
                     </p>
272 271
                 </div>
273
-                <input autocomplete="off" type="text" id="yubico_key" class="form-control submit-button" placeholder="' . $lang->get('press_your_yubico_key') . '">
272
+                <input autocomplete="off" type="text" id="yubico_key" class="form-control submit-button" placeholder="' . $lang->get('press_your_yubico_key').'">
274 273
                 <div class="row">
275
-                    <span class="ml-2 mt-1 font-weight-light small pointer" id="register-yubiko-key">' . $lang->get('register_new_yubiko_key') . '</span>
274
+                    <span class="ml-2 mt-1 font-weight-light small pointer" id="register-yubiko-key">' . $lang->get('register_new_yubiko_key').'</span>
276 275
                 </div>
277 276
             </div>
278 277
         </div>';
@@ -281,22 +280,22 @@  discard block
 block discarded – undo
281 280
 echo '
282 281
         <div class="row mt-5">
283 282
             <div class="col-12">
284
-                <button id="but_identify_user" class="btn btn-primary btn-block">' . $lang->get('log_in') . '</button>
283
+                <button id="but_identify_user" class="btn btn-primary btn-block">' . $lang->get('log_in').'</button>
285 284
                 
286 285
                 <!-- In case of upgrade, the user has to provide his One Time Code -->
287 286
                 <div class="card-body user-one-time-code-card-body hidden">
288
-                    <h5 class="login-box-msg">' . $lang->get('provide_personal_one_time_code') . '</h5>
287
+                    <h5 class="login-box-msg">' . $lang->get('provide_personal_one_time_code').'</h5>
289 288
 
290 289
                     <div class="input-group has-feedback mb-2 mt-4">
291 290
                         <div class="input-group-prepend">
292 291
                             <span class="input-group-text"><i class="fa-solid fa-unlock-alt"></i></span>
293 292
                         </div>
294
-                        <input type="password" id="user-one-time-code" class="form-control" placeholder="' . $lang->get('one_time_code') . '">
293
+                        <input type="password" id="user-one-time-code" class="form-control" placeholder="' . $lang->get('one_time_code').'">
295 294
                     </div>
296 295
 
297 296
                     <div class="row mb-3">
298 297
                         <div class="col-12">
299
-                            <button id="but_confirm_otc" class="btn btn-primary btn-block">' . $lang->get('confirm') . '</button>
298
+                            <button id="but_confirm_otc" class="btn btn-primary btn-block">' . $lang->get('confirm').'</button>
300 299
                         </div>
301 300
                     </div>
302 301
                 </div>
@@ -311,7 +310,7 @@  discard block
 block discarded – undo
311 310
         <hr class="mt-3 mb-3"/>
312 311
         <div class="row mb-2">
313 312
             <div class="col-12">
314
-                <button id="but_login_with_oauth2" class="btn btn-primary btn-block">' . $SETTINGS['oauth2_client_appname'] . '</button>
313
+                <button id="but_login_with_oauth2" class="btn btn-primary btn-block">' . $SETTINGS['oauth2_client_appname'].'</button>
315 314
             </div>
316 315
         </div>';
317 316
 }
@@ -324,10 +323,10 @@  discard block
 block discarded – undo
324 323
 // In case of password change
325 324
 echo '
326 325
     <div class="card-body confirm-password-card-body hidden">
327
-        <h5 class="login-box-msg">' . $lang->get('new_password_required') . '</h5>
326
+        <h5 class="login-box-msg">' . $lang->get('new_password_required').'</h5>
328 327
 
329 328
         <div class="alert alert-info">
330
-            <div class="text-center"><i class="icon fa fa-info"></i>' . $lang->get('password_strength') . '
329
+            <div class="text-center"><i class="icon fa fa-info"></i>' . $lang->get('password_strength').'
331 330
             <span id="confirm-password-level" class="ml-2 font-weight-bold"></span></div>
332 331
         </div>
333 332
 
@@ -337,20 +336,20 @@  discard block
 block discarded – undo
337 336
                     <div class="input-group-prepend">
338 337
                         <span class="input-group-text"><i class="fas fa-key"></i></span>
339 338
                     </div>
340
-                    <input type="password" id="current-user-password" class="form-control" placeholder="' . $lang->get('current_password') . '">
339
+                    <input type="password" id="current-user-password" class="form-control" placeholder="' . $lang->get('current_password').'">
341 340
                 </div>
342 341
             </div>
343 342
             <div class="input-group has-feedback mb-2 mt-4">
344 343
                 <div class="input-group-prepend">
345 344
                     <span class="input-group-text"><i class="fas fa-key"></i></span>
346 345
                 </div>
347
-                <input type="password" id="new-user-password" class="form-control" placeholder="' . $lang->get('index_new_pw') . '">
346
+                <input type="password" id="new-user-password" class="form-control" placeholder="' . $lang->get('index_new_pw').'">
348 347
             </div>
349 348
             <div class="input-group has-feedback mb-2">
350 349
                 <div class="input-group-prepend">
351 350
                     <span class="input-group-text"><i class="fas fa-key"></i></span>
352 351
                 </div>
353
-                <input type="password" id="new-user-password-confirm" class="form-control" placeholder="' . $lang->get('index_change_pw_confirmation') . '">
352
+                <input type="password" id="new-user-password-confirm" class="form-control" placeholder="' . $lang->get('index_change_pw_confirmation').'">
354 353
             </div>
355 354
             <div class="row mb-3">
356 355
                 <div class="col-md-12 offset-sm-4 text-center">
@@ -361,7 +360,7 @@  discard block
 block discarded – undo
361 360
             </div>
362 361
             <div class="row mb-3">
363 362
                 <div class="col-12">
364
-                    <button id="but_confirm_new_password" class="btn btn-primary btn-block">' . $lang->get('confirm') . '</button>
363
+                    <button id="but_confirm_new_password" class="btn btn-primary btn-block">' . $lang->get('confirm').'</button>
365 364
                 </div>
366 365
             </div>
367 366
         </div>
@@ -369,20 +368,20 @@  discard block
 block discarded – undo
369 368
 
370 369
     <div class="card-body hidden" id="card-user-treat-psk">
371 370
         <div class="alert alert-info">
372
-            <div class="text-center"><i class="icon fa fa-info"></i>' . $lang->get('user_has_psk_info') . '</div>
371
+            <div class="text-center"><i class="icon fa fa-info"></i>' . $lang->get('user_has_psk_info').'</div>
373 372
         </div>
374 373
         <div class="input-group has-feedback mb-2">
375 374
             <div class="input-group-prepend">
376 375
                 <span class="input-group-text"><i class="fas fa-key"></i></span>
377 376
             </div>
378
-            <input type="password" id="user-old-defuse-psk" class="form-control" placeholder="' . $lang->get('home_personal_saltkey') . '">
377
+            <input type="password" id="user-old-defuse-psk" class="form-control" placeholder="' . $lang->get('home_personal_saltkey').'">
379 378
         </div>
380 379
         <div class="row mb-3 mt-4">
381 380
             <div class="col-12">
382
-                <button id="but_confirm_defuse_psk" class="btn btn-primary btn-block">' . $lang->get('launch') . '</button>
381
+                <button id="but_confirm_defuse_psk" class="btn btn-primary btn-block">' . $lang->get('launch').'</button>
383 382
             </div>
384 383
             <div class="col-12 mt-3">
385
-                <button id="but_confirm_forgot_defuse_psk" class="btn btn-danger btn-block text-bold">' . $lang->get('i_cannot_remember') . '</button>
384
+                <button id="but_confirm_forgot_defuse_psk" class="btn btn-danger btn-block text-bold">' . $lang->get('i_cannot_remember').'</button>
386 385
             </div>
387 386
         </div>
388 387
     </div>
Please login to merge, or discard this patch.
Braces   +3 added lines, -1 removed lines patch added patch discarded remove patch
@@ -58,7 +58,9 @@
 block discarded – undo
58 58
     $get['state'] = filter_var($_GET['state'], FILTER_SANITIZE_SPECIAL_CHARS);
59 59
     $get['session_state'] = filter_var($_GET['session_state'], FILTER_SANITIZE_SPECIAL_CHARS);
60 60
 
61
-    if (WIP === true) error_log('---- OAUTH2 START ----');
61
+    if (WIP === true) {
62
+        error_log('---- OAUTH2 START ----');
63
+    }
62 64
 
63 65
     // Création d'une instance du contrôleur
64 66
     $OAuth2 = new OAuth2Controller($SETTINGS);
Please login to merge, or discard this patch.
pages/oauth.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -71,7 +71,7 @@
 block discarded – undo
71 71
 if ($checkUserAccess->checkSession() === false || $checkUserAccess->userAccessPage('oauth') === false) {
72 72
     // Not allowed page
73 73
     $session->set('system-error_code', ERR_NOT_ALLOWED);
74
-    include $SETTINGS['cpassman_dir'] . '/error.php';
74
+    include $SETTINGS['cpassman_dir'].'/error.php';
75 75
     exit;
76 76
 }
77 77
 
Please login to merge, or discard this patch.
scripts/background_tasks___sending_emails.php 1 patch
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -70,7 +70,7 @@  discard block
 block discarded – undo
70 70
 $emailService = new EmailService();
71 71
 $rows = DB::query(
72 72
     'SELECT *
73
-    FROM ' . prefixTable('background_tasks') . '
73
+    FROM ' . prefixTable('background_tasks').'
74 74
     WHERE is_in_progress = %i AND process_type = %s
75 75
     ORDER BY increment_id ASC LIMIT 0,10',
76 76
     0,
@@ -138,7 +138,7 @@  discard block
 block discarded – undo
138 138
     
139 139
     //if ((int) $SETTINGS['enable_backlog_mail'] === 1) {
140 140
         $row = DB::queryFirstRow(
141
-            'SELECT valeur FROM ' . prefixTable('misc') . ' WHERE type = %s AND intitule = %s',
141
+            'SELECT valeur FROM '.prefixTable('misc').' WHERE type = %s AND intitule = %s',
142 142
             'cron',
143 143
             'sending_emails'
144 144
         );
@@ -146,7 +146,7 @@  discard block
 block discarded – undo
146 146
         if ((int) (time() - $row['valeur']) >= 300 || (int) $row['valeur'] === 0) {
147 147
             $rows = DB::query(
148 148
                 'SELECT *
149
-                FROM ' . prefixTable('emails') .
149
+                FROM ' . prefixTable('emails').
150 150
                 ' WHERE status != %s',
151 151
                 'sent'
152 152
             );
Please login to merge, or discard this patch.
sources/folders.class.php 1 patch
Spacing   +15 added lines, -15 removed lines patch added patch discarded remove patch
@@ -86,7 +86,7 @@  discard block
 block discarded – undo
86 86
 
87 87
         $parentComplexity = $this->checkComplexityLevel($parentFolderData, $complexity, $parent_id);
88 88
         if (isset($parentComplexity ['error']) && $parentComplexity['error'] === true) {
89
-            return $this->errorResponse($this->lang->get('error_folder_complexity_lower_than_top_folder') . " [<b>{$this->settings['TP_PW_COMPLEXITY'][$parentComplexity['valeur']][1]}</b>]");
89
+            return $this->errorResponse($this->lang->get('error_folder_complexity_lower_than_top_folder')." [<b>{$this->settings['TP_PW_COMPLEXITY'][$parentComplexity['valeur']][1]}</b>]");
90 90
         }
91 91
 
92 92
         return $this->createFolder($params, array_merge($parentFolderData, $parentComplexity));
@@ -135,7 +135,7 @@  discard block
 block discarded – undo
135 135
         ) {
136 136
             DB::query(
137 137
                 'SELECT *
138
-                FROM ' . prefixTable('nested_tree') . '
138
+                FROM ' . prefixTable('nested_tree').'
139 139
                 WHERE title = %s AND personal_folder = 0',
140 140
                 $title
141 141
             );
@@ -159,7 +159,7 @@  discard block
 block discarded – undo
159 159
         //check if parent folder is personal
160 160
         $data = DB::queryfirstrow(
161 161
             'SELECT personal_folder, bloquer_creation, bloquer_modification
162
-            FROM ' . prefixTable('nested_tree') . '
162
+            FROM ' . prefixTable('nested_tree').'
163 163
             WHERE id = %i',
164 164
             $parent_id
165 165
         );
@@ -198,7 +198,7 @@  discard block
 block discarded – undo
198 198
             // get complexity level for this folder
199 199
             $data = DB::queryfirstrow(
200 200
                 'SELECT valeur
201
-                FROM ' . prefixTable('misc') . '
201
+                FROM ' . prefixTable('misc').'
202 202
                 WHERE intitule = %i AND type = %s',
203 203
                 $parent_id,
204 204
                 'complex'
@@ -249,11 +249,11 @@  discard block
 block discarded – undo
249 249
      */
250 250
     private function canCreateFolder($isPersonal, $user_is_admin, $user_is_manager, $user_can_manage_all_users, $user_can_create_root_folder)
251 251
     {
252
-        return (int)$isPersonal === 1 ||
253
-            (int)$user_is_admin === 1 ||
254
-            ((int)$user_is_manager === 1 || (int)$user_can_manage_all_users === 1) ||
252
+        return (int) $isPersonal === 1 ||
253
+            (int) $user_is_admin === 1 ||
254
+            ((int) $user_is_manager === 1 || (int) $user_can_manage_all_users === 1) ||
255 255
             ($this->settings['enable_user_can_create_folders'] ?? false) ||
256
-            ((int)$user_can_create_root_folder === 1);
256
+            ((int) $user_can_create_root_folder === 1);
257 257
     }
258 258
 
259 259
     /**
@@ -332,7 +332,7 @@  discard block
 block discarded – undo
332 332
         $path = '';
333 333
         $tree_path = $tree->getPath(0, false);
334 334
         foreach ($tree_path as $fld) {
335
-            $path .= empty($path) ? $fld->title : '/' . $fld->title;
335
+            $path .= empty($path) ? $fld->title : '/'.$fld->title;
336 336
         }
337 337
 
338 338
         $new_json = [
@@ -346,7 +346,7 @@  discard block
 block discarded – undo
346 346
             "is_visible_active" => 0,
347 347
         ];
348 348
 
349
-        $cache_tree = DB::queryFirstRow('SELECT increment_id, folders, visible_folders FROM ' . prefixTable('cache_tree') . ' WHERE user_id = %i', (int)$user_id);
349
+        $cache_tree = DB::queryFirstRow('SELECT increment_id, folders, visible_folders FROM '.prefixTable('cache_tree').' WHERE user_id = %i', (int) $user_id);
350 350
 
351 351
         if (empty($cache_tree)) {
352 352
             DB::insert(prefixTable('cache_tree'), [
@@ -366,7 +366,7 @@  discard block
 block discarded – undo
366 366
                 'folders' => json_encode($folders),
367 367
                 'visible_folders' => json_encode($visible_folders),
368 368
                 'timestamp' => time(),
369
-            ], 'increment_id = %i', (int)$cache_tree['increment_id']);
369
+            ], 'increment_id = %i', (int) $cache_tree['increment_id']);
370 370
         }
371 371
     }
372 372
 
@@ -376,7 +376,7 @@  discard block
 block discarded – undo
376 376
     private function manageFolderPermissions($parent_id, $newId, $user_roles, $access_rights, $user_is_admin)
377 377
     {
378 378
         if ($this->settings['subfolder_rights_as_parent'] ?? false) {
379
-            $rows = DB::query('SELECT role_id, type FROM ' . prefixTable('roles_values') . ' WHERE folder_id = %i', $parent_id);
379
+            $rows = DB::query('SELECT role_id, type FROM '.prefixTable('roles_values').' WHERE folder_id = %i', $parent_id);
380 380
             foreach ($rows as $record) {
381 381
                 DB::insert(prefixTable('roles_values'), [
382 382
                     'role_id' => $record['role_id'],
@@ -384,7 +384,7 @@  discard block
 block discarded – undo
384 384
                     'type' => $record['type'],
385 385
                 ]);
386 386
             }
387
-        } elseif ((int)$user_is_admin !== 1) {
387
+        } elseif ((int) $user_is_admin !== 1) {
388 388
             foreach (array_unique(explode(';', $user_roles)) as $role) {
389 389
                 if (!empty($role)) {
390 390
                     DB::insert(prefixTable('roles_values'), [
@@ -402,7 +402,7 @@  discard block
 block discarded – undo
402 402
      */
403 403
     private function copyCustomFieldsCategories($parent_id, $newId)
404 404
     {
405
-        $rows = DB::query('SELECT id_category FROM ' . prefixTable('categories_folders') . ' WHERE id_folder = %i', $parent_id);
405
+        $rows = DB::query('SELECT id_category FROM '.prefixTable('categories_folders').' WHERE id_folder = %i', $parent_id);
406 406
         foreach ($rows as $record) {
407 407
             DB::insert(prefixTable('categories_folders'), [
408 408
                 'id_category' => $record['id_category'],
@@ -430,7 +430,7 @@  discard block
 block discarded – undo
430 430
         return [
431 431
             'error' => true,
432 432
             'message' => $message,
433
-            'newId' => '' . $newIdSuffix,
433
+            'newId' => ''.$newIdSuffix,
434 434
         ];
435 435
     }
436 436
 }
437 437
\ No newline at end of file
Please login to merge, or discard this patch.
includes/core/login.oauth2.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -32,7 +32,7 @@
 block discarded – undo
32 32
 use TeampassClasses\OAuth2Controller\OAuth2Controller;
33 33
 
34 34
 session_start();
35
-require_once __DIR__. '/../../includes/config/include.php';
35
+require_once __DIR__.'/../../includes/config/include.php';
36 36
 require_once __DIR__.'/../../sources/main.functions.php';
37 37
 
38 38
 // init
Please login to merge, or discard this patch.