@@ -78,7 +78,7 @@ discard block |
||
| 78 | 78 | ) { |
| 79 | 79 | // Not allowed page |
| 80 | 80 | $session->set('system-error_code', ERR_NOT_ALLOWED); |
| 81 | - include $SETTINGS['cpassman_dir'] . '/error.php'; |
|
| 81 | + include $SETTINGS['cpassman_dir'].'/error.php'; |
|
| 82 | 82 | exit; |
| 83 | 83 | } |
| 84 | 84 | |
@@ -100,7 +100,7 @@ discard block |
||
| 100 | 100 | $antiXss = new AntiXSS(); |
| 101 | 101 | |
| 102 | 102 | // User's language loading |
| 103 | -require_once $SETTINGS['cpassman_dir'] . '/includes/language/' . $session->get('user-language') . '.php'; |
|
| 103 | +require_once $SETTINGS['cpassman_dir'].'/includes/language/'.$session->get('user-language').'.php'; |
|
| 104 | 104 | |
| 105 | 105 | // Prepare POST variables |
| 106 | 106 | $id = filter_input(INPUT_POST, 'id', FILTER_SANITIZE_NUMBER_INT); |
@@ -152,9 +152,9 @@ discard block |
||
| 152 | 152 | 'SELECT i.id as id, i.id_tree as id_tree, i.restricted_to as restricted_to, i.perso as perso, |
| 153 | 153 | i.label as label, i.description as description, i.pw as pw, i.login as login, i.url as url, |
| 154 | 154 | i.email as email,l.date as date, i.pw_iv as pw_iv,n.renewal_period as renewal_period |
| 155 | - FROM ' . prefixTable('items') . ' as i |
|
| 156 | - INNER JOIN ' . prefixTable('nested_tree') . ' as n ON (i.id_tree = n.id) |
|
| 157 | - INNER JOIN ' . prefixTable('log_items') . ' as l ON (i.id = l.id_item) |
|
| 155 | + FROM ' . prefixTable('items').' as i |
|
| 156 | + INNER JOIN ' . prefixTable('nested_tree').' as n ON (i.id_tree = n.id) |
|
| 157 | + INNER JOIN ' . prefixTable('log_items').' as l ON (i.id = l.id_item) |
|
| 158 | 158 | WHERE i.inactif = %i |
| 159 | 159 | AND i.id_tree= %i |
| 160 | 160 | AND (l.action = %s OR (l.action = %s AND l.raison LIKE %s)) |
@@ -177,8 +177,8 @@ discard block |
||
| 177 | 177 | // Run query |
| 178 | 178 | $dataItem = DB::queryFirstRow( |
| 179 | 179 | 'SELECT i.pw AS pw, s.share_key AS share_key |
| 180 | - FROM ' . prefixTable('items') . ' AS i |
|
| 181 | - INNER JOIN ' . prefixTable('sharekeys_items') . ' AS s ON (s.object_id = i.id) |
|
| 180 | + FROM ' . prefixTable('items').' AS i |
|
| 181 | + INNER JOIN ' . prefixTable('sharekeys_items').' AS s ON (s.object_id = i.id) |
|
| 182 | 182 | WHERE user_id = %i AND i.id = %i', |
| 183 | 183 | $session->get('user-id'), |
| 184 | 184 | $record['id'] |
@@ -202,8 +202,8 @@ discard block |
||
| 202 | 202 | $arr_kbs = []; |
| 203 | 203 | $rows_kb = DB::query( |
| 204 | 204 | 'SELECT b.label, b.id |
| 205 | - FROM ' . prefixTable('kb_items') . ' AS a |
|
| 206 | - INNER JOIN ' . prefixTable('kb') . ' AS b ON (a.kb_id = b.id) |
|
| 205 | + FROM ' . prefixTable('kb_items').' AS a |
|
| 206 | + INNER JOIN ' . prefixTable('kb').' AS b ON (a.kb_id = b.id) |
|
| 207 | 207 | WHERE a.item_id = %i', |
| 208 | 208 | $record['id'] |
| 209 | 209 | ); |
@@ -215,7 +215,7 @@ discard block |
||
| 215 | 215 | $arr_tags = []; |
| 216 | 216 | $rows_tag = DB::query( |
| 217 | 217 | 'SELECT tag |
| 218 | - FROM ' . prefixTable('tags') . ' |
|
| 218 | + FROM ' . prefixTable('tags').' |
|
| 219 | 219 | WHERE item_id = %i', |
| 220 | 220 | $record['id'] |
| 221 | 221 | ); |
@@ -227,18 +227,18 @@ discard block |
||
| 227 | 227 | $arr_trees = []; |
| 228 | 228 | $rows_child_tree = DB::query( |
| 229 | 229 | 'SELECT t.id, t.title |
| 230 | - FROM ' . prefixTable('nested_tree') . ' AS t |
|
| 231 | - INNER JOIN ' . prefixTable('items') . ' AS i ON (t.id = i.id_tree) |
|
| 230 | + FROM ' . prefixTable('nested_tree').' AS t |
|
| 231 | + INNER JOIN ' . prefixTable('items').' AS i ON (t.id = i.id_tree) |
|
| 232 | 232 | WHERE i.id = %i', |
| 233 | 233 | $record['id'] |
| 234 | 234 | ); |
| 235 | 235 | foreach ($rows_child_tree as $rec_child_tree) { |
| 236 | 236 | $stack = array(); |
| 237 | 237 | $parent = $rec_child_tree['id']; |
| 238 | - while($parent != 0){ |
|
| 238 | + while ($parent != 0) { |
|
| 239 | 239 | $rows_parent_tree = DB::query( |
| 240 | 240 | 'SELECT parent_id, title |
| 241 | - FROM ' . prefixTable('nested_tree') . ' |
|
| 241 | + FROM ' . prefixTable('nested_tree').' |
|
| 242 | 242 | WHERE id = %i', |
| 243 | 243 | $parent |
| 244 | 244 | ); |
@@ -325,7 +325,7 @@ discard block |
||
| 325 | 325 | // Prepare variables |
| 326 | 326 | $post_export_tag = filter_var($dataReceived['export_tag'], FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
| 327 | 327 | if (empty($post_export_tag) === false) { |
| 328 | - DB::query('DELETE FROM ' . prefixTable('export') . ' WHERE export_tag = %s', $post_export_tag); |
|
| 328 | + DB::query('DELETE FROM '.prefixTable('export').' WHERE export_tag = %s', $post_export_tag); |
|
| 329 | 329 | } |
| 330 | 330 | break; |
| 331 | 331 | |
@@ -375,9 +375,9 @@ discard block |
||
| 375 | 375 | l.date as date, i.pw_iv as pw_iv, |
| 376 | 376 | n.renewal_period as renewal_period, |
| 377 | 377 | i.id_tree as tree_id |
| 378 | - FROM ' . prefixTable('items') . ' as i |
|
| 379 | - INNER JOIN ' . prefixTable('nested_tree') . ' as n ON (i.id_tree = n.id) |
|
| 380 | - INNER JOIN ' . prefixTable('log_items') . ' as l ON (i.id = l.id_item) |
|
| 378 | + FROM ' . prefixTable('items').' as i |
|
| 379 | + INNER JOIN ' . prefixTable('nested_tree').' as n ON (i.id_tree = n.id) |
|
| 380 | + INNER JOIN ' . prefixTable('log_items').' as l ON (i.id = l.id_item) |
|
| 381 | 381 | WHERE i.inactif = %i |
| 382 | 382 | AND i.id_tree= %i |
| 383 | 383 | AND (l.action = %s OR (l.action = %s AND l.raison LIKE %s)) |
@@ -403,8 +403,8 @@ discard block |
||
| 403 | 403 | // Run query |
| 404 | 404 | $dataItem = DB::queryFirstRow( |
| 405 | 405 | 'SELECT i.pw AS pw, s.share_key AS share_key |
| 406 | - FROM ' . prefixTable('items') . ' AS i |
|
| 407 | - INNER JOIN ' . prefixTable('sharekeys_items') . ' AS s ON (s.object_id = i.id) |
|
| 406 | + FROM ' . prefixTable('items').' AS i |
|
| 407 | + INNER JOIN ' . prefixTable('sharekeys_items').' AS s ON (s.object_id = i.id) |
|
| 408 | 408 | WHERE user_id = %i AND i.id = %i', |
| 409 | 409 | $session->get('user-id'), |
| 410 | 410 | $record['id'] |
@@ -428,8 +428,8 @@ discard block |
||
| 428 | 428 | $arr_kbs = ''; |
| 429 | 429 | $rows_kb = DB::query( |
| 430 | 430 | 'SELECT b.label, b.id |
| 431 | - FROM ' . prefixTable('kb_items') . ' AS a |
|
| 432 | - INNER JOIN ' . prefixTable('kb') . ' AS b ON (a.kb_id = b.id) |
|
| 431 | + FROM ' . prefixTable('kb_items').' AS a |
|
| 432 | + INNER JOIN ' . prefixTable('kb').' AS b ON (a.kb_id = b.id) |
|
| 433 | 433 | WHERE a.item_id = %i', |
| 434 | 434 | $record['id'] |
| 435 | 435 | ); |
@@ -437,7 +437,7 @@ discard block |
||
| 437 | 437 | if (empty($arr_kbs)) { |
| 438 | 438 | $arr_kbs = $rec_kb['label']; |
| 439 | 439 | } else { |
| 440 | - $arr_kbs .= ' | ' . $rec_kb['label']; |
|
| 440 | + $arr_kbs .= ' | '.$rec_kb['label']; |
|
| 441 | 441 | } |
| 442 | 442 | } |
| 443 | 443 | |
@@ -445,7 +445,7 @@ discard block |
||
| 445 | 445 | $arr_tags = ''; |
| 446 | 446 | $rows_tag = DB::query( |
| 447 | 447 | 'SELECT tag |
| 448 | - FROM ' . prefixTable('tags') . ' |
|
| 448 | + FROM ' . prefixTable('tags').' |
|
| 449 | 449 | WHERE item_id = %i', |
| 450 | 450 | $record['id'] |
| 451 | 451 | ); |
@@ -453,7 +453,7 @@ discard block |
||
| 453 | 453 | if (empty($arr_tags)) { |
| 454 | 454 | $arr_tags = $rec_tag['tag']; |
| 455 | 455 | } else { |
| 456 | - $arr_tags .= ' ' . $rec_tag['tag']; |
|
| 456 | + $arr_tags .= ' '.$rec_tag['tag']; |
|
| 457 | 457 | } |
| 458 | 458 | } |
| 459 | 459 | |
@@ -531,7 +531,7 @@ discard block |
||
| 531 | 531 | // query |
| 532 | 532 | $rows = DB::query( |
| 533 | 533 | 'SELECT * |
| 534 | - FROM ' . prefixTable('export') . ' |
|
| 534 | + FROM ' . prefixTable('export').' |
|
| 535 | 535 | WHERE export_tag = %s', |
| 536 | 536 | $dataReceived['export_tag'] |
| 537 | 537 | ); |
@@ -543,7 +543,7 @@ discard block |
||
| 543 | 543 | $prev_path = ''; |
| 544 | 544 | |
| 545 | 545 | //Prepare the PDF file |
| 546 | - require_once $SETTINGS['cpassman_dir'] . '/vendor/tecnickcom/tcpdf/tcpdf.php'; |
|
| 546 | + require_once $SETTINGS['cpassman_dir'].'/vendor/tecnickcom/tcpdf/tcpdf.php'; |
|
| 547 | 547 | |
| 548 | 548 | $pdf = new TCPDF(PDF_PAGE_ORIENTATION, PDF_UNIT, PDF_PAGE_FORMAT, true, 'UTF-8', false); |
| 549 | 549 | $pdf->SetProtection(array('print'), $dataReceived['pdf_password'], null); |
@@ -555,7 +555,7 @@ discard block |
||
| 555 | 555 | |
| 556 | 556 | // set default header data |
| 557 | 557 | $pdf->SetHeaderData( |
| 558 | - $SETTINGS['cpassman_dir'] . '/includes/images/teampass-logo2-home.png', |
|
| 558 | + $SETTINGS['cpassman_dir'].'/includes/images/teampass-logo2-home.png', |
|
| 559 | 559 | PDF_HEADER_LOGO_WIDTH, |
| 560 | 560 | 'Teampass export', |
| 561 | 561 | $session->get('user-lastname')." ".$session->get('user-name').' @ '.date($SETTINGS['date_format']." ".$SETTINGS['time_format'], (int) time()) |
@@ -665,7 +665,7 @@ discard block |
||
| 665 | 665 | logEvents($SETTINGS, 'pdf_export', '', (string) $session->get('user-id'), $session->get('user-login')); |
| 666 | 666 | |
| 667 | 667 | //clean table |
| 668 | - DB::query('TRUNCATE TABLE ' . prefixTable('export')); |
|
| 668 | + DB::query('TRUNCATE TABLE '.prefixTable('export')); |
|
| 669 | 669 | |
| 670 | 670 | // Clean any content of the output buffer |
| 671 | 671 | ob_end_clean(); |
@@ -704,13 +704,13 @@ discard block |
||
| 704 | 704 | // step 1: |
| 705 | 705 | // - prepare export file |
| 706 | 706 | // - get full list of objects id to export |
| 707 | - include $SETTINGS['cpassman_dir'] . '/includes/config/include.php'; |
|
| 707 | + include $SETTINGS['cpassman_dir'].'/includes/config/include.php'; |
|
| 708 | 708 | $idsList = array(); |
| 709 | 709 | |
| 710 | 710 | // query |
| 711 | 711 | $rows = DB::query( |
| 712 | 712 | 'SELECT * |
| 713 | - FROM ' . prefixTable('export') . ' |
|
| 713 | + FROM ' . prefixTable('export').' |
|
| 714 | 714 | WHERE export_tag = %s', |
| 715 | 715 | $inputData['export_tag'] |
| 716 | 716 | ); |
@@ -747,13 +747,13 @@ discard block |
||
| 747 | 747 | } |
| 748 | 748 | // prepare export file |
| 749 | 749 | //save the file |
| 750 | - $outstream = fopen($SETTINGS['path_to_files_folder'] . (substr($SETTINGS['path_to_files_folder'] , -1) === '/' ? '' : '/') . $inputData['filename'], 'w'); |
|
| 750 | + $outstream = fopen($SETTINGS['path_to_files_folder'].(substr($SETTINGS['path_to_files_folder'], -1) === '/' ? '' : '/').$inputData['filename'], 'w'); |
|
| 751 | 751 | if ($outstream === false) { |
| 752 | 752 | echo (string) prepareExchangedData( |
| 753 | 753 | [ |
| 754 | 754 | 'error' => true, |
| 755 | 755 | 'message' => $lang->get('error_while_creating_file'), |
| 756 | - 'detail' => $SETTINGS['path_to_files_folder'] . $inputData['filename'], |
|
| 756 | + 'detail' => $SETTINGS['path_to_files_folder'].$inputData['filename'], |
|
| 757 | 757 | ], |
| 758 | 758 | 'encode' |
| 759 | 759 | ); |
@@ -779,12 +779,12 @@ discard block |
||
| 779 | 779 | </style> |
| 780 | 780 | </head> |
| 781 | 781 | <body> |
| 782 | - <input type="hidden" id="generation_date" value="' . GibberishAES::enc(/** @scrutinizer ignore-type */ (string) time(), $inputData['password']) . '" /> |
|
| 782 | + <input type="hidden" id="generation_date" value="' . GibberishAES::enc(/** @scrutinizer ignore-type */ (string) time(), $inputData['password']).'" /> |
|
| 783 | 783 | <div id="header"> |
| 784 | - ' . TP_TOOL_NAME . ' - Off Line mode |
|
| 784 | + ' . TP_TOOL_NAME.' - Off Line mode |
|
| 785 | 785 | </div> |
| 786 | 786 | <div style="margin:10px; font-size:9px;"> |
| 787 | - <i>This page was generated by <b>' . $session->get('user-name') . ' ' . $session->get('user-lastname') . '</b>, the ' . date('Y/m/d H:i:s') . '.</i> |
|
| 787 | + <i>This page was generated by <b>' . $session->get('user-name').' '.$session->get('user-lastname').'</b>, the '.date('Y/m/d H:i:s').'.</i> |
|
| 788 | 788 | <span id="info_page" style="margin-left:20px; font-weight:bold; font-size: 14px; color:red;"></span> |
| 789 | 789 | </div> |
| 790 | 790 | <div id="information"></div> |
@@ -795,11 +795,11 @@ discard block |
||
| 795 | 795 | <div> |
| 796 | 796 | <table id="itemsTable"> |
| 797 | 797 | <thead><tr> |
| 798 | - <th style="width:15%;">' . $lang->get('label') . '</th> |
|
| 799 | - <th style="width:10%;">' . $lang->get('pw') . '</th> |
|
| 800 | - <th style="width:30%;">' . $lang->get('description') . '</th> |
|
| 801 | - <th style="width:5%;">' . $lang->get('user_login') . '</th> |
|
| 802 | - <th style="width:20%;">' . $lang->get('url') . '</th> |
|
| 798 | + <th style="width:15%;">' . $lang->get('label').'</th> |
|
| 799 | + <th style="width:10%;">' . $lang->get('pw').'</th> |
|
| 800 | + <th style="width:30%;">' . $lang->get('description').'</th> |
|
| 801 | + <th style="width:5%;">' . $lang->get('user_login').'</th> |
|
| 802 | + <th style="width:20%;">' . $lang->get('url').'</th> |
|
| 803 | 803 | </tr></thead> |
| 804 | 804 | <tbody id="itemsTable_tbody">' |
| 805 | 805 | ); |
@@ -813,8 +813,8 @@ discard block |
||
| 813 | 813 | 'loop' => true, |
| 814 | 814 | 'ids_list' => json_encode($idsList), |
| 815 | 815 | 'ids_count' => count($idsList), |
| 816 | - 'file_path' => $SETTINGS['path_to_files_folder'] . (substr($SETTINGS['path_to_files_folder'] , -1) === '/' ? '' : '/') . $inputData['filename'], |
|
| 817 | - 'file_link' => $SETTINGS['url_to_files_folder'] . (substr($SETTINGS['path_to_files_folder'] , -1) === '/' ? '' : '/') . $inputData['filename'], |
|
| 816 | + 'file_path' => $SETTINGS['path_to_files_folder'].(substr($SETTINGS['path_to_files_folder'], -1) === '/' ? '' : '/').$inputData['filename'], |
|
| 817 | + 'file_link' => $SETTINGS['url_to_files_folder'].(substr($SETTINGS['path_to_files_folder'], -1) === '/' ? '' : '/').$inputData['filename'], |
|
| 818 | 818 | 'export_tag' => $inputData['export_tag'], |
| 819 | 819 | ], |
| 820 | 820 | 'encode' |
@@ -854,12 +854,12 @@ discard block |
||
| 854 | 854 | $full_listing = array(); |
| 855 | 855 | $items_id_list = array(); |
| 856 | 856 | $outstream = ''; |
| 857 | - include $SETTINGS['cpassman_dir'] . '/includes/config/include.php'; |
|
| 857 | + include $SETTINGS['cpassman_dir'].'/includes/config/include.php'; |
|
| 858 | 858 | |
| 859 | 859 | // query |
| 860 | 860 | $rows = DB::query( |
| 861 | 861 | 'SELECT * |
| 862 | - FROM ' . prefixTable('export') . ' |
|
| 862 | + FROM ' . prefixTable('export').' |
|
| 863 | 863 | WHERE export_tag = %s AND item_id IN %ls', |
| 864 | 864 | $inputData['export_tag'], |
| 865 | 865 | $inputData['idsList'] |
@@ -873,7 +873,7 @@ discard block |
||
| 873 | 873 | [ |
| 874 | 874 | 'error' => true, |
| 875 | 875 | 'message' => $lang->get('error_while_creating_file'), |
| 876 | - 'detail' => $SETTINGS['path_to_files_folder'] . $inputData['filename'], |
|
| 876 | + 'detail' => $SETTINGS['path_to_files_folder'].$inputData['filename'], |
|
| 877 | 877 | ], |
| 878 | 878 | 'encode' |
| 879 | 879 | ); |
@@ -906,13 +906,13 @@ discard block |
||
| 906 | 906 | if (empty($arboHtml)) { |
| 907 | 907 | $arboHtml = $arboHtml_tmp; |
| 908 | 908 | } else { |
| 909 | - $arboHtml .= ' » ' . $arboHtml_tmp; |
|
| 909 | + $arboHtml .= ' » '.$arboHtml_tmp; |
|
| 910 | 910 | } |
| 911 | 911 | } |
| 912 | 912 | fputs( |
| 913 | 913 | $outstream, |
| 914 | 914 | ' |
| 915 | - <tr class="path"><td colspan="5">' . $arboHtml . '</td></tr>' |
|
| 915 | + <tr class="path"><td colspan="5">' . $arboHtml.'</td></tr>' |
|
| 916 | 916 | ); |
| 917 | 917 | $idTree = $record['folder_id']; |
| 918 | 918 | |
@@ -920,12 +920,12 @@ discard block |
||
| 920 | 920 | fputs( |
| 921 | 921 | $outstream, |
| 922 | 922 | ' |
| 923 | - <tr class="' . $lineType . '"> |
|
| 924 | - <td>' . addslashes($record['label']) . '</td> |
|
| 925 | - <td align="center"><span class="span_pw" id="span_' . $record['item_id'] . '"><a href="#" onclick="decryptme(' . $record['item_id'] . ', \'' . $encPw . '\');return false;">Decrypt </a></span><input type="hidden" id="hide_' . $record['item_id'] . '" value="' . $encPw . '" /></td> |
|
| 926 | - <td>' . (empty($record['description']) === true ? ' ' : addslashes(str_replace(array(';', '<br />'), array('|', "\n\r"), stripslashes(mb_convert_encoding($record['description'], 'ISO-8859-1', 'UTF-8'))))) . '</td> |
|
| 927 | - <td align="center">' . (empty($record['login']) === true ? ' ' : addslashes($record['login'])) . '</td> |
|
| 928 | - <td align="center">' . (empty($record['url']) === true ? ' ' : addslashes($record['url'])) . '</td> |
|
| 923 | + <tr class="' . $lineType.'"> |
|
| 924 | + <td>' . addslashes($record['label']).'</td> |
|
| 925 | + <td align="center"><span class="span_pw" id="span_' . $record['item_id'].'"><a href="#" onclick="decryptme('.$record['item_id'].', \''.$encPw.'\');return false;">Decrypt </a></span><input type="hidden" id="hide_'.$record['item_id'].'" value="'.$encPw.'" /></td> |
|
| 926 | + <td>' . (empty($record['description']) === true ? ' ' : addslashes(str_replace(array(';', '<br />'), array('|', "\n\r"), stripslashes(mb_convert_encoding($record['description'], 'ISO-8859-1', 'UTF-8'))))).'</td> |
|
| 927 | + <td align="center">' . (empty($record['login']) === true ? ' ' : addslashes($record['login'])).'</td> |
|
| 928 | + <td align="center">' . (empty($record['url']) === true ? ' ' : addslashes($record['url'])).'</td> |
|
| 929 | 929 | </tr>' |
| 930 | 930 | ); |
| 931 | 931 | } |
@@ -975,7 +975,7 @@ discard block |
||
| 975 | 975 | $inputData['password'] = (string) $dataReceived['password']; |
| 976 | 976 | |
| 977 | 977 | // Load includes |
| 978 | - include $SETTINGS['cpassman_dir'] . '/includes/config/include.php'; |
|
| 978 | + include $SETTINGS['cpassman_dir'].'/includes/config/include.php'; |
|
| 979 | 979 | |
| 980 | 980 | // read the content of the temporary file |
| 981 | 981 | $handle = fopen($inputData['filename'].'.txt', 'r'); |
@@ -984,7 +984,7 @@ discard block |
||
| 984 | 984 | [ |
| 985 | 985 | 'error' => true, |
| 986 | 986 | 'message' => $lang->get('error_while_creating_file'), |
| 987 | - 'detail' => $SETTINGS['path_to_files_folder'] . $inputData['filename'], |
|
| 987 | + 'detail' => $SETTINGS['path_to_files_folder'].$inputData['filename'], |
|
| 988 | 988 | ], |
| 989 | 989 | 'encode' |
| 990 | 990 | ); |
@@ -996,7 +996,7 @@ discard block |
||
| 996 | 996 | [ |
| 997 | 997 | 'error' => true, |
| 998 | 998 | 'message' => $lang->get('error_while_creating_file'), |
| 999 | - 'detail' => $SETTINGS['path_to_files_folder'] . $inputData['filename'], |
|
| 999 | + 'detail' => $SETTINGS['path_to_files_folder'].$inputData['filename'], |
|
| 1000 | 1000 | ], |
| 1001 | 1001 | 'encode' |
| 1002 | 1002 | ); |
@@ -1012,9 +1012,9 @@ discard block |
||
| 1012 | 1012 | $chunks = explode('|#|#|', chunk_split($contents, 10000, '|#|#|')); |
| 1013 | 1013 | foreach ($chunks as $chunk) { |
| 1014 | 1014 | if (empty($encrypted_text) === true) { |
| 1015 | - $encrypted_text = GibberishAES::enc(/** @scrutinizer ignore-type */ $chunk, $inputData['password'] ); |
|
| 1015 | + $encrypted_text = GibberishAES::enc(/** @scrutinizer ignore-type */ $chunk, $inputData['password']); |
|
| 1016 | 1016 | } else { |
| 1017 | - $encrypted_text .= '|#|#|' . GibberishAES::enc(/** @scrutinizer ignore-type */ $chunk, $inputData['password'] ); |
|
| 1017 | + $encrypted_text .= '|#|#|'.GibberishAES::enc(/** @scrutinizer ignore-type */ $chunk, $inputData['password']); |
|
| 1018 | 1018 | } |
| 1019 | 1019 | } |
| 1020 | 1020 | |
@@ -1025,7 +1025,7 @@ discard block |
||
| 1025 | 1025 | [ |
| 1026 | 1026 | 'error' => true, |
| 1027 | 1027 | 'message' => $lang->get('error_while_creating_file'), |
| 1028 | - 'detail' => $SETTINGS['path_to_files_folder'] . $inputData['filename'], |
|
| 1028 | + 'detail' => $SETTINGS['path_to_files_folder'].$inputData['filename'], |
|
| 1029 | 1029 | ], |
| 1030 | 1030 | 'encode' |
| 1031 | 1031 | ); |
@@ -1038,9 +1038,9 @@ discard block |
||
| 1038 | 1038 | </table></div> |
| 1039 | 1039 | <input type="button" value="Hide all" onclick="hideAll()" /> |
| 1040 | 1040 | <div id="footer" style="text-align:center;"> |
| 1041 | - <a href="https://teampass.net/about/" target="_blank">' . TP_TOOL_NAME . ' ' . TP_VERSION . ' ' . TP_COPYRIGHT . '</a> |
|
| 1041 | + <a href="https://teampass.net/about/" target="_blank">' . TP_TOOL_NAME.' '.TP_VERSION.' '.TP_COPYRIGHT.'</a> |
|
| 1042 | 1042 | </div> |
| 1043 | - <div id="enc_html" style="display:none;">' . $encrypted_text . '</div> |
|
| 1043 | + <div id="enc_html" style="display:none;">' . $encrypted_text.'</div> |
|
| 1044 | 1044 | </body> |
| 1045 | 1045 | </html> |
| 1046 | 1046 | <script type="text/javascript"> |
@@ -1143,12 +1143,12 @@ discard block |
||
| 1143 | 1143 | fclose($outstream); |
| 1144 | 1144 | |
| 1145 | 1145 | //clean table |
| 1146 | - DB::query('TRUNCATE TABLE ' . prefixTable('export')); |
|
| 1146 | + DB::query('TRUNCATE TABLE '.prefixTable('export')); |
|
| 1147 | 1147 | |
| 1148 | 1148 | echo (string) prepareExchangedData( |
| 1149 | 1149 | [ |
| 1150 | 1150 | 'error' => false, |
| 1151 | - 'filelink' => $inputData['file_link'] , |
|
| 1151 | + 'filelink' => $inputData['file_link'], |
|
| 1152 | 1152 | ], |
| 1153 | 1153 | 'encode' |
| 1154 | 1154 | ); |
@@ -51,7 +51,7 @@ discard block |
||
| 51 | 51 | // Sanitize |
| 52 | 52 | // IMPORTANT: Password should NOT be escaped/sanitized - treat as opaque binary data |
| 53 | 53 | // Only trim whitespace which is safe and expected (fix 3.1.5.10) |
| 54 | - include_once API_ROOT_PATH . '/../sources/main.functions.php'; |
|
| 54 | + include_once API_ROOT_PATH.'/../sources/main.functions.php'; |
|
| 55 | 55 | $inputData = dataSanitizer( |
| 56 | 56 | [ |
| 57 | 57 | 'login' => isset($login) === true ? $login : '', |
@@ -115,7 +115,7 @@ discard block |
||
| 115 | 115 | |
| 116 | 116 | // Encrypt the decrypted private key with the session key |
| 117 | 117 | // This allows us to store it securely in the database without exposing it |
| 118 | - require_once API_ROOT_PATH . '/inc/encryption_utils.php'; |
|
| 118 | + require_once API_ROOT_PATH.'/inc/encryption_utils.php'; |
|
| 119 | 119 | $encryptedPrivateKey = encrypt_with_session_key($privateKeyClear, $sessionKey); |
| 120 | 120 | |
| 121 | 121 | if ($encryptedPrivateKey === false) { |
@@ -283,7 +283,7 @@ discard block |
||
| 283 | 283 | if (count($userFunctionId) > 0) { |
| 284 | 284 | $rows = DB::query( |
| 285 | 285 | 'SELECT * |
| 286 | - FROM ' . prefixTable('roles_values') . ' |
|
| 286 | + FROM ' . prefixTable('roles_values').' |
|
| 287 | 287 | WHERE role_id IN %li AND type IN ("W", "ND", "NE", "NDNE", "R")', |
| 288 | 288 | $userFunctionId |
| 289 | 289 | ); |
@@ -309,7 +309,7 @@ discard block |
||
| 309 | 309 | $inc = 0; |
| 310 | 310 | $rows = DB::query( |
| 311 | 311 | 'SELECT id, id_tree |
| 312 | - FROM ' . prefixTable('items') . ' |
|
| 312 | + FROM ' . prefixTable('items').' |
|
| 313 | 313 | WHERE restricted_to LIKE %s'. |
| 314 | 314 | (count($userFunctionId) > 0 ? ' AND id_tree NOT IN %li' : ''), |
| 315 | 315 | $userInfo['id'], |
@@ -324,8 +324,8 @@ discard block |
||
| 324 | 324 | // Check for the users roles if some specific rights exist on items |
| 325 | 325 | $rows = DB::query( |
| 326 | 326 | 'SELECT i.id_tree, r.item_id |
| 327 | - FROM ' . prefixTable('items') . ' AS i |
|
| 328 | - INNER JOIN ' . prefixTable('restriction_to_roles') . ' AS r ON (r.item_id=i.id) |
|
| 327 | + FROM ' . prefixTable('items').' AS i |
|
| 328 | + INNER JOIN ' . prefixTable('restriction_to_roles').' AS r ON (r.item_id=i.id) |
|
| 329 | 329 | WHERE '.(count($userFunctionId) > 0 ? ' id_tree NOT IN %li AND ' : '').' i.id_tree != "" |
| 330 | 330 | ORDER BY i.id_tree ASC', |
| 331 | 331 | count($userFunctionId) > 0 ? $userFunctionId : DB::sqleval('0') |
@@ -341,7 +341,7 @@ discard block |
||
| 341 | 341 | // Add all personal folders |
| 342 | 342 | $rows = DB::queryFirstRow( |
| 343 | 343 | 'SELECT id |
| 344 | - FROM ' . prefixTable('nested_tree') . ' |
|
| 344 | + FROM ' . prefixTable('nested_tree').' |
|
| 345 | 345 | WHERE title = %i AND personal_folder = 1'. |
| 346 | 346 | (count($userFunctionId) > 0 ? ' AND id NOT IN %li' : ''), |
| 347 | 347 | $userInfo['id'], |
@@ -360,12 +360,12 @@ |
||
| 360 | 360 | //end getAction() |
| 361 | 361 | |
| 362 | 362 | /** |
| 363 | - * Find items by URL |
|
| 364 | - * Searches for items matching a specific URL |
|
| 365 | - * |
|
| 366 | - * @param array $userData User data from JWT token |
|
| 367 | - * @return void |
|
| 368 | - */ |
|
| 363 | + * Find items by URL |
|
| 364 | + * Searches for items matching a specific URL |
|
| 365 | + * |
|
| 366 | + * @param array $userData User data from JWT token |
|
| 367 | + * @return void |
|
| 368 | + */ |
|
| 369 | 369 | public function findByUrlAction(array $userData): void |
| 370 | 370 | { |
| 371 | 371 | $request = symfonyRequest::createFromGlobals(); |
@@ -40,11 +40,11 @@ discard block |
||
| 40 | 40 | */ |
| 41 | 41 | private function getUserPrivateKey(array $userData): ?string |
| 42 | 42 | { |
| 43 | - include_once API_ROOT_PATH . '/inc/jwt_utils.php'; |
|
| 43 | + include_once API_ROOT_PATH.'/inc/jwt_utils.php'; |
|
| 44 | 44 | |
| 45 | 45 | // Verify session_key exists in JWT payload |
| 46 | 46 | if (!isset($userData['session_key']) || empty($userData['session_key'])) { |
| 47 | - error_log('getUserPrivateKey: Missing session_key in JWT token for user ID ' . $userData['id']); |
|
| 47 | + error_log('getUserPrivateKey: Missing session_key in JWT token for user ID '.$userData['id']); |
|
| 48 | 48 | return null; |
| 49 | 49 | } |
| 50 | 50 | |
@@ -88,7 +88,7 @@ discard block |
||
| 88 | 88 | // SQL where clause with folders list |
| 89 | 89 | if (isset($arrQueryStringParams['folders']) === true) { |
| 90 | 90 | // convert the folders to an array |
| 91 | - $arrQueryStringParams['folders'] = explode(',', str_replace( array('[',']') , '' , $arrQueryStringParams['folders'])); |
|
| 91 | + $arrQueryStringParams['folders'] = explode(',', str_replace(array('[', ']'), '', $arrQueryStringParams['folders'])); |
|
| 92 | 92 | |
| 93 | 93 | // ensure to only use the intersection |
| 94 | 94 | $foldersList = implode(',', array_intersect($arrQueryStringParams['folders'], $userData['folders_list'])); |
@@ -256,7 +256,7 @@ discard block |
||
| 256 | 256 | } else { |
| 257 | 257 | // Gérer le cas où les paramètres ne sont pas un tableau |
| 258 | 258 | $strErrorDesc = 'Data not consistent'; |
| 259 | - $strErrorHeader = 'Expected array, received ' . gettype($arrQueryStringParams); |
|
| 259 | + $strErrorHeader = 'Expected array, received '.gettype($arrQueryStringParams); |
|
| 260 | 260 | } |
| 261 | 261 | } |
| 262 | 262 | } else { |
@@ -307,10 +307,10 @@ discard block |
||
| 307 | 307 | // SQL where clause with item id |
| 308 | 308 | if (isset($arrQueryStringParams['id']) === true) { |
| 309 | 309 | // build sql where clause by ID |
| 310 | - $sqlExtra = ' WHERE i.id = '.$arrQueryStringParams['id'] . $sql_constraint; |
|
| 310 | + $sqlExtra = ' WHERE i.id = '.$arrQueryStringParams['id'].$sql_constraint; |
|
| 311 | 311 | } else if (isset($arrQueryStringParams['label']) === true) { |
| 312 | 312 | // build sql where clause by LABEL |
| 313 | - $sqlExtra = ' WHERE i.label '.(isset($arrQueryStringParams['like']) === true && (int) $arrQueryStringParams['like'] === 1 ? ' LIKE '.$arrQueryStringParams['label'] : ' = '.$arrQueryStringParams['label']) . $sql_constraint; |
|
| 313 | + $sqlExtra = ' WHERE i.label '.(isset($arrQueryStringParams['like']) === true && (int) $arrQueryStringParams['like'] === 1 ? ' LIKE '.$arrQueryStringParams['label'] : ' = '.$arrQueryStringParams['label']).$sql_constraint; |
|
| 314 | 314 | } else if (isset($arrQueryStringParams['description']) === true) { |
| 315 | 315 | // build sql where clause by LABEL |
| 316 | 316 | $sqlExtra = ' WHERE i.description '.(isset($arrQueryStringParams['like']) === true && (int) $arrQueryStringParams['like'] === 1 ? ' LIKE '.$arrQueryStringParams['description'] : ' = '.$arrQueryStringParams['description']).$sql_constraint; |
@@ -393,9 +393,9 @@ discard block |
||
| 393 | 393 | }*/ |
| 394 | 394 | |
| 395 | 395 | // Build SQL constraint for accessible folders |
| 396 | - $sql_constraint = ' AND (i.id_tree IN (' . $userData['folders_list'] . ')'; |
|
| 396 | + $sql_constraint = ' AND (i.id_tree IN ('.$userData['folders_list'].')'; |
|
| 397 | 397 | if (!empty($userData['restricted_items_list'])) { |
| 398 | - $sql_constraint .= ' OR i.id IN (' . $userData['restricted_items_list'] . ')'; |
|
| 398 | + $sql_constraint .= ' OR i.id IN ('.$userData['restricted_items_list'].')'; |
|
| 399 | 399 | } |
| 400 | 400 | $sql_constraint .= ')'; |
| 401 | 401 | |
@@ -412,8 +412,8 @@ discard block |
||
| 412 | 412 | // Query items with the specific URL |
| 413 | 413 | $rows = DB::query( |
| 414 | 414 | 'SELECT i.id, i.label, i.login, i.url, i.id_tree |
| 415 | - FROM ' . prefixTable('items') . ' AS i |
|
| 416 | - WHERE i.url LIKE %s' . $sql_constraint . ' |
|
| 415 | + FROM ' . prefixTable('items').' AS i |
|
| 416 | + WHERE i.url LIKE %s' . $sql_constraint.' |
|
| 417 | 417 | ORDER BY i.label ASC', |
| 418 | 418 | $searchUrl."%" |
| 419 | 419 | ); |
@@ -423,7 +423,7 @@ discard block |
||
| 423 | 423 | // Get user's sharekey for this item |
| 424 | 424 | $shareKey = DB::queryfirstrow( |
| 425 | 425 | 'SELECT share_key |
| 426 | - FROM ' . prefixTable('sharekeys_items') . ' |
|
| 426 | + FROM ' . prefixTable('sharekeys_items').' |
|
| 427 | 427 | WHERE user_id = %i AND object_id = %i', |
| 428 | 428 | $userData['id'], |
| 429 | 429 | $row['id'] |
@@ -455,7 +455,7 @@ discard block |
||
| 455 | 455 | } |
| 456 | 456 | } |
| 457 | 457 | } catch (Error $e) { |
| 458 | - $strErrorDesc = $e->getMessage() . '. Something went wrong! Please contact support.'; |
|
| 458 | + $strErrorDesc = $e->getMessage().'. Something went wrong! Please contact support.'; |
|
| 459 | 459 | $strErrorHeader = 'HTTP/1.1 500 Internal Server Error'; |
| 460 | 460 | } |
| 461 | 461 | } else { |
@@ -61,7 +61,7 @@ discard block |
||
| 61 | 61 | $strErrorDesc = 'Missing required parameters: login, password, and apikey must be provided in request body'; |
| 62 | 62 | $strErrorHeader = 'HTTP/1.1 400 Bad Request'; |
| 63 | 63 | } else { |
| 64 | - require API_ROOT_PATH . "/Model/AuthModel.php"; |
|
| 64 | + require API_ROOT_PATH."/Model/AuthModel.php"; |
|
| 65 | 65 | try { |
| 66 | 66 | $authModel = new AuthModel(); |
| 67 | 67 | $arrUser = $authModel->getUserAuth( |
@@ -72,7 +72,7 @@ discard block |
||
| 72 | 72 | if (array_key_exists("token", $arrUser)) { |
| 73 | 73 | $responseData = json_encode($arrUser); |
| 74 | 74 | } else { |
| 75 | - $strErrorDesc = $arrUser['error'] . " (" . $arrUser['info'] . ")"; |
|
| 75 | + $strErrorDesc = $arrUser['error']." (".$arrUser['info'].")"; |
|
| 76 | 76 | $strErrorHeader = 'HTTP/1.1 401 Unauthorized'; |
| 77 | 77 | } |
| 78 | 78 | } catch (Error $e) { |
@@ -148,34 +148,34 @@ discard block |
||
| 148 | 148 | */ |
| 149 | 149 | function get_user_keys(int $userId, string $keyTempo, string $sessionKey): ?array |
| 150 | 150 | { |
| 151 | - require_once API_ROOT_PATH . '/inc/encryption_utils.php'; |
|
| 151 | + require_once API_ROOT_PATH.'/inc/encryption_utils.php'; |
|
| 152 | 152 | |
| 153 | 153 | // Retrieve user's public key and encrypted private key from database |
| 154 | 154 | $userInfo = DB::queryfirstrow( |
| 155 | 155 | "SELECT u.public_key, a.encrypted_private_key, a.session_key AS key_tempo |
| 156 | - FROM " . prefixTable('users') . " AS u |
|
| 157 | - INNER JOIN " . prefixTable('api') . " AS a ON (a.user_id = u.id) |
|
| 156 | + FROM " . prefixTable('users')." AS u |
|
| 157 | + INNER JOIN " . prefixTable('api')." AS a ON (a.user_id = u.id) |
|
| 158 | 158 | WHERE u.id = %i", |
| 159 | 159 | $userId |
| 160 | 160 | ); |
| 161 | 161 | |
| 162 | 162 | if (DB::count() === 0) { |
| 163 | 163 | // User not found or no API configuration |
| 164 | - error_log('[API] get_user_keys: User not found or no API config for user ID ' . $userId); |
|
| 164 | + error_log('[API] get_user_keys: User not found or no API config for user ID '.$userId); |
|
| 165 | 165 | return null; |
| 166 | 166 | } |
| 167 | 167 | |
| 168 | 168 | // Validate key_tempo matches (security check - ensures session is still valid) |
| 169 | 169 | if (($userInfo['key_tempo']) !== $keyTempo) { |
| 170 | 170 | // Session invalid or expired |
| 171 | - error_log('[API] get_user_keys: Invalid key_tempo for user ID ' . $userId); |
|
| 171 | + error_log('[API] get_user_keys: Invalid key_tempo for user ID '.$userId); |
|
| 172 | 172 | return null; |
| 173 | 173 | } |
| 174 | 174 | |
| 175 | 175 | // Check if encrypted private key exists |
| 176 | 176 | if (empty($userInfo['encrypted_private_key'])) { |
| 177 | 177 | // No encrypted key found - user needs to re-authenticate |
| 178 | - error_log('[API] get_user_keys: No encrypted private key found for user ID ' . $userId); |
|
| 178 | + error_log('[API] get_user_keys: No encrypted private key found for user ID '.$userId); |
|
| 179 | 179 | return null; |
| 180 | 180 | } |
| 181 | 181 | |
@@ -195,7 +195,7 @@ discard block |
||
| 195 | 195 | |
| 196 | 196 | if ($privateKeyDecrypted === false) { |
| 197 | 197 | // Decryption failed - wrong key or tampered data |
| 198 | - error_log('[API] get_user_keys: Failed to decrypt private key for user ID ' . $userId); |
|
| 198 | + error_log('[API] get_user_keys: Failed to decrypt private key for user ID '.$userId); |
|
| 199 | 199 | return null; |
| 200 | 200 | } |
| 201 | 201 | |
@@ -76,7 +76,7 @@ discard block |
||
| 76 | 76 | ) { |
| 77 | 77 | // Not allowed page |
| 78 | 78 | $session->set('system-error_code', ERR_NOT_ALLOWED); |
| 79 | - include $SETTINGS['cpassman_dir'] . '/error.php'; |
|
| 79 | + include $SETTINGS['cpassman_dir'].'/error.php'; |
|
| 80 | 80 | exit; |
| 81 | 81 | } |
| 82 | 82 | |
@@ -557,7 +557,7 @@ discard block |
||
| 557 | 557 | |
| 558 | 558 | // Parse all users to remove this role from users_roles table |
| 559 | 559 | DB::query( |
| 560 | - 'DELETE FROM ' . prefixTable('users_roles') . ' |
|
| 560 | + 'DELETE FROM '.prefixTable('users_roles').' |
|
| 561 | 561 | WHERE role_id = %i', |
| 562 | 562 | $post_roleId |
| 563 | 563 | ); |
@@ -619,7 +619,7 @@ discard block |
||
| 619 | 619 | $groupsData = $openLdapExtra->getADGroups($ldapConnection, $SETTINGS); |
| 620 | 620 | break; |
| 621 | 621 | default: |
| 622 | - throw new Exception("Unsupported LDAP type: " . $SETTINGS['ldap_type']); |
|
| 622 | + throw new Exception("Unsupported LDAP type: ".$SETTINGS['ldap_type']); |
|
| 623 | 623 | } |
| 624 | 624 | } catch (Exception $e) { |
| 625 | 625 | if (defined('LOG_TO_SERVER') && LOG_TO_SERVER === true) { |
@@ -639,7 +639,7 @@ discard block |
||
| 639 | 639 | } else { |
| 640 | 640 | // Handle successful retrieval of groups |
| 641 | 641 | // exists in Teampass |
| 642 | - foreach($groupsData['userGroups'] as $key => $group) { |
|
| 642 | + foreach ($groupsData['userGroups'] as $key => $group) { |
|
| 643 | 643 | $role_detail = DB::queryFirstRow( |
| 644 | 644 | 'SELECT a.increment_id as increment_id, a.role_id as role_id, r.title as title |
| 645 | 645 | FROM '.prefixTable('ldap_groups_roles').' AS a |
@@ -664,7 +664,7 @@ discard block |
||
| 664 | 664 | |
| 665 | 665 | // Get all groups in Teampass |
| 666 | 666 | $teampassRoles = array(); |
| 667 | - $rows = DB::query('SELECT id,title FROM ' . prefixTable('roles_title')); |
|
| 667 | + $rows = DB::query('SELECT id,title FROM '.prefixTable('roles_title')); |
|
| 668 | 668 | foreach ($rows as $record) { |
| 669 | 669 | array_push( |
| 670 | 670 | $teampassRoles, |
@@ -146,7 +146,7 @@ discard block |
||
| 146 | 146 | $sessionPwdAttempts = $session->get('pwd_attempts'); |
| 147 | 147 | $sessionUrl = $session->get('user-initial_url'); |
| 148 | 148 | $server = []; |
| 149 | - $server['PHP_AUTH_USER'] = $request->getUser(); |
|
| 149 | + $server['PHP_AUTH_USER'] = $request->getUser(); |
|
| 150 | 150 | $server['PHP_AUTH_PW'] = $request->getPassword(); |
| 151 | 151 | |
| 152 | 152 | // decrypt and retreive data in JSON format |
@@ -166,18 +166,18 @@ discard block |
||
| 166 | 166 | } |
| 167 | 167 | |
| 168 | 168 | // Check if Duo auth is in progress and pass the pw and login back to the standard login process |
| 169 | - if( |
|
| 169 | + if ( |
|
| 170 | 170 | isKeyExistingAndEqual('duo', 1, $SETTINGS) === true |
| 171 | 171 | && $dataReceived['user_2fa_selection'] === 'duo' |
| 172 | 172 | && $session->get('user-duo_status') === 'IN_PROGRESS' |
| 173 | 173 | && !empty($dataReceived['duo_state']) |
| 174 | - ){ |
|
| 174 | + ) { |
|
| 175 | 175 | $key = hash('sha256', $dataReceived['duo_state']); |
| 176 | 176 | $iv = substr(hash('sha256', $dataReceived['duo_state']), 0, 16); |
| 177 | 177 | $duo_data_dec = openssl_decrypt(base64_decode($session->get('user-duo_data')), 'AES-256-CBC', $key, 0, $iv); |
| 178 | 178 | // Clear the data from the Duo process to continue clean with the standard login process |
| 179 | - $session->set('user-duo_data',''); |
|
| 180 | - if($duo_data_dec === false) { |
|
| 179 | + $session->set('user-duo_data', ''); |
|
| 180 | + if ($duo_data_dec === false) { |
|
| 181 | 181 | // Add failed authentication log |
| 182 | 182 | addFailedAuthentication(filter_var($dataReceived['login'], FILTER_SANITIZE_FULL_SPECIAL_CHARS), getClientIpServer()); |
| 183 | 183 | |
@@ -195,7 +195,7 @@ discard block |
||
| 195 | 195 | $dataReceived['login'] = $duo_data['duo_login']; |
| 196 | 196 | } |
| 197 | 197 | |
| 198 | - if(isset($dataReceived['pw']) === false || isset($dataReceived['login']) === false) { |
|
| 198 | + if (isset($dataReceived['pw']) === false || isset($dataReceived['login']) === false) { |
|
| 199 | 199 | echo json_encode([ |
| 200 | 200 | 'data' => prepareExchangedData( |
| 201 | 201 | [ |
@@ -498,7 +498,7 @@ discard block |
||
| 498 | 498 | 0, |
| 499 | 499 | (string) $return, |
| 500 | 500 | (array) $userInfo ?? [], |
| 501 | - false, // not success |
|
| 501 | + false, // not success |
|
| 502 | 502 | 'user_is_locked', |
| 503 | 503 | $lang->get('account_is_locked') |
| 504 | 504 | ), |
@@ -514,7 +514,7 @@ discard block |
||
| 514 | 514 | (int) $sessionPwdAttempts, |
| 515 | 515 | (string) $return, |
| 516 | 516 | (array) $userInfo ?? [], |
| 517 | - false, // not success |
|
| 517 | + false, // not success |
|
| 518 | 518 | true, |
| 519 | 519 | $lang->get('error_not_allowed_to_authenticate') |
| 520 | 520 | ), |
@@ -791,7 +791,7 @@ discard block |
||
| 791 | 791 | // Get cache tree info |
| 792 | 792 | $cacheTreeData = DB::queryFirstRow( |
| 793 | 793 | 'SELECT visible_folders |
| 794 | - FROM ' . prefixTable('cache_tree') . ' |
|
| 794 | + FROM ' . prefixTable('cache_tree').' |
|
| 795 | 795 | WHERE user_id=%i', |
| 796 | 796 | (int) $session->get('user-id') |
| 797 | 797 | ); |
@@ -822,7 +822,7 @@ discard block |
||
| 822 | 822 | && (int) $userInfo['admin'] !== 1 |
| 823 | 823 | ) { |
| 824 | 824 | // get all Admin users |
| 825 | - $val = DB::queryFirstRow('SELECT email FROM ' . prefixTable('users') . " WHERE admin = %i and email != ''", 1); |
|
| 825 | + $val = DB::queryFirstRow('SELECT email FROM '.prefixTable('users')." WHERE admin = %i and email != ''", 1); |
|
| 826 | 826 | if (DB::count() > 0) { |
| 827 | 827 | // Add email to table |
| 828 | 828 | prepareSendingEmail( |
@@ -834,7 +834,7 @@ discard block |
||
| 834 | 834 | '#tp_time#', |
| 835 | 835 | ], |
| 836 | 836 | [ |
| 837 | - ' ' . $session->get('user-login') . ' (IP: ' . getClientIpServer() . ')', |
|
| 837 | + ' '.$session->get('user-login').' (IP: '.getClientIpServer().')', |
|
| 838 | 838 | date($SETTINGS['date_format'], (int) time()), |
| 839 | 839 | date($SETTINGS['time_format'], (int) time()), |
| 840 | 840 | ], |
@@ -941,7 +941,7 @@ discard block |
||
| 941 | 941 | if (is_null($userInfo['roles_from_ad_groups']) === false) { |
| 942 | 942 | $userInfo['fonction_id'] = empty($userInfo['fonction_id']) === true |
| 943 | 943 | ? $userInfo['roles_from_ad_groups'] |
| 944 | - : $userInfo['fonction_id'] . ';' . $userInfo['roles_from_ad_groups']; |
|
| 944 | + : $userInfo['fonction_id'].';'.$userInfo['roles_from_ad_groups']; |
|
| 945 | 945 | } |
| 946 | 946 | |
| 947 | 947 | // Store roles in session |
@@ -958,7 +958,7 @@ discard block |
||
| 958 | 958 | // Get roles from database |
| 959 | 959 | $rolesList = DB::query( |
| 960 | 960 | 'SELECT id, title, complexity |
| 961 | - FROM ' . prefixTable('roles_title') . ' |
|
| 961 | + FROM ' . prefixTable('roles_title').' |
|
| 962 | 962 | WHERE id IN %li', |
| 963 | 963 | $session->get('user-roles_array') |
| 964 | 964 | ); |
@@ -1047,7 +1047,7 @@ discard block |
||
| 1047 | 1047 | { |
| 1048 | 1048 | $rows = DB::query( |
| 1049 | 1049 | 'SELECT date |
| 1050 | - FROM ' . prefixTable('log_system') . " |
|
| 1050 | + FROM ' . prefixTable('log_system')." |
|
| 1051 | 1051 | WHERE field_1 = %s |
| 1052 | 1052 | AND type = 'failed_auth' |
| 1053 | 1053 | AND label = 'password_is_not_correct' |
@@ -1061,7 +1061,7 @@ discard block |
||
| 1061 | 1061 | foreach ($rows as $record) { |
| 1062 | 1062 | array_push( |
| 1063 | 1063 | $arrAttempts, |
| 1064 | - date($SETTINGS['date_format'] . ' ' . $SETTINGS['time_format'], (int) $record['date']) |
|
| 1064 | + date($SETTINGS['date_format'].' '.$SETTINGS['time_format'], (int) $record['date']) |
|
| 1065 | 1065 | ); |
| 1066 | 1066 | } |
| 1067 | 1067 | } |
@@ -1096,7 +1096,7 @@ discard block |
||
| 1096 | 1096 | $ldapConnection |
| 1097 | 1097 | ) : bool |
| 1098 | 1098 | { |
| 1099 | - include_once $SETTINGS['cpassman_dir'] . '/sources/main.functions.php'; |
|
| 1099 | + include_once $SETTINGS['cpassman_dir'].'/sources/main.functions.php'; |
|
| 1100 | 1100 | |
| 1101 | 1101 | if ((int) $userInfoDisabled === 1) { |
| 1102 | 1102 | return false; |
@@ -1184,7 +1184,7 @@ discard block |
||
| 1184 | 1184 | // If user has seed but no backup, create it on first successful login |
| 1185 | 1185 | if (!empty($userInfo['user_derivation_seed']) && empty($userInfo['private_key_backup'])) { |
| 1186 | 1186 | if (defined('LOG_TO_SERVER') && LOG_TO_SERVER === true) { |
| 1187 | - error_log('TEAMPASS Transparent Recovery - Creating backup for user ' . ($userInfo['login'] ?? 'unknown')); |
|
| 1187 | + error_log('TEAMPASS Transparent Recovery - Creating backup for user '.($userInfo['login'] ?? 'unknown')); |
|
| 1188 | 1188 | } |
| 1189 | 1189 | |
| 1190 | 1190 | $derivedKey = deriveBackupKey($userInfo['user_derivation_seed'], $userInfo['public_key'], $SETTINGS); |
@@ -1354,7 +1354,7 @@ discard block |
||
| 1354 | 1354 | } catch (Exception $e) { |
| 1355 | 1355 | return [ |
| 1356 | 1356 | 'error' => true, |
| 1357 | - 'message' => "Error: " . $e->getMessage(), |
|
| 1357 | + 'message' => "Error: ".$e->getMessage(), |
|
| 1358 | 1358 | ]; |
| 1359 | 1359 | } |
| 1360 | 1360 | } |
@@ -1385,7 +1385,7 @@ discard block |
||
| 1385 | 1385 | 'type' => 'OpenLDAP' |
| 1386 | 1386 | ]; |
| 1387 | 1387 | default: |
| 1388 | - throw new Exception("Unsupported LDAP type: " . $SETTINGS['ldap_type']); |
|
| 1388 | + throw new Exception("Unsupported LDAP type: ".$SETTINGS['ldap_type']); |
|
| 1389 | 1389 | } |
| 1390 | 1390 | } |
| 1391 | 1391 | |
@@ -1522,7 +1522,7 @@ discard block |
||
| 1522 | 1522 | ); |
| 1523 | 1523 | } |
| 1524 | 1524 | |
| 1525 | - throw new Exception("Unsupported LDAP type: " . $ldapHandler['type']); |
|
| 1525 | + throw new Exception("Unsupported LDAP type: ".$ldapHandler['type']); |
|
| 1526 | 1526 | } |
| 1527 | 1527 | |
| 1528 | 1528 | /** |
@@ -1539,11 +1539,11 @@ discard block |
||
| 1539 | 1539 | if (isset($SETTINGS['enable_ad_users_with_ad_groups']) === true && (int) $SETTINGS['enable_ad_users_with_ad_groups'] === 1) { |
| 1540 | 1540 | // Get user groups from AD |
| 1541 | 1541 | $user_ad_groups = []; |
| 1542 | - foreach($groups as $group) { |
|
| 1542 | + foreach ($groups as $group) { |
|
| 1543 | 1543 | // get relation role id for AD group |
| 1544 | 1544 | $role = DB::queryFirstRow( |
| 1545 | 1545 | 'SELECT lgr.role_id |
| 1546 | - FROM ' . prefixTable('ldap_groups_roles') . ' AS lgr |
|
| 1546 | + FROM ' . prefixTable('ldap_groups_roles').' AS lgr |
|
| 1547 | 1547 | WHERE lgr.ldap_group_id = %s', |
| 1548 | 1548 | $group |
| 1549 | 1549 | ); |
@@ -1589,7 +1589,7 @@ discard block |
||
| 1589 | 1589 | $passwordManager = new PasswordManager(); |
| 1590 | 1590 | |
| 1591 | 1591 | // Migrate password if needed |
| 1592 | - $result = $passwordManager->migratePassword( |
|
| 1592 | + $result = $passwordManager->migratePassword( |
|
| 1593 | 1593 | $userInfo['pw'], |
| 1594 | 1594 | $passwordClear, |
| 1595 | 1595 | (int) $userInfo['id'] |
@@ -1666,7 +1666,7 @@ discard block |
||
| 1666 | 1666 | // Check if exists in DB |
| 1667 | 1667 | $groupData = DB::queryFirstRow( |
| 1668 | 1668 | 'SELECT id |
| 1669 | - FROM ' . prefixTable('roles_title') . ' |
|
| 1669 | + FROM ' . prefixTable('roles_title').' |
|
| 1670 | 1670 | WHERE title = %s', |
| 1671 | 1671 | $group["displayName"] |
| 1672 | 1672 | ); |
@@ -1815,7 +1815,7 @@ discard block |
||
| 1815 | 1815 | |
| 1816 | 1816 | // generate new QR |
| 1817 | 1817 | $new_2fa_qr = $tfa->getQRCodeImageAsDataUri( |
| 1818 | - 'Teampass - ' . $username, |
|
| 1818 | + 'Teampass - '.$username, |
|
| 1819 | 1819 | $userInfo['ga'] |
| 1820 | 1820 | ); |
| 1821 | 1821 | // clear temporary code from DB |
@@ -1828,7 +1828,7 @@ discard block |
||
| 1828 | 1828 | $userInfo['id'] |
| 1829 | 1829 | ); |
| 1830 | 1830 | $firstTime = [ |
| 1831 | - 'value' => '<img src="' . $new_2fa_qr . '">', |
|
| 1831 | + 'value' => '<img src="'.$new_2fa_qr.'">', |
|
| 1832 | 1832 | 'user_admin' => isset($sessionAdmin) ? (int) $sessionAdmin : '', |
| 1833 | 1833 | 'initial_url' => isset($sessionUrl) === true ? $sessionUrl : '', |
| 1834 | 1834 | 'pwd_attempts' => (int) $sessionPwdAttempts, |
@@ -1984,7 +1984,7 @@ discard block |
||
| 1984 | 1984 | }*/ |
| 1985 | 1985 | return [ |
| 1986 | 1986 | 'error' => true, |
| 1987 | - 'message' => $duo_error . $lang->get('duo_error_check_config'), |
|
| 1987 | + 'message' => $duo_error.$lang->get('duo_error_check_config'), |
|
| 1988 | 1988 | 'pwd_attempts' => (int) $sessionPwdAttempts, |
| 1989 | 1989 | 'debug_message' => $e->getMessage(), |
| 1990 | 1990 | 'proceedIdentification' => false, |
@@ -2000,7 +2000,7 @@ discard block |
||
| 2000 | 2000 | } catch (DuoException $e) { |
| 2001 | 2001 | return [ |
| 2002 | 2002 | 'error' => true, |
| 2003 | - 'message' => $duo_error . $lang->get('duo_error_url'), |
|
| 2003 | + 'message' => $duo_error.$lang->get('duo_error_url'), |
|
| 2004 | 2004 | 'pwd_attempts' => (int) $sessionPwdAttempts, |
| 2005 | 2005 | 'debug_message' => $e->getMessage(), |
| 2006 | 2006 | 'proceedIdentification' => false, |
@@ -2008,7 +2008,7 @@ discard block |
||
| 2008 | 2008 | } |
| 2009 | 2009 | |
| 2010 | 2010 | // Somethimes Duo return success but fail to return a URL, double check if the URL has been created |
| 2011 | - if (!empty($duo_redirect_url) && filter_var($duo_redirect_url,FILTER_SANITIZE_URL)) { |
|
| 2011 | + if (!empty($duo_redirect_url) && filter_var($duo_redirect_url, FILTER_SANITIZE_URL)) { |
|
| 2012 | 2012 | // Since Duo Universal requires a redirect, let's store some info when the user get's back after completing the Duo prompt |
| 2013 | 2013 | $key = hash('sha256', $duo_state); |
| 2014 | 2014 | $iv = substr(hash('sha256', $duo_state), 0, 16); |
@@ -2036,7 +2036,7 @@ discard block |
||
| 2036 | 2036 | } else { |
| 2037 | 2037 | return [ |
| 2038 | 2038 | 'error' => true, |
| 2039 | - 'message' => $duo_error . $lang->get('duo_error_url'), |
|
| 2039 | + 'message' => $duo_error.$lang->get('duo_error_url'), |
|
| 2040 | 2040 | 'pwd_attempts' => (int) $sessionPwdAttempts, |
| 2041 | 2041 | 'proceedIdentification' => false, |
| 2042 | 2042 | ]; |
@@ -2057,8 +2057,8 @@ discard block |
||
| 2057 | 2057 | // return the response (which should be the user name) |
| 2058 | 2058 | if ($decoded_token['preferred_username'] === $username) { |
| 2059 | 2059 | $session->set('user-duo_status', 'COMPLET'); |
| 2060 | - $session->set('user-duo_state',''); |
|
| 2061 | - $session->set('user-duo_data',''); |
|
| 2060 | + $session->set('user-duo_state', ''); |
|
| 2061 | + $session->set('user-duo_data', ''); |
|
| 2062 | 2062 | $session->set('user-login', $username); |
| 2063 | 2063 | |
| 2064 | 2064 | return [ |
@@ -2069,9 +2069,9 @@ discard block |
||
| 2069 | 2069 | ]; |
| 2070 | 2070 | } else { |
| 2071 | 2071 | // Something wrong, username from the original Duo request is different than the one received now |
| 2072 | - $session->set('user-duo_status',''); |
|
| 2073 | - $session->set('user-duo_state',''); |
|
| 2074 | - $session->set('user-duo_data',''); |
|
| 2072 | + $session->set('user-duo_status', ''); |
|
| 2073 | + $session->set('user-duo_state', ''); |
|
| 2074 | + $session->set('user-duo_data', ''); |
|
| 2075 | 2075 | |
| 2076 | 2076 | return [ |
| 2077 | 2077 | 'error' => true, |
@@ -2082,9 +2082,9 @@ discard block |
||
| 2082 | 2082 | } |
| 2083 | 2083 | } |
| 2084 | 2084 | // If we are here something wrong |
| 2085 | - $session->set('user-duo_status',''); |
|
| 2086 | - $session->set('user-duo_state',''); |
|
| 2087 | - $session->set('user-duo_data',''); |
|
| 2085 | + $session->set('user-duo_status', ''); |
|
| 2086 | + $session->set('user-duo_state', ''); |
|
| 2087 | + $session->set('user-duo_data', ''); |
|
| 2088 | 2088 | return [ |
| 2089 | 2089 | 'error' => true, |
| 2090 | 2090 | 'message' => $lang->get('duo_login_mismatch'), |
@@ -2150,7 +2150,7 @@ discard block |
||
| 2150 | 2150 | prefixTable('users'), |
| 2151 | 2151 | [ |
| 2152 | 2152 | 'pw' => $newHash, |
| 2153 | - 'needs_password_migration' => 0, // 0 = migration completed |
|
| 2153 | + 'needs_password_migration' => 0, // 0 = migration completed |
|
| 2154 | 2154 | 'private_key' => $newUserPrivateKey, |
| 2155 | 2155 | ], |
| 2156 | 2156 | 'id = %i', |
@@ -2259,7 +2259,7 @@ discard block |
||
| 2259 | 2259 | // Check for existing lock |
| 2260 | 2260 | $unlock_at = DB::queryFirstField( |
| 2261 | 2261 | 'SELECT MAX(unlock_at) |
| 2262 | - FROM ' . prefixTable('auth_failures') . ' |
|
| 2262 | + FROM ' . prefixTable('auth_failures').' |
|
| 2263 | 2263 | WHERE unlock_at > %s |
| 2264 | 2264 | AND ((source = %s AND value = %s) OR (source = %s AND value = %s))', |
| 2265 | 2265 | date('Y-m-d H:i:s', time()), |
@@ -2296,9 +2296,9 @@ discard block |
||
| 2296 | 2296 | // Check if similar login deleted exists |
| 2297 | 2297 | DB::queryFirstRow( |
| 2298 | 2298 | 'SELECT id, login |
| 2299 | - FROM ' . prefixTable('users') . ' |
|
| 2299 | + FROM ' . prefixTable('users').' |
|
| 2300 | 2300 | WHERE login LIKE %s AND deleted_at IS NOT NULL', |
| 2301 | - $login . '_deleted_%' |
|
| 2301 | + $login.'_deleted_%' |
|
| 2302 | 2302 | ); |
| 2303 | 2303 | |
| 2304 | 2304 | if (DB::count() > 0) { |
@@ -2408,7 +2408,7 @@ discard block |
||
| 2408 | 2408 | 'array' => [ |
| 2409 | 2409 | 'value' => 'bruteforce_wait', |
| 2410 | 2410 | 'error' => true, |
| 2411 | - 'message' => $lang->get('bruteforce_wait') . (string) $e->getMessage(), |
|
| 2411 | + 'message' => $lang->get('bruteforce_wait').(string) $e->getMessage(), |
|
| 2412 | 2412 | ] |
| 2413 | 2413 | ]; |
| 2414 | 2414 | } |
@@ -2513,7 +2513,7 @@ discard block |
||
| 2513 | 2513 | // Clean previous failed attempts |
| 2514 | 2514 | $failedTasks = DB::query( |
| 2515 | 2515 | 'SELECT increment_id |
| 2516 | - FROM ' . prefixTable('background_tasks') . ' |
|
| 2516 | + FROM ' . prefixTable('background_tasks').' |
|
| 2517 | 2517 | WHERE process_type = %s |
| 2518 | 2518 | AND JSON_EXTRACT(arguments, "$.new_user_id") = %i |
| 2519 | 2519 | AND status = %s', |
@@ -2630,7 +2630,7 @@ discard block |
||
| 2630 | 2630 | $userKeys['public_key'] |
| 2631 | 2631 | ); |
| 2632 | 2632 | }*/ |
| 2633 | - error_log('Switch user ' . $username . ' auth_type to oauth2'); |
|
| 2633 | + error_log('Switch user '.$username.' auth_type to oauth2'); |
|
| 2634 | 2634 | // Update user in database: |
| 2635 | 2635 | DB::update( |
| 2636 | 2636 | prefixTable('users'), |
@@ -2854,12 +2854,12 @@ discard block |
||
| 2854 | 2854 | { |
| 2855 | 2855 | // Find the latest "create_user_keys" task for the given user_id |
| 2856 | 2856 | $latestTask = DB::queryFirstRow( |
| 2857 | - 'SELECT arguments, status FROM ' . prefixTable('background_tasks') . ' |
|
| 2857 | + 'SELECT arguments, status FROM '.prefixTable('background_tasks').' |
|
| 2858 | 2858 | WHERE process_type = %s |
| 2859 | 2859 | AND arguments LIKE %s |
| 2860 | 2860 | ORDER BY increment_id DESC |
| 2861 | 2861 | LIMIT 1', |
| 2862 | - 'create_user_keys', '%"new_user_id":' . $userId . '%' |
|
| 2862 | + 'create_user_keys', '%"new_user_id":'.$userId.'%' |
|
| 2863 | 2863 | ); |
| 2864 | 2864 | |
| 2865 | 2865 | // If a failed task is found, return an error message |
@@ -3071,15 +3071,15 @@ discard block |
||
| 3071 | 3071 | |
| 3072 | 3072 | if ($ret['error'] !== false) { |
| 3073 | 3073 | logEvents($SETTINGS, 'failed_auth', 'bad_duo_mfa', '', stripslashes($username), stripslashes($username)); |
| 3074 | - $session->set('user-duo_status',''); |
|
| 3075 | - $session->set('user-duo_state',''); |
|
| 3076 | - $session->set('user-duo_data',''); |
|
| 3074 | + $session->set('user-duo_status', ''); |
|
| 3075 | + $session->set('user-duo_state', ''); |
|
| 3076 | + $session->set('user-duo_data', ''); |
|
| 3077 | 3077 | return [ |
| 3078 | 3078 | 'error' => true, |
| 3079 | 3079 | 'mfaData' => $ret, |
| 3080 | 3080 | 'mfaQRCodeInfos' => false, |
| 3081 | 3081 | ]; |
| 3082 | - } else if ($ret['duo_url_ready'] === true){ |
|
| 3082 | + } else if ($ret['duo_url_ready'] === true) { |
|
| 3083 | 3083 | return [ |
| 3084 | 3084 | 'error' => false, |
| 3085 | 3085 | 'mfaData' => $ret, |
@@ -3143,7 +3143,7 @@ discard block |
||
| 3143 | 3143 | // Count failed attempts from this source |
| 3144 | 3144 | $count = DB::queryFirstField( |
| 3145 | 3145 | 'SELECT COUNT(*) |
| 3146 | - FROM ' . prefixTable('auth_failures') . ' |
|
| 3146 | + FROM ' . prefixTable('auth_failures').' |
|
| 3147 | 3147 | WHERE source = %s AND value = %s', |
| 3148 | 3148 | $source, |
| 3149 | 3149 | $value |
@@ -58,16 +58,16 @@ discard block |
||
| 58 | 58 | { |
| 59 | 59 | // Load AntiXSS |
| 60 | 60 | $antiXss = new AntiXSS(); |
| 61 | - if (! headers_sent()) { //If headers not sent yet... then do php redirect |
|
| 62 | - header('Location: ' . $antiXss->xss_clean($url)); |
|
| 61 | + if (!headers_sent()) { //If headers not sent yet... then do php redirect |
|
| 62 | + header('Location: '.$antiXss->xss_clean($url)); |
|
| 63 | 63 | } |
| 64 | 64 | |
| 65 | 65 | //If headers are sent... do java redirect... if java disabled, do html redirect. |
| 66 | 66 | echo '<script type="text/javascript">'; |
| 67 | - echo 'window.location.href="' . $antiXss->xss_clean($url) . '";'; |
|
| 67 | + echo 'window.location.href="'.$antiXss->xss_clean($url).'";'; |
|
| 68 | 68 | echo '</script>'; |
| 69 | 69 | echo '<noscript>'; |
| 70 | - echo '<meta http-equiv="refresh" content="0;url=' . $antiXss->xss_clean($url) . '" />'; |
|
| 70 | + echo '<meta http-equiv="refresh" content="0;url='.$antiXss->xss_clean($url).'" />'; |
|
| 71 | 71 | echo '</noscript>'; |
| 72 | 72 | } |
| 73 | 73 | |
@@ -93,7 +93,7 @@ discard block |
||
| 93 | 93 | && isset($SETTINGS['enable_sts']) === true |
| 94 | 94 | && (int) $SETTINGS['enable_sts'] === 1 |
| 95 | 95 | ) { |
| 96 | - teampassRedirect('https://' . $server['http_host'] . $server['request_uri']); |
|
| 96 | + teampassRedirect('https://'.$server['http_host'].$server['request_uri']); |
|
| 97 | 97 | } |
| 98 | 98 | |
| 99 | 99 | // Load pwComplexity |
@@ -114,11 +114,11 @@ discard block |
||
| 114 | 114 | // LOAD CPASSMAN SETTINGS |
| 115 | 115 | if ( |
| 116 | 116 | isset($SETTINGS['cpassman_dir']) === true |
| 117 | - && is_dir($SETTINGS['cpassman_dir'] . '/install') === true |
|
| 117 | + && is_dir($SETTINGS['cpassman_dir'].'/install') === true |
|
| 118 | 118 | ) { |
| 119 | 119 | // Should we delete folder INSTALL? |
| 120 | 120 | $row = DB::queryFirstRow( |
| 121 | - 'SELECT valeur FROM ' . prefixTable('misc') . ' WHERE type=%s AND intitule=%s', |
|
| 121 | + 'SELECT valeur FROM '.prefixTable('misc').' WHERE type=%s AND intitule=%s', |
|
| 122 | 122 | 'install', |
| 123 | 123 | 'clear_install_folder' |
| 124 | 124 | ); |
@@ -136,11 +136,11 @@ discard block |
||
| 136 | 136 | if ($directories !== false) { |
| 137 | 137 | $files = array_diff($directories, ['.', '..']); |
| 138 | 138 | foreach ($files as $file) { |
| 139 | - if (is_dir($dir . '/' . $file)) { |
|
| 140 | - delTree($dir . '/' . $file); |
|
| 139 | + if (is_dir($dir.'/'.$file)) { |
|
| 140 | + delTree($dir.'/'.$file); |
|
| 141 | 141 | } else { |
| 142 | 142 | try { |
| 143 | - unlink($dir . '/' . $file); |
|
| 143 | + unlink($dir.'/'.$file); |
|
| 144 | 144 | } catch (Exception $e) { |
| 145 | 145 | // do nothing... php will ignore and continue |
| 146 | 146 | } |
@@ -154,13 +154,13 @@ discard block |
||
| 154 | 154 | return false; |
| 155 | 155 | } |
| 156 | 156 | |
| 157 | - if (is_dir($SETTINGS['cpassman_dir'] . '/install')) { |
|
| 157 | + if (is_dir($SETTINGS['cpassman_dir'].'/install')) { |
|
| 158 | 158 | // Set the permissions on the install directory and delete |
| 159 | 159 | // is server Windows or Linux? |
| 160 | 160 | if (strtoupper(substr(PHP_OS, 0, 3)) !== 'WIN') { |
| 161 | - recursiveChmod($SETTINGS['cpassman_dir'] . '/install', 0755, 0440); |
|
| 161 | + recursiveChmod($SETTINGS['cpassman_dir'].'/install', 0755, 0440); |
|
| 162 | 162 | } |
| 163 | - delTree($SETTINGS['cpassman_dir'] . '/install'); |
|
| 163 | + delTree($SETTINGS['cpassman_dir'].'/install'); |
|
| 164 | 164 | } |
| 165 | 165 | |
| 166 | 166 | // Delete temporary install table |
@@ -178,10 +178,10 @@ discard block |
||
| 178 | 178 | // Load Languages stuff |
| 179 | 179 | if (isset($languagesList) === false) { |
| 180 | 180 | $languagesList = []; |
| 181 | - $rows = DB::query('SELECT * FROM ' . prefixTable('languages') . ' GROUP BY name, label, code, flag, id ORDER BY name ASC'); |
|
| 181 | + $rows = DB::query('SELECT * FROM '.prefixTable('languages').' GROUP BY name, label, code, flag, id ORDER BY name ASC'); |
|
| 182 | 182 | foreach ($rows as $record) { |
| 183 | 183 | array_push($languagesList, $record['name']); |
| 184 | - if ($session->get('user-language') === $record['name'] ) { |
|
| 184 | + if ($session->get('user-language') === $record['name']) { |
|
| 185 | 185 | $session->set('user-language_flag', $record['flag']); |
| 186 | 186 | $session->set('user-language_code', $record['code']); |
| 187 | 187 | //$session->set('user-language_label', $record['label']); |
@@ -238,7 +238,7 @@ discard block |
||
| 238 | 238 | // CHECK IF SESSION EXISTS AND IF SESSION IS VALID |
| 239 | 239 | if (empty($session->get('user-session_duration')) === false) { |
| 240 | 240 | $dataSession = DB::queryFirstRow( |
| 241 | - 'SELECT key_tempo, deleted_at FROM ' . prefixTable('users') . ' WHERE id=%i', |
|
| 241 | + 'SELECT key_tempo, deleted_at FROM '.prefixTable('users').' WHERE id=%i', |
|
| 242 | 242 | $session->get('user-id') |
| 243 | 243 | ); |
| 244 | 244 | // Ensure deleted_at is set |
@@ -299,7 +299,7 @@ discard block |
||
| 299 | 299 | && ($session->has('user-admin') && $session->get('user-admin') && null !== $session->get('user-admin') && $session->get('user-admin') === 1) |
| 300 | 300 | ) { |
| 301 | 301 | $row = DB::queryFirstRow( |
| 302 | - 'SELECT valeur FROM ' . prefixTable('misc') . ' WHERE type=%s_type AND intitule=%s_intitule', |
|
| 302 | + 'SELECT valeur FROM '.prefixTable('misc').' WHERE type=%s_type AND intitule=%s_intitule', |
|
| 303 | 303 | [ |
| 304 | 304 | 'type' => 'admin', |
| 305 | 305 | 'intitule' => 'teampass_version', |
@@ -340,7 +340,7 @@ discard block |
||
| 340 | 340 | |
| 341 | 341 | syslog( |
| 342 | 342 | LOG_WARNING, |
| 343 | - 'Unlog user: ' . date('Y/m/d H:i:s') . " {$server['remote_addr']} ({$server['http_user_agent']})" |
|
| 343 | + 'Unlog user: '.date('Y/m/d H:i:s')." {$server['remote_addr']} ({$server['http_user_agent']})" |
|
| 344 | 344 | ); |
| 345 | 345 | // erase session table |
| 346 | 346 | $session->invalidate(); |
@@ -393,16 +393,16 @@ discard block |
||
| 393 | 393 | /* LOAD INFORMATION CONCERNING USER */ |
| 394 | 394 | if ($session->has('user-timezone') && null !== $session->get('user-id') && empty($session->get('user-id')) === false) { |
| 395 | 395 | // query on user |
| 396 | - $data =DB::queryFirstRow( |
|
| 396 | + $data = DB::queryFirstRow( |
|
| 397 | 397 | 'SELECT u.login, u.admin, u.gestionnaire, u.can_manage_all_users, u.last_connexion, u.auth_type, u.last_pw_change, u.deleted_at, |
| 398 | 398 | GROUP_CONCAT(DISTINCT ug.group_id ORDER BY ug.group_id SEPARATOR ";") AS groupes_visibles, |
| 399 | 399 | GROUP_CONCAT(DISTINCT ugf.group_id ORDER BY ugf.group_id SEPARATOR ";") AS groupes_interdits, |
| 400 | 400 | GROUP_CONCAT(DISTINCT CASE WHEN ur.source = "manual" THEN ur.role_id END ORDER BY ur.role_id SEPARATOR ";") AS fonction_id, |
| 401 | 401 | GROUP_CONCAT(DISTINCT CASE WHEN ur.source = "ad" THEN ur.role_id END ORDER BY ur.role_id SEPARATOR ";") AS roles_from_ad_groups |
| 402 | - FROM ' . prefixTable('users') . ' AS u |
|
| 403 | - LEFT JOIN ' . prefixTable('users_groups') . ' AS ug ON (u.id = ug.user_id) |
|
| 404 | - LEFT JOIN ' . prefixTable('users_groups_forbidden') . ' AS ugf ON (u.id = ugf.user_id) |
|
| 405 | - LEFT JOIN ' . prefixTable('users_roles') . ' AS ur ON (u.id = ur.user_id) |
|
| 402 | + FROM ' . prefixTable('users').' AS u |
|
| 403 | + LEFT JOIN ' . prefixTable('users_groups').' AS ug ON (u.id = ug.user_id) |
|
| 404 | + LEFT JOIN ' . prefixTable('users_groups_forbidden').' AS ugf ON (u.id = ugf.user_id) |
|
| 405 | + LEFT JOIN ' . prefixTable('users_roles').' AS ur ON (u.id = ur.user_id) |
|
| 406 | 406 | WHERE u.id = %s |
| 407 | 407 | GROUP BY u.id', |
| 408 | 408 | $session->get('user-id') |
@@ -452,7 +452,7 @@ discard block |
||
| 452 | 452 | $data['groupes_visibles'] ?? [], |
| 453 | 453 | $data['groupes_interdits'] ?? [], |
| 454 | 454 | $data['admin'], |
| 455 | - is_null($data['roles_from_ad_groups']) === true ? $data['fonction_id'] : (empty($data['roles_from_ad_groups']) === true ? $data['fonction_id'] : $data['fonction_id'] . ';' . $data['roles_from_ad_groups']), |
|
| 455 | + is_null($data['roles_from_ad_groups']) === true ? $data['fonction_id'] : (empty($data['roles_from_ad_groups']) === true ? $data['fonction_id'] : $data['fonction_id'].';'.$data['roles_from_ad_groups']), |
|
| 456 | 456 | $SETTINGS |
| 457 | 457 | ); |
| 458 | 458 | if ($session->has('user-can_create_root_folder') && (int) $session->get('user-can_create_root_folder') && null !== $session->get('user-can_create_root_folder') && (int) $session->get('user-can_create_root_folder') === 1) { |
@@ -487,7 +487,7 @@ discard block |
||
| 487 | 487 | $session->set('system-item_fields', []); |
| 488 | 488 | $rows = DB::query( |
| 489 | 489 | 'SELECT * |
| 490 | - FROM ' . prefixTable('categories') . ' |
|
| 490 | + FROM ' . prefixTable('categories').' |
|
| 491 | 491 | WHERE level=%i', |
| 492 | 492 | '0' |
| 493 | 493 | ); |
@@ -496,7 +496,7 @@ discard block |
||
| 496 | 496 | // get each field |
| 497 | 497 | $rows2 = DB::query( |
| 498 | 498 | 'SELECT * |
| 499 | - FROM ' . prefixTable('categories') . ' |
|
| 499 | + FROM ' . prefixTable('categories').' |
|
| 500 | 500 | WHERE parent_id=%i |
| 501 | 501 | ORDER BY `order` ASC', |
| 502 | 502 | $record['id'] |
@@ -583,5 +583,5 @@ discard block |
||
| 583 | 583 | } |
| 584 | 584 | |
| 585 | 585 | /* CHECK NUMBER OF USER ONLINE */ |
| 586 | -DB::query('SELECT * FROM ' . prefixTable('users') . ' WHERE timestamp>=%i', time() - 600); |
|
| 586 | +DB::query('SELECT * FROM '.prefixTable('users').' WHERE timestamp>=%i', time() - 600); |
|
| 587 | 587 | $session->set('system-nb_users_online', DB::count()); |
@@ -74,7 +74,7 @@ discard block |
||
| 74 | 74 | if ($checkUserAccess->checkSession() === false || $checkUserAccess->userAccessPage('profile') === false) { |
| 75 | 75 | // Not allowed page |
| 76 | 76 | $session->set('system-error_code', ERR_NOT_ALLOWED); |
| 77 | - include $SETTINGS['cpassman_dir'] . '/error.php'; |
|
| 77 | + include $SETTINGS['cpassman_dir'].'/error.php'; |
|
| 78 | 78 | exit; |
| 79 | 79 | } |
| 80 | 80 | |
@@ -145,7 +145,7 @@ discard block |
||
| 145 | 145 | |
| 146 | 146 | // Get info about user to modify |
| 147 | 147 | $targetUserInfos = DB::queryFirstRow( |
| 148 | - 'SELECT admin, gestionnaire, can_manage_all_users, isAdministratedByRole FROM ' . prefixTable('users') . ' |
|
| 148 | + 'SELECT admin, gestionnaire, can_manage_all_users, isAdministratedByRole FROM '.prefixTable('users').' |
|
| 149 | 149 | WHERE id = %i', |
| 150 | 150 | (int) $dataReceived['user_id'] |
| 151 | 151 | ); |
@@ -277,11 +277,11 @@ discard block |
||
| 277 | 277 | // Check if user exists (active or soft-deleted) |
| 278 | 278 | $existingUser = DB::queryFirstRow( |
| 279 | 279 | 'SELECT id, login, deleted_at |
| 280 | - FROM ' . prefixTable('users') . ' |
|
| 280 | + FROM ' . prefixTable('users').' |
|
| 281 | 281 | WHERE (login = %s AND deleted_at IS NULL) |
| 282 | 282 | OR (login LIKE %s AND deleted_at IS NOT NULL)', |
| 283 | 283 | $login, |
| 284 | - $login . '_deleted_%' |
|
| 284 | + $login.'_deleted_%' |
|
| 285 | 285 | ); |
| 286 | 286 | |
| 287 | 287 | if (is_null($existingUser)) { |
@@ -464,7 +464,7 @@ discard block |
||
| 464 | 464 | // Check if it's a soft-deleted user |
| 465 | 465 | $errorMessage = $lang->get('error_user_exists'); |
| 466 | 466 | if (empty($deletedUser) === false) { |
| 467 | - $errorMessage = 'A deleted user with this login already exists (ID: ' . $deletedUser['id'] . '). Please restore the user instead of creating a new one.'; |
|
| 467 | + $errorMessage = 'A deleted user with this login already exists (ID: '.$deletedUser['id'].'). Please restore the user instead of creating a new one.'; |
|
| 468 | 468 | } |
| 469 | 469 | |
| 470 | 470 | echo prepareExchangedData( |
@@ -503,7 +503,7 @@ discard block |
||
| 503 | 503 | } |
| 504 | 504 | |
| 505 | 505 | // Prepare variables |
| 506 | - $userId = filter_var($dataReceived['user_id'], FILTER_SANITIZE_NUMBER_INT); |
|
| 506 | + $userId = filter_var($dataReceived['user_id'], FILTER_SANITIZE_NUMBER_INT); |
|
| 507 | 507 | |
| 508 | 508 | if (empty($userId)) { |
| 509 | 509 | echo prepareExchangedData( |
@@ -518,7 +518,7 @@ discard block |
||
| 518 | 518 | |
| 519 | 519 | // Get info about user to delete |
| 520 | 520 | $data_user = DB::queryFirstRow( |
| 521 | - 'SELECT login, admin, isAdministratedByRole FROM ' . prefixTable('users') . ' |
|
| 521 | + 'SELECT login, admin, isAdministratedByRole FROM '.prefixTable('users').' |
|
| 522 | 522 | WHERE id = %i', |
| 523 | 523 | $userId |
| 524 | 524 | ); |
@@ -535,7 +535,7 @@ discard block |
||
| 535 | 535 | || ((int) $session->get('user-can_manage_all_users') === 1 && (int) $data_user['admin'] !== 1) |
| 536 | 536 | ) { |
| 537 | 537 | $timestamp = time(); |
| 538 | - $deletedSuffix = '_deleted_' . $timestamp; |
|
| 538 | + $deletedSuffix = '_deleted_'.$timestamp; |
|
| 539 | 539 | |
| 540 | 540 | // delete user in database |
| 541 | 541 | DB::update( |
@@ -555,7 +555,7 @@ discard block |
||
| 555 | 555 | logEvents($SETTINGS, 'user_mngt', 'at_user_deleted', (string) $session->get('user-id'), $session->get('user-login'), $userId); |
| 556 | 556 | |
| 557 | 557 | // Count deleted users |
| 558 | - $deletedAccountsCount = (int) DB::queryFirstField("SELECT COUNT(id) FROM " . prefixTable('users') . " WHERE deleted_at IS NOT NULL"); |
|
| 558 | + $deletedAccountsCount = (int) DB::queryFirstField("SELECT COUNT(id) FROM ".prefixTable('users')." WHERE deleted_at IS NOT NULL"); |
|
| 559 | 559 | |
| 560 | 560 | DB::commit(); |
| 561 | 561 | |
@@ -584,7 +584,7 @@ discard block |
||
| 584 | 584 | echo prepareExchangedData( |
| 585 | 585 | [ |
| 586 | 586 | 'error' => true, |
| 587 | - 'message' => $lang->get('error') . ': ' . $e->getMessage(), |
|
| 587 | + 'message' => $lang->get('error').': '.$e->getMessage(), |
|
| 588 | 588 | ], |
| 589 | 589 | 'encode' |
| 590 | 590 | ); |
@@ -598,7 +598,7 @@ discard block |
||
| 598 | 598 | $return = array(); |
| 599 | 599 | // Check if folder exists |
| 600 | 600 | $data = DB::query( |
| 601 | - 'SELECT * FROM ' . prefixTable('nested_tree') . ' |
|
| 601 | + 'SELECT * FROM '.prefixTable('nested_tree').' |
|
| 602 | 602 | WHERE title = %s AND parent_id = %i', |
| 603 | 603 | filter_input(INPUT_POST, 'domain', FILTER_SANITIZE_FULL_SPECIAL_CHARS), |
| 604 | 604 | '0' |
@@ -611,7 +611,7 @@ discard block |
||
| 611 | 611 | } |
| 612 | 612 | // Check if role exists |
| 613 | 613 | $data = DB::query( |
| 614 | - 'SELECT * FROM ' . prefixTable('roles_title') . ' |
|
| 614 | + 'SELECT * FROM '.prefixTable('roles_title').' |
|
| 615 | 615 | WHERE title = %s', |
| 616 | 616 | filter_input(INPUT_POST, 'domain', FILTER_SANITIZE_FULL_SPECIAL_CHARS) |
| 617 | 617 | ); |
@@ -640,7 +640,7 @@ discard block |
||
| 640 | 640 | // Get info about user to delete |
| 641 | 641 | $data_user = DB::queryFirstRow( |
| 642 | 642 | 'SELECT admin, isAdministratedByRole, gestionnaire |
| 643 | - FROM ' . prefixTable('users') . ' |
|
| 643 | + FROM ' . prefixTable('users').' |
|
| 644 | 644 | WHERE id = %i', |
| 645 | 645 | $post_user_id |
| 646 | 646 | ); |
@@ -719,7 +719,7 @@ discard block |
||
| 719 | 719 | $session->set('user-roles_array', explode(';', $session->get('user-roles'))); |
| 720 | 720 | $rows = DB::query(' |
| 721 | 721 | SELECT id,title,creator_id |
| 722 | - FROM ' . prefixTable('roles_title') .' |
|
| 722 | + FROM ' . prefixTable('roles_title').' |
|
| 723 | 723 | WHERE id IN %li', |
| 724 | 724 | $session->get('user-roles_array') |
| 725 | 725 | ); |
@@ -757,7 +757,7 @@ discard block |
||
| 757 | 757 | $rolesList = array(); |
| 758 | 758 | $managedBy = array(); |
| 759 | 759 | $selected = ''; |
| 760 | - $rows = DB::query('SELECT id,title FROM ' . prefixTable('roles_title') . ' ORDER BY title ASC'); |
|
| 760 | + $rows = DB::query('SELECT id,title FROM '.prefixTable('roles_title').' ORDER BY title ASC'); |
|
| 761 | 761 | foreach ($rows as $reccord) { |
| 762 | 762 | $rolesList[$reccord['id']] = array('id' => $reccord['id'], 'title' => $reccord['title']); |
| 763 | 763 | } |
@@ -788,7 +788,7 @@ discard block |
||
| 788 | 788 | array_push( |
| 789 | 789 | $managedBy, |
| 790 | 790 | array( |
| 791 | - 'title' => $lang->get('managers_of') . ' ' . $fonction['title'], |
|
| 791 | + 'title' => $lang->get('managers_of').' '.$fonction['title'], |
|
| 792 | 792 | 'id' => $fonction['id'], |
| 793 | 793 | 'selected' => $selected, |
| 794 | 794 | ) |
@@ -870,9 +870,9 @@ discard block |
||
| 870 | 870 | |
| 871 | 871 | // get USER STATUS |
| 872 | 872 | if ($rowUser['disabled'] == 1) { |
| 873 | - $arrData['info'] = $lang->get('user_info_locked') . '<br><input type="checkbox" value="unlock" name="1" class="chk"> <label for="1">' . $lang->get('user_info_unlock_question') . '</label><br><input type="checkbox" value="delete" id="account_delete" class="chk mr-2" name="2" onclick="confirmDeletion()">label for="2">' . $lang->get('user_info_delete_question') . '</label>'; |
|
| 873 | + $arrData['info'] = $lang->get('user_info_locked').'<br><input type="checkbox" value="unlock" name="1" class="chk"> <label for="1">'.$lang->get('user_info_unlock_question').'</label><br><input type="checkbox" value="delete" id="account_delete" class="chk mr-2" name="2" onclick="confirmDeletion()">label for="2">'.$lang->get('user_info_delete_question').'</label>'; |
|
| 874 | 874 | } else { |
| 875 | - $arrData['info'] = $lang->get('user_info_active') . '<br><input type="checkbox" value="lock" class="chk"> ' . $lang->get('user_info_lock_question'); |
|
| 875 | + $arrData['info'] = $lang->get('user_info_active').'<br><input type="checkbox" value="lock" class="chk"> '.$lang->get('user_info_lock_question'); |
|
| 876 | 876 | } |
| 877 | 877 | |
| 878 | 878 | $arrData['error'] = false; |
@@ -960,7 +960,7 @@ discard block |
||
| 960 | 960 | // Get info about user to modify |
| 961 | 961 | $data_user = DB::queryFirstRow( |
| 962 | 962 | 'SELECT admin, gestionnaire, can_manage_all_users, isAdministratedByRole |
| 963 | - FROM ' . prefixTable('users') . ' |
|
| 963 | + FROM ' . prefixTable('users').' |
|
| 964 | 964 | WHERE id = %i', |
| 965 | 965 | $post_id |
| 966 | 966 | ); |
@@ -971,7 +971,7 @@ discard block |
||
| 971 | 971 | // count number of admins |
| 972 | 972 | $users = DB::query( |
| 973 | 973 | 'SELECT id |
| 974 | - FROM ' . prefixTable('users') . ' |
|
| 974 | + FROM ' . prefixTable('users').' |
|
| 975 | 975 | WHERE admin = 1 AND email != "" AND pw != "" AND id != %i', |
| 976 | 976 | $post_id |
| 977 | 977 | ); |
@@ -994,7 +994,7 @@ discard block |
||
| 994 | 994 | // Exclude roles from AD - PR #3635 |
| 995 | 995 | $adRolesResult = DB::query( |
| 996 | 996 | 'SELECT role_id |
| 997 | - FROM ' . prefixTable('users_roles') . ' |
|
| 997 | + FROM ' . prefixTable('users_roles').' |
|
| 998 | 998 | WHERE user_id = %i AND source = %s', |
| 999 | 999 | $post_id, |
| 1000 | 1000 | 'ad' |
@@ -1097,7 +1097,7 @@ discard block |
||
| 1097 | 1097 | ); |
| 1098 | 1098 | // delete personal folder and subfolders |
| 1099 | 1099 | $data = DB::queryFirstRow( |
| 1100 | - 'SELECT id FROM ' . prefixTable('nested_tree') . ' |
|
| 1100 | + 'SELECT id FROM '.prefixTable('nested_tree').' |
|
| 1101 | 1101 | WHERE title = %s AND personal_folder = %i', |
| 1102 | 1102 | $post_id, |
| 1103 | 1103 | '1' |
@@ -1110,7 +1110,7 @@ discard block |
||
| 1110 | 1110 | DB::delete(prefixTable('nested_tree'), 'id = %i AND personal_folder = %i', $folder->id, '1'); |
| 1111 | 1111 | // delete items & logs |
| 1112 | 1112 | $items = DB::query( |
| 1113 | - 'SELECT id FROM ' . prefixTable('items') . ' |
|
| 1113 | + 'SELECT id FROM '.prefixTable('items').' |
|
| 1114 | 1114 | WHERE id_tree=%i AND perso = %i', |
| 1115 | 1115 | $folder->id, |
| 1116 | 1116 | '1' |
@@ -1204,7 +1204,7 @@ discard block |
||
| 1204 | 1204 | |
| 1205 | 1205 | // update LOG |
| 1206 | 1206 | if ($oldData['email'] !== $post_email) { |
| 1207 | - logEvents($SETTINGS, 'user_mngt', 'at_user_email_changed:' . $oldData['email'], (string) $session->get('user-id'), $session->get('user-login'), $post_id); |
|
| 1207 | + logEvents($SETTINGS, 'user_mngt', 'at_user_email_changed:'.$oldData['email'], (string) $session->get('user-id'), $session->get('user-login'), $post_id); |
|
| 1208 | 1208 | } |
| 1209 | 1209 | } |
| 1210 | 1210 | echo prepareExchangedData( |
@@ -1253,7 +1253,7 @@ discard block |
||
| 1253 | 1253 | |
| 1254 | 1254 | $login = (string) filter_input(INPUT_POST, 'login', FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
| 1255 | 1255 | DB::queryFirstRow( |
| 1256 | - 'SELECT * FROM ' . prefixTable('users') . ' |
|
| 1256 | + 'SELECT * FROM '.prefixTable('users').' |
|
| 1257 | 1257 | WHERE (login = %s AND deleted_at IS NULL) |
| 1258 | 1258 | OR login LIKE %s', |
| 1259 | 1259 | $login, |
@@ -1312,7 +1312,7 @@ discard block |
||
| 1312 | 1312 | $html = ''; |
| 1313 | 1313 | |
| 1314 | 1314 | if (isset($SETTINGS['ldap_mode']) === true && (int) $SETTINGS['ldap_mode'] === 1 && isset($SETTINGS['enable_ad_users_with_ad_groups']) === true && (int) $SETTINGS['enable_ad_users_with_ad_groups'] === 1) { |
| 1315 | - $rowUser['fonction_id'] = empty($rowUser['fonction_id']) === true ? $rowUser['roles_from_ad_groups'] : $rowUser['fonction_id']. ';' . $rowUser['roles_from_ad_groups']; |
|
| 1315 | + $rowUser['fonction_id'] = empty($rowUser['fonction_id']) === true ? $rowUser['roles_from_ad_groups'] : $rowUser['fonction_id'].';'.$rowUser['roles_from_ad_groups']; |
|
| 1316 | 1316 | } |
| 1317 | 1317 | $arrData['functions'] = array_filter(explode(';', $rowUser['fonction_id'])); |
| 1318 | 1318 | $arrData['allowed_folders'] = array_filter(explode(';', $rowUser['groupes_visibles'])); |
@@ -1323,8 +1323,8 @@ discard block |
||
| 1323 | 1323 | // refine folders based upon roles |
| 1324 | 1324 | $rows = DB::query( |
| 1325 | 1325 | 'SELECT rv.folder_id, rv.type |
| 1326 | - FROM ' . prefixTable('roles_values') . ' as rv |
|
| 1327 | - INNER JOIN ' . prefixTable('nested_tree') . ' as nt ON rv.folder_id = nt.id |
|
| 1326 | + FROM ' . prefixTable('roles_values').' as rv |
|
| 1327 | + INNER JOIN ' . prefixTable('nested_tree').' as nt ON rv.folder_id = nt.id |
|
| 1328 | 1328 | WHERE rv.role_id IN %ls AND nt.personal_folder = 0 |
| 1329 | 1329 | ORDER BY rv.folder_id ASC', |
| 1330 | 1330 | $arrData['functions'] |
@@ -1347,7 +1347,7 @@ discard block |
||
| 1347 | 1347 | } |
| 1348 | 1348 | |
| 1349 | 1349 | // add allowed folders |
| 1350 | - foreach($arrData['allowed_folders'] as $Fld) { |
|
| 1350 | + foreach ($arrData['allowed_folders'] as $Fld) { |
|
| 1351 | 1351 | array_push($arrFolders, array('id' => $Fld, 'type' => 'W', 'special' => true)); |
| 1352 | 1352 | } |
| 1353 | 1353 | |
@@ -1362,7 +1362,7 @@ discard block |
||
| 1362 | 1362 | // get folder name |
| 1363 | 1363 | $row = DB::queryFirstRow( |
| 1364 | 1364 | 'SELECT title, nlevel, id |
| 1365 | - FROM ' . prefixTable('nested_tree') . ' |
|
| 1365 | + FROM ' . prefixTable('nested_tree').' |
|
| 1366 | 1366 | WHERE id = %i', |
| 1367 | 1367 | $fld['id'] |
| 1368 | 1368 | ); |
@@ -1380,8 +1380,8 @@ discard block |
||
| 1380 | 1380 | } |
| 1381 | 1381 | } |
| 1382 | 1382 | |
| 1383 | - $html_full = '<table id="table-folders" class="table table-bordered table-striped dt-responsive nowrap" style="width:100%"><tbody>' . |
|
| 1384 | - $html . '</tbody></table>'; |
|
| 1383 | + $html_full = '<table id="table-folders" class="table table-bordered table-striped dt-responsive nowrap" style="width:100%"><tbody>'. |
|
| 1384 | + $html.'</tbody></table>'; |
|
| 1385 | 1385 | } else { |
| 1386 | 1386 | $html_full = ''; |
| 1387 | 1387 | } |
@@ -1435,10 +1435,10 @@ discard block |
||
| 1435 | 1435 | GROUP_CONCAT(DISTINCT CASE WHEN ur.source = "manual" THEN ur.role_id END ORDER BY ur.role_id SEPARATOR ";") AS fonction_id, |
| 1436 | 1436 | GROUP_CONCAT(DISTINCT ug.group_id ORDER BY ug.group_id SEPARATOR ";") AS groupes_visibles, |
| 1437 | 1437 | GROUP_CONCAT(DISTINCT ugf.group_id ORDER BY ugf.group_id SEPARATOR ";") AS groupes_interdits |
| 1438 | - FROM ' . prefixTable('users') . ' AS u |
|
| 1439 | - LEFT JOIN ' . prefixTable('users_roles') . ' AS ur ON (u.id = ur.user_id) |
|
| 1440 | - LEFT JOIN ' . prefixTable('users_groups') . ' AS ug ON (u.id = ug.user_id) |
|
| 1441 | - LEFT JOIN ' . prefixTable('users_groups_forbidden') . ' AS ugf ON (u.id = ugf.user_id) |
|
| 1438 | + FROM ' . prefixTable('users').' AS u |
|
| 1439 | + LEFT JOIN ' . prefixTable('users_roles').' AS ur ON (u.id = ur.user_id) |
|
| 1440 | + LEFT JOIN ' . prefixTable('users_groups').' AS ug ON (u.id = ug.user_id) |
|
| 1441 | + LEFT JOIN ' . prefixTable('users_groups_forbidden').' AS ugf ON (u.id = ugf.user_id) |
|
| 1442 | 1442 | WHERE u.admin = %i AND u.isAdministratedByRole IN %ls AND u.deleted_at IS NULL AND u.disabled = %i |
| 1443 | 1443 | GROUP BY u.id', |
| 1444 | 1444 | 0, |
@@ -1451,10 +1451,10 @@ discard block |
||
| 1451 | 1451 | GROUP_CONCAT(DISTINCT CASE WHEN ur.source = "manual" THEN ur.role_id END ORDER BY ur.role_id SEPARATOR ";") AS fonction_id, |
| 1452 | 1452 | GROUP_CONCAT(DISTINCT ug.group_id ORDER BY ug.group_id SEPARATOR ";") AS groupes_visibles, |
| 1453 | 1453 | GROUP_CONCAT(DISTINCT ugf.group_id ORDER BY ugf.group_id SEPARATOR ";") AS groupes_interdits |
| 1454 | - FROM ' . prefixTable('users') . ' AS u |
|
| 1455 | - LEFT JOIN ' . prefixTable('users_roles') . ' AS ur ON (u.id = ur.user_id) |
|
| 1456 | - LEFT JOIN ' . prefixTable('users_groups') . ' AS ug ON (u.id = ug.user_id) |
|
| 1457 | - LEFT JOIN ' . prefixTable('users_groups_forbidden') . ' AS ugf ON (u.id = ugf.user_id) |
|
| 1454 | + FROM ' . prefixTable('users').' AS u |
|
| 1455 | + LEFT JOIN ' . prefixTable('users_roles').' AS ur ON (u.id = ur.user_id) |
|
| 1456 | + LEFT JOIN ' . prefixTable('users_groups').' AS ug ON (u.id = ug.user_id) |
|
| 1457 | + LEFT JOIN ' . prefixTable('users_groups_forbidden').' AS ugf ON (u.id = ugf.user_id) |
|
| 1458 | 1458 | WHERE u.admin = %i AND u.deleted_at IS NULL AND u.disabled = %i |
| 1459 | 1459 | GROUP BY u.id', |
| 1460 | 1460 | 0, |
@@ -1475,7 +1475,7 @@ discard block |
||
| 1475 | 1475 | foreach (explode(';', $record['fonction_id']) as $group) { |
| 1476 | 1476 | if (!empty($group)) { |
| 1477 | 1477 | $tmp = DB::queryFirstRow( |
| 1478 | - 'SELECT id, title FROM ' . prefixTable('roles_title') . ' |
|
| 1478 | + 'SELECT id, title FROM '.prefixTable('roles_title').' |
|
| 1479 | 1479 | WHERE id = %i', |
| 1480 | 1480 | $group |
| 1481 | 1481 | ); |
@@ -1489,7 +1489,7 @@ discard block |
||
| 1489 | 1489 | |
| 1490 | 1490 | // Get managed_by |
| 1491 | 1491 | $managedBy = DB::queryFirstRow( |
| 1492 | - 'SELECT id, title FROM ' . prefixTable('roles_title') . ' |
|
| 1492 | + 'SELECT id, title FROM '.prefixTable('roles_title').' |
|
| 1493 | 1493 | WHERE id = %i', |
| 1494 | 1494 | $record['isAdministratedByRole'] |
| 1495 | 1495 | ); |
@@ -1501,7 +1501,7 @@ discard block |
||
| 1501 | 1501 | foreach (explode(';', $record['groupes_visibles']) as $role) { |
| 1502 | 1502 | if (!empty($role)) { |
| 1503 | 1503 | $tmp = DB::queryFirstRow( |
| 1504 | - 'SELECT id, title FROM ' . prefixTable('nested_tree') . ' |
|
| 1504 | + 'SELECT id, title FROM '.prefixTable('nested_tree').' |
|
| 1505 | 1505 | WHERE id = %i', |
| 1506 | 1506 | $role |
| 1507 | 1507 | ); |
@@ -1518,7 +1518,7 @@ discard block |
||
| 1518 | 1518 | foreach (explode(';', $record['groupes_interdits']) as $role) { |
| 1519 | 1519 | if (!empty($role)) { |
| 1520 | 1520 | $tmp = DB::queryFirstRow( |
| 1521 | - 'SELECT id, title FROM ' . prefixTable('nested_tree') . ' |
|
| 1521 | + 'SELECT id, title FROM '.prefixTable('nested_tree').' |
|
| 1522 | 1522 | WHERE id = %i', |
| 1523 | 1523 | $role |
| 1524 | 1524 | ); |
@@ -1640,7 +1640,7 @@ discard block |
||
| 1640 | 1640 | |
| 1641 | 1641 | // Get info about user |
| 1642 | 1642 | $data_user = DB::queryFirstRow( |
| 1643 | - 'SELECT admin, isAdministratedByRole FROM ' . prefixTable('users') . ' |
|
| 1643 | + 'SELECT admin, isAdministratedByRole FROM '.prefixTable('users').' |
|
| 1644 | 1644 | WHERE id = %i', |
| 1645 | 1645 | $inputData['source_id'] |
| 1646 | 1646 | ); |
@@ -1888,14 +1888,14 @@ discard block |
||
| 1888 | 1888 | if (empty($post_context) === false && $post_context === 'add_one_role_to_user') { |
| 1889 | 1889 | $data_user = DB::queryFirstRow( |
| 1890 | 1890 | 'SELECT fonction_id, public_key |
| 1891 | - FROM ' . prefixTable('users') . ' |
|
| 1891 | + FROM ' . prefixTable('users').' |
|
| 1892 | 1892 | WHERE id = %i', |
| 1893 | 1893 | $post_user_id |
| 1894 | 1894 | ); |
| 1895 | 1895 | |
| 1896 | 1896 | if ($data_user) { |
| 1897 | 1897 | // Ensure array is unique |
| 1898 | - $post_new_value = str_replace(',', ';', $data_user['fonction_id']) . ';' . $post_new_value; |
|
| 1898 | + $post_new_value = str_replace(',', ';', $data_user['fonction_id']).';'.$post_new_value; |
|
| 1899 | 1899 | $post_new_value = implode(';', array_unique(explode(';', $post_new_value))); |
| 1900 | 1900 | } else { |
| 1901 | 1901 | // User not found |
@@ -1911,14 +1911,14 @@ discard block |
||
| 1911 | 1911 | } |
| 1912 | 1912 | |
| 1913 | 1913 | // Manage specific case of api key |
| 1914 | - if($post_field === 'user_api_key') { |
|
| 1914 | + if ($post_field === 'user_api_key') { |
|
| 1915 | 1915 | $encrypted_key = encryptUserObjectKey(base64_encode($post_new_value), $session->get('user-public_key')); |
| 1916 | 1916 | $session->set('user-api_key', $post_new_value); |
| 1917 | 1917 | |
| 1918 | 1918 | // test if user has an api key |
| 1919 | 1919 | $data_user = DB::queryFirstRow( |
| 1920 | 1920 | 'SELECT value |
| 1921 | - FROM ' . prefixTable('api') . ' |
|
| 1921 | + FROM ' . prefixTable('api').' |
|
| 1922 | 1922 | WHERE user_id = %i', |
| 1923 | 1923 | $post_user_id |
| 1924 | 1924 | ); |
@@ -2038,7 +2038,7 @@ discard block |
||
| 2038 | 2038 | } catch (\LdapRecord\Auth\BindException $e) { |
| 2039 | 2039 | $error = $e->getDetailedError(); |
| 2040 | 2040 | if ($error && defined('LOG_TO_SERVER') && LOG_TO_SERVER === true) { |
| 2041 | - error_log('TEAMPASS Error - LDAP - '.$error->getErrorCode()." - ".$error->getErrorMessage(). " - ".$error->getDiagnosticMessage()); |
|
| 2041 | + error_log('TEAMPASS Error - LDAP - '.$error->getErrorCode()." - ".$error->getErrorMessage()." - ".$error->getDiagnosticMessage()); |
|
| 2042 | 2042 | } |
| 2043 | 2043 | // deepcode ignore ServerLeak: No important data is sent and it is encrypted before sending |
| 2044 | 2044 | echo prepareExchangedData( |
@@ -2068,7 +2068,7 @@ discard block |
||
| 2068 | 2068 | } catch (\LdapRecord\Auth\BindException $e) { |
| 2069 | 2069 | $error = $e->getDetailedError(); |
| 2070 | 2070 | if ($error && defined('LOG_TO_SERVER') && LOG_TO_SERVER === true) { |
| 2071 | - error_log('TEAMPASS Error - LDAP - '.$error->getErrorCode()." - ".$error->getErrorMessage(). " - ".$error->getDiagnosticMessage()); |
|
| 2071 | + error_log('TEAMPASS Error - LDAP - '.$error->getErrorCode()." - ".$error->getErrorMessage()." - ".$error->getDiagnosticMessage()); |
|
| 2072 | 2072 | } |
| 2073 | 2073 | // deepcode ignore ServerLeak: No important data is sent and it is encrypted before sending |
| 2074 | 2074 | echo prepareExchangedData( |
@@ -2085,7 +2085,7 @@ discard block |
||
| 2085 | 2085 | if (isset($adUser[$SETTINGS['ldap_user_attribute']][0]) === false) continue; |
| 2086 | 2086 | // Build the list of all groups in AD |
| 2087 | 2087 | if (isset($adUser['memberof']) === true) { |
| 2088 | - foreach($adUser['memberof'] as $j => $adUserGroup) { |
|
| 2088 | + foreach ($adUser['memberof'] as $j => $adUserGroup) { |
|
| 2089 | 2089 | if (empty($adUserGroup) === false && $j !== "count") { |
| 2090 | 2090 | $adGroup = substr($adUserGroup, 3, strpos($adUserGroup, ',') - 3); |
| 2091 | 2091 | if (in_array($adGroup, $adRoles) === false && empty($adGroup) === false) { |
@@ -2133,7 +2133,7 @@ discard block |
||
| 2133 | 2133 | |
| 2134 | 2134 | // Get all groups in Teampass |
| 2135 | 2135 | $teampassRoles = array(); |
| 2136 | - $rows = DB::query('SELECT id,title FROM ' . prefixTable('roles_title')); |
|
| 2136 | + $rows = DB::query('SELECT id,title FROM '.prefixTable('roles_title')); |
|
| 2137 | 2137 | foreach ($rows as $record) { |
| 2138 | 2138 | array_push( |
| 2139 | 2139 | $teampassRoles, |
@@ -2198,7 +2198,7 @@ discard block |
||
| 2198 | 2198 | // Check if user already exists |
| 2199 | 2199 | $data = DB::query( |
| 2200 | 2200 | 'SELECT id, fonction_id, groupes_interdits, groupes_visibles |
| 2201 | - FROM ' . prefixTable('users') . ' |
|
| 2201 | + FROM ' . prefixTable('users').' |
|
| 2202 | 2202 | WHERE login = %s', |
| 2203 | 2203 | $post_login |
| 2204 | 2204 | ); |
@@ -2392,7 +2392,7 @@ discard block |
||
| 2392 | 2392 | // Check if user already exists |
| 2393 | 2393 | DB::query( |
| 2394 | 2394 | 'SELECT id |
| 2395 | - FROM ' . prefixTable('users') . ' |
|
| 2395 | + FROM ' . prefixTable('users').' |
|
| 2396 | 2396 | WHERE id = %i', |
| 2397 | 2397 | $post_id |
| 2398 | 2398 | ); |
@@ -2454,7 +2454,7 @@ discard block |
||
| 2454 | 2454 | // Get all groups in Teampass |
| 2455 | 2455 | $teampassRoles = array(); |
| 2456 | 2456 | $titleToIdMap = []; |
| 2457 | - $rows = DB::query('SELECT id,title FROM ' . prefixTable('roles_title')); |
|
| 2457 | + $rows = DB::query('SELECT id,title FROM '.prefixTable('roles_title')); |
|
| 2458 | 2458 | foreach ($rows as $record) { |
| 2459 | 2459 | array_push( |
| 2460 | 2460 | $teampassRoles, |
@@ -2500,7 +2500,7 @@ discard block |
||
| 2500 | 2500 | // Get his ID and auth type |
| 2501 | 2501 | $userInfo = DB::queryFirstRow( |
| 2502 | 2502 | 'SELECT id, login, auth_type |
| 2503 | - FROM ' . prefixTable('users') . ' |
|
| 2503 | + FROM ' . prefixTable('users').' |
|
| 2504 | 2504 | WHERE login = %s', |
| 2505 | 2505 | $userLogin |
| 2506 | 2506 | ); |
@@ -2509,7 +2509,7 @@ discard block |
||
| 2509 | 2509 | $userGroupsInTeampass = []; |
| 2510 | 2510 | if ($userInfo !== null) { |
| 2511 | 2511 | $userRoles = DB::query( |
| 2512 | - 'SELECT role_id FROM ' . prefixTable('users_roles') . ' |
|
| 2512 | + 'SELECT role_id FROM '.prefixTable('users_roles').' |
|
| 2513 | 2513 | WHERE user_id = %i', |
| 2514 | 2514 | $userInfo['id'] |
| 2515 | 2515 | ); |
@@ -2618,7 +2618,7 @@ discard block |
||
| 2618 | 2618 | // Check if user already exists |
| 2619 | 2619 | DB::query( |
| 2620 | 2620 | 'SELECT id |
| 2621 | - FROM ' . prefixTable('users') . ' |
|
| 2621 | + FROM ' . prefixTable('users').' |
|
| 2622 | 2622 | WHERE id = %i', |
| 2623 | 2623 | $post_id |
| 2624 | 2624 | ); |
@@ -2684,7 +2684,7 @@ discard block |
||
| 2684 | 2684 | // Search TP_USER in db |
| 2685 | 2685 | $userTP = DB::queryFirstRow( |
| 2686 | 2686 | 'SELECT pw |
| 2687 | - FROM ' . prefixTable('users') . ' |
|
| 2687 | + FROM ' . prefixTable('users').' |
|
| 2688 | 2688 | WHERE id = %i', |
| 2689 | 2689 | TP_USER_ID |
| 2690 | 2690 | ); |
@@ -2707,7 +2707,7 @@ discard block |
||
| 2707 | 2707 | 'arguments' => json_encode([ |
| 2708 | 2708 | 'new_user_id' => (int) $post_user_id, |
| 2709 | 2709 | 'new_user_pwd' => '', |
| 2710 | - 'new_user_code' => cryption($post_user_code, '','encrypt', $SETTINGS)['string'], |
|
| 2710 | + 'new_user_code' => cryption($post_user_code, '', 'encrypt', $SETTINGS)['string'], |
|
| 2711 | 2711 | 'owner_id' => (int) TP_USER_ID, |
| 2712 | 2712 | 'creator_pwd' => $userTP['pw'], |
| 2713 | 2713 | 'email_body' => $lang->get('email_body_user_config_5'), |
@@ -2814,17 +2814,17 @@ discard block |
||
| 2814 | 2814 | // get user info |
| 2815 | 2815 | $processesProgress = DB::query( |
| 2816 | 2816 | 'SELECT u.ongoing_process_id, pt.task, pt.updated_at, pt.finished_at, pt.is_in_progress |
| 2817 | - FROM ' . prefixTable('users') . ' AS u |
|
| 2818 | - INNER JOIN ' . prefixTable('background_subtasks') . ' AS pt ON (pt.task_id = u.ongoing_process_id) |
|
| 2817 | + FROM ' . prefixTable('users').' AS u |
|
| 2818 | + INNER JOIN ' . prefixTable('background_subtasks').' AS pt ON (pt.task_id = u.ongoing_process_id) |
|
| 2819 | 2819 | WHERE u.id = %i', |
| 2820 | 2820 | $user_id |
| 2821 | 2821 | ); |
| 2822 | 2822 | |
| 2823 | 2823 | $finished_steps = 0; |
| 2824 | 2824 | $nb_steps = count($processesProgress); |
| 2825 | - foreach($processesProgress as $process) { |
|
| 2825 | + foreach ($processesProgress as $process) { |
|
| 2826 | 2826 | if ((int) $process['is_in_progress'] === -1) { |
| 2827 | - $finished_steps ++; |
|
| 2827 | + $finished_steps++; |
|
| 2828 | 2828 | } |
| 2829 | 2829 | } |
| 2830 | 2830 | |
@@ -2833,7 +2833,7 @@ discard block |
||
| 2833 | 2833 | 'error' => false, |
| 2834 | 2834 | 'message' => '', |
| 2835 | 2835 | 'user_id' => $user_id, |
| 2836 | - 'status' => $finished_steps === $nb_steps ? 'finished' : number_format($finished_steps/$nb_steps*100, 0).'%', |
|
| 2836 | + 'status' => $finished_steps === $nb_steps ? 'finished' : number_format($finished_steps / $nb_steps * 100, 0).'%', |
|
| 2837 | 2837 | 'debug' => $finished_steps.",".$nb_steps, |
| 2838 | 2838 | ), |
| 2839 | 2839 | 'encode' |
@@ -2966,7 +2966,7 @@ discard block |
||
| 2966 | 2966 | } |
| 2967 | 2967 | |
| 2968 | 2968 | $result = purgeDeletedUserById($userId); |
| 2969 | - $deletedAccountsCount = (int) DB::queryFirstField("SELECT COUNT(id) FROM " . prefixTable('users') . " WHERE deleted_at IS NOT NULL"); |
|
| 2969 | + $deletedAccountsCount = (int) DB::queryFirstField("SELECT COUNT(id) FROM ".prefixTable('users')." WHERE deleted_at IS NOT NULL"); |
|
| 2970 | 2970 | |
| 2971 | 2971 | echo prepareExchangedData( |
| 2972 | 2972 | [ |
@@ -3006,13 +3006,13 @@ discard block |
||
| 3006 | 3006 | |
| 3007 | 3007 | // Prepare variables |
| 3008 | 3008 | $daysRetention = filter_var($dataReceived['days_retention'], FILTER_SANITIZE_NUMBER_INT); |
| 3009 | - $daysRetention = empty($daysRetention) ? 90 : (int)$daysRetention; |
|
| 3009 | + $daysRetention = empty($daysRetention) ? 90 : (int) $daysRetention; |
|
| 3010 | 3010 | $cutoffTimestamp = time() - ($daysRetention * 86400); |
| 3011 | 3011 | |
| 3012 | 3012 | try { |
| 3013 | 3013 | // Get list of users to delete |
| 3014 | 3014 | $users = DB::query( |
| 3015 | - "SELECT id FROM " . prefixTable("users") . " |
|
| 3015 | + "SELECT id FROM ".prefixTable("users")." |
|
| 3016 | 3016 | WHERE deleted_at IS NOT NULL |
| 3017 | 3017 | AND deleted_at > 0 |
| 3018 | 3018 | AND deleted_at < %i |
@@ -3036,7 +3036,7 @@ discard block |
||
| 3036 | 3036 | echo prepareExchangedData( |
| 3037 | 3037 | [ |
| 3038 | 3038 | 'error' => true, |
| 3039 | - 'message' => $lang->get('error') . ': ' . $e->getMessage(), |
|
| 3039 | + 'message' => $lang->get('error').': '.$e->getMessage(), |
|
| 3040 | 3040 | ], |
| 3041 | 3041 | 'encode' |
| 3042 | 3042 | ); |
@@ -3090,10 +3090,10 @@ discard block |
||
| 3090 | 3090 | |
| 3091 | 3091 | $purgedCount = 0; |
| 3092 | 3092 | $errors = []; |
| 3093 | - $cutoffTimestamp = time() - ((int)$daysRetention * 86400); |
|
| 3093 | + $cutoffTimestamp = time() - ((int) $daysRetention * 86400); |
|
| 3094 | 3094 | |
| 3095 | 3095 | foreach ($userIds as $userId) { |
| 3096 | - $userId = (int)$userId; |
|
| 3096 | + $userId = (int) $userId; |
|
| 3097 | 3097 | |
| 3098 | 3098 | try { |
| 3099 | 3099 | $result = purgeDeletedUserById($userId); |
@@ -3101,11 +3101,11 @@ discard block |
||
| 3101 | 3101 | |
| 3102 | 3102 | } catch (Exception $e) { |
| 3103 | 3103 | DB::rollback(); |
| 3104 | - $errors[] = "User ID $userId: " . $e->getMessage(); |
|
| 3104 | + $errors[] = "User ID $userId: ".$e->getMessage(); |
|
| 3105 | 3105 | } |
| 3106 | 3106 | } |
| 3107 | 3107 | |
| 3108 | - $deletedAccountsCount = (int) DB::queryFirstField("SELECT COUNT(id) FROM " . prefixTable('users') . " WHERE deleted_at IS NOT NULL"); |
|
| 3108 | + $deletedAccountsCount = (int) DB::queryFirstField("SELECT COUNT(id) FROM ".prefixTable('users')." WHERE deleted_at IS NOT NULL"); |
|
| 3109 | 3109 | |
| 3110 | 3110 | echo prepareExchangedData( |
| 3111 | 3111 | [ |
@@ -3113,7 +3113,7 @@ discard block |
||
| 3113 | 3113 | 'purged_count' => $purgedCount, |
| 3114 | 3114 | 'total_in_batch' => count($userIds), |
| 3115 | 3115 | 'errors' => $errors, |
| 3116 | - 'message' => $purgedCount . ' user(s) purged in this batch', |
|
| 3116 | + 'message' => $purgedCount.' user(s) purged in this batch', |
|
| 3117 | 3117 | 'deletedAccountsCount' => $deletedAccountsCount, |
| 3118 | 3118 | ], |
| 3119 | 3119 | 'encode' |
@@ -3148,7 +3148,7 @@ discard block |
||
| 3148 | 3148 | |
| 3149 | 3149 | // Get info about user |
| 3150 | 3150 | $data_user = DB::queryFirstRow( |
| 3151 | - 'SELECT login FROM ' . prefixTable('users') . ' WHERE id = %i', |
|
| 3151 | + 'SELECT login FROM '.prefixTable('users').' WHERE id = %i', |
|
| 3152 | 3152 | $userId |
| 3153 | 3153 | ); |
| 3154 | 3154 | |
@@ -3161,12 +3161,12 @@ discard block |
||
| 3161 | 3161 | } |
| 3162 | 3162 | |
| 3163 | 3163 | // Remove user suffix "_deleted_timestamp" |
| 3164 | - $deletedSuffix = '_deleted_' . substr($data_user['login'], strrpos($data_user['login'], '_deleted_') + 9); |
|
| 3164 | + $deletedSuffix = '_deleted_'.substr($data_user['login'], strrpos($data_user['login'], '_deleted_') + 9); |
|
| 3165 | 3165 | $originalLogin = str_replace($deletedSuffix, '', $data_user['login']); |
| 3166 | 3166 | |
| 3167 | 3167 | // Check if an active user with the original login already exists |
| 3168 | 3168 | $existingUser = DB::queryFirstRow( |
| 3169 | - 'SELECT id FROM ' . prefixTable('users') . ' |
|
| 3169 | + 'SELECT id FROM '.prefixTable('users').' |
|
| 3170 | 3170 | WHERE login = %s AND deleted_at IS NULL AND id != %i', |
| 3171 | 3171 | $originalLogin, |
| 3172 | 3172 | $userId |
@@ -3176,7 +3176,7 @@ discard block |
||
| 3176 | 3176 | echo prepareExchangedData( |
| 3177 | 3177 | array( |
| 3178 | 3178 | 'error' => true, |
| 3179 | - 'message' => 'Cannot restore user: an active user with login "' . $originalLogin . '" already exists (ID: ' . $existingUser['id'] . ')' |
|
| 3179 | + 'message' => 'Cannot restore user: an active user with login "'.$originalLogin.'" already exists (ID: '.$existingUser['id'].')' |
|
| 3180 | 3180 | ), |
| 3181 | 3181 | 'encode' |
| 3182 | 3182 | ); |
@@ -3209,7 +3209,7 @@ discard block |
||
| 3209 | 3209 | |
| 3210 | 3210 | // Get info about user |
| 3211 | 3211 | $data_user = DB::queryFirstRow( |
| 3212 | - 'SELECT admin, isAdministratedByRole FROM ' . prefixTable('users') . ' |
|
| 3212 | + 'SELECT admin, isAdministratedByRole FROM '.prefixTable('users').' |
|
| 3213 | 3213 | WHERE id = %i', |
| 3214 | 3214 | $value[1] |
| 3215 | 3215 | ); |
@@ -3243,7 +3243,7 @@ discard block |
||
| 3243 | 3243 | logEvents( |
| 3244 | 3244 | $SETTINGS, |
| 3245 | 3245 | 'user_mngt', |
| 3246 | - 'at_user_new_' . $value[0] . ':' . $value[1], |
|
| 3246 | + 'at_user_new_'.$value[0].':'.$value[1], |
|
| 3247 | 3247 | (string) $session->get('user-id'), |
| 3248 | 3248 | $session->get('user-login'), |
| 3249 | 3249 | filter_input(INPUT_POST, 'id', FILTER_SANITIZE_FULL_SPECIAL_CHARS) |
@@ -3278,7 +3278,7 @@ discard block |
||
| 3278 | 3278 | |
| 3279 | 3279 | // Get info about user |
| 3280 | 3280 | $data_user = DB::queryFirstRow( |
| 3281 | - 'SELECT admin, isAdministratedByRole FROM ' . prefixTable('users') . ' |
|
| 3281 | + 'SELECT admin, isAdministratedByRole FROM '.prefixTable('users').' |
|
| 3282 | 3282 | WHERE id = %i', |
| 3283 | 3283 | $id[1] |
| 3284 | 3284 | ); |
@@ -3317,7 +3317,7 @@ discard block |
||
| 3317 | 3317 | $users = DB::query( |
| 3318 | 3318 | "SELECT id, login, email, deleted_at, |
| 3319 | 3319 | DATEDIFF(NOW(), FROM_UNIXTIME(deleted_at)) as days_since_deletion |
| 3320 | - FROM " . prefixTable("users") . " |
|
| 3320 | + FROM " . prefixTable("users")." |
|
| 3321 | 3321 | WHERE deleted_at IS NOT NULL |
| 3322 | 3322 | AND deleted_at > 0 |
| 3323 | 3323 | ORDER BY deleted_at DESC" |
@@ -3343,7 +3343,7 @@ discard block |
||
| 3343 | 3343 | |
| 3344 | 3344 | // Vérifier que l'utilisateur est bien marqué deleted |
| 3345 | 3345 | $user = DB::queryFirstRow( |
| 3346 | - "SELECT id, login, deleted_at FROM " . prefixTable("users") . " |
|
| 3346 | + "SELECT id, login, deleted_at FROM ".prefixTable("users")." |
|
| 3347 | 3347 | WHERE id = %i |
| 3348 | 3348 | AND deleted_at IS NOT NULL |
| 3349 | 3349 | AND deleted_at > 0", |
@@ -3383,7 +3383,7 @@ discard block |
||
| 3383 | 3383 | |
| 3384 | 3384 | // delete personal folder and subfolders |
| 3385 | 3385 | $data = DB::queryFirstRow( |
| 3386 | - 'SELECT id FROM ' . prefixTable('nested_tree') . ' |
|
| 3386 | + 'SELECT id FROM '.prefixTable('nested_tree').' |
|
| 3387 | 3387 | WHERE title = %s AND personal_folder = %i', |
| 3388 | 3388 | $userId, |
| 3389 | 3389 | '1' |
@@ -3405,7 +3405,7 @@ discard block |
||
| 3405 | 3405 | DB::delete(prefixTable('nested_tree'), 'id = %i AND personal_folder = %i', $folder->id, '1'); |
| 3406 | 3406 | // delete items & logs |
| 3407 | 3407 | $items = DB::query( |
| 3408 | - 'SELECT id FROM ' . prefixTable('items') . ' |
|
| 3408 | + 'SELECT id FROM '.prefixTable('items').' |
|
| 3409 | 3409 | WHERE id_tree=%i AND perso = %i', |
| 3410 | 3410 | $folder->id, |
| 3411 | 3411 | '1' |
@@ -3435,7 +3435,7 @@ discard block |
||
| 3435 | 3435 | // Delete any process related to user |
| 3436 | 3436 | $processes = DB::query( |
| 3437 | 3437 | 'SELECT increment_id |
| 3438 | - FROM ' . prefixTable('background_tasks') . ' |
|
| 3438 | + FROM ' . prefixTable('background_tasks').' |
|
| 3439 | 3439 | WHERE JSON_EXTRACT(arguments, "$.new_user_id") = %i', |
| 3440 | 3440 | $userId |
| 3441 | 3441 | ); |