PATH:
opt
/
cpanel
/
ea-wappspector
/
vendor
/
squizlabs
/
php_codesniffer
/
src
/
Standards
/
Generic
/
Sniffs
/
Files
<?php /** * Tests that files are not executable. * * @author Matthew Peveler <matt.peveler@gmail.com> * @copyright 2019 Matthew Peveler * @license https://github.com/PHPCSStandards/PHP_CodeSniffer/blob/master/licence.txt BSD Licence */ namespace PHP_CodeSniffer\Standards\Generic\Sniffs\Files; use PHP_CodeSniffer\Files\File; use PHP_CodeSniffer\Sniffs\Sniff; class ExecutableFileSniff implements Sniff { /** * Returns an array of tokens this test wants to listen for. * * @return array<int|string> */ public function register() { return [ T_OPEN_TAG, T_OPEN_TAG_WITH_ECHO, ]; }//end register() /** * Processes this test, when one of its tokens is encountered. * * @param \PHP_CodeSniffer\Files\File $phpcsFile The file being scanned. * @param int $stackPtr The position of the current token in the * stack passed in $tokens. * * @return int */ public function process(File $phpcsFile, $stackPtr) { $filename = $phpcsFile->getFilename(); if ($filename !== 'STDIN') { $perms = fileperms($phpcsFile->getFilename()); if (($perms & 0x0040) !== 0 || ($perms & 0x0008) !== 0 || ($perms & 0x0001) !== 0) { $error = 'A PHP file should not be executable; found file permissions set to %s'; $data = [substr(sprintf('%o', $perms), -4)]; $phpcsFile->addError($error, 0, 'Executable', $data); } } // Ignore the rest of the file. return $phpcsFile->numTokens; }//end process() }//end class
[-] EndFileNewlineSniff.php
[edit]
[-] EndFileNoNewlineSniff.php
[edit]
[-] ExecutableFileSniff.php
[edit]
[+]
..
[-] LowercasedFilenameSniff.php
[edit]
[-] OneClassPerFileSniff.php
[edit]
[-] OneTraitPerFileSniff.php
[edit]
[-] InlineHTMLSniff.php
[edit]
[-] LineEndingsSniff.php
[edit]
[-] ByteOrderMarkSniff.php
[edit]
[-] OneObjectStructurePerFileSniff.php
[edit]
[-] OneInterfacePerFileSniff.php
[edit]
[-] LineLengthSniff.php
[edit]