3
3
* @author : JIHAD SINNAOUR
4
4
* @package : FloatPHP
5
5
* @subpackage : Kernel Component
6
- * @version : 1.0.1
6
+ * @version : 1.0.2
7
7
* @category : PHP framework
8
8
* @copyright : (c) 2017 - 2023 Jihad Sinnaour <[email protected] >
9
9
* @link : https://www.floatphp.com
@@ -49,33 +49,35 @@ public function hasAccess() : bool
49
49
$ access = false ;
50
50
51
51
// Allow local access
52
- if ( Stringify::contains (['127.0.0.1 ' ,'::1 ' ],$ ip ) ) {
52
+ if ( Stringify::contains (['127.0.0.1 ' ,'::1 ' ], $ ip ) ) {
53
53
$ access = true ;
54
54
55
55
} else {
56
56
57
57
// Check allowed IPs
58
- $ allowed = $ this ->applyFilter ('access-allowed-ip ' ,$ this ->getAllowedAccess ());
58
+ $ allowed = $ this ->applyFilter ('access-allowed-ip ' , $ this ->getAllowedAccess ());
59
59
if ( !empty ($ allowed ) ) {
60
- if ( Stringify::contains ($ allowed ,$ ip ) ) {
60
+ if ( Stringify::contains ($ allowed , $ ip ) ) {
61
61
$ access = true ;
62
+
62
63
} else {
63
64
$ access = false ;
64
65
}
65
66
66
67
} else {
67
68
// Deny access
68
- $ denied = $ this ->applyFilter ('access-denied-ip ' ,$ this ->getDeniedAccess ());
69
- if ( Stringify::contains ($ denied ,$ ip ) ) {
69
+ $ denied = $ this ->applyFilter ('access-denied-ip ' , $ this ->getDeniedAccess ());
70
+ if ( Stringify::contains ($ denied , $ ip ) ) {
70
71
$ access = false ;
72
+
71
73
} else {
72
74
$ access = true ;
73
75
}
74
76
}
75
77
}
76
78
77
- $ data = ['ip ' => $ ip ,'access ' => $ access ];
78
- $ this ->doAction ('ip-access ' ,$ data );
79
+ $ data = ['ip ' => $ ip , 'access ' => $ access ];
80
+ $ this ->doAction ('ip-access ' , $ data );
79
81
return $ access ;
80
82
}
81
83
@@ -88,8 +90,8 @@ public function hasAccess() : bool
88
90
protected function addJS ($ js , $ hook = 'add-js ' )
89
91
{
90
92
$ this ->addAction ($ hook , function () use ($ js ) {
91
- $ tpl = $ this ->applyFilter ('view-js ' ,'system/js ' );
92
- $ this ->render (['js ' => $ js ],$ tpl );
93
+ $ tpl = $ this ->applyFilter ('view-js ' , 'system/js ' );
94
+ $ this ->render (['js ' => $ js ], $ tpl );
93
95
});
94
96
}
95
97
@@ -102,8 +104,8 @@ protected function addJS($js, $hook = 'add-js')
102
104
protected function addCSS ($ css , $ hook = 'add-css ' )
103
105
{
104
106
$ this ->addAction ($ hook , function () use ($ css ){
105
- $ tpl = $ this ->applyFilter ('view-css ' ,'system/css ' );
106
- $ this ->render (['css ' => $ css ],$ tpl );
107
+ $ tpl = $ this ->applyFilter ('view-css ' , 'system/css ' );
108
+ $ this ->render (['css ' => $ css ], $ tpl );
107
109
});
108
110
}
109
111
@@ -116,7 +118,7 @@ protected function addCSS($css, $hook = 'add-css')
116
118
*/
117
119
public function redirect ($ url = '/ ' , $ code = 301 , $ message = 'Moved Permanently ' )
118
120
{
119
- Server::redirect ($ url ,$ code ,$ message );
121
+ Server::redirect ($ url , $ code , $ message );
120
122
}
121
123
122
124
/**
@@ -133,7 +135,7 @@ protected function verifyToken($token = '', $source = '')
133
135
$ data = Stringify::unserialize ($ transient ->getTemp ($ token ));
134
136
135
137
// Override
136
- $ this ->doAction ('verify-token ' ,$ data );
138
+ $ this ->doAction ('verify-token ' , $ data );
137
139
138
140
// Verify token data
139
141
if ( $ data ) {
@@ -167,30 +169,30 @@ protected function verifyToken($token = '', $source = '')
167
169
*/
168
170
protected function verifyRequest ($ force = false )
169
171
{
170
- $ token = $ this ->applyFilter ('verify-request-token ' ,'--token ' );
171
- $ source = $ this ->applyFilter ('verify-request-source ' ,'--source ' );
172
- $ ignore = $ this ->applyFilter ('verify-request-ignore ' ,'--ignore ' );
172
+ $ token = $ this ->applyFilter ('verify-request-token ' , '--token ' );
173
+ $ source = $ this ->applyFilter ('verify-request-source ' , '--source ' );
174
+ $ ignore = $ this ->applyFilter ('verify-request-ignore ' , '--ignore ' );
173
175
174
176
if ( $ force ) {
175
177
if ( !Request::isSetted ($ token ) ) {
176
- $ msg = $ this ->applyFilter ('invalid-request-signature ' ,'Invalid request signature ' );
178
+ $ msg = $ this ->applyFilter ('invalid-request-signature ' , 'Invalid request signature ' );
177
179
$ msg = $ this ->translate ($ msg );
178
- $ this ->setResponse ($ msg ,[],'error ' ,401 );
180
+ $ this ->setResponse ($ msg , [], 'error ' , 401 );
179
181
}
180
182
}
181
183
182
184
if ( Request::isSetted ($ token ) ) {
183
185
$ source = Request::isSetted ($ source ) ? Request::get ($ source ) : '' ;
184
186
if ( !$ this ->verifyToken (Request::get ($ token ),$ source ) ) {
185
- $ msg = $ this ->applyFilter ('invalid-request-token ' ,'Invalid request token ' );
187
+ $ msg = $ this ->applyFilter ('invalid-request-token ' , 'Invalid request token ' );
186
188
$ msg = $ this ->translate ($ msg );
187
- $ this ->setResponse ($ msg ,[],'error ' ,401 );
189
+ $ this ->setResponse ($ msg , [], 'error ' , 401 );
188
190
}
189
191
}
190
192
if ( Request::isSetted ($ ignore ) && !empty (Request::get ($ ignore )) ) {
191
- $ msg = $ this ->applyFilter ('invalid-request-data ' ,'Invalid request data ' );
193
+ $ msg = $ this ->applyFilter ('invalid-request-data ' , 'Invalid request data ' );
192
194
$ msg = $ this ->translate ($ msg );
193
- $ this ->setResponse ($ msg ,[],'error ' ,401 );
195
+ $ this ->setResponse ($ msg , [], 'error ' , 401 );
194
196
}
195
197
}
196
198
@@ -205,7 +207,7 @@ protected function sanitizeRequest($verify = true, $force = false)
205
207
$ this ->verifyRequest ($ force );
206
208
}
207
209
$ request = Request::get ();
208
- $ excepts = $ this ->applyFilter ('sanitize-request ' ,[
210
+ $ excepts = $ this ->applyFilter ('sanitize-request ' , [
209
211
'submit ' ,
210
212
'--token ' ,
211
213
'--source ' ,
0 commit comments