X-Git-Url: https://git.mxchange.org/?p=mailer.git;a=blobdiff_plain;f=js.php;h=d108cd75bf40c27aa8c4539d1cfd475fdd6f9bfc;hp=0ced4dccaf11e6bda308c25d8683d0c20a7b768a;hb=deb4293fa309b70be72d66b394e7253c8ea7d351;hpb=d798a412acb8c1263933bd7f7a0fd9aa251495a7 diff --git a/js.php b/js.php index 0ced4dccaf..d108cd75bf 100644 --- a/js.php +++ b/js.php @@ -35,11 +35,12 @@ define('_OB_CACHING', "old"); // Load security stuff here (Oh, I hope this is not unsecure? Am I paranoia??? ;-) ) -require_once("inc/libs/security_functions.php"); +require("inc/libs/security_functions.php"); // Init "action" and "what" global $what, $action; -$GLOBALS['what'] = ""; $GLOBALS['action'] = ""; +$GLOBALS['what'] = ""; +$GLOBALS['action'] = ""; // This is a fake-CSS file loader, more a JavaScript loader... // This is in one way good and in one not. The whole reset part will be @@ -56,25 +57,24 @@ require("inc/config.php"); // Is this script installed and a JavaScript tag is provied? if ((isBooleanConstantAndTrue('mxchange_installed')) && (isset($_GET['tag']))) { // Set header - @header("Content-type: text/javascript"); + header("Content-type: text/javascript"); // Load header - require_once(PATH."inc/header.php"); + LOAD_INC_ONCE("inc/header.php"); // Prepare include file for looking - $fqfn = sprintf("%sinc/js/tag-%s.php", - PATH, + $INC = sprintf("inc/js/tag-%s.php", SQL_ESCAPE($_GET['tag']) ); // Is that file readable? - if (FILE_READABLE($fqfn)) { + if (INCLUDE_READABLE($INC)) { // Include it - require_once($fqfn); + LOAD_INC_ONCE($INC); } // END - if // Load footer - require_once(PATH."inc/footer.php"); + LOAD_INC_ONCE("inc/footer.php"); } // END - if //