33 * @author : JIHAD SINNAOUR
44 * @package : FloatPHP
55 * @subpackage : Kernel Component
6- * @version : 1.0.1
6+ * @version : 1.0.2
77 * @category : PHP framework
88 * @copyright : (c) 2017 - 2023 Jihad Sinnaour <[email protected] > 99 * @link : https://www.floatphp.com
@@ -49,33 +49,35 @@ public function hasAccess() : bool
4949 $ access = false ;
5050
5151 // Allow local access
52- if ( Stringify::contains (['127.0.0.1 ' ,'::1 ' ],$ ip ) ) {
52+ if ( Stringify::contains (['127.0.0.1 ' ,'::1 ' ], $ ip ) ) {
5353 $ access = true ;
5454
5555 } else {
5656
5757 // Check allowed IPs
58- $ allowed = $ this ->applyFilter ('access-allowed-ip ' ,$ this ->getAllowedAccess ());
58+ $ allowed = $ this ->applyFilter ('access-allowed-ip ' , $ this ->getAllowedAccess ());
5959 if ( !empty ($ allowed ) ) {
60- if ( Stringify::contains ($ allowed ,$ ip ) ) {
60+ if ( Stringify::contains ($ allowed , $ ip ) ) {
6161 $ access = true ;
62+
6263 } else {
6364 $ access = false ;
6465 }
6566
6667 } else {
6768 // Deny access
68- $ denied = $ this ->applyFilter ('access-denied-ip ' ,$ this ->getDeniedAccess ());
69- if ( Stringify::contains ($ denied ,$ ip ) ) {
69+ $ denied = $ this ->applyFilter ('access-denied-ip ' , $ this ->getDeniedAccess ());
70+ if ( Stringify::contains ($ denied , $ ip ) ) {
7071 $ access = false ;
72+
7173 } else {
7274 $ access = true ;
7375 }
7476 }
7577 }
7678
77- $ data = ['ip ' => $ ip ,'access ' => $ access ];
78- $ this ->doAction ('ip-access ' ,$ data );
79+ $ data = ['ip ' => $ ip , 'access ' => $ access ];
80+ $ this ->doAction ('ip-access ' , $ data );
7981 return $ access ;
8082 }
8183
@@ -88,8 +90,8 @@ public function hasAccess() : bool
8890 protected function addJS ($ js , $ hook = 'add-js ' )
8991 {
9092 $ this ->addAction ($ hook , function () use ($ js ) {
91- $ tpl = $ this ->applyFilter ('view-js ' ,'system/js ' );
92- $ this ->render (['js ' => $ js ],$ tpl );
93+ $ tpl = $ this ->applyFilter ('view-js ' , 'system/js ' );
94+ $ this ->render (['js ' => $ js ], $ tpl );
9395 });
9496 }
9597
@@ -102,8 +104,8 @@ protected function addJS($js, $hook = 'add-js')
102104 protected function addCSS ($ css , $ hook = 'add-css ' )
103105 {
104106 $ this ->addAction ($ hook , function () use ($ css ){
105- $ tpl = $ this ->applyFilter ('view-css ' ,'system/css ' );
106- $ this ->render (['css ' => $ css ],$ tpl );
107+ $ tpl = $ this ->applyFilter ('view-css ' , 'system/css ' );
108+ $ this ->render (['css ' => $ css ], $ tpl );
107109 });
108110 }
109111
@@ -116,7 +118,7 @@ protected function addCSS($css, $hook = 'add-css')
116118 */
117119 public function redirect ($ url = '/ ' , $ code = 301 , $ message = 'Moved Permanently ' )
118120 {
119- Server::redirect ($ url ,$ code ,$ message );
121+ Server::redirect ($ url , $ code , $ message );
120122 }
121123
122124 /**
@@ -133,7 +135,7 @@ protected function verifyToken($token = '', $source = '')
133135 $ data = Stringify::unserialize ($ transient ->getTemp ($ token ));
134136
135137 // Override
136- $ this ->doAction ('verify-token ' ,$ data );
138+ $ this ->doAction ('verify-token ' , $ data );
137139
138140 // Verify token data
139141 if ( $ data ) {
@@ -167,30 +169,30 @@ protected function verifyToken($token = '', $source = '')
167169 */
168170 protected function verifyRequest ($ force = false )
169171 {
170- $ token = $ this ->applyFilter ('verify-request-token ' ,'--token ' );
171- $ source = $ this ->applyFilter ('verify-request-source ' ,'--source ' );
172- $ ignore = $ this ->applyFilter ('verify-request-ignore ' ,'--ignore ' );
172+ $ token = $ this ->applyFilter ('verify-request-token ' , '--token ' );
173+ $ source = $ this ->applyFilter ('verify-request-source ' , '--source ' );
174+ $ ignore = $ this ->applyFilter ('verify-request-ignore ' , '--ignore ' );
173175
174176 if ( $ force ) {
175177 if ( !Request::isSetted ($ token ) ) {
176- $ msg = $ this ->applyFilter ('invalid-request-signature ' ,'Invalid request signature ' );
178+ $ msg = $ this ->applyFilter ('invalid-request-signature ' , 'Invalid request signature ' );
177179 $ msg = $ this ->translate ($ msg );
178- $ this ->setResponse ($ msg ,[],'error ' ,401 );
180+ $ this ->setResponse ($ msg , [], 'error ' , 401 );
179181 }
180182 }
181183
182184 if ( Request::isSetted ($ token ) ) {
183185 $ source = Request::isSetted ($ source ) ? Request::get ($ source ) : '' ;
184186 if ( !$ this ->verifyToken (Request::get ($ token ),$ source ) ) {
185- $ msg = $ this ->applyFilter ('invalid-request-token ' ,'Invalid request token ' );
187+ $ msg = $ this ->applyFilter ('invalid-request-token ' , 'Invalid request token ' );
186188 $ msg = $ this ->translate ($ msg );
187- $ this ->setResponse ($ msg ,[],'error ' ,401 );
189+ $ this ->setResponse ($ msg , [], 'error ' , 401 );
188190 }
189191 }
190192 if ( Request::isSetted ($ ignore ) && !empty (Request::get ($ ignore )) ) {
191- $ msg = $ this ->applyFilter ('invalid-request-data ' ,'Invalid request data ' );
193+ $ msg = $ this ->applyFilter ('invalid-request-data ' , 'Invalid request data ' );
192194 $ msg = $ this ->translate ($ msg );
193- $ this ->setResponse ($ msg ,[],'error ' ,401 );
195+ $ this ->setResponse ($ msg , [], 'error ' , 401 );
194196 }
195197 }
196198
@@ -205,7 +207,7 @@ protected function sanitizeRequest($verify = true, $force = false)
205207 $ this ->verifyRequest ($ force );
206208 }
207209 $ request = Request::get ();
208- $ excepts = $ this ->applyFilter ('sanitize-request ' ,[
210+ $ excepts = $ this ->applyFilter ('sanitize-request ' , [
209211 'submit ' ,
210212 '--token ' ,
211213 '--source ' ,
0 commit comments