當前位置: 首頁>>代碼示例>>PHP>>正文


PHP wfUtils::cleanupOneEntryPerLine方法代碼示例

本文整理匯總了PHP中wfUtils::cleanupOneEntryPerLine方法的典型用法代碼示例。如果您正苦於以下問題:PHP wfUtils::cleanupOneEntryPerLine方法的具體用法?PHP wfUtils::cleanupOneEntryPerLine怎麽用?PHP wfUtils::cleanupOneEntryPerLine使用的例子?那麽, 這裏精選的方法代碼示例或許可以為您提供幫助。您也可以進一步了解該方法所在wfUtils的用法示例。


在下文中一共展示了wfUtils::cleanupOneEntryPerLine方法的5個代碼示例,這些例子默認根據受歡迎程度排序。您可以為喜歡或者感覺有用的代碼點讚,您的評價將有助於係統推薦出更棒的PHP代碼示例。

示例1: getExcludeFilePattern

 /**
  *	Return regular expression to exclude files or false if 
  *	there is no pattern
  *
  *	@return string|boolean
  */
 public static function getExcludeFilePattern()
 {
     if (self::$excludePattern !== NULL) {
         return self::$excludePattern;
     }
     if (wfConfig::get('scan_exclude', false)) {
         $exParts = explode("\n", wfUtils::cleanupOneEntryPerLine(wfConfig::get('scan_exclude')));
         foreach ($exParts as &$exPart) {
             $exPart = preg_quote(trim($exPart), '/');
             $exPart = preg_replace('/\\\\\\*/', '.*', $exPart);
         }
         self::$excludePattern = '/^(?:' . implode('|', array_filter($exParts)) . ')$/i';
         self::$excludePattern = '/(?:' . implode('|', array_filter($exParts)) . ')$/i';
     } else {
         self::$excludePattern = false;
     }
     return self::$excludePattern;
 }
開發者ID:arobbins,項目名稱:davis,代碼行數:24,代碼來源:wordfenceScanner.php

示例2:

							href="http://docs.wordfence.com/en/Wordfence_options#Prevent_discovery_of_usernames_through_.27.3F.2Fauthor.3DN.27_scans"
							target="_blank" class="wfhelp"></a></th>
					<td><input type="checkbox" id="loginSec_disableAuthorScan" class="wfConfigElem"
					           name="loginSec_disableAuthorScan" <?php 
$w->cb('loginSec_disableAuthorScan');
?>
 />
					</td>
				</tr>
				<tr>
					<th style="vertical-align: top;">Immediately block the IP of users who try to sign in as these usernames<a
							href="http://docs.wordfence.com/en/Wordfence_options#Immediately_block_the_IP_of_users_who_try_to_sign_in_as_these_usernames"
							target="_blank" class="wfhelp"></a></th>
					<td>
						<textarea name="loginSec_userBlacklist" cols="40" rows="4" id="loginSec_userBlacklist"><?php 
echo wfUtils::cleanupOneEntryPerLine($w->getHTML('loginSec_userBlacklist'));
?>
</textarea><br/>
						(One per line. Existing users won't be blocked.)
					</td>
				</tr>
				<tr>
					<td colspan="2">
						<div class="wfMarker" id="wfMarkerOtherOptions"></div>
						<h3 class="wfConfigHeading">Other Options<a
								href="http://docs.wordfence.com/en/Wordfence_options#Other_Options" target="_blank"
								class="wfhelp"></a></h3>
					</td>
				</tr>

				<tr>
開發者ID:GafaMX,項目名稱:operaciondespierta.org,代碼行數:31,代碼來源:menu_options.php

示例3: ajax_saveConfig_callback

 public static function ajax_saveConfig_callback()
 {
     $reload = '';
     $opts = wfConfig::parseOptions();
     // These are now on the Diagnostics page, so they aren't sent across.
     foreach (self::$diagnosticParams as $param) {
         $opts[$param] = wfConfig::get($param);
     }
     $emails = array();
     foreach (explode(',', preg_replace('/[\\r\\n\\s\\t]+/', '', $opts['alertEmails'])) as $email) {
         if (strlen($email) > 0) {
             $emails[] = $email;
         }
     }
     if (sizeof($emails) > 0) {
         $badEmails = array();
         foreach ($emails as $email) {
             if (!preg_match('/^[^@]+@[a-z0-9-]+(\\.[a-z0-9-]+)*(\\.[a-z]{2,11})$/i', $email)) {
                 $badEmails[] = $email;
             }
         }
         if (sizeof($badEmails) > 0) {
             return array('errorMsg' => "The following emails are invalid: " . wp_kses(implode(', ', $badEmails), array()));
         }
         $opts['alertEmails'] = implode(',', $emails);
     } else {
         $opts['alertEmails'] = '';
     }
     $opts['scan_exclude'] = wfUtils::cleanupOneEntryPerLine($opts['scan_exclude']);
     foreach (explode("\n", $opts['scan_include_extra']) as $regex) {
         if (@preg_match("/{$regex}/", "") === FALSE) {
             return array('errorMsg' => "\"" . esc_html($regex) . "\" is not a valid regular expression");
         }
     }
     $whiteIPs = array();
     foreach (explode(',', preg_replace('/[\\r\\n\\s\\t]+/', '', $opts['whitelisted'])) as $whiteIP) {
         if (strlen($whiteIP) > 0) {
             $whiteIPs[] = $whiteIP;
         }
     }
     if (sizeof($whiteIPs) > 0) {
         $badWhiteIPs = array();
         $range = new wfUserIPRange();
         foreach ($whiteIPs as $whiteIP) {
             $range->setIPString($whiteIP);
             if (!$range->isValidRange()) {
                 $badWhiteIPs[] = $whiteIP;
             }
         }
         if (sizeof($badWhiteIPs) > 0) {
             return array('errorMsg' => "Please make sure you separate your IP addresses with commas. The following whitelisted IP addresses are invalid: " . wp_kses(implode(', ', $badWhiteIPs), array()));
         }
         $opts['whitelisted'] = implode(',', $whiteIPs);
     } else {
         $opts['whitelisted'] = '';
     }
     $validUsers = array();
     $invalidUsers = array();
     foreach (explode(',', $opts['liveTraf_ignoreUsers']) as $val) {
         $val = trim($val);
         if (strlen($val) > 0) {
             if (get_user_by('login', $val)) {
                 $validUsers[] = $val;
             } else {
                 $invalidUsers[] = $val;
             }
         }
     }
     $opts['loginSec_userBlacklist'] = wfUtils::cleanupOneEntryPerLine($opts['loginSec_userBlacklist']);
     $opts['apiKey'] = trim($opts['apiKey']);
     if ($opts['apiKey'] && !preg_match('/^[a-fA-F0-9]+$/', $opts['apiKey'])) {
         //User entered something but it's garbage.
         return array('errorMsg' => "You entered an API key but it is not in a valid format. It must consist only of characters A to F and 0 to 9.");
     }
     if (sizeof($invalidUsers) > 0) {
         return array('errorMsg' => "The following users you selected to ignore in live traffic reports are not valid on this system: " . wp_kses(implode(', ', $invalidUsers), array()));
     }
     if (sizeof($validUsers) > 0) {
         $opts['liveTraf_ignoreUsers'] = implode(',', $validUsers);
     } else {
         $opts['liveTraf_ignoreUsers'] = '';
     }
     $validIPs = array();
     $invalidIPs = array();
     foreach (explode(',', preg_replace('/[\\r\\n\\s\\t]+/', '', $opts['liveTraf_ignoreIPs'])) as $val) {
         if (strlen($val) > 0) {
             if (wfUtils::isValidIP($val)) {
                 $validIPs[] = $val;
             } else {
                 $invalidIPs[] = $val;
             }
         }
     }
     if (sizeof($invalidIPs) > 0) {
         return array('errorMsg' => "The following IPs you selected to ignore in live traffic reports are not valid: " . wp_kses(implode(', ', $invalidIPs), array()));
     }
     if (sizeof($validIPs) > 0) {
         $opts['liveTraf_ignoreIPs'] = implode(',', $validIPs);
     }
     if (preg_match('/[a-zA-Z0-9\\d]+/', $opts['liveTraf_ignoreUA'])) {
//.........這裏部分代碼省略.........
開發者ID:ashenkar,項目名稱:sanga,代碼行數:101,代碼來源:wordfenceClass.php

示例4: getExcludeFilePattern

 /**
  * Return regular expression to exclude files or false if
  * there is no pattern
  *
  * @param $whichPatterns int Bitmask indicating which patterns to include.
  * @return string|boolean
  */
 public static function getExcludeFilePattern($whichPatterns = self::EXCLUSION_PATTERNS_USER)
 {
     if (isset(self::$excludePatterns[$whichPatterns])) {
         return self::$excludePatterns[$whichPatterns];
     }
     $exParts = array();
     if (($whichPatterns & self::EXCLUSION_PATTERNS_USER) > 0) {
         if (wfConfig::get('scan_exclude', false)) {
             $exParts = explode("\n", wfUtils::cleanupOneEntryPerLine(wfConfig::get('scan_exclude')));
         }
     }
     foreach (self::$builtinExclusions as $pattern) {
         if (($pattern['include'] & $whichPatterns) > 0) {
             $exParts[] = $pattern['pattern'];
         }
     }
     if (!empty($exParts)) {
         foreach ($exParts as &$exPart) {
             $exPart = preg_quote(trim($exPart), '/');
             $exPart = preg_replace('/\\\\\\*/', '.*', $exPart);
         }
         //self::$excludePattern = '/^(?:' . implode('|', array_filter($exParts)) . ')$/i';
         self::$excludePatterns[$whichPatterns] = '/(?:' . implode('|', array_filter($exParts)) . ')$/i';
     } else {
         self::$excludePatterns[$whichPatterns] = false;
     }
     return self::$excludePatterns[$whichPatterns];
 }
開發者ID:VizualAbstract,項目名稱:Marilyn,代碼行數:35,代碼來源:wordfenceScanner.php

示例5:

							target="_blank" class="wfhelp"></a></th>
					<td><input type="checkbox" id="scansEnabled_highSense" class="wfConfigElem"
					           name="scansEnabled_highSense" value="1" <?php 
$w->cb('scansEnabled_highSense');
?>
 />
					</td>
				</tr>
				<tr>
					<th>Exclude files from scan that match these wildcard patterns. (One per line).<a
							href="http://docs.wordfence.com/en/Wordfence_options#Exclude_files_from_scan_that_match_these_wildcard_patterns."
							target="_blank" class="wfhelp"></a></th>
					<td>
						<textarea id="scan_exclude" class="wfConfigElem" cols="40" rows="4"
							name="scan_exclude"><?php 
echo wfUtils::cleanupOneEntryPerLine($w->getHTML('scan_exclude'));
?>
</textarea>
					</td>
				</tr>
				<tr>
					<td colspan="2">
						<div class="wfMarker" id="wfMarkerFirewallRules"></div>
						<h3 class="wfConfigHeading">Firewall Rules<a
								href="http://docs.wordfence.com/en/Wordfence_options#Firewall_Rules" target="_blank"
								class="wfhelp"></a></h3>
					</td>
				</tr>
				<tr>
					<th>Immediately block fake Google crawlers:<a
							href="http://docs.wordfence.com/en/Wordfence_options#Immediately_block_fake_Google_crawlers:"
開發者ID:pcuervo,項目名稱:wp-carnival,代碼行數:31,代碼來源:menu_options.php


注:本文中的wfUtils::cleanupOneEntryPerLine方法示例由純淨天空整理自Github/MSDocs等開源代碼及文檔管理平台,相關代碼片段篩選自各路編程大神貢獻的開源項目,源碼版權歸原作者所有,傳播和使用請參考對應項目的License;未經允許,請勿轉載。