@@ -69,7 +69,7 @@ discard block |
||
69 | 69 | ) { |
70 | 70 | // Not allowed page |
71 | 71 | $session->set('system-error_code', ERR_NOT_ALLOWED); |
72 | - include $SETTINGS['cpassman_dir'] . '/error.php'; |
|
72 | + include $SETTINGS['cpassman_dir'].'/error.php'; |
|
73 | 73 | exit; |
74 | 74 | } |
75 | 75 | |
@@ -450,7 +450,7 @@ discard block |
||
450 | 450 | ); |
451 | 451 | |
452 | 452 | // add new role to user |
453 | - $tmp = $data_tmp['fonction_id'] . (substr($data_tmp['fonction_id'], -1) == ';' ? $role_id : ';' . $role_id); |
|
453 | + $tmp = $data_tmp['fonction_id'].(substr($data_tmp['fonction_id'], -1) == ';' ? $role_id : ';'.$role_id); |
|
454 | 454 | $session->set('user-roles', str_replace(';;', ';', $tmp)); |
455 | 455 | |
456 | 456 | // store in DB |
@@ -722,7 +722,7 @@ discard block |
||
722 | 722 | $groupsData = $openLdapExtra->getADGroups($ldapConnection, $SETTINGS); |
723 | 723 | break; |
724 | 724 | default: |
725 | - throw new Exception("Unsupported LDAP type: " . $SETTINGS['ldap_type']); |
|
725 | + throw new Exception("Unsupported LDAP type: ".$SETTINGS['ldap_type']); |
|
726 | 726 | } |
727 | 727 | } catch (Exception $e) { |
728 | 728 | echo prepareExchangedData(array( |
@@ -739,7 +739,7 @@ discard block |
||
739 | 739 | // Handle successful retrieval of groups |
740 | 740 | // exists in Teampass |
741 | 741 | //error_log("Error: " . print_r($groupsData['userGroups'], true)); |
742 | - foreach($groupsData['userGroups'] as $key => $group) { |
|
742 | + foreach ($groupsData['userGroups'] as $key => $group) { |
|
743 | 743 | $role_detail = DB::queryfirstrow( |
744 | 744 | 'SELECT a.increment_id as increment_id, a.role_id as role_id, r.title as title |
745 | 745 | FROM '.prefixTable('ldap_groups_roles').' AS a |
@@ -764,7 +764,7 @@ discard block |
||
764 | 764 | |
765 | 765 | // Get all groups in Teampass |
766 | 766 | $teampassRoles = array(); |
767 | - $rows = DB::query('SELECT id,title FROM ' . prefixTable('roles_title')); |
|
767 | + $rows = DB::query('SELECT id,title FROM '.prefixTable('roles_title')); |
|
768 | 768 | foreach ($rows as $record) { |
769 | 769 | array_push( |
770 | 770 | $teampassRoles, |
@@ -50,7 +50,7 @@ discard block |
||
50 | 50 | |
51 | 51 | // Load config if $SETTINGS not defined |
52 | 52 | if (isset($SETTINGS['cpassman_dir']) === false || empty($SETTINGS['cpassman_dir']) === true) { |
53 | - include_once __DIR__ . '/../includes/config/tp.config.php'; |
|
53 | + include_once __DIR__.'/../includes/config/tp.config.php'; |
|
54 | 54 | } |
55 | 55 | |
56 | 56 | header('Content-type: text/html; charset=utf-8'); |
@@ -219,7 +219,7 @@ discard block |
||
219 | 219 | */ |
220 | 220 | function trimElement($chaine, string $element): string |
221 | 221 | { |
222 | - if (! empty($chaine)) { |
|
222 | + if (!empty($chaine)) { |
|
223 | 223 | if (is_array($chaine) === true) { |
224 | 224 | $chaine = implode(';', $chaine); |
225 | 225 | } |
@@ -267,8 +267,8 @@ discard block |
||
267 | 267 | */ |
268 | 268 | function db_error_handler(array $params): void |
269 | 269 | { |
270 | - echo 'Error: ' . $params['error'] . "<br>\n"; |
|
271 | - echo 'Query: ' . $params['query'] . "<br>\n"; |
|
270 | + echo 'Error: '.$params['error']."<br>\n"; |
|
271 | + echo 'Query: '.$params['query']."<br>\n"; |
|
272 | 272 | throw new Exception('Error - Query', 1); |
273 | 273 | } |
274 | 274 | |
@@ -348,7 +348,7 @@ discard block |
||
348 | 348 | $globalsVisibleFolders = $session->get('user-accessible_folders'); |
349 | 349 | $globalsPersonalVisibleFolders = $session->get('user-personal_visible_folders'); |
350 | 350 | // Get list of Folders |
351 | - $rows = DB::query('SELECT id FROM ' . prefixTable('nested_tree') . ' WHERE personal_folder = %i', 0); |
|
351 | + $rows = DB::query('SELECT id FROM '.prefixTable('nested_tree').' WHERE personal_folder = %i', 0); |
|
352 | 352 | foreach ($rows as $record) { |
353 | 353 | array_push($groupesVisibles, $record['id']); |
354 | 354 | } |
@@ -367,7 +367,7 @@ discard block |
||
367 | 367 | } |
368 | 368 | // Get ID of personal folder |
369 | 369 | $persfld = DB::queryfirstrow( |
370 | - 'SELECT id FROM ' . prefixTable('nested_tree') . ' WHERE title = %s', |
|
370 | + 'SELECT id FROM '.prefixTable('nested_tree').' WHERE title = %s', |
|
371 | 371 | $globalsUserId |
372 | 372 | ); |
373 | 373 | if (empty($persfld['id']) === false) { |
@@ -387,20 +387,20 @@ discard block |
||
387 | 387 | // get complete list of ROLES |
388 | 388 | $tmp = explode(';', $idFonctions); |
389 | 389 | $rows = DB::query( |
390 | - 'SELECT * FROM ' . prefixTable('roles_title') . ' |
|
390 | + 'SELECT * FROM '.prefixTable('roles_title').' |
|
391 | 391 | ORDER BY title ASC' |
392 | 392 | ); |
393 | 393 | foreach ($rows as $record) { |
394 | - if (! empty($record['id']) && ! in_array($record['id'], $tmp)) { |
|
394 | + if (!empty($record['id']) && !in_array($record['id'], $tmp)) { |
|
395 | 395 | array_push($tmp, $record['id']); |
396 | 396 | } |
397 | 397 | } |
398 | 398 | $session->set('user-roles', implode(';', $tmp)); |
399 | 399 | $session->set('user-admin', 1); |
400 | 400 | // Check if admin has created Folders and Roles |
401 | - DB::query('SELECT * FROM ' . prefixTable('nested_tree') . ''); |
|
401 | + DB::query('SELECT * FROM '.prefixTable('nested_tree').''); |
|
402 | 402 | $session->set('user-nb_folders', DB::count()); |
403 | - DB::query('SELECT * FROM ' . prefixTable('roles_title')); |
|
403 | + DB::query('SELECT * FROM '.prefixTable('roles_title')); |
|
404 | 404 | $session->set('user-nb_roles', DB::count()); |
405 | 405 | |
406 | 406 | return true; |
@@ -483,7 +483,7 @@ discard block |
||
483 | 483 | // Does this user is allowed to see other items |
484 | 484 | $inc = 0; |
485 | 485 | $rows = DB::query( |
486 | - 'SELECT id, id_tree FROM ' . prefixTable('items') . ' |
|
486 | + 'SELECT id, id_tree FROM '.prefixTable('items').' |
|
487 | 487 | WHERE restricted_to LIKE %ss AND inactif = %s'. |
488 | 488 | (count($allowedFolders) > 0 ? ' AND id_tree NOT IN ('.implode(',', $allowedFolders).')' : ''), |
489 | 489 | $globalsUserId, |
@@ -500,8 +500,8 @@ discard block |
||
500 | 500 | // Check for the users roles if some specific rights exist on items |
501 | 501 | $rows = DB::query( |
502 | 502 | 'SELECT i.id_tree, r.item_id |
503 | - FROM ' . prefixTable('items') . ' as i |
|
504 | - INNER JOIN ' . prefixTable('restriction_to_roles') . ' as r ON (r.item_id=i.id) |
|
503 | + FROM ' . prefixTable('items').' as i |
|
504 | + INNER JOIN ' . prefixTable('restriction_to_roles').' as r ON (r.item_id=i.id) |
|
505 | 505 | WHERE i.id_tree <> "" '. |
506 | 506 | (count($userRoles) > 0 ? 'AND r.role_id IN %li ' : ''). |
507 | 507 | 'ORDER BY i.id_tree ASC', |
@@ -555,16 +555,16 @@ discard block |
||
555 | 555 | ), SORT_NUMERIC) |
556 | 556 | ); |
557 | 557 | // Folders and Roles numbers |
558 | - DB::queryfirstrow('SELECT id FROM ' . prefixTable('nested_tree') . ''); |
|
558 | + DB::queryfirstrow('SELECT id FROM '.prefixTable('nested_tree').''); |
|
559 | 559 | $session->set('user-nb_folders', DB::count()); |
560 | - DB::queryfirstrow('SELECT id FROM ' . prefixTable('roles_title')); |
|
560 | + DB::queryfirstrow('SELECT id FROM '.prefixTable('roles_title')); |
|
561 | 561 | $session->set('user-nb_roles', DB::count()); |
562 | 562 | // check if change proposals on User's items |
563 | 563 | if (isset($SETTINGS['enable_suggestion']) === true && (int) $SETTINGS['enable_suggestion'] === 1) { |
564 | 564 | $countNewItems = DB::query( |
565 | 565 | 'SELECT COUNT(*) |
566 | - FROM ' . prefixTable('items_change') . ' AS c |
|
567 | - LEFT JOIN ' . prefixTable('log_items') . ' AS i ON (c.item_id = i.id_item) |
|
566 | + FROM ' . prefixTable('items_change').' AS c |
|
567 | + LEFT JOIN ' . prefixTable('log_items').' AS i ON (c.item_id = i.id_item) |
|
568 | 568 | WHERE i.action = %s AND i.id_user = %i', |
569 | 569 | 'at_creation', |
570 | 570 | $globalsUserId |
@@ -591,7 +591,7 @@ discard block |
||
591 | 591 | { |
592 | 592 | $rows = DB::query( |
593 | 593 | 'SELECT * |
594 | - FROM ' . prefixTable('roles_values') . ' |
|
594 | + FROM ' . prefixTable('roles_values').' |
|
595 | 595 | WHERE type IN %ls'.(count($userRoles) > 0 ? ' AND role_id IN %li' : ''), |
596 | 596 | ['W', 'ND', 'NE', 'NDNE', 'R'], |
597 | 597 | $userRoles, |
@@ -658,7 +658,7 @@ discard block |
||
658 | 658 | ) { |
659 | 659 | $persoFld = DB::queryfirstrow( |
660 | 660 | 'SELECT id |
661 | - FROM ' . prefixTable('nested_tree') . ' |
|
661 | + FROM ' . prefixTable('nested_tree').' |
|
662 | 662 | WHERE title = %s AND personal_folder = %i'. |
663 | 663 | (count($allowedFolders) > 0 ? ' AND id NOT IN ('.implode(',', $allowedFolders).')' : ''), |
664 | 664 | $globalsUserId, |
@@ -691,7 +691,7 @@ discard block |
||
691 | 691 | } |
692 | 692 | $persoFlds = DB::query( |
693 | 693 | 'SELECT id |
694 | - FROM ' . prefixTable('nested_tree') . ' |
|
694 | + FROM ' . prefixTable('nested_tree').' |
|
695 | 695 | WHERE %l', |
696 | 696 | $where |
697 | 697 | ); |
@@ -759,12 +759,12 @@ discard block |
||
759 | 759 | //Load Tree |
760 | 760 | $tree = new NestedTree(prefixTable('nested_tree'), 'id', 'parent_id', 'title'); |
761 | 761 | // truncate table |
762 | - DB::query('TRUNCATE TABLE ' . prefixTable('cache')); |
|
762 | + DB::query('TRUNCATE TABLE '.prefixTable('cache')); |
|
763 | 763 | // reload date |
764 | 764 | $rows = DB::query( |
765 | 765 | 'SELECT * |
766 | - FROM ' . prefixTable('items') . ' as i |
|
767 | - INNER JOIN ' . prefixTable('log_items') . ' as l ON (l.id_item = i.id) |
|
766 | + FROM ' . prefixTable('items').' as i |
|
767 | + INNER JOIN ' . prefixTable('log_items').' as l ON (l.id_item = i.id) |
|
768 | 768 | AND l.action = %s |
769 | 769 | AND i.inactif = %i', |
770 | 770 | 'at_creation', |
@@ -776,18 +776,18 @@ discard block |
||
776 | 776 | $tags = ''; |
777 | 777 | $itemTags = DB::query( |
778 | 778 | 'SELECT tag |
779 | - FROM ' . prefixTable('tags') . ' |
|
779 | + FROM ' . prefixTable('tags').' |
|
780 | 780 | WHERE item_id = %i AND tag != ""', |
781 | 781 | $record['id'] |
782 | 782 | ); |
783 | 783 | foreach ($itemTags as $itemTag) { |
784 | - $tags .= $itemTag['tag'] . ' '; |
|
784 | + $tags .= $itemTag['tag'].' '; |
|
785 | 785 | } |
786 | 786 | |
787 | 787 | // Get renewal period |
788 | 788 | $resNT = DB::queryfirstrow( |
789 | 789 | 'SELECT renewal_period |
790 | - FROM ' . prefixTable('nested_tree') . ' |
|
790 | + FROM ' . prefixTable('nested_tree').' |
|
791 | 791 | WHERE id = %i', |
792 | 792 | $record['id_tree'] |
793 | 793 | ); |
@@ -800,7 +800,7 @@ discard block |
||
800 | 800 | // Is this a User id? |
801 | 801 | $user = DB::queryfirstrow( |
802 | 802 | 'SELECT id, login |
803 | - FROM ' . prefixTable('users') . ' |
|
803 | + FROM ' . prefixTable('users').' |
|
804 | 804 | WHERE id = %i', |
805 | 805 | $elem->title |
806 | 806 | ); |
@@ -818,11 +818,11 @@ discard block |
||
818 | 818 | 'id' => $record['id'], |
819 | 819 | 'label' => $record['label'], |
820 | 820 | 'description' => $record['description'] ?? '', |
821 | - 'url' => isset($record['url']) && ! empty($record['url']) ? $record['url'] : '0', |
|
821 | + 'url' => isset($record['url']) && !empty($record['url']) ? $record['url'] : '0', |
|
822 | 822 | 'tags' => $tags, |
823 | 823 | 'id_tree' => $record['id_tree'], |
824 | 824 | 'perso' => $record['perso'], |
825 | - 'restricted_to' => isset($record['restricted_to']) && ! empty($record['restricted_to']) ? $record['restricted_to'] : '0', |
|
825 | + 'restricted_to' => isset($record['restricted_to']) && !empty($record['restricted_to']) ? $record['restricted_to'] : '0', |
|
826 | 826 | 'login' => $record['login'] ?? '', |
827 | 827 | 'folder' => implode(' > ', $folder), |
828 | 828 | 'author' => $record['id_user'], |
@@ -851,7 +851,7 @@ discard block |
||
851 | 851 | // get new value from db |
852 | 852 | $data = DB::queryfirstrow( |
853 | 853 | 'SELECT label, description, id_tree, perso, restricted_to, login, url |
854 | - FROM ' . prefixTable('items') . ' |
|
854 | + FROM ' . prefixTable('items').' |
|
855 | 855 | WHERE id=%i', |
856 | 856 | $ident |
857 | 857 | ); |
@@ -859,12 +859,12 @@ discard block |
||
859 | 859 | $tags = ''; |
860 | 860 | $itemTags = DB::query( |
861 | 861 | 'SELECT tag |
862 | - FROM ' . prefixTable('tags') . ' |
|
862 | + FROM ' . prefixTable('tags').' |
|
863 | 863 | WHERE item_id = %i AND tag != ""', |
864 | 864 | $ident |
865 | 865 | ); |
866 | 866 | foreach ($itemTags as $itemTag) { |
867 | - $tags .= $itemTag['tag'] . ' '; |
|
867 | + $tags .= $itemTag['tag'].' '; |
|
868 | 868 | } |
869 | 869 | // form id_tree to full foldername |
870 | 870 | $folder = []; |
@@ -875,7 +875,7 @@ discard block |
||
875 | 875 | // Is this a User id? |
876 | 876 | $user = DB::queryfirstrow( |
877 | 877 | 'SELECT id, login |
878 | - FROM ' . prefixTable('users') . ' |
|
878 | + FROM ' . prefixTable('users').' |
|
879 | 879 | WHERE id = %i', |
880 | 880 | $elem->title |
881 | 881 | ); |
@@ -893,10 +893,10 @@ discard block |
||
893 | 893 | 'label' => $data['label'], |
894 | 894 | 'description' => $data['description'], |
895 | 895 | 'tags' => $tags, |
896 | - 'url' => isset($data['url']) && ! empty($data['url']) ? $data['url'] : '0', |
|
896 | + 'url' => isset($data['url']) && !empty($data['url']) ? $data['url'] : '0', |
|
897 | 897 | 'id_tree' => $data['id_tree'], |
898 | 898 | 'perso' => $data['perso'], |
899 | - 'restricted_to' => isset($data['restricted_to']) && ! empty($data['restricted_to']) ? $data['restricted_to'] : '0', |
|
899 | + 'restricted_to' => isset($data['restricted_to']) && !empty($data['restricted_to']) ? $data['restricted_to'] : '0', |
|
900 | 900 | 'login' => $data['login'] ?? '', |
901 | 901 | 'folder' => implode(' » ', $folder), |
902 | 902 | 'author' => $session->get('user-id'), |
@@ -926,8 +926,8 @@ discard block |
||
926 | 926 | // get new value from db |
927 | 927 | $data = DB::queryFirstRow( |
928 | 928 | 'SELECT i.label, i.description, i.id_tree as id_tree, i.perso, i.restricted_to, i.id, i.login, i.url, l.date |
929 | - FROM ' . prefixTable('items') . ' as i |
|
930 | - INNER JOIN ' . prefixTable('log_items') . ' as l ON (l.id_item = i.id) |
|
929 | + FROM ' . prefixTable('items').' as i |
|
930 | + INNER JOIN ' . prefixTable('log_items').' as l ON (l.id_item = i.id) |
|
931 | 931 | WHERE i.id = %i |
932 | 932 | AND l.action = %s', |
933 | 933 | $ident, |
@@ -937,12 +937,12 @@ discard block |
||
937 | 937 | $tags = ''; |
938 | 938 | $itemTags = DB::query( |
939 | 939 | 'SELECT tag |
940 | - FROM ' . prefixTable('tags') . ' |
|
940 | + FROM ' . prefixTable('tags').' |
|
941 | 941 | WHERE item_id = %i AND tag != ""', |
942 | 942 | $ident |
943 | 943 | ); |
944 | 944 | foreach ($itemTags as $itemTag) { |
945 | - $tags .= $itemTag['tag'] . ' '; |
|
945 | + $tags .= $itemTag['tag'].' '; |
|
946 | 946 | } |
947 | 947 | // form id_tree to full foldername |
948 | 948 | $folder = []; |
@@ -953,7 +953,7 @@ discard block |
||
953 | 953 | // Is this a User id? |
954 | 954 | $user = DB::queryfirstrow( |
955 | 955 | 'SELECT id, login |
956 | - FROM ' . prefixTable('users') . ' |
|
956 | + FROM ' . prefixTable('users').' |
|
957 | 957 | WHERE id = %i', |
958 | 958 | $elem->title |
959 | 959 | ); |
@@ -972,7 +972,7 @@ discard block |
||
972 | 972 | 'label' => $data['label'], |
973 | 973 | 'description' => $data['description'], |
974 | 974 | 'tags' => isset($tags) && empty($tags) === false ? $tags : 'None', |
975 | - 'url' => isset($data['url']) && ! empty($data['url']) ? $data['url'] : '0', |
|
975 | + 'url' => isset($data['url']) && !empty($data['url']) ? $data['url'] : '0', |
|
976 | 976 | 'id_tree' => $data['id_tree'], |
977 | 977 | 'perso' => isset($data['perso']) && empty($data['perso']) === false && $data['perso'] !== 'None' ? $data['perso'] : '0', |
978 | 978 | 'restricted_to' => isset($data['restricted_to']) && empty($data['restricted_to']) === false ? $data['restricted_to'] : '0', |
@@ -994,52 +994,52 @@ discard block |
||
994 | 994 | function getStatisticsData(array $SETTINGS): array |
995 | 995 | { |
996 | 996 | DB::query( |
997 | - 'SELECT id FROM ' . prefixTable('nested_tree') . ' WHERE personal_folder = %i', |
|
997 | + 'SELECT id FROM '.prefixTable('nested_tree').' WHERE personal_folder = %i', |
|
998 | 998 | 0 |
999 | 999 | ); |
1000 | 1000 | $counter_folders = DB::count(); |
1001 | 1001 | DB::query( |
1002 | - 'SELECT id FROM ' . prefixTable('nested_tree') . ' WHERE personal_folder = %i', |
|
1002 | + 'SELECT id FROM '.prefixTable('nested_tree').' WHERE personal_folder = %i', |
|
1003 | 1003 | 1 |
1004 | 1004 | ); |
1005 | 1005 | $counter_folders_perso = DB::count(); |
1006 | 1006 | DB::query( |
1007 | - 'SELECT id FROM ' . prefixTable('items') . ' WHERE perso = %i', |
|
1007 | + 'SELECT id FROM '.prefixTable('items').' WHERE perso = %i', |
|
1008 | 1008 | 0 |
1009 | 1009 | ); |
1010 | 1010 | $counter_items = DB::count(); |
1011 | 1011 | DB::query( |
1012 | - 'SELECT id FROM ' . prefixTable('items') . ' WHERE perso = %i', |
|
1012 | + 'SELECT id FROM '.prefixTable('items').' WHERE perso = %i', |
|
1013 | 1013 | 1 |
1014 | 1014 | ); |
1015 | 1015 | $counter_items_perso = DB::count(); |
1016 | 1016 | DB::query( |
1017 | - 'SELECT id FROM ' . prefixTable('users') . '' |
|
1017 | + 'SELECT id FROM '.prefixTable('users').'' |
|
1018 | 1018 | ); |
1019 | 1019 | $counter_users = DB::count(); |
1020 | 1020 | DB::query( |
1021 | - 'SELECT id FROM ' . prefixTable('users') . ' WHERE admin = %i', |
|
1021 | + 'SELECT id FROM '.prefixTable('users').' WHERE admin = %i', |
|
1022 | 1022 | 1 |
1023 | 1023 | ); |
1024 | 1024 | $admins = DB::count(); |
1025 | 1025 | DB::query( |
1026 | - 'SELECT id FROM ' . prefixTable('users') . ' WHERE gestionnaire = %i', |
|
1026 | + 'SELECT id FROM '.prefixTable('users').' WHERE gestionnaire = %i', |
|
1027 | 1027 | 1 |
1028 | 1028 | ); |
1029 | 1029 | $managers = DB::count(); |
1030 | 1030 | DB::query( |
1031 | - 'SELECT id FROM ' . prefixTable('users') . ' WHERE read_only = %i', |
|
1031 | + 'SELECT id FROM '.prefixTable('users').' WHERE read_only = %i', |
|
1032 | 1032 | 1 |
1033 | 1033 | ); |
1034 | 1034 | $readOnly = DB::count(); |
1035 | 1035 | // list the languages |
1036 | 1036 | $usedLang = []; |
1037 | 1037 | $tp_languages = DB::query( |
1038 | - 'SELECT name FROM ' . prefixTable('languages') |
|
1038 | + 'SELECT name FROM '.prefixTable('languages') |
|
1039 | 1039 | ); |
1040 | 1040 | foreach ($tp_languages as $tp_language) { |
1041 | 1041 | DB::query( |
1042 | - 'SELECT * FROM ' . prefixTable('users') . ' WHERE user_language = %s', |
|
1042 | + 'SELECT * FROM '.prefixTable('users').' WHERE user_language = %s', |
|
1043 | 1043 | $tp_language['name'] |
1044 | 1044 | ); |
1045 | 1045 | $usedLang[$tp_language['name']] = round((DB::count() * 100 / $counter_users), 0); |
@@ -1048,12 +1048,12 @@ discard block |
||
1048 | 1048 | // get list of ips |
1049 | 1049 | $usedIp = []; |
1050 | 1050 | $tp_ips = DB::query( |
1051 | - 'SELECT user_ip FROM ' . prefixTable('users') |
|
1051 | + 'SELECT user_ip FROM '.prefixTable('users') |
|
1052 | 1052 | ); |
1053 | 1053 | foreach ($tp_ips as $ip) { |
1054 | 1054 | if (array_key_exists($ip['user_ip'], $usedIp)) { |
1055 | 1055 | $usedIp[$ip['user_ip']] += $usedIp[$ip['user_ip']]; |
1056 | - } elseif (! empty($ip['user_ip']) && $ip['user_ip'] !== 'none') { |
|
1056 | + } elseif (!empty($ip['user_ip']) && $ip['user_ip'] !== 'none') { |
|
1057 | 1057 | $usedIp[$ip['user_ip']] = 1; |
1058 | 1058 | } |
1059 | 1059 | } |
@@ -1206,7 +1206,7 @@ discard block |
||
1206 | 1206 | { |
1207 | 1207 | // Load PHPMailer |
1208 | 1208 | $mail = new PHPMailer(true); |
1209 | - $languageDir = $SETTINGS['cpassman_dir'] . '/vendor/phpmailer/phpmailer/language/'; |
|
1209 | + $languageDir = $SETTINGS['cpassman_dir'].'/vendor/phpmailer/phpmailer/language/'; |
|
1210 | 1210 | |
1211 | 1211 | try { |
1212 | 1212 | // Set language and SMTPDebug |
@@ -1217,7 +1217,7 @@ discard block |
||
1217 | 1217 | $mail->Debugoutput = function($str, $level) { |
1218 | 1218 | // Path to your log file |
1219 | 1219 | $logFilePath = '/var/log/phpmailer.log'; |
1220 | - file_put_contents($logFilePath, gmdate('Y-m-d H:i:s'). "\t$level\t$str\n", FILE_APPEND | LOCK_EX); |
|
1220 | + file_put_contents($logFilePath, gmdate('Y-m-d H:i:s')."\t$level\t$str\n", FILE_APPEND | LOCK_EX); |
|
1221 | 1221 | }; |
1222 | 1222 | |
1223 | 1223 | // Configure SMTP |
@@ -1360,7 +1360,7 @@ discard block |
||
1360 | 1360 | <table width="600" cellpadding="0" cellspacing="0" border="0" class="container" bgcolor="#ffffff" style="border-spacing: 0; border-bottom: 1px solid #e0e0e0; box-shadow: 0 0 3px #ddd; color: #434343; font-family: Helvetica, Verdana, sans-serif;"> |
1361 | 1361 | <tr><td class="container-padding" bgcolor="#ffffff" style="border-collapse: collapse; border-left: 1px solid #e0e0e0; background-color: #ffffff; padding-left: 30px; padding-right: 30px;"> |
1362 | 1362 | <br><div style="float:right;">' . |
1363 | - $textMail . |
|
1363 | + $textMail. |
|
1364 | 1364 | '<br><br></td></tr></table> |
1365 | 1365 | </td></tr></table> |
1366 | 1366 | <br></body></html>'; |
@@ -1373,7 +1373,7 @@ discard block |
||
1373 | 1373 | */ |
1374 | 1374 | function generateKey(): string |
1375 | 1375 | { |
1376 | - return substr(md5(rand() . rand()), 0, 15); |
|
1376 | + return substr(md5(rand().rand()), 0, 15); |
|
1377 | 1377 | } |
1378 | 1378 | |
1379 | 1379 | /** |
@@ -1451,7 +1451,7 @@ discard block |
||
1451 | 1451 | { |
1452 | 1452 | array_walk_recursive( |
1453 | 1453 | $array, |
1454 | - static function (&$item): void { |
|
1454 | + static function(&$item): void { |
|
1455 | 1455 | if (mb_detect_encoding((string) $item, 'utf-8', true) === false) { |
1456 | 1456 | $item = mb_convert_encoding($item, 'ISO-8859-1', 'UTF-8'); |
1457 | 1457 | } |
@@ -1544,7 +1544,7 @@ discard block |
||
1544 | 1544 | */ |
1545 | 1545 | function prefixTable(string $table): string |
1546 | 1546 | { |
1547 | - $safeTable = htmlspecialchars(DB_PREFIX . $table); |
|
1547 | + $safeTable = htmlspecialchars(DB_PREFIX.$table); |
|
1548 | 1548 | if (empty($safeTable) === false) { |
1549 | 1549 | // sanitize string |
1550 | 1550 | return $safeTable; |
@@ -1608,7 +1608,7 @@ discard block |
||
1608 | 1608 | function send_syslog($message, $host, $port, $component = 'teampass'): void |
1609 | 1609 | { |
1610 | 1610 | $sock = socket_create(AF_INET, SOCK_DGRAM, SOL_UDP); |
1611 | - $syslog_message = '<123>' . date('M d H:i:s ') . $component . ': ' . $message; |
|
1611 | + $syslog_message = '<123>'.date('M d H:i:s ').$component.': '.$message; |
|
1612 | 1612 | socket_sendto($sock, (string) $syslog_message, strlen($syslog_message), 0, (string) $host, (int) $port); |
1613 | 1613 | socket_close($sock); |
1614 | 1614 | } |
@@ -1655,14 +1655,14 @@ discard block |
||
1655 | 1655 | if (isset($SETTINGS['syslog_enable']) === true && (int) $SETTINGS['syslog_enable'] === 1) { |
1656 | 1656 | if ($type === 'user_mngt') { |
1657 | 1657 | send_syslog( |
1658 | - 'action=' . str_replace('at_', '', $label) . ' attribute=user user=' . $who . ' userid="' . $login . '" change="' . $field_1 . '" ', |
|
1658 | + 'action='.str_replace('at_', '', $label).' attribute=user user='.$who.' userid="'.$login.'" change="'.$field_1.'" ', |
|
1659 | 1659 | $SETTINGS['syslog_host'], |
1660 | 1660 | $SETTINGS['syslog_port'], |
1661 | 1661 | 'teampass' |
1662 | 1662 | ); |
1663 | 1663 | } else { |
1664 | 1664 | send_syslog( |
1665 | - 'action=' . $type . ' attribute=' . $label . ' user=' . $who . ' userid="' . $login . '" ', |
|
1665 | + 'action='.$type.' attribute='.$label.' user='.$who.' userid="'.$login.'" ', |
|
1666 | 1666 | $SETTINGS['syslog_host'], |
1667 | 1667 | $SETTINGS['syslog_port'], |
1668 | 1668 | 'teampass' |
@@ -1736,7 +1736,7 @@ discard block |
||
1736 | 1736 | if (empty($item_label) === true) { |
1737 | 1737 | $dataItem = DB::queryfirstrow( |
1738 | 1738 | 'SELECT id, id_tree, label |
1739 | - FROM ' . prefixTable('items') . ' |
|
1739 | + FROM ' . prefixTable('items').' |
|
1740 | 1740 | WHERE id = %i', |
1741 | 1741 | $item_id |
1742 | 1742 | ); |
@@ -1744,11 +1744,11 @@ discard block |
||
1744 | 1744 | } |
1745 | 1745 | |
1746 | 1746 | send_syslog( |
1747 | - 'action=' . str_replace('at_', '', $action) . |
|
1748 | - ' attribute=' . str_replace('at_', '', $attribute[0]) . |
|
1749 | - ' itemno=' . $item_id . |
|
1750 | - ' user=' . is_null($login) === true ? '' : addslashes((string) $login) . |
|
1751 | - ' itemname="' . addslashes($item_label) . '"', |
|
1747 | + 'action='.str_replace('at_', '', $action). |
|
1748 | + ' attribute='.str_replace('at_', '', $attribute[0]). |
|
1749 | + ' itemno='.$item_id. |
|
1750 | + ' user='.is_null($login) === true ? '' : addslashes((string) $login). |
|
1751 | + ' itemname="'.addslashes($item_label).'"', |
|
1752 | 1752 | $SETTINGS['syslog_host'], |
1753 | 1753 | $SETTINGS['syslog_port'], |
1754 | 1754 | 'teampass' |
@@ -1780,8 +1780,8 @@ discard block |
||
1780 | 1780 | $notification = DB::queryOneColumn( |
1781 | 1781 | 'email', |
1782 | 1782 | 'SELECT * |
1783 | - FROM ' . prefixTable('notification') . ' AS n |
|
1784 | - INNER JOIN ' . prefixTable('users') . ' AS u ON (n.user_id = u.id) |
|
1783 | + FROM ' . prefixTable('notification').' AS n |
|
1784 | + INNER JOIN ' . prefixTable('users').' AS u ON (n.user_id = u.id) |
|
1785 | 1785 | WHERE n.item_id = %i AND n.user_id != %i', |
1786 | 1786 | $item_id, |
1787 | 1787 | $globalsUserId |
@@ -1792,7 +1792,7 @@ discard block |
||
1792 | 1792 | // Get list of changes |
1793 | 1793 | $htmlChanges = '<ul>'; |
1794 | 1794 | foreach ($changes as $change) { |
1795 | - $htmlChanges .= '<li>' . $change . '</li>'; |
|
1795 | + $htmlChanges .= '<li>'.$change.'</li>'; |
|
1796 | 1796 | } |
1797 | 1797 | $htmlChanges .= '</ul>'; |
1798 | 1798 | // send email |
@@ -1829,15 +1829,15 @@ discard block |
||
1829 | 1829 | $path = ''; |
1830 | 1830 | foreach ($arbo as $elem) { |
1831 | 1831 | if (empty($path) === true) { |
1832 | - $path = htmlspecialchars(stripslashes(htmlspecialchars_decode($elem->title, ENT_QUOTES)), ENT_QUOTES) . ' '; |
|
1832 | + $path = htmlspecialchars(stripslashes(htmlspecialchars_decode($elem->title, ENT_QUOTES)), ENT_QUOTES).' '; |
|
1833 | 1833 | } else { |
1834 | - $path .= '→ ' . htmlspecialchars(stripslashes(htmlspecialchars_decode($elem->title, ENT_QUOTES)), ENT_QUOTES); |
|
1834 | + $path .= '→ '.htmlspecialchars(stripslashes(htmlspecialchars_decode($elem->title, ENT_QUOTES)), ENT_QUOTES); |
|
1835 | 1835 | } |
1836 | 1836 | } |
1837 | 1837 | |
1838 | 1838 | // Build text to show user |
1839 | 1839 | if (empty($label) === false) { |
1840 | - return empty($path) === true ? addslashes($label) : addslashes($label) . ' (' . $path . ')'; |
|
1840 | + return empty($path) === true ? addslashes($label) : addslashes($label).' ('.$path.')'; |
|
1841 | 1841 | } |
1842 | 1842 | return empty($path) === true ? '' : $path; |
1843 | 1843 | } |
@@ -1894,7 +1894,7 @@ discard block |
||
1894 | 1894 | */ |
1895 | 1895 | function handleConfigFile($action, $SETTINGS, $field = null, $value = null) |
1896 | 1896 | { |
1897 | - $tp_config_file = $SETTINGS['cpassman_dir'] . '/includes/config/tp.config.php'; |
|
1897 | + $tp_config_file = $SETTINGS['cpassman_dir'].'/includes/config/tp.config.php'; |
|
1898 | 1898 | |
1899 | 1899 | // Load class DB |
1900 | 1900 | loadClasses('DB'); |
@@ -1902,8 +1902,8 @@ discard block |
||
1902 | 1902 | if (file_exists($tp_config_file) === false || $action === 'rebuild') { |
1903 | 1903 | // perform a copy |
1904 | 1904 | if (file_exists($tp_config_file)) { |
1905 | - if (! copy($tp_config_file, $tp_config_file . '.' . date('Y_m_d_His', time()))) { |
|
1906 | - return "ERROR: Could not copy file '" . $tp_config_file . "'"; |
|
1905 | + if (!copy($tp_config_file, $tp_config_file.'.'.date('Y_m_d_His', time()))) { |
|
1906 | + return "ERROR: Could not copy file '".$tp_config_file."'"; |
|
1907 | 1907 | } |
1908 | 1908 | } |
1909 | 1909 | |
@@ -1913,11 +1913,11 @@ discard block |
||
1913 | 1913 | $data[1] = "global \$SETTINGS;\n"; |
1914 | 1914 | $data[2] = "\$SETTINGS = array (\n"; |
1915 | 1915 | $rows = DB::query( |
1916 | - 'SELECT * FROM ' . prefixTable('misc') . ' WHERE type=%s', |
|
1916 | + 'SELECT * FROM '.prefixTable('misc').' WHERE type=%s', |
|
1917 | 1917 | 'admin' |
1918 | 1918 | ); |
1919 | 1919 | foreach ($rows as $record) { |
1920 | - array_push($data, " '" . $record['intitule'] . "' => '" . htmlspecialchars_decode($record['valeur'], ENT_COMPAT) . "',\n"); |
|
1920 | + array_push($data, " '".$record['intitule']."' => '".htmlspecialchars_decode($record['valeur'], ENT_COMPAT)."',\n"); |
|
1921 | 1921 | } |
1922 | 1922 | array_push($data, ");\n"); |
1923 | 1923 | $data = array_unique($data); |
@@ -1931,15 +1931,15 @@ discard block |
||
1931 | 1931 | break; |
1932 | 1932 | } |
1933 | 1933 | |
1934 | - if (stristr($line, "'" . $field . "' => '")) { |
|
1935 | - $data[$inc] = " '" . $field . "' => '" . htmlspecialchars_decode($value ?? '', ENT_COMPAT) . "',\n"; |
|
1934 | + if (stristr($line, "'".$field."' => '")) { |
|
1935 | + $data[$inc] = " '".$field."' => '".htmlspecialchars_decode($value ?? '', ENT_COMPAT)."',\n"; |
|
1936 | 1936 | $bFound = true; |
1937 | 1937 | break; |
1938 | 1938 | } |
1939 | 1939 | ++$inc; |
1940 | 1940 | } |
1941 | 1941 | if ($bFound === false) { |
1942 | - $data[$inc] = " '" . $field . "' => '" . htmlspecialchars_decode($value ?? '', ENT_COMPAT). "',\n);\n"; |
|
1942 | + $data[$inc] = " '".$field."' => '".htmlspecialchars_decode($value ?? '', ENT_COMPAT)."',\n);\n"; |
|
1943 | 1943 | } |
1944 | 1944 | } |
1945 | 1945 | |
@@ -1969,7 +1969,7 @@ discard block |
||
1969 | 1969 | { |
1970 | 1970 | global $SETTINGS; |
1971 | 1971 | /* LOAD CPASSMAN SETTINGS */ |
1972 | - if (! isset($SETTINGS['loaded']) || $SETTINGS['loaded'] !== 1) { |
|
1972 | + if (!isset($SETTINGS['loaded']) || $SETTINGS['loaded'] !== 1) { |
|
1973 | 1973 | $SETTINGS = []; |
1974 | 1974 | $SETTINGS['duplicate_folder'] = 0; |
1975 | 1975 | //by default, this is set to 0; |
@@ -1979,7 +1979,7 @@ discard block |
||
1979 | 1979 | //by default, this value is set to 5; |
1980 | 1980 | $settings = []; |
1981 | 1981 | $rows = DB::query( |
1982 | - 'SELECT * FROM ' . prefixTable('misc') . ' WHERE type=%s_type OR type=%s_type2', |
|
1982 | + 'SELECT * FROM '.prefixTable('misc').' WHERE type=%s_type OR type=%s_type2', |
|
1983 | 1983 | [ |
1984 | 1984 | 'type' => 'admin', |
1985 | 1985 | 'type2' => 'settings', |
@@ -2011,7 +2011,7 @@ discard block |
||
2011 | 2011 | $source_cf = []; |
2012 | 2012 | $rows = DB::QUERY( |
2013 | 2013 | 'SELECT id_category |
2014 | - FROM ' . prefixTable('categories_folders') . ' |
|
2014 | + FROM ' . prefixTable('categories_folders').' |
|
2015 | 2015 | WHERE id_folder = %i', |
2016 | 2016 | $source_id |
2017 | 2017 | ); |
@@ -2022,7 +2022,7 @@ discard block |
||
2022 | 2022 | $target_cf = []; |
2023 | 2023 | $rows = DB::QUERY( |
2024 | 2024 | 'SELECT id_category |
2025 | - FROM ' . prefixTable('categories_folders') . ' |
|
2025 | + FROM ' . prefixTable('categories_folders').' |
|
2026 | 2026 | WHERE id_folder = %i', |
2027 | 2027 | $target_id |
2028 | 2028 | ); |
@@ -2240,7 +2240,7 @@ discard block |
||
2240 | 2240 | int $dirPerm = 0755 |
2241 | 2241 | ) { |
2242 | 2242 | // Check if the path exists |
2243 | - if (! file_exists($path)) { |
|
2243 | + if (!file_exists($path)) { |
|
2244 | 2244 | return false; |
2245 | 2245 | } |
2246 | 2246 | |
@@ -2293,7 +2293,7 @@ discard block |
||
2293 | 2293 | // Load item data |
2294 | 2294 | $data = DB::queryFirstRow( |
2295 | 2295 | 'SELECT id_tree |
2296 | - FROM ' . prefixTable('items') . ' |
|
2296 | + FROM ' . prefixTable('items').' |
|
2297 | 2297 | WHERE id = %i', |
2298 | 2298 | $item_id |
2299 | 2299 | ); |
@@ -2356,7 +2356,7 @@ discard block |
||
2356 | 2356 | } |
2357 | 2357 | $host .= substr(explode(".", $email[1])[0], -1, 1); |
2358 | 2358 | } |
2359 | - $email = $name . "@" . $host . "." . explode(".", $email[1])[1]; |
|
2359 | + $email = $name."@".$host.".".explode(".", $email[1])[1]; |
|
2360 | 2360 | return $email; |
2361 | 2361 | } |
2362 | 2362 | |
@@ -2379,7 +2379,7 @@ discard block |
||
2379 | 2379 | |
2380 | 2380 | // Insert log in DB |
2381 | 2381 | return DB::query( |
2382 | - 'SELECT ' . $fields . ' |
|
2382 | + 'SELECT '.$fields.' |
|
2383 | 2383 | FROM ' . prefixTable($table) |
2384 | 2384 | ); |
2385 | 2385 | } |
@@ -2394,11 +2394,11 @@ discard block |
||
2394 | 2394 | function formatSizeUnits(int $bytes): string |
2395 | 2395 | { |
2396 | 2396 | if ($bytes >= 1073741824) { |
2397 | - $bytes = number_format($bytes / 1073741824, 2) . ' GB'; |
|
2397 | + $bytes = number_format($bytes / 1073741824, 2).' GB'; |
|
2398 | 2398 | } elseif ($bytes >= 1048576) { |
2399 | - $bytes = number_format($bytes / 1048576, 2) . ' MB'; |
|
2399 | + $bytes = number_format($bytes / 1048576, 2).' MB'; |
|
2400 | 2400 | } elseif ($bytes >= 1024) { |
2401 | - $bytes = number_format($bytes / 1024, 2) . ' KB'; |
|
2401 | + $bytes = number_format($bytes / 1024, 2).' KB'; |
|
2402 | 2402 | } elseif ($bytes > 1) { |
2403 | 2403 | $bytes .= ' bytes'; |
2404 | 2404 | } elseif ($bytes === 1) { |
@@ -2643,14 +2643,14 @@ discard block |
||
2643 | 2643 | |
2644 | 2644 | // Encrypt the file content |
2645 | 2645 | $plaintext = file_get_contents( |
2646 | - filter_var($fileInPath . '/' . $fileInName, FILTER_SANITIZE_URL) |
|
2646 | + filter_var($fileInPath.'/'.$fileInName, FILTER_SANITIZE_URL) |
|
2647 | 2647 | ); |
2648 | 2648 | $ciphertext = $cipher->encrypt($plaintext); |
2649 | 2649 | // Save new file |
2650 | 2650 | $hash = md5($plaintext); |
2651 | - $fileOut = $fileInPath . '/' . TP_FILE_PREFIX . $hash; |
|
2651 | + $fileOut = $fileInPath.'/'.TP_FILE_PREFIX.$hash; |
|
2652 | 2652 | file_put_contents($fileOut, $ciphertext); |
2653 | - unlink($fileInPath . '/' . $fileInName); |
|
2653 | + unlink($fileInPath.'/'.$fileInName); |
|
2654 | 2654 | return [ |
2655 | 2655 | 'fileHash' => base64_encode($hash), |
2656 | 2656 | 'objectKey' => base64_encode($objectKey), |
@@ -2671,7 +2671,7 @@ discard block |
||
2671 | 2671 | */ |
2672 | 2672 | function decryptFile(string $fileName, string $filePath, string $key): string |
2673 | 2673 | { |
2674 | - if (! defined('FILE_BUFFER_SIZE')) { |
|
2674 | + if (!defined('FILE_BUFFER_SIZE')) { |
|
2675 | 2675 | define('FILE_BUFFER_SIZE', 128 * 1024); |
2676 | 2676 | } |
2677 | 2677 | |
@@ -2687,7 +2687,7 @@ discard block |
||
2687 | 2687 | $cipher->enableContinuousBuffer(); |
2688 | 2688 | $cipher->disablePadding(); |
2689 | 2689 | // Get file content |
2690 | - $ciphertext = file_get_contents($filePath . '/' . TP_FILE_PREFIX . $fileName); |
|
2690 | + $ciphertext = file_get_contents($filePath.'/'.TP_FILE_PREFIX.$fileName); |
|
2691 | 2691 | // Decrypt file content and return |
2692 | 2692 | return base64_encode($cipher->decrypt($ciphertext)); |
2693 | 2693 | /*} else { |
@@ -2769,8 +2769,8 @@ discard block |
||
2769 | 2769 | // Only create the sharekey for a user |
2770 | 2770 | $user = DB::queryFirstRow( |
2771 | 2771 | 'SELECT public_key |
2772 | - FROM ' . prefixTable('users') . ' |
|
2773 | - WHERE id = ' . (int) $session->get('user-id') . ' |
|
2772 | + FROM ' . prefixTable('users').' |
|
2773 | + WHERE id = ' . (int) $session->get('user-id').' |
|
2774 | 2774 | AND public_key != ""' |
2775 | 2775 | ); |
2776 | 2776 | |
@@ -2806,10 +2806,9 @@ discard block |
||
2806 | 2806 | //DB::debugmode(true); |
2807 | 2807 | $users = DB::query( |
2808 | 2808 | 'SELECT id, public_key |
2809 | - FROM ' . prefixTable('users') . ' |
|
2809 | + FROM ' . prefixTable('users').' |
|
2810 | 2810 | WHERE ' . ($onlyForUser === true ? |
2811 | - 'id IN ("' . TP_USER_ID . '","' . $session->get('user-id') . '") ' : |
|
2812 | - 'id NOT IN ("' . OTV_USER_ID . '","' . SSH_USER_ID . '","' . API_USER_ID . '") ') . ' |
|
2811 | + 'id IN ("'.TP_USER_ID.'","'.$session->get('user-id').'") ' : 'id NOT IN ("'.OTV_USER_ID.'","'.SSH_USER_ID.'","'.API_USER_ID.'") ').' |
|
2813 | 2812 | AND public_key != ""' |
2814 | 2813 | ); |
2815 | 2814 | //DB::debugmode(false); |
@@ -2856,7 +2855,7 @@ discard block |
||
2856 | 2855 | function isBase64(string $str): bool |
2857 | 2856 | { |
2858 | 2857 | $str = (string) trim($str); |
2859 | - if (! isset($str[0])) { |
|
2858 | + if (!isset($str[0])) { |
|
2860 | 2859 | return false; |
2861 | 2860 | } |
2862 | 2861 | |
@@ -2929,7 +2928,7 @@ discard block |
||
2929 | 2928 | $connection->connect(); |
2930 | 2929 | } catch (\LdapRecord\Auth\BindException $e) { |
2931 | 2930 | $error = $e->getDetailedError(); |
2932 | - echo 'Error : '.$error->getErrorCode().' - '.$error->getErrorMessage(). '<br>'.$error->getDiagnosticMessage(); |
|
2931 | + echo 'Error : '.$error->getErrorCode().' - '.$error->getErrorMessage().'<br>'.$error->getDiagnosticMessage(); |
|
2933 | 2932 | return false; |
2934 | 2933 | } |
2935 | 2934 | |
@@ -2942,7 +2941,7 @@ discard block |
||
2942 | 2941 | } |
2943 | 2942 | } catch (\LdapRecord\Auth\BindException $e) { |
2944 | 2943 | $error = $e->getDetailedError(); |
2945 | - echo 'Error : '.$error->getErrorCode().' - '.$error->getErrorMessage(). '<br>'.$error->getDiagnosticMessage(); |
|
2944 | + echo 'Error : '.$error->getErrorCode().' - '.$error->getErrorMessage().'<br>'.$error->getDiagnosticMessage(); |
|
2946 | 2945 | return false; |
2947 | 2946 | } |
2948 | 2947 | |
@@ -2966,7 +2965,7 @@ discard block |
||
2966 | 2965 | // expect if personal item |
2967 | 2966 | DB::delete( |
2968 | 2967 | prefixTable('sharekeys_items'), |
2969 | - 'user_id = %i AND object_id NOT IN (SELECT i.id FROM ' . prefixTable('items') . ' AS i WHERE i.perso = 1)', |
|
2968 | + 'user_id = %i AND object_id NOT IN (SELECT i.id FROM '.prefixTable('items').' AS i WHERE i.perso = 1)', |
|
2970 | 2969 | $userId |
2971 | 2970 | ); |
2972 | 2971 | // Remove all item sharekeys files |
@@ -2974,8 +2973,8 @@ discard block |
||
2974 | 2973 | prefixTable('sharekeys_files'), |
2975 | 2974 | 'user_id = %i AND object_id NOT IN ( |
2976 | 2975 | SELECT f.id |
2977 | - FROM ' . prefixTable('items') . ' AS i |
|
2978 | - INNER JOIN ' . prefixTable('files') . ' AS f ON f.id_item = i.id |
|
2976 | + FROM ' . prefixTable('items').' AS i |
|
2977 | + INNER JOIN ' . prefixTable('files').' AS f ON f.id_item = i.id |
|
2979 | 2978 | WHERE i.perso = 1 |
2980 | 2979 | )', |
2981 | 2980 | $userId |
@@ -2985,8 +2984,8 @@ discard block |
||
2985 | 2984 | prefixTable('sharekeys_fields'), |
2986 | 2985 | 'user_id = %i AND object_id NOT IN ( |
2987 | 2986 | SELECT c.id |
2988 | - FROM ' . prefixTable('items') . ' AS i |
|
2989 | - INNER JOIN ' . prefixTable('categories_items') . ' AS c ON c.item_id = i.id |
|
2987 | + FROM ' . prefixTable('items').' AS i |
|
2988 | + INNER JOIN ' . prefixTable('categories_items').' AS c ON c.item_id = i.id |
|
2990 | 2989 | WHERE i.perso = 1 |
2991 | 2990 | )', |
2992 | 2991 | $userId |
@@ -2994,13 +2993,13 @@ discard block |
||
2994 | 2993 | // Remove all item sharekeys logs |
2995 | 2994 | DB::delete( |
2996 | 2995 | prefixTable('sharekeys_logs'), |
2997 | - 'user_id = %i AND object_id NOT IN (SELECT i.id FROM ' . prefixTable('items') . ' AS i WHERE i.perso = 1)', |
|
2996 | + 'user_id = %i AND object_id NOT IN (SELECT i.id FROM '.prefixTable('items').' AS i WHERE i.perso = 1)', |
|
2998 | 2997 | $userId |
2999 | 2998 | ); |
3000 | 2999 | // Remove all item sharekeys suggestions |
3001 | 3000 | DB::delete( |
3002 | 3001 | prefixTable('sharekeys_suggestions'), |
3003 | - 'user_id = %i AND object_id NOT IN (SELECT i.id FROM ' . prefixTable('items') . ' AS i WHERE i.perso = 1)', |
|
3002 | + 'user_id = %i AND object_id NOT IN (SELECT i.id FROM '.prefixTable('items').' AS i WHERE i.perso = 1)', |
|
3004 | 3003 | $userId |
3005 | 3004 | ); |
3006 | 3005 | return false; |
@@ -3021,7 +3020,7 @@ discard block |
||
3021 | 3020 | foreach (DateTimeZone::listIdentifiers() as $timezone) { |
3022 | 3021 | $now->setTimezone(new DateTimeZone($timezone)); |
3023 | 3022 | $offsets[] = $offset = $now->getOffset(); |
3024 | - $timezones[$timezone] = '(' . format_GMT_offset($offset) . ') ' . format_timezone_name($timezone); |
|
3023 | + $timezones[$timezone] = '('.format_GMT_offset($offset).') '.format_timezone_name($timezone); |
|
3025 | 3024 | } |
3026 | 3025 | |
3027 | 3026 | array_multisort($offsets, $timezones); |
@@ -3041,7 +3040,7 @@ discard block |
||
3041 | 3040 | { |
3042 | 3041 | $hours = intval($offset / 3600); |
3043 | 3042 | $minutes = abs(intval($offset % 3600 / 60)); |
3044 | - return 'GMT' . ($offset ? sprintf('%+03d:%02d', $hours, $minutes) : ''); |
|
3043 | + return 'GMT'.($offset ? sprintf('%+03d:%02d', $hours, $minutes) : ''); |
|
3045 | 3044 | } |
3046 | 3045 | |
3047 | 3046 | /** |
@@ -3141,8 +3140,7 @@ discard block |
||
3141 | 3140 | { |
3142 | 3141 | if (isset($array[$key]) === true |
3143 | 3142 | && (is_int($value) === true ? |
3144 | - (int) $array[$key] === $value : |
|
3145 | - (string) $array[$key] === $value) |
|
3143 | + (int) $array[$key] === $value : (string) $array[$key] === $value) |
|
3146 | 3144 | ) { |
3147 | 3145 | return true; |
3148 | 3146 | } |
@@ -3164,8 +3162,7 @@ discard block |
||
3164 | 3162 | { |
3165 | 3163 | if (isset($var) === false |
3166 | 3164 | || (is_int($value) === true ? |
3167 | - (int) $var === $value : |
|
3168 | - (string) $var === $value) |
|
3165 | + (int) $var === $value : (string) $var === $value) |
|
3169 | 3166 | ) { |
3170 | 3167 | return true; |
3171 | 3168 | } |
@@ -3216,7 +3213,7 @@ discard block |
||
3216 | 3213 | */ |
3217 | 3214 | function isSetArrayOfValues(array $arrayOfValues): bool |
3218 | 3215 | { |
3219 | - foreach($arrayOfValues as $value) { |
|
3216 | + foreach ($arrayOfValues as $value) { |
|
3220 | 3217 | if (isset($value) === false) { |
3221 | 3218 | return false; |
3222 | 3219 | } |
@@ -3238,7 +3235,7 @@ discard block |
||
3238 | 3235 | /*PHP8 - integer|string*/$value |
3239 | 3236 | ) : bool |
3240 | 3237 | { |
3241 | - foreach($arrayOfVars as $variable) { |
|
3238 | + foreach ($arrayOfVars as $variable) { |
|
3242 | 3239 | if ($variable !== $value) { |
3243 | 3240 | return false; |
3244 | 3241 | } |
@@ -3258,7 +3255,7 @@ discard block |
||
3258 | 3255 | /*PHP8 - integer|string*/$value |
3259 | 3256 | ) : bool |
3260 | 3257 | { |
3261 | - foreach($arrayOfVars as $variable) { |
|
3258 | + foreach ($arrayOfVars as $variable) { |
|
3262 | 3259 | if ($variable === $value) { |
3263 | 3260 | return true; |
3264 | 3261 | } |
@@ -3326,7 +3323,7 @@ discard block |
||
3326 | 3323 | * @param array $filters |
3327 | 3324 | * @return array|string |
3328 | 3325 | */ |
3329 | -function dataSanitizer(array $data, array $filters): array|string |
|
3326 | +function dataSanitizer(array $data, array $filters): array | string |
|
3330 | 3327 | { |
3331 | 3328 | // Load Sanitizer library |
3332 | 3329 | $sanitizer = new Sanitizer($data, $filters); |
@@ -3355,7 +3352,7 @@ discard block |
||
3355 | 3352 | // Exists ? |
3356 | 3353 | $userCacheId = DB::queryfirstrow( |
3357 | 3354 | 'SELECT increment_id |
3358 | - FROM ' . prefixTable('cache_tree') . ' |
|
3355 | + FROM ' . prefixTable('cache_tree').' |
|
3359 | 3356 | WHERE user_id = %i', |
3360 | 3357 | $user_id |
3361 | 3358 | ); |
@@ -3406,7 +3403,7 @@ discard block |
||
3406 | 3403 | */ |
3407 | 3404 | function pourcentage(float $nombre, float $total, float $pourcentage): float |
3408 | 3405 | { |
3409 | - $resultat = ($nombre/$total) * $pourcentage; |
|
3406 | + $resultat = ($nombre / $total) * $pourcentage; |
|
3410 | 3407 | return round($resultat); |
3411 | 3408 | } |
3412 | 3409 | |
@@ -3436,7 +3433,7 @@ discard block |
||
3436 | 3433 | |
3437 | 3434 | // Get last folder update |
3438 | 3435 | $lastFolderChange = DB::queryfirstrow( |
3439 | - 'SELECT valeur FROM ' . prefixTable('misc') . ' |
|
3436 | + 'SELECT valeur FROM '.prefixTable('misc').' |
|
3440 | 3437 | WHERE type = %s AND intitule = %s', |
3441 | 3438 | 'timestamp', |
3442 | 3439 | 'last_folder_change' |
@@ -3466,7 +3463,7 @@ discard block |
||
3466 | 3463 | // Does this user has a tree cache |
3467 | 3464 | $userCacheTree = DB::queryfirstrow( |
3468 | 3465 | 'SELECT '.$fieldName.' |
3469 | - FROM ' . prefixTable('cache_tree') . ' |
|
3466 | + FROM ' . prefixTable('cache_tree').' |
|
3470 | 3467 | WHERE user_id = %i', |
3471 | 3468 | $session->get('user-id') |
3472 | 3469 | ); |
@@ -3508,7 +3505,7 @@ discard block |
||
3508 | 3505 | if (count($folderIds) === 0) { |
3509 | 3506 | $folderIds = DB::queryFirstColumn( |
3510 | 3507 | 'SELECT id |
3511 | - FROM ' . prefixTable('nested_tree') . ' |
|
3508 | + FROM ' . prefixTable('nested_tree').' |
|
3512 | 3509 | WHERE personal_folder=%i', |
3513 | 3510 | 0 |
3514 | 3511 | ); |
@@ -3525,8 +3522,8 @@ discard block |
||
3525 | 3522 | $rows_tmp = DB::query( |
3526 | 3523 | 'SELECT c.id, c.title, c.level, c.type, c.masked, c.order, c.encrypted_data, c.role_visibility, c.is_mandatory, |
3527 | 3524 | f.id_category AS category_id |
3528 | - FROM ' . prefixTable('categories_folders') . ' AS f |
|
3529 | - INNER JOIN ' . prefixTable('categories') . ' AS c ON (f.id_category = c.parent_id) |
|
3525 | + FROM ' . prefixTable('categories_folders').' AS f |
|
3526 | + INNER JOIN ' . prefixTable('categories').' AS c ON (f.id_category = c.parent_id) |
|
3530 | 3527 | WHERE id_folder=%i', |
3531 | 3528 | $folder |
3532 | 3529 | ); |
@@ -3552,7 +3549,7 @@ discard block |
||
3552 | 3549 | $valTemp = ''; |
3553 | 3550 | $data = DB::queryFirstRow( |
3554 | 3551 | 'SELECT valeur |
3555 | - FROM ' . prefixTable('misc') . ' |
|
3552 | + FROM ' . prefixTable('misc').' |
|
3556 | 3553 | WHERE type = %s AND intitule=%i', |
3557 | 3554 | 'complex', |
3558 | 3555 | $folder |
@@ -3569,14 +3566,14 @@ discard block |
||
3569 | 3566 | $valTemp = ''; |
3570 | 3567 | $rows_tmp = DB::query( |
3571 | 3568 | 'SELECT t.title |
3572 | - FROM ' . prefixTable('roles_values') . ' as v |
|
3573 | - INNER JOIN ' . prefixTable('roles_title') . ' as t ON (v.role_id = t.id) |
|
3569 | + FROM ' . prefixTable('roles_values').' as v |
|
3570 | + INNER JOIN ' . prefixTable('roles_title').' as t ON (v.role_id = t.id) |
|
3574 | 3571 | WHERE v.folder_id = %i |
3575 | 3572 | GROUP BY title', |
3576 | 3573 | $folder |
3577 | 3574 | ); |
3578 | 3575 | foreach ($rows_tmp as $record) { |
3579 | - $valTemp .= (empty($valTemp) === true ? '' : ' - ') . $record['title']; |
|
3576 | + $valTemp .= (empty($valTemp) === true ? '' : ' - ').$record['title']; |
|
3580 | 3577 | } |
3581 | 3578 | $arr_data['visibilityRoles'] = $valTemp; |
3582 | 3579 | |
@@ -3609,7 +3606,7 @@ discard block |
||
3609 | 3606 | // loop on users and check if user has this role |
3610 | 3607 | $rows = DB::query( |
3611 | 3608 | 'SELECT id, fonction_id |
3612 | - FROM ' . prefixTable('users') . ' |
|
3609 | + FROM ' . prefixTable('users').' |
|
3613 | 3610 | WHERE id != %i AND admin = 0 AND fonction_id IS NOT NULL AND fonction_id != ""', |
3614 | 3611 | $session->get('user-id') |
3615 | 3612 | ); |
@@ -3641,7 +3638,7 @@ discard block |
||
3641 | 3638 | |
3642 | 3639 | $val = DB::queryfirstrow( |
3643 | 3640 | 'SELECT * |
3644 | - FROM ' . prefixTable('users') . ' |
|
3641 | + FROM ' . prefixTable('users').' |
|
3645 | 3642 | WHERE id = %i', |
3646 | 3643 | $userId |
3647 | 3644 | ); |
@@ -3657,12 +3654,12 @@ discard block |
||
3657 | 3654 | function upgradeRequired(): bool |
3658 | 3655 | { |
3659 | 3656 | // Get settings.php |
3660 | - include_once __DIR__. '/../includes/config/settings.php'; |
|
3657 | + include_once __DIR__.'/../includes/config/settings.php'; |
|
3661 | 3658 | |
3662 | 3659 | // Get timestamp in DB |
3663 | 3660 | $val = DB::queryfirstrow( |
3664 | 3661 | 'SELECT valeur |
3665 | - FROM ' . prefixTable('misc') . ' |
|
3662 | + FROM ' . prefixTable('misc').' |
|
3666 | 3663 | WHERE type = %s AND intitule = %s', |
3667 | 3664 | 'admin', |
3668 | 3665 | 'upgrade_timestamp' |
@@ -3717,7 +3714,7 @@ discard block |
||
3717 | 3714 | // prepapre background tasks for item keys generation |
3718 | 3715 | $userTP = DB::queryFirstRow( |
3719 | 3716 | 'SELECT pw, public_key, private_key |
3720 | - FROM ' . prefixTable('users') . ' |
|
3717 | + FROM ' . prefixTable('users').' |
|
3721 | 3718 | WHERE id = %i', |
3722 | 3719 | TP_USER_ID |
3723 | 3720 | ); |
@@ -3751,7 +3748,7 @@ discard block |
||
3751 | 3748 | } |
3752 | 3749 | |
3753 | 3750 | // Generate new keys |
3754 | - if ($user_self_change === true && empty($recovery_public_key) === false && empty($recovery_private_key) === false){ |
|
3751 | + if ($user_self_change === true && empty($recovery_public_key) === false && empty($recovery_private_key) === false) { |
|
3755 | 3752 | $userKeys = [ |
3756 | 3753 | 'public_key' => $recovery_public_key, |
3757 | 3754 | 'private_key_clear' => $recovery_private_key, |
@@ -3791,8 +3788,8 @@ discard block |
||
3791 | 3788 | 'process_type' => 'create_user_keys', |
3792 | 3789 | 'arguments' => json_encode([ |
3793 | 3790 | 'new_user_id' => (int) $userId, |
3794 | - 'new_user_pwd' => cryption($passwordClear, '','encrypt')['string'], |
|
3795 | - 'new_user_code' => cryption(empty($encryptionKey) === true ? uniqidReal(20) : $encryptionKey, '','encrypt')['string'], |
|
3791 | + 'new_user_pwd' => cryption($passwordClear, '', 'encrypt')['string'], |
|
3792 | + 'new_user_code' => cryption(empty($encryptionKey) === true ? uniqidReal(20) : $encryptionKey, '', 'encrypt')['string'], |
|
3796 | 3793 | 'owner_id' => (int) TP_USER_ID, |
3797 | 3794 | 'creator_pwd' => $userTP['pw'], |
3798 | 3795 | 'send_email' => $sendEmailToUser === true ? 1 : 0, |
@@ -4100,7 +4097,7 @@ discard block |
||
4100 | 4097 | * @param integer $user_id |
4101 | 4098 | * @return void |
4102 | 4099 | */ |
4103 | -function purgeUnnecessaryKeys(bool $allUsers = true, int $user_id=0) |
|
4100 | +function purgeUnnecessaryKeys(bool $allUsers = true, int $user_id = 0) |
|
4104 | 4101 | { |
4105 | 4102 | if ($allUsers === true) { |
4106 | 4103 | // Load class DB |
@@ -4110,7 +4107,7 @@ discard block |
||
4110 | 4107 | |
4111 | 4108 | $users = DB::query( |
4112 | 4109 | 'SELECT id |
4113 | - FROM ' . prefixTable('users') . ' |
|
4110 | + FROM ' . prefixTable('users').' |
|
4114 | 4111 | WHERE id NOT IN ('.OTV_USER_ID.', '.TP_USER_ID.', '.SSH_USER_ID.', '.API_USER_ID.') |
4115 | 4112 | ORDER BY login ASC' |
4116 | 4113 | ); |
@@ -4128,7 +4125,7 @@ discard block |
||
4128 | 4125 | * @param integer $user_id |
4129 | 4126 | * @return void |
4130 | 4127 | */ |
4131 | -function purgeUnnecessaryKeysForUser(int $user_id=0) |
|
4128 | +function purgeUnnecessaryKeysForUser(int $user_id = 0) |
|
4132 | 4129 | { |
4133 | 4130 | if ($user_id === 0) { |
4134 | 4131 | return; |
@@ -4139,8 +4136,8 @@ discard block |
||
4139 | 4136 | |
4140 | 4137 | $personalItems = DB::queryFirstColumn( |
4141 | 4138 | 'SELECT id |
4142 | - FROM ' . prefixTable('items') . ' AS i |
|
4143 | - INNER JOIN ' . prefixTable('log_items') . ' AS li ON li.id_item = i.id |
|
4139 | + FROM ' . prefixTable('items').' AS i |
|
4140 | + INNER JOIN ' . prefixTable('log_items').' AS li ON li.id_item = i.id |
|
4144 | 4141 | WHERE i.perso = 1 AND li.action = "at_creation" AND li.id_user IN (%i, '.TP_USER_ID.')', |
4145 | 4142 | $user_id |
4146 | 4143 | ); |
@@ -4189,7 +4186,7 @@ discard block |
||
4189 | 4186 | // Check if user exists |
4190 | 4187 | $userInfo = DB::queryFirstRow( |
4191 | 4188 | 'SELECT pw, public_key, private_key, login, name |
4192 | - FROM ' . prefixTable('users') . ' |
|
4189 | + FROM ' . prefixTable('users').' |
|
4193 | 4190 | WHERE id = %i', |
4194 | 4191 | $userId |
4195 | 4192 | ); |
@@ -4199,7 +4196,7 @@ discard block |
||
4199 | 4196 | |
4200 | 4197 | // Prepare file content |
4201 | 4198 | $export_value = file_get_contents(__DIR__."/../includes/core/teampass_ascii.txt")."\n". |
4202 | - "Generation date: ".date($SETTINGS['date_format'] . ' ' . $SETTINGS['time_format'], $now)."\n\n". |
|
4199 | + "Generation date: ".date($SETTINGS['date_format'].' '.$SETTINGS['time_format'], $now)."\n\n". |
|
4203 | 4200 | "RECOVERY KEYS - Not to be shared - To be store safely\n\n". |
4204 | 4201 | "Public Key:\n".$userInfo['public_key']."\n\n". |
4205 | 4202 | "Private Key:\n".decryptPrivateKey($session->get('user-password'), $userInfo['private_key'])."\n\n"; |
@@ -4222,7 +4219,7 @@ discard block |
||
4222 | 4219 | return prepareExchangedData( |
4223 | 4220 | array( |
4224 | 4221 | 'error' => false, |
4225 | - 'datetime' => date($SETTINGS['date_format'] . ' ' . $SETTINGS['time_format'], $now), |
|
4222 | + 'datetime' => date($SETTINGS['date_format'].' '.$SETTINGS['time_format'], $now), |
|
4226 | 4223 | 'timestamp' => $now, |
4227 | 4224 | 'content' => base64_encode($export_value), |
4228 | 4225 | 'login' => $userInfo['login'], |
@@ -4248,8 +4245,8 @@ discard block |
||
4248 | 4245 | */ |
4249 | 4246 | function loadClasses(string $className = ''): void |
4250 | 4247 | { |
4251 | - require_once __DIR__. '/../includes/config/include.php'; |
|
4252 | - require_once __DIR__. '/../includes/config/settings.php'; |
|
4248 | + require_once __DIR__.'/../includes/config/include.php'; |
|
4249 | + require_once __DIR__.'/../includes/config/settings.php'; |
|
4253 | 4250 | require_once __DIR__.'/../vendor/autoload.php'; |
4254 | 4251 | |
4255 | 4252 | if (defined('DB_PASSWD_CLEAR') === false) { |
@@ -87,7 +87,7 @@ discard block |
||
87 | 87 | if ($checkUserAccess->checkSession() === false) { |
88 | 88 | // Not allowed page |
89 | 89 | $session->set('system-error_code', ERR_NOT_ALLOWED); |
90 | - include $SETTINGS['cpassman_dir'] . '/error.php'; |
|
90 | + include $SETTINGS['cpassman_dir'].'/error.php'; |
|
91 | 91 | exit; |
92 | 92 | } |
93 | 93 | |
@@ -122,7 +122,7 @@ discard block |
||
122 | 122 | * @param array $SETTINGS |
123 | 123 | * @return bool|string |
124 | 124 | */ |
125 | - function handleAuthAttempts($post_data, $SETTINGS): bool|string |
|
125 | + function handleAuthAttempts($post_data, $SETTINGS): bool | string |
|
126 | 126 | { |
127 | 127 | $session = SessionManager::getSession(); |
128 | 128 | $lang = new Language(); |
@@ -234,7 +234,7 @@ discard block |
||
234 | 234 | $sessionPwdAttempts = $session->get('pwd_attempts'); |
235 | 235 | $sessionUrl = $session->get('user-initial_url'); |
236 | 236 | $server = []; |
237 | - $server['PHP_AUTH_USER'] = $request->server->get('PHP_AUTH_USER'); |
|
237 | + $server['PHP_AUTH_USER'] = $request->server->get('PHP_AUTH_USER'); |
|
238 | 238 | $server['PHP_AUTH_PW'] = $request->server->get('PHP_AUTH_PW'); |
239 | 239 | |
240 | 240 | // decrypt and retreive data in JSON format |
@@ -249,18 +249,18 @@ discard block |
||
249 | 249 | } |
250 | 250 | |
251 | 251 | // Check if Duo auth is in progress and pass the pw and login back to the standard login process |
252 | - if( |
|
252 | + if ( |
|
253 | 253 | isKeyExistingAndEqual('duo', 1, $SETTINGS) === true |
254 | 254 | && $dataReceived['user_2fa_selection'] === 'duo' |
255 | 255 | && $session->get('user-duo_status') === 'IN_PROGRESS' |
256 | 256 | && !empty($dataReceived['duo_state']) |
257 | - ){ |
|
257 | + ) { |
|
258 | 258 | $key = hash('sha256', $dataReceived['duo_state']); |
259 | 259 | $iv = substr(hash('sha256', $dataReceived['duo_state']), 0, 16); |
260 | 260 | $duo_data_dec = openssl_decrypt(base64_decode($session->get('user-duo_status')), 'AES-256-CBC', $key, 0, $iv); |
261 | 261 | // Clear the data from the Duo process to continue clean with the standard login process |
262 | - $session->set('user-duo_data',''); |
|
263 | - if($duo_data_dec === false){ |
|
262 | + $session->set('user-duo_data', ''); |
|
263 | + if ($duo_data_dec === false) { |
|
264 | 264 | echo prepareExchangedData( |
265 | 265 | [ |
266 | 266 | 'error' => true, |
@@ -275,7 +275,7 @@ discard block |
||
275 | 275 | $dataReceived['login'] = $duo_data['duo_login']; |
276 | 276 | } |
277 | 277 | |
278 | - if(isset($dataReceived['pw']) === false || isset($dataReceived['login']) === false) { |
|
278 | + if (isset($dataReceived['pw']) === false || isset($dataReceived['login']) === false) { |
|
279 | 279 | echo json_encode([ |
280 | 280 | 'data' => prepareExchangedData( |
281 | 281 | [ |
@@ -544,7 +544,7 @@ discard block |
||
544 | 544 | } |
545 | 545 | // Append with roles from AD groups |
546 | 546 | if (is_null($userInfo['roles_from_ad_groups']) === false) { |
547 | - $userInfo['fonction_id'] = empty($userInfo['fonction_id']) === true ? $userInfo['roles_from_ad_groups'] : $userInfo['fonction_id']. ';' . $userInfo['roles_from_ad_groups']; |
|
547 | + $userInfo['fonction_id'] = empty($userInfo['fonction_id']) === true ? $userInfo['roles_from_ad_groups'] : $userInfo['fonction_id'].';'.$userInfo['roles_from_ad_groups']; |
|
548 | 548 | } |
549 | 549 | // store |
550 | 550 | $session->set('user-roles', $userInfo['fonction_id']); |
@@ -556,7 +556,7 @@ discard block |
||
556 | 556 | if (count($session->get('user-roles_array')) > 0) { |
557 | 557 | $rolesList = DB::query( |
558 | 558 | 'SELECT id, title, complexity |
559 | - FROM ' . prefixTable('roles_title') . ' |
|
559 | + FROM ' . prefixTable('roles_title').' |
|
560 | 560 | WHERE id IN %li', |
561 | 561 | $session->get('user-roles_array') |
562 | 562 | ); |
@@ -602,7 +602,7 @@ discard block |
||
602 | 602 | if ($adjustPermissions) { |
603 | 603 | $session->set('user-admin', (int) $userInfo['admin']); |
604 | 604 | $session->set('user-manager', (int) $userInfo['gestionnaire']); |
605 | - $session->set('user-can_manage_all_users',(int) $userInfo['can_manage_all_users']); |
|
605 | + $session->set('user-can_manage_all_users', (int) $userInfo['can_manage_all_users']); |
|
606 | 606 | $session->set('user-read_only', (int) $userInfo['read_only']); |
607 | 607 | DB::update( |
608 | 608 | prefixTable('users'), |
@@ -674,10 +674,10 @@ discard block |
||
674 | 674 | $session->set('user-latest_items_tab', []); |
675 | 675 | $session->set('user-nb_roles', 0); |
676 | 676 | foreach ($session->get('user-latest_items') as $item) { |
677 | - if (! empty($item)) { |
|
677 | + if (!empty($item)) { |
|
678 | 678 | $dataLastItems = DB::queryFirstRow( |
679 | 679 | 'SELECT id,label,id_tree |
680 | - FROM ' . prefixTable('items') . ' |
|
680 | + FROM ' . prefixTable('items').' |
|
681 | 681 | WHERE id=%i', |
682 | 682 | $item |
683 | 683 | ); |
@@ -686,7 +686,7 @@ discard block |
||
686 | 686 | [ |
687 | 687 | 'id' => $item, |
688 | 688 | 'label' => $dataLastItems['label'], |
689 | - 'url' => 'index.php?page=items&group=' . $dataLastItems['id_tree'] . '&id=' . $item, |
|
689 | + 'url' => 'index.php?page=items&group='.$dataLastItems['id_tree'].'&id='.$item, |
|
690 | 690 | ], |
691 | 691 | 'add' |
692 | 692 | ); |
@@ -696,7 +696,7 @@ discard block |
||
696 | 696 | // Get cahce tree info |
697 | 697 | $cacheTreeData = DB::queryFirstRow( |
698 | 698 | 'SELECT visible_folders |
699 | - FROM ' . prefixTable('cache_tree') . ' |
|
699 | + FROM ' . prefixTable('cache_tree').' |
|
700 | 700 | WHERE user_id=%i', |
701 | 701 | (int) $session->get('user-id') |
702 | 702 | ); |
@@ -728,7 +728,7 @@ discard block |
||
728 | 728 | && (int) $sessionAdmin !== 1 |
729 | 729 | ) { |
730 | 730 | // get all Admin users |
731 | - $val = DB::queryfirstrow('SELECT email FROM ' . prefixTable('users') . " WHERE admin = %i and email != ''", 1); |
|
731 | + $val = DB::queryfirstrow('SELECT email FROM '.prefixTable('users')." WHERE admin = %i and email != ''", 1); |
|
732 | 732 | if (DB::count() > 0) { |
733 | 733 | // Add email to table |
734 | 734 | prepareSendingEmail( |
@@ -740,7 +740,7 @@ discard block |
||
740 | 740 | '#tp_time#', |
741 | 741 | ], |
742 | 742 | [ |
743 | - ' ' . $session->get('user-login') . ' (IP: ' . getClientIpServer() . ')', |
|
743 | + ' '.$session->get('user-login').' (IP: '.getClientIpServer().')', |
|
744 | 744 | date($SETTINGS['date_format'], (int) $session->get('user-last_connection')), |
745 | 745 | date($SETTINGS['time_format'], (int) $session->get('user-last_connection')), |
746 | 746 | ], |
@@ -887,7 +887,7 @@ discard block |
||
887 | 887 | { |
888 | 888 | $rows = DB::query( |
889 | 889 | 'SELECT date |
890 | - FROM ' . prefixTable('log_system') . " |
|
890 | + FROM ' . prefixTable('log_system')." |
|
891 | 891 | WHERE field_1 = %s |
892 | 892 | AND type = 'failed_auth' |
893 | 893 | AND label = 'password_is_not_correct' |
@@ -901,7 +901,7 @@ discard block |
||
901 | 901 | foreach ($rows as $record) { |
902 | 902 | array_push( |
903 | 903 | $arrAttempts, |
904 | - date($SETTINGS['date_format'] . ' ' . $SETTINGS['time_format'], (int) $record['date']) |
|
904 | + date($SETTINGS['date_format'].' '.$SETTINGS['time_format'], (int) $record['date']) |
|
905 | 905 | ); |
906 | 906 | } |
907 | 907 | } |
@@ -955,7 +955,7 @@ discard block |
||
955 | 955 | $ldapConnection |
956 | 956 | ) : bool |
957 | 957 | { |
958 | - include_once $SETTINGS['cpassman_dir'] . '/sources/main.functions.php'; |
|
958 | + include_once $SETTINGS['cpassman_dir'].'/sources/main.functions.php'; |
|
959 | 959 | |
960 | 960 | if ((int) $userInfoDisabled === 1) { |
961 | 961 | return false; |
@@ -1163,7 +1163,7 @@ discard block |
||
1163 | 1163 | $openLdapExtra = new OpenLdapExtra(); |
1164 | 1164 | break; |
1165 | 1165 | default: |
1166 | - throw new Exception("Unsupported LDAP type: " . $SETTINGS['ldap_type']); |
|
1166 | + throw new Exception("Unsupported LDAP type: ".$SETTINGS['ldap_type']); |
|
1167 | 1167 | } |
1168 | 1168 | } catch (Exception $e) { |
1169 | 1169 | return [ |
@@ -1176,7 +1176,7 @@ discard block |
||
1176 | 1176 | // 2- Get user info from AD |
1177 | 1177 | // We want to isolate attribute ldap_user_attribute or mostly samAccountName |
1178 | 1178 | $userADInfos = $ldapConnection->query() |
1179 | - ->where((isset($SETTINGS['ldap_user_attribute']) ===true && empty($SETTINGS['ldap_user_attribute']) === false) ? $SETTINGS['ldap_user_attribute'] : 'samaccountname', '=', $username) |
|
1179 | + ->where((isset($SETTINGS['ldap_user_attribute']) === true && empty($SETTINGS['ldap_user_attribute']) === false) ? $SETTINGS['ldap_user_attribute'] : 'samaccountname', '=', $username) |
|
1180 | 1180 | ->firstOrFail(); |
1181 | 1181 | |
1182 | 1182 | // Is user enabled? Only ActiveDirectory |
@@ -1195,7 +1195,7 @@ discard block |
||
1195 | 1195 | // For OpenLDAP and others, we use attribute dn |
1196 | 1196 | $userAuthAttempt = $ldapConnection->auth()->attempt( |
1197 | 1197 | $SETTINGS['ldap_type'] === 'ActiveDirectory' ? |
1198 | - $userADInfos['userprincipalname'][0] : // refering to https://ldaprecord.com/docs/core/v2/authentication#basic-authentication |
|
1198 | + $userADInfos['userprincipalname'][0] : // refering to https://ldaprecord.com/docs/core/v2/authentication#basic-authentication |
|
1199 | 1199 | $userADInfos['dn'], |
1200 | 1200 | $passwordClear |
1201 | 1201 | ); |
@@ -1212,7 +1212,7 @@ discard block |
||
1212 | 1212 | $error = $e->getDetailedError(); |
1213 | 1213 | return [ |
1214 | 1214 | 'error' => true, |
1215 | - 'message' => $lang->get('error')." - ".(isset($error) === true ? $error->getErrorCode()." - ".$error->getErrorMessage(). "<br>".$error->getDiagnosticMessage() : $e), |
|
1215 | + 'message' => $lang->get('error')." - ".(isset($error) === true ? $error->getErrorCode()." - ".$error->getErrorMessage()."<br>".$error->getDiagnosticMessage() : $e), |
|
1216 | 1216 | |
1217 | 1217 | ]; |
1218 | 1218 | } |
@@ -1277,7 +1277,7 @@ discard block |
||
1277 | 1277 | // error |
1278 | 1278 | return [ |
1279 | 1279 | 'error' => true, |
1280 | - 'message' => "Error: Unsupported LDAP type: " . $SETTINGS['ldap_type'], |
|
1280 | + 'message' => "Error: Unsupported LDAP type: ".$SETTINGS['ldap_type'], |
|
1281 | 1281 | ]; |
1282 | 1282 | } |
1283 | 1283 | |
@@ -1312,12 +1312,12 @@ discard block |
||
1312 | 1312 | if (isset($SETTINGS['enable_ad_users_with_ad_groups']) === true && (int) $SETTINGS['enable_ad_users_with_ad_groups'] === 1) { |
1313 | 1313 | // Get user groups from AD |
1314 | 1314 | $user_ad_groups = []; |
1315 | - foreach($groups as $group) { |
|
1315 | + foreach ($groups as $group) { |
|
1316 | 1316 | //print_r($group); |
1317 | 1317 | // get relation role id for AD group |
1318 | 1318 | $role = DB::queryFirstRow( |
1319 | 1319 | 'SELECT lgr.role_id |
1320 | - FROM ' . prefixTable('ldap_groups_roles') . ' AS lgr |
|
1320 | + FROM ' . prefixTable('ldap_groups_roles').' AS lgr |
|
1321 | 1321 | WHERE lgr.ldap_group_id = %i', |
1322 | 1322 | $group |
1323 | 1323 | ); |
@@ -1466,7 +1466,7 @@ discard block |
||
1466 | 1466 | } |
1467 | 1467 | |
1468 | 1468 | // Now check yubico validity |
1469 | - include_once $SETTINGS['cpassman_dir'] . '/includes/libraries/Authentication/Yubico/Yubico.php'; |
|
1469 | + include_once $SETTINGS['cpassman_dir'].'/includes/libraries/Authentication/Yubico/Yubico.php'; |
|
1470 | 1470 | $yubi = new Auth_Yubico($yubico_user_id, $yubico_user_key); |
1471 | 1471 | $auth = $yubi->verify($yubico_key); |
1472 | 1472 | //, null, null, null, 60 |
@@ -1620,7 +1620,7 @@ discard block |
||
1620 | 1620 | $mfaMessage = $lang->get('ga_flash_qr_and_login'); |
1621 | 1621 | // generate new QR |
1622 | 1622 | $new_2fa_qr = $tfa->getQRCodeImageAsDataUri( |
1623 | - 'Teampass - ' . $username, |
|
1623 | + 'Teampass - '.$username, |
|
1624 | 1624 | $userInfo['ga'] |
1625 | 1625 | ); |
1626 | 1626 | // clear temporary code from DB |
@@ -1633,7 +1633,7 @@ discard block |
||
1633 | 1633 | $userInfo['id'] |
1634 | 1634 | ); |
1635 | 1635 | $firstTime = [ |
1636 | - 'value' => '<img src="' . $new_2fa_qr . '">', |
|
1636 | + 'value' => '<img src="'.$new_2fa_qr.'">', |
|
1637 | 1637 | 'user_admin' => isset($sessionAdmin) ? (int) $sessionAdmin : '', |
1638 | 1638 | 'initial_url' => isset($sessionUrl) === true ? $sessionUrl : '', |
1639 | 1639 | 'pwd_attempts' => (int) $sessionPwdAttempts, |
@@ -1789,7 +1789,7 @@ discard block |
||
1789 | 1789 | }*/ |
1790 | 1790 | return [ |
1791 | 1791 | 'error' => true, |
1792 | - 'message' => $duo_error . $lang->get('duo_error_check_config'), |
|
1792 | + 'message' => $duo_error.$lang->get('duo_error_check_config'), |
|
1793 | 1793 | 'pwd_attempts' => (int) $sessionPwdAttempts, |
1794 | 1794 | 'debug_message' => $e->getMessage(), |
1795 | 1795 | 'proceedIdentification' => false, |
@@ -1805,7 +1805,7 @@ discard block |
||
1805 | 1805 | } catch (DuoException $e) { |
1806 | 1806 | return [ |
1807 | 1807 | 'error' => true, |
1808 | - 'message' => $duo_error . $lang->get('duo_error_url'), |
|
1808 | + 'message' => $duo_error.$lang->get('duo_error_url'), |
|
1809 | 1809 | 'pwd_attempts' => (int) $sessionPwdAttempts, |
1810 | 1810 | 'debug_message' => $e->getMessage(), |
1811 | 1811 | 'proceedIdentification' => false, |
@@ -1813,7 +1813,7 @@ discard block |
||
1813 | 1813 | } |
1814 | 1814 | |
1815 | 1815 | // Somethimes Duo return success but fail to return a URL, double check if the URL has been created |
1816 | - if (!empty($duo_redirect_url) && isset($duo_redirect_url) && filter_var($duo_redirect_url,FILTER_SANITIZE_URL)) { |
|
1816 | + if (!empty($duo_redirect_url) && isset($duo_redirect_url) && filter_var($duo_redirect_url, FILTER_SANITIZE_URL)) { |
|
1817 | 1817 | // Since Duo Universal requires a redirect, let's store some info when the user get's back after completing the Duo prompt |
1818 | 1818 | $key = hash('sha256', $duo_state); |
1819 | 1819 | $iv = substr(hash('sha256', $duo_state), 0, 16); |
@@ -1841,7 +1841,7 @@ discard block |
||
1841 | 1841 | } else { |
1842 | 1842 | return [ |
1843 | 1843 | 'error' => true, |
1844 | - 'message' => $duo_error . $lang->get('duo_error_url'), |
|
1844 | + 'message' => $duo_error.$lang->get('duo_error_url'), |
|
1845 | 1845 | 'pwd_attempts' => (int) $sessionPwdAttempts, |
1846 | 1846 | 'proceedIdentification' => false, |
1847 | 1847 | ]; |
@@ -1862,8 +1862,8 @@ discard block |
||
1862 | 1862 | // return the response (which should be the user name) |
1863 | 1863 | if ($decoded_token['preferred_username'] === $username) { |
1864 | 1864 | $session->set('user-duo_status', 'COMPLET'); |
1865 | - $session->set('user-duo_state',''); |
|
1866 | - $session->set('user-duo_data',''); |
|
1865 | + $session->set('user-duo_state', ''); |
|
1866 | + $session->set('user-duo_data', ''); |
|
1867 | 1867 | $session->set('user-login', $username); |
1868 | 1868 | |
1869 | 1869 | return [ |
@@ -1874,9 +1874,9 @@ discard block |
||
1874 | 1874 | ]; |
1875 | 1875 | } else { |
1876 | 1876 | // Something wrong, username from the original Duo request is different than the one received now |
1877 | - $session->set('user-duo_status',''); |
|
1878 | - $session->set('user-duo_state',''); |
|
1879 | - $session->set('user-duo_data',''); |
|
1877 | + $session->set('user-duo_status', ''); |
|
1878 | + $session->set('user-duo_state', ''); |
|
1879 | + $session->set('user-duo_data', ''); |
|
1880 | 1880 | |
1881 | 1881 | return [ |
1882 | 1882 | 'error' => true, |
@@ -1887,9 +1887,9 @@ discard block |
||
1887 | 1887 | } |
1888 | 1888 | } |
1889 | 1889 | // If we are here something wrong |
1890 | - $session->set('user-duo_status',''); |
|
1891 | - $session->set('user-duo_state',''); |
|
1892 | - $session->set('user-duo_data',''); |
|
1890 | + $session->set('user-duo_status', ''); |
|
1891 | + $session->set('user-duo_state', ''); |
|
1892 | + $session->set('user-duo_data', ''); |
|
1893 | 1893 | return [ |
1894 | 1894 | 'error' => true, |
1895 | 1895 | 'message' => $lang->get('duo_login_mismatch'), |
@@ -2045,8 +2045,8 @@ discard block |
||
2045 | 2045 | public function get_user_info($login, $enable_ad_user_auto_creation) { |
2046 | 2046 | $data = DB::queryFirstRow( |
2047 | 2047 | 'SELECT u.*, a.value AS api_key |
2048 | - FROM ' . prefixTable('users') . ' AS u |
|
2049 | - LEFT JOIN ' . prefixTable('api') . ' AS a ON (u.id = a.user_id) |
|
2048 | + FROM ' . prefixTable('users').' AS u |
|
2049 | + LEFT JOIN ' . prefixTable('api').' AS a ON (u.id = a.user_id) |
|
2050 | 2050 | WHERE login = %s AND deleted_at IS NULL', |
2051 | 2051 | $login |
2052 | 2052 | ); |
@@ -2396,15 +2396,15 @@ discard block |
||
2396 | 2396 | |
2397 | 2397 | if ($ret['error'] !== false) { |
2398 | 2398 | logEvents($SETTINGS, 'failed_auth', 'bad_duo_mfa', '', stripslashes($username), stripslashes($username)); |
2399 | - $session->set('user-duo_status',''); |
|
2400 | - $session->set('user-duo_state',''); |
|
2401 | - $session->set('user-duo_data',''); |
|
2399 | + $session->set('user-duo_status', ''); |
|
2400 | + $session->set('user-duo_state', ''); |
|
2401 | + $session->set('user-duo_data', ''); |
|
2402 | 2402 | return [ |
2403 | 2403 | 'error' => true, |
2404 | 2404 | 'mfaData' => $ret, |
2405 | 2405 | 'mfaQRCodeInfos' => false, |
2406 | 2406 | ]; |
2407 | - } else if ($ret['duo_url_ready'] === true){ |
|
2407 | + } else if ($ret['duo_url_ready'] === true) { |
|
2408 | 2408 | return [ |
2409 | 2409 | 'error' => false, |
2410 | 2410 | 'mfaData' => $ret, |