MDL-20700 coding style cleanup - cvs keywords removed, closign php tag removed, trailing whitespace cleanup

This commit is contained in:
Petr Skoda 2009-11-01 10:57:00 +00:00
parent 8e3837060d
commit f578af59fc
12 changed files with 23 additions and 23 deletions

View File

@ -174,4 +174,4 @@ function print_auth_lock_options ($auth, $user_fields, $helptext, $retrieveopts,
}
}
?>

View File

@ -1,4 +1,4 @@
<?php // $Id$
<?php
/// This script looks through all the module directories for cron.php files
/// and runs them. These files can contain cleanup functions, email functions
@ -591,4 +591,4 @@
echo "</xmp>";
}
?>

View File

@ -1,4 +1,4 @@
<?PHP //$Id$
<?php
// Deletes the moodledata directory, COMPLETELY!!
// BE VERY CAREFUL USING THIS!
@ -83,4 +83,4 @@ function delete_subdirectories($rootdir) {
closedir($dir);
}
?>

View File

@ -1,4 +1,4 @@
<?PHP // $Id$
<?php
// enrol.php - allows admin to edit all enrollment variables
// Yes, enrol is correct English spelling.
@ -138,4 +138,4 @@
echo $OUTPUT->footer();
?>

View File

@ -1,4 +1,4 @@
<?php //$Id$
<?php
///////////////////////////////////////////////////////////////////////////
// //
@ -134,4 +134,4 @@
/// Print footer
echo $OUTPUT->footer();
?>

View File

@ -1,4 +1,4 @@
<?php // $Id$
<?php
///////////////////////////////////////////////////////////////////////////
// //

View File

@ -1,6 +1,6 @@
<?php
/** This expects the output from a command like
* clamscan -r --infected --no-summary <files> 2>&1 | php -d error_log=/path/to/log thisfile.php
* clamscan -r --infected --no-summary <files> 2>&1 | php -d error_log=/path/to/log thisfile.php
* also it's important that the output of clamscan prints the FULL PATH to each infected file, so use absolute paths for area to scan
* also it should be run as root, or whatever the webserver runs as so that it has the right permissions in the quarantine dir etc.
* php -d error_log=/path/to/log thisfile.php will override the default error log for php cli, which is stderr, so if you want this script to just print stuff out, use php thisfile.php instead.
@ -36,7 +36,7 @@ while(!feof($fd)) {
}
$action = clam_handle_infected_file($file,$log->userid,true);
clam_replace_infected_file($file);
$user = $DB->get_record("user", array("id"=>$log->userid));
$course = $DB->get_record("course", array("id"=>$log->course));
$subject = get_string('virusfoundsubject','moodle',format_string($site->fullname));
@ -86,13 +86,13 @@ function notify_admins($user,$subject,$a) {
$eventdata->fullmessage = $body;
$eventdata->fullmessageformat = FORMAT_PLAIN;
$eventdata->fullmessagehtml = '';
$eventdata->smallmessage = '';
$eventdata->smallmessage = '';
events_trigger('message_send', $eventdata);
}
}
function notify_admins_unknown($file,$a) {
global $site;
$admins = get_admins();

View File

@ -1,4 +1,4 @@
<?php // $Id$
<?php
ob_start(); //for whitespace test
require_once('../config.php');
@ -815,4 +815,4 @@ TODO:
*/
?>

View File

@ -1,4 +1,4 @@
<?PHP // $Id$
<?php
/**
* Display the admin/language menu and process strings translation.
*
@ -1382,4 +1382,4 @@ function lang_help_save_file($helproot, $file, $content) {
}
?>

View File

@ -74,4 +74,4 @@ function mdie($msg='', $errorcode=1) {
exit($errorcode);
}
?>

View File

@ -1,4 +1,4 @@
<?php // $Id$
<?php
if (!isset($CFG)) {
@ -153,4 +153,4 @@ function online_assignment_cleanup($output=false) {
echo '</center>';
}
?>

View File

@ -1,5 +1,5 @@
#!/usr/bin/php -f
<?php // $Id$
<?php
//error_reporting(0);
//ini_set('display_errors',0);
@ -77,4 +77,4 @@ fclose($fd);
?>