X-Git-Url: https://git.mxchange.org/?p=mailer.git;a=blobdiff_plain;f=inc%2Fmodules%2Fguest%2Faction-members.php;h=df2c43424828b8f686d614685d67b95c929a3dc4;hp=78362718dc619e2953b5c3e79b279be5daed39ea;hb=f928ad2bed60fa256d0641eaf6d2c027a2944688;hpb=641ca2a3526aa0612781dddf83dd77dbb003adff diff --git a/inc/modules/guest/action-members.php b/inc/modules/guest/action-members.php index 78362718dc..df2c434248 100644 --- a/inc/modules/guest/action-members.php +++ b/inc/modules/guest/action-members.php @@ -10,7 +10,12 @@ * -------------------------------------------------------------------- * * Kurzbeschreibung : Menues fuer Mitglieder (Login, Anmeldung, ...) * * -------------------------------------------------------------------- * - * * + * $Revision:: $ * + * $Date:: $ * + * $Tag:: 0.2.1-FINAL $ * + * $Author:: $ * + * Needs to be in all Files and every File needs "svn propset * + * svn:keywords Date Revision" (autoprobset!) at least!!!!!! * * -------------------------------------------------------------------- * * Copyright (c) 2003 - 2008 by Roland Haeder * * For more information visit: http://www.mxchange.org * @@ -33,25 +38,23 @@ // Some security stuff... if (!defined('__SECURITY')) { - $INC = substr(dirname(__FILE__), 0, strpos(dirname(__FILE__), "/inc") + 4) . "/security.php"; + $INC = substr(dirname(__FILE__), 0, strpos(dirname(__FILE__), '/inc') + 4) . '/security.php'; require($INC); -} elseif ($BLOCK_MODE) { +} elseif (isBlockModeEnabled()) { // Block mode detected return; } // Add description as navigation point -ADD_DESCR("guest", __FILE__); +ADD_DESCR('guest', __FILE__); // Load the include file -$INC = sprintf("%sinc/modules/guest/what-%s.php", PATH, SQL_ESCAPE($GLOBALS['what'])); -if (FILE_READABLE($INC)) { +$INC = sprintf("inc/modules/guest/what-%s.php", getWhat()); +if (isIncludeReadable($INC)) { // Ok, we finally load the guest action module - include($INC); -} elseif ($IS_VALID) { - ADD_FATAL(sprintf(getMessage('GUEST_404_ACTION'), SQL_ESCAPE($GLOBALS['what']))); + loadInclude($INC); } else { - ADD_FATAL(sprintf(getMessage('GUEST_LOCKED_ACTION'), SQL_ESCAPE($GLOBALS['what']))); + addFatalMessage(__FILE__, __LINE__, getMessage('GUEST_404_ACTION'), getWhat()); } //