@@ -79,7 +79,7 @@ discard block |
||
79 | 79 | */ |
80 | 80 | protected function init() |
81 | 81 | { |
82 | - if (file_exists(CONFIG_DIR . DIRECTORY_SEPARATOR . self::CONFIG_FILE)) { |
|
82 | + if (file_exists(CONFIG_DIR.DIRECTORY_SEPARATOR.self::CONFIG_FILE)) { |
|
83 | 83 | $this->loadConfigData(); |
84 | 84 | } |
85 | 85 | return $this; |
@@ -195,10 +195,10 @@ discard block |
||
195 | 195 | $final_data = array_filter($final_data, function($key, $value) { |
196 | 196 | return in_array($key, self::$required, true) || !empty($value); |
197 | 197 | }, ARRAY_FILTER_USE_BOTH); |
198 | - $saved = (false !== file_put_contents(CONFIG_DIR . DIRECTORY_SEPARATOR . self::CONFIG_FILE, json_encode($final_data, JSON_PRETTY_PRINT))); |
|
198 | + $saved = (false !== file_put_contents(CONFIG_DIR.DIRECTORY_SEPARATOR.self::CONFIG_FILE, json_encode($final_data, JSON_PRETTY_PRINT))); |
|
199 | 199 | self::getInstance()->loadConfigData(); |
200 | 200 | $saved = true; |
201 | - } catch (ConfigException $e) { |
|
201 | + }catch (ConfigException $e) { |
|
202 | 202 | Logger::log($e->getMessage(), LOG_ERR); |
203 | 203 | } |
204 | 204 | return $saved; |
@@ -230,7 +230,7 @@ discard block |
||
230 | 230 | */ |
231 | 231 | public function loadConfigData() |
232 | 232 | { |
233 | - self::$config = json_decode(file_get_contents(CONFIG_DIR . DIRECTORY_SEPARATOR . self::CONFIG_FILE), true) ?: []; |
|
233 | + self::$config = json_decode(file_get_contents(CONFIG_DIR.DIRECTORY_SEPARATOR.self::CONFIG_FILE), true) ?: []; |
|
234 | 234 | $this->debug = array_key_exists('debug', self::$config) ? (bool)self::$config['debug'] : FALSE; |
235 | 235 | } |
236 | 236 | |
@@ -251,8 +251,8 @@ discard block |
||
251 | 251 | */ |
252 | 252 | public static function getParam($key, $defaultValue = null, $module = null) |
253 | 253 | { |
254 | - if(null !== $module) { |
|
255 | - return self::getParam(strtolower($module) . '.' . $key, self::getParam($key, $defaultValue)); |
|
254 | + if (null !== $module) { |
|
255 | + return self::getParam(strtolower($module).'.'.$key, self::getParam($key, $defaultValue)); |
|
256 | 256 | } |
257 | 257 | return array_key_exists($key, self::$config) ? self::$config[$key] : $defaultValue; |
258 | 258 | } |
@@ -33,7 +33,7 @@ discard block |
||
33 | 33 | && (preg_match('/^\/(admin|setup\-admin)/i', $route) || Config::getParam('restricted', false)) |
34 | 34 | ) { |
35 | 35 | if (!self::isTest() && |
36 | - null === Cache::getInstance()->getDataFromFile(CONFIG_DIR . DIRECTORY_SEPARATOR . 'admins.json', Cache::JSONGZ, true)) { |
|
36 | + null === Cache::getInstance()->getDataFromFile(CONFIG_DIR.DIRECTORY_SEPARATOR.'admins.json', Cache::JSONGZ, true)) { |
|
37 | 37 | throw new AdminCredentialsException(); |
38 | 38 | } |
39 | 39 | if (!Security::getInstance()->checkAdmin()) { |
@@ -53,8 +53,8 @@ discard block |
||
53 | 53 | $token = ''; |
54 | 54 | $ct = strlen($ts); |
55 | 55 | for ($i = 0; $i < $ct; $i++) { |
56 | - $token = substr($hash, $i, 1) . |
|
57 | - substr($ts, $i, 1) . |
|
56 | + $token = substr($hash, $i, 1). |
|
57 | + substr($ts, $i, 1). |
|
58 | 58 | $token; |
59 | 59 | } |
60 | 60 | return $token; |
@@ -72,16 +72,16 @@ discard block |
||
72 | 72 | $charsLength = strlen(self::RAND_SEP) - 1; |
73 | 73 | $tsLength = strlen($ts); |
74 | 74 | $i = 0; |
75 | - $ct = ceil($hashRest / 4); |
|
76 | - $part = substr($hash, $tsLength + $ct * $i, $ct); |
|
77 | - while(false !== $part) { |
|
78 | - $mixedToken .= $part . |
|
79 | - substr(self::RAND_SEP, round(rand(0, $charsLength), 0, PHP_ROUND_HALF_DOWN), 1) . |
|
75 | + $ct = ceil($hashRest/4); |
|
76 | + $part = substr($hash, $tsLength + $ct*$i, $ct); |
|
77 | + while (false !== $part) { |
|
78 | + $mixedToken .= $part. |
|
79 | + substr(self::RAND_SEP, round(rand(0, $charsLength), 0, PHP_ROUND_HALF_DOWN), 1). |
|
80 | 80 | substr(self::RAND_SEP, round(rand(0, $charsLength), 0, PHP_ROUND_HALF_DOWN), 1); |
81 | - $part = substr($hash, $tsLength + $ct * $i, $ct); |
|
81 | + $part = substr($hash, $tsLength + $ct*$i, $ct); |
|
82 | 82 | $i++; |
83 | 83 | } |
84 | - return $mixedToken . $token; |
|
84 | + return $mixedToken.$token; |
|
85 | 85 | } |
86 | 86 | |
87 | 87 | /** |
@@ -90,10 +90,10 @@ discard block |
||
90 | 90 | */ |
91 | 91 | private static function getTs($isOdd = null) { |
92 | 92 | $ts = time(); |
93 | - $tsIsOdd = (bool)((int)substr($ts, -1) % 2); |
|
94 | - if(false === $isOdd && !$tsIsOdd) { |
|
93 | + $tsIsOdd = (bool)((int)substr($ts, -1)%2); |
|
94 | + if (false === $isOdd && !$tsIsOdd) { |
|
95 | 95 | $ts--; |
96 | - } elseif(true === $isOdd && !$tsIsOdd) { |
|
96 | + } elseif (true === $isOdd && !$tsIsOdd) { |
|
97 | 97 | $ts--; |
98 | 98 | } |
99 | 99 | return $ts; |
@@ -125,10 +125,10 @@ discard block |
||
125 | 125 | $partToken = ''; |
126 | 126 | $ts = ''; |
127 | 127 | $part = strrev($part); |
128 | - for($i = 0, $ct = strlen($part); $i < $ct; $i++) { |
|
129 | - if($i % 2 == 0) { |
|
128 | + for ($i = 0, $ct = strlen($part); $i < $ct; $i++) { |
|
129 | + if ($i%2 == 0) { |
|
130 | 130 | $ts .= substr($part, $i, 1); |
131 | - } else { |
|
131 | + }else { |
|
132 | 132 | $partToken .= substr($part, $i, 1); |
133 | 133 | } |
134 | 134 | } |
@@ -143,11 +143,11 @@ discard block |
||
143 | 143 | private static function parseTokenParts(array $parts) { |
144 | 144 | $token = ''; |
145 | 145 | list($partToken, $ts) = self::extractTs(array_pop($parts)); |
146 | - if($ts > 0) { |
|
147 | - foreach($parts as $part) { |
|
146 | + if ($ts > 0) { |
|
147 | + foreach ($parts as $part) { |
|
148 | 148 | $token .= $part; |
149 | 149 | } |
150 | - $token = $partToken . $token; |
|
150 | + $token = $partToken.$token; |
|
151 | 151 | } |
152 | 152 | return [$token, $ts]; |
153 | 153 | } |
@@ -175,8 +175,8 @@ discard block |
||
175 | 175 | * @return array |
176 | 176 | */ |
177 | 177 | private static function extractTokenParts($token) { |
178 | - for($i = 0, $ct = strlen(self::RAND_SEP); $i < $ct; $i++) { |
|
179 | - $token = str_replace(substr(self::RAND_SEP,$i,1), "|", $token); |
|
178 | + for ($i = 0, $ct = strlen(self::RAND_SEP); $i < $ct; $i++) { |
|
179 | + $token = str_replace(substr(self::RAND_SEP, $i, 1), "|", $token); |
|
180 | 180 | } |
181 | 181 | return array_unique(explode('||', $token)); |
182 | 182 | } |
@@ -73,18 +73,18 @@ |
||
73 | 73 | if (!Request::getInstance()->isFile()) { |
74 | 74 | return $this->router->execute($uri ?: $this->actualUri); |
75 | 75 | } |
76 | - } else { |
|
76 | + }else { |
|
77 | 77 | return ConfigController::getInstance()->config(); |
78 | 78 | } |
79 | - } catch (AdminCredentialsException $a) { |
|
79 | + }catch (AdminCredentialsException $a) { |
|
80 | 80 | return UserController::showAdminManager(); |
81 | - } catch (SecurityException $s) { |
|
81 | + }catch (SecurityException $s) { |
|
82 | 82 | return $this->security->notAuthorized($this->actualUri); |
83 | - } catch (RouterException $r) { |
|
83 | + }catch (RouterException $r) { |
|
84 | 84 | return $this->router->httpNotFound($r); |
85 | - } catch(ApiException $a) { |
|
85 | + }catch (ApiException $a) { |
|
86 | 86 | return $this->router->httpNotFound($a, true); |
87 | - } catch (\Exception $e) { |
|
87 | + }catch (\Exception $e) { |
|
88 | 88 | return $this->dumpException($e); |
89 | 89 | } |
90 | 90 | } |