@@ -33,7 +33,7 @@ discard block |
||
| 33 | 33 | && (preg_match('/^\/(admin|setup\-admin)/i', $route) || Config::getParam('restricted', false)) |
| 34 | 34 | ) { |
| 35 | 35 | if (!self::isTest() && |
| 36 | - null === Cache::getInstance()->getDataFromFile(CONFIG_DIR . DIRECTORY_SEPARATOR . 'admins.json', Cache::JSONGZ, true)) { |
|
| 36 | + null === Cache::getInstance()->getDataFromFile(CONFIG_DIR.DIRECTORY_SEPARATOR.'admins.json', Cache::JSONGZ, true)) { |
|
| 37 | 37 | throw new AdminCredentialsException(); |
| 38 | 38 | } |
| 39 | 39 | if (!Security::getInstance()->checkAdmin()) { |
@@ -53,8 +53,8 @@ discard block |
||
| 53 | 53 | $token = ''; |
| 54 | 54 | $ct = strlen($ts); |
| 55 | 55 | for ($i = 0; $i < $ct; $i++) { |
| 56 | - $token = substr($hash, $i, 1) . |
|
| 57 | - substr($ts, $i, 1) . |
|
| 56 | + $token = substr($hash, $i, 1). |
|
| 57 | + substr($ts, $i, 1). |
|
| 58 | 58 | $token; |
| 59 | 59 | } |
| 60 | 60 | return $token; |
@@ -72,16 +72,16 @@ discard block |
||
| 72 | 72 | $charsLength = strlen(self::RAND_SEP) - 1; |
| 73 | 73 | $tsLength = strlen($ts); |
| 74 | 74 | $i = 0; |
| 75 | - $ct = ceil($hashRest / 4); |
|
| 76 | - $part = substr($hash, $tsLength + $ct * $i, $ct); |
|
| 77 | - while(false !== $part) { |
|
| 78 | - $mixedToken .= $part . |
|
| 79 | - substr(self::RAND_SEP, round(rand(0, $charsLength), 0, PHP_ROUND_HALF_DOWN), 1) . |
|
| 75 | + $ct = ceil($hashRest/4); |
|
| 76 | + $part = substr($hash, $tsLength + $ct*$i, $ct); |
|
| 77 | + while (false !== $part) { |
|
| 78 | + $mixedToken .= $part. |
|
| 79 | + substr(self::RAND_SEP, round(rand(0, $charsLength), 0, PHP_ROUND_HALF_DOWN), 1). |
|
| 80 | 80 | substr(self::RAND_SEP, round(rand(0, $charsLength), 0, PHP_ROUND_HALF_DOWN), 1); |
| 81 | - $part = substr($hash, $tsLength + $ct * $i, $ct); |
|
| 81 | + $part = substr($hash, $tsLength + $ct*$i, $ct); |
|
| 82 | 82 | $i++; |
| 83 | 83 | } |
| 84 | - return $mixedToken . $token; |
|
| 84 | + return $mixedToken.$token; |
|
| 85 | 85 | } |
| 86 | 86 | |
| 87 | 87 | /** |
@@ -90,10 +90,10 @@ discard block |
||
| 90 | 90 | */ |
| 91 | 91 | private static function getTs($isOdd = null) { |
| 92 | 92 | $ts = time(); |
| 93 | - $tsIsOdd = (bool)((int)substr($ts, -1) % 2); |
|
| 94 | - if(false === $isOdd && !$tsIsOdd) { |
|
| 93 | + $tsIsOdd = (bool)((int)substr($ts, -1)%2); |
|
| 94 | + if (false === $isOdd && !$tsIsOdd) { |
|
| 95 | 95 | $ts--; |
| 96 | - } elseif(true === $isOdd && !$tsIsOdd) { |
|
| 96 | + } elseif (true === $isOdd && !$tsIsOdd) { |
|
| 97 | 97 | $ts--; |
| 98 | 98 | } |
| 99 | 99 | return $ts; |
@@ -125,10 +125,10 @@ discard block |
||
| 125 | 125 | $partToken = ''; |
| 126 | 126 | $ts = ''; |
| 127 | 127 | $part = strrev($part); |
| 128 | - for($i = 0, $ct = strlen($part); $i < $ct; $i++) { |
|
| 129 | - if($i % 2 == 0) { |
|
| 128 | + for ($i = 0, $ct = strlen($part); $i < $ct; $i++) { |
|
| 129 | + if ($i%2 == 0) { |
|
| 130 | 130 | $ts .= substr($part, $i, 1); |
| 131 | - } else { |
|
| 131 | + }else { |
|
| 132 | 132 | $partToken .= substr($part, $i, 1); |
| 133 | 133 | } |
| 134 | 134 | } |
@@ -143,11 +143,11 @@ discard block |
||
| 143 | 143 | private static function parseTokenParts(array $parts) { |
| 144 | 144 | $token = ''; |
| 145 | 145 | list($partToken, $ts) = self::extractTs(array_pop($parts)); |
| 146 | - if($ts > 0) { |
|
| 147 | - foreach($parts as $part) { |
|
| 146 | + if ($ts > 0) { |
|
| 147 | + foreach ($parts as $part) { |
|
| 148 | 148 | $token .= $part; |
| 149 | 149 | } |
| 150 | - $token = $partToken . $token; |
|
| 150 | + $token = $partToken.$token; |
|
| 151 | 151 | } |
| 152 | 152 | return [$token, $ts]; |
| 153 | 153 | } |
@@ -175,8 +175,8 @@ discard block |
||
| 175 | 175 | * @return array |
| 176 | 176 | */ |
| 177 | 177 | private static function extractTokenParts($token) { |
| 178 | - for($i = 0, $ct = strlen(self::RAND_SEP); $i < $ct; $i++) { |
|
| 179 | - $token = str_replace(substr(self::RAND_SEP,$i,1), "|", $token); |
|
| 178 | + for ($i = 0, $ct = strlen(self::RAND_SEP); $i < $ct; $i++) { |
|
| 179 | + $token = str_replace(substr(self::RAND_SEP, $i, 1), "|", $token); |
|
| 180 | 180 | } |
| 181 | 181 | return array_unique(explode('||', $token)); |
| 182 | 182 | } |
@@ -73,18 +73,18 @@ |
||
| 73 | 73 | if (!Request::getInstance()->isFile()) { |
| 74 | 74 | return $this->router->execute($uri ?: $this->actualUri); |
| 75 | 75 | } |
| 76 | - } else { |
|
| 76 | + }else { |
|
| 77 | 77 | return ConfigController::getInstance()->config(); |
| 78 | 78 | } |
| 79 | - } catch (AdminCredentialsException $a) { |
|
| 79 | + }catch (AdminCredentialsException $a) { |
|
| 80 | 80 | return UserController::showAdminManager(); |
| 81 | - } catch (SecurityException $s) { |
|
| 81 | + }catch (SecurityException $s) { |
|
| 82 | 82 | return $this->security->notAuthorized($this->actualUri); |
| 83 | - } catch (RouterException $r) { |
|
| 83 | + }catch (RouterException $r) { |
|
| 84 | 84 | return $this->router->httpNotFound($r); |
| 85 | - } catch(ApiException $a) { |
|
| 85 | + }catch (ApiException $a) { |
|
| 86 | 86 | return $this->router->httpNotFound($a, true); |
| 87 | - } catch (\Exception $e) { |
|
| 87 | + }catch (\Exception $e) { |
|
| 88 | 88 | return $this->dumpException($e); |
| 89 | 89 | } |
| 90 | 90 | } |