X-Git-Url: https://git.mxchange.org/?p=mailer.git;a=blobdiff_plain;f=js.php;h=cf93e394b3a119748102ea46dcd67d615cff1e4e;hp=b666aac864617cfc44d52b9ccfb0d5a8ad205200;hb=444470f309a050293341c95917beb89d60a394b9;hpb=5071030af40e69ca4284642f44758964e18f5be8 diff --git a/js.php b/js.php index b666aac864..cf93e394b3 100644 --- a/js.php +++ b/js.php @@ -39,10 +39,6 @@ // Load security stuff here require('inc/libs/security_functions.php'); -// Init "action" and "what" -$GLOBALS['what'] = ''; -$GLOBALS['action'] = ''; - // This is a fake-CSS file loader, more a JavaScript loader... // This is in one way good and in one not. The whole reset part will be // by-passed even in this "faked" CSS mode. The bad news is that this makes all @@ -65,8 +61,8 @@ if ((isInstalled()) && (REQUEST_ISSET_GET('tag'))) { loadIncludeOnce('inc/header.php'); // Prepare include file for looking - $INC = sprintf("inc/js/tag-%s.php", - REQUEST_GET('tag') + $INC = sprintf("inc/js/js-%s.php", + REQUEST_GET('tag') ); // Is that file readable?