X-Git-Url: https://git.mxchange.org/?a=blobdiff_plain;f=inc%2Fmodules%2Fguest%2Faction-;h=1dcd93d11ed31b97a499ab8ae858da252540dc52;hb=12d1414024e87153a133bb1d0fe0185ca2c700c5;hp=f8ad401be92a2e0b54e17c68a73fc95809e28145;hpb=b8c86fa12322603c24a88ea2b0fd3dbeba612752;p=mailer.git diff --git a/inc/modules/guest/action- b/inc/modules/guest/action- index f8ad401be9..1dcd93d11e 100644 --- a/inc/modules/guest/action- +++ b/inc/modules/guest/action- @@ -10,7 +10,12 @@ * -------------------------------------------------------------------- * * Kurzbeschreibung : * * -------------------------------------------------------------------- * - * * + * $Revision:: 856 $ * + * $Date:: 2009-03-06 20:24:32 +0100 (Fr, 06. March 2009) $ * + * $Tag:: 0.2.1-FINAL $ * + * $Author:: stelzi $ * + * Needs to be in all Files and every File needs "svn propset * + * svn:keywords Date Revision" (autoprobset!) at least!!!!!! * * -------------------------------------------------------------------- * * Copyright (c) 2003 - 2008 by Roland Haeder * * For more information visit: http://www.mxchange.org * @@ -33,10 +38,10 @@ // Some security stuff... if (!defined('__SECURITY')) { - $INC = substr(dirname(__FILE__), 0, strpos(dirname(__FILE__), "/inc") + 4) . "/security.php"; + $INC = substr(dirname(__FILE__), 0, strpos(dirname(__FILE__), '/inc') + 4) . '/security.php'; require($INC); -} elseif ((!EXT_IS_ACTIVE("")) && (!IS_ADMIN())) { - addFatalMessage(__FILE__, __LINE__, EXTENSION_PROBLEM_EXT_INACTIVE, ""); +} elseif ((!EXT_IS_ACTIVE('')) && (!IS_ADMIN())) { + addFatalMessage(__FILE__, __LINE__, generateExtensionInactiveNotInstalledMessage('')); return; } elseif ($BLOCK_MODE) { // Block mode detected @@ -44,13 +49,13 @@ if (!defined('__SECURITY')) { } // Add description as navigation point -ADD_DESCR("guest", __FILE__); +ADD_DESCR('guest', __FILE__); // Load the include file $INC = sprintf("inc/modules/guest/what-%s.php", $GLOBALS['what']); -if (FILE_READABLE($INC)) { +if (isIncludeReadable($INC)) { // Ok, we finally load the guest action module - LOAD_INC($INC); + loadInclude($INC); } elseif ($IS_VALID) { addFatalMessage(__FILE__, __LINE__, sprintf(getMessage('GUEST_404_ACTION'), SQL_ESCAPE($GLOBALS['what']))); } else {