X-Git-Url: https://git.mxchange.org/?a=blobdiff_plain;f=inc%2Fmodules%2Fguest%2Faction-admin.php;h=26dd5cc40b406e6db7211f0eed821ce1a5cf423f;hb=e8ce566b7f77e4f96fa8a6d6ced4b8f5053c447a;hp=5d3416a663a1b3f7c7f6bf06abf0e66bfaf0ab09;hpb=3daede4c904e23905c3e48dd6749019deca0a0e0;p=mailer.git diff --git a/inc/modules/guest/action-admin.php b/inc/modules/guest/action-admin.php index 5d3416a663..26dd5cc40b 100644 --- a/inc/modules/guest/action-admin.php +++ b/inc/modules/guest/action-admin.php @@ -10,9 +10,14 @@ * -------------------------------------------------------------------- * * Kurzbeschreibung : Administrative Links * * -------------------------------------------------------------------- * - * * + * $Revision:: $ * + * $Date:: $ * + * $Tag:: 0.2.1-FINAL $ * + * $Author:: $ * + * Needs to be in all Files and every File needs "svn propset * + * svn:keywords Date Revision" (autoprobset!) at least!!!!!! * * -------------------------------------------------------------------- * - * Copyright (c) 2003 - 2008 by Roland Haeder * + * Copyright (c) 2003 - 2009 by Roland Haeder * * For more information visit: http://www.mxchange.org * * * * This program is free software; you can redistribute it and/or modify * @@ -33,23 +38,23 @@ // Some security stuff... if (!defined('__SECURITY')) { - $INC = substr(dirname(__FILE__), 0, strpos(dirname(__FILE__), "/inc") + 4) . "/security.php"; - require($INC); -} elseif ($BLOCK_MODE) { + die(); +} elseif (isBlockModeEnabled()) { // Block mode detected return; } +// Add description as navigation point +addMenuDescription('guest', __FILE__); + // Only when one admin link is clicked... -$INC = sprintf("%sinc/modules/guest/what-%s.php", PATH, SQL_ESCAPE($GLOBALS['what'])); -if (FILE_READABLE($INC)) { +$inc = sprintf("inc/modules/guest/what-%s.php", getWhat()); +if (isIncludeReadable($inc)) { // Ok, we finally load the guest action module - include($INC); -} elseif ($IS_VALID) { - addFatalMessage(sprintf(getMessage('GUEST_404_ACTION'), SQL_ESCAPE($GLOBALS['what']))); + loadInclude($inc); } else { - addFatalMessage(sprintf(getMessage('GUEST_LOCKED_ACTION'), SQL_ESCAPE($GLOBALS['what']))); + addFatalMessage(__FILE__, __LINE__, getMessage('GUEST_404_WHAT'), getWhat()); } -// +// [EOF] ?>