X-Git-Url: https://git.mxchange.org/?p=mailer.git;a=blobdiff_plain;f=js.php;h=ec46e60e499120e90d8cf3eda625062b27b1a01f;hp=0ced4dccaf11e6bda308c25d8683d0c20a7b768a;hb=4001187f22197f55e5a1f211fc8defcc180f7c32;hpb=d798a412acb8c1263933bd7f7a0fd9aa251495a7 diff --git a/js.php b/js.php index 0ced4dccaf..ec46e60e49 100644 --- a/js.php +++ b/js.php @@ -35,11 +35,11 @@ define('_OB_CACHING', "old"); // Load security stuff here (Oh, I hope this is not unsecure? Am I paranoia??? ;-) ) -require_once("inc/libs/security_functions.php"); +require("inc/libs/security_functions.php"); // Init "action" and "what" -global $what, $action; -$GLOBALS['what'] = ""; $GLOBALS['action'] = ""; +$GLOBALS['what'] = ""; +$GLOBALS['action'] = ""; // This is a fake-CSS file loader, more a JavaScript loader... // This is in one way good and in one not. The whole reset part will be @@ -48,33 +48,33 @@ $GLOBALS['what'] = ""; $GLOBALS['action'] = ""; // pattern is given... // // But mxchange 0.3.0 will show that in better way! :D :D :D -$CSS = "1"; $GLOBALS['module'] = "js"; +$GLOBALS['output_mode'] = "1"; +$GLOBALS['module'] = "js"; // Load the required file(s) require("inc/config.php"); // Is this script installed and a JavaScript tag is provied? -if ((isBooleanConstantAndTrue('mxchange_installed')) && (isset($_GET['tag']))) { +if ((isInstalled()) && (REQUEST_ISSET_GET(('tag')))) { // Set header - @header("Content-type: text/javascript"); + header("Content-type: text/javascript"); // Load header - require_once(PATH."inc/header.php"); + LOAD_INC_ONCE("inc/header.php"); // Prepare include file for looking - $fqfn = sprintf("%sinc/js/tag-%s.php", - PATH, - SQL_ESCAPE($_GET['tag']) + $INC = sprintf("inc/js/tag-%s.php", + REQUEST_GET(('tag')) ); // Is that file readable? - if (FILE_READABLE($fqfn)) { + if (INCLUDE_READABLE($INC)) { // Include it - require_once($fqfn); + LOAD_INC_ONCE($INC); } // END - if // Load footer - require_once(PATH."inc/footer.php"); + LOAD_INC_ONCE("inc/footer.php"); } // END - if //