Chris@0
|
1 <?php
|
Chris@0
|
2 /**
|
Chris@0
|
3 * Drupal_Sniffs_Semantics_RemoteAddressSniff.
|
Chris@0
|
4 *
|
Chris@0
|
5 * @category PHP
|
Chris@0
|
6 * @package PHP_CodeSniffer
|
Chris@0
|
7 * @link http://pear.php.net/package/PHP_CodeSniffer
|
Chris@0
|
8 */
|
Chris@0
|
9
|
Chris@0
|
10 /**
|
Chris@0
|
11 * Make sure that the function ip_address() is used instead of
|
Chris@0
|
12 * $_SERVER['REMOTE_ADDR'].
|
Chris@0
|
13 *
|
Chris@0
|
14 * @category PHP
|
Chris@0
|
15 * @package PHP_CodeSniffer
|
Chris@0
|
16 * @link http://pear.php.net/package/PHP_CodeSniffer
|
Chris@0
|
17 */
|
Chris@0
|
18 class Drupal_Sniffs_Semantics_RemoteAddressSniff implements PHP_CodeSniffer_Sniff
|
Chris@0
|
19 {
|
Chris@0
|
20
|
Chris@0
|
21
|
Chris@0
|
22 /**
|
Chris@0
|
23 * Returns an array of tokens this test wants to listen for.
|
Chris@0
|
24 *
|
Chris@0
|
25 * @return array
|
Chris@0
|
26 */
|
Chris@0
|
27 public function register()
|
Chris@0
|
28 {
|
Chris@0
|
29 return array(T_VARIABLE);
|
Chris@0
|
30
|
Chris@0
|
31 }//end register()
|
Chris@0
|
32
|
Chris@0
|
33
|
Chris@0
|
34 /**
|
Chris@0
|
35 * Processes this test, when one of its tokens is encountered.
|
Chris@0
|
36 *
|
Chris@0
|
37 * @param PHP_CodeSniffer_File $phpcsFile The current file being processed.
|
Chris@0
|
38 * @param int $stackPtr The position of the current token
|
Chris@0
|
39 * in the stack passed in $tokens.
|
Chris@0
|
40 *
|
Chris@0
|
41 * @return void
|
Chris@0
|
42 */
|
Chris@0
|
43 public function process(PHP_CodeSniffer_File $phpcsFile, $stackPtr)
|
Chris@0
|
44 {
|
Chris@0
|
45 $string = $phpcsFile->getTokensAsString($stackPtr, 4);
|
Chris@0
|
46 if ($string === '$_SERVER["REMOTE_ADDR"]' || $string === '$_SERVER[\'REMOTE_ADDR\']') {
|
Chris@0
|
47 $error = 'Use the function ip_address() instead of $_SERVER[\'REMOTE_ADDR\']';
|
Chris@0
|
48 $phpcsFile->addError($error, $stackPtr, 'RemoteAddress');
|
Chris@0
|
49 }
|
Chris@0
|
50
|
Chris@0
|
51 }//end process()
|
Chris@0
|
52
|
Chris@0
|
53
|
Chris@0
|
54 }//end class
|