Changeset 608 for branches/1.1dev


Ignore:
Timestamp:
Jul 13, 2017 1:50:49 PM (7 years ago)
Author:
anonymous
Message:

Fix undefined index errors

Location:
branches/1.1dev
Files:
3 edited

Legend:

Unmodified
Added
Removed
  • branches/1.1dev/config/boot.inc.php

    r571 r608  
    205205    session_start();
    206206
     207    // Access session data using: $_SESSION['...'].
     208    // Initialize here _after_ session has started.
     209    if (!isset($_SESSION['_boomerang'])) {
     210        $_SESSION['_boomerang'] = array(
     211            'url' => array(),
     212        );
     213    }
     214    if (!isset($_SESSION['_messages'])) {
     215        $_SESSION['_messages'] = array();
     216    }
     217
    207218//     if (isset($_COOKIE[session_name()])) {
    208219//         logMsg(sprintf('Found session in cookie: %s=%s', session_name(), $_COOKIE[session_name()]), LOG_DEBUG, __FILE__, __LINE__);
  • branches/1.1dev/lib/App.inc.php

    r604 r608  
    198198
    199199    if (isset($url) && is_string($url)) {
    200         // Delete any boomerang request keys in the query string.
    201         $url = preg_replace('/boomerang=[\w]+/', '', $url);
    202 
    203         if (is_array($_SESSION['_boomerang']['url']) && !empty($_SESSION['_boomerang']['url'])) {
     200        // Delete any boomerang request keys in the query string (along with any trailing delimiters after the deletion).
     201        $url = preg_replace(array('/([&?])boomerang=[^&?]+[&?]?/', '/[&?]$/'), array('$1', ''), $url);
     202
     203        if (isset($_SESSION['_boomerang']['url']) && is_array($_SESSION['_boomerang']['url']) && !empty($_SESSION['_boomerang']['url'])) {
    204204            // If the URL currently exists in the boomerang array, delete.
    205205            while ($existing_key = array_search($url, $_SESSION['_boomerang']['url'])) {
  • branches/1.1dev/lib/AuthSQL.inc.php

    r585 r608  
    234234            'last_access_datetime'  => date('Y-m-d H:i:s'),
    235235            'remote_ip'             => getRemoteAddr(),
    236             'abuse_warning_level'   => $user_data['abuse_warning_level'],
     236            'abuse_warning_level'   => isset($user_data['abuse_warning_level']) ? $user_data['abuse_warning_level'] : 0,
    237237            'login_abuse_exempt'    => isset($user_data['login_abuse_exempt']) ? !empty($user_data['login_abuse_exempt']) : in_array(strtolower($username), $this->_params['login_abuse_exempt_usernames']),
    238238            'match_remote_ip_exempt'=> isset($user_data['match_remote_ip_exempt']) ? !empty($user_data['match_remote_ip_exempt']) : in_array(strtolower($username), $this->_params['match_remote_ip_exempt_usernames']),
     
    375375        // Do we match the user's remote IP at all? Yes, if set in config and not disabled for specific user.
    376376        if ($this->getFeature('match_remote_ip') && !$this->getVal('match_remote_ip_exempt')) {
    377             $remote_ip_is_matched = ($_SESSION[$this->_auth_name]['remote_ip'] == getRemoteAddr() || $user_in_trusted_network);
     377            $remote_ip_is_matched = (isset($_SESSION[$this->_auth_name]['remote_ip']) && $_SESSION[$this->_auth_name]['remote_ip'] == getRemoteAddr() || $user_in_trusted_network);
    378378        } else {
    379379            logMsg(sprintf('%s%s exempt from remote_ip match.',
Note: See TracChangeset for help on using the changeset viewer.