Kanti/htmly-installer

View on GitHub

Showing 765 of 765 total issues

runForm accesses the super-global variable $_REQUEST.
Open

    protected function runForm()
    {
        if (StaticFunctions::from($_REQUEST, 'user_name') && StaticFunctions::from($_REQUEST, 'user_password')) {
            $this->install();
            $this->saveConfigs();
Severity: Minor
Found in src/Settings.php by phpmd

Superglobals

Since: 0.2

Accessing a super-global variable directly is considered a bad practice. These variables should be encapsulated in objects that are provided by a framework, for instance.

Example

class Foo {
    public function bar() {
        $name = $_POST['foo'];
    }
}

Source

generateSiteUrl accesses the super-global variable $_SERVER.
Open

    protected function generateSiteUrl()
    {
        $dir = dirname(substr($_SERVER["SCRIPT_FILENAME"], strlen($_SERVER["DOCUMENT_ROOT"])));
        if ($dir == '.' || $dir == '..') {
            $dir = '';
Severity: Minor
Found in src/Settings.php by phpmd

Superglobals

Since: 0.2

Accessing a super-global variable directly is considered a bad practice. These variables should be encapsulated in objects that are provided by a framework, for instance.

Example

class Foo {
    public function bar() {
        $name = $_POST['foo'];
    }
}

Source

testIfBackingIsNecessary accesses the super-global variable $_SERVER.
Open

    protected function testIfBackingIsNecessary()
    {
        if (!file_exists(dirname($_SERVER["SCRIPT_FILENAME"]) . "/" . "composer.json")) {
            return false;
        }
Severity: Minor
Found in backer.php by phpmd

Superglobals

Since: 0.2

Accessing a super-global variable directly is considered a bad practice. These variables should be encapsulated in objects that are provided by a framework, for instance.

Example

class Foo {
    public function bar() {
        $name = $_POST['foo'];
    }
}

Source

back accesses the super-global variable $_SERVER.
Open

    protected function back()
    {
        $phar = new Phar(
            $this->tmpDir . $this->backedName . ".phar",
            FilesystemIterator::CURRENT_AS_FILEINFO | FilesystemIterator::KEY_AS_FILENAME,
Severity: Minor
Found in backer.php by phpmd

Superglobals

Since: 0.2

Accessing a super-global variable directly is considered a bad practice. These variables should be encapsulated in objects that are provided by a framework, for instance.

Example

class Foo {
    public function bar() {
        $name = $_POST['foo'];
    }
}

Source

testIfBackingIsNecessary accesses the super-global variable $_SERVER.
Open

    protected function testIfBackingIsNecessary()
    {
        if (!file_exists(dirname($_SERVER["SCRIPT_FILENAME"]) . "/" . "composer.json")) {
            return false;
        }
Severity: Minor
Found in backer.php by phpmd

Superglobals

Since: 0.2

Accessing a super-global variable directly is considered a bad practice. These variables should be encapsulated in objects that are provided by a framework, for instance.

Example

class Foo {
    public function bar() {
        $name = $_POST['foo'];
    }
}

Source

testIfBackingIsNecessary accesses the super-global variable $_SERVER.
Open

    protected function testIfBackingIsNecessary()
    {
        if (!file_exists(dirname($_SERVER["SCRIPT_FILENAME"]) . "/" . "composer.json")) {
            return false;
        }
Severity: Minor
Found in backer.php by phpmd

Superglobals

Since: 0.2

Accessing a super-global variable directly is considered a bad practice. These variables should be encapsulated in objects that are provided by a framework, for instance.

Example

class Foo {
    public function bar() {
        $name = $_POST['foo'];
    }
}

Source

testIfBackingIsNecessary accesses the super-global variable $_SERVER.
Open

    protected function testIfBackingIsNecessary()
    {
        if (!file_exists(dirname($_SERVER["SCRIPT_FILENAME"]) . "/" . "composer.json")) {
            return false;
        }
Severity: Minor
Found in backer.php by phpmd

Superglobals

Since: 0.2

Accessing a super-global variable directly is considered a bad practice. These variables should be encapsulated in objects that are provided by a framework, for instance.

Example

class Foo {
    public function bar() {
        $name = $_POST['foo'];
    }
}

Source

Line exceeds 120 characters; contains 136 characters
Open

Severity: Minor
Found in htmly-installer.php by phpcodesniffer

Line exceeds 120 characters; contains 1602 characters
Open

                      href="data:image/vnd.microsoft.icon;base64,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"
Severity: Minor
Found in src/HeaderTemplate.php by phpcodesniffer

Line exceeds 120 characters; contains 129 characters
Open

    <a href="<?php echo $version['html_url']; ?>" target="_blank"> HTMLy <small>/<?php echo $version['tag_name']; ?>/</a></small>
Severity: Minor
Found in src/HeaderTemplate.php by phpcodesniffer

Line exceeds 120 characters; contains 158 characters
Open

Severity: Minor
Found in htmly-installer.php by phpcodesniffer

Line exceeds 120 characters; contains 173 characters
Open

Severity: Minor
Found in htmly-installer.php by phpcodesniffer

Line exceeds 120 characters; contains 199 characters
Open

Severity: Minor
Found in htmly-installer.php by phpcodesniffer

Inline control structures are not allowed
Open

Severity: Minor
Found in htmly-installer.php by phpcodesniffer

Line exceeds 120 characters; contains 149 characters
Open

Severity: Minor
Found in htmly-installer.php by phpcodesniffer

Line exceeds 120 characters; contains 179 characters
Open

Severity: Minor
Found in htmly-installer.php by phpcodesniffer

Line exceeds 120 characters; contains 193 characters
Open

Severity: Minor
Found in htmly-installer.php by phpcodesniffer

Line exceeds 120 characters; contains 181 characters
Open

Severity: Minor
Found in htmly-installer.php by phpcodesniffer

Line exceeds 120 characters; contains 193 characters
Open

Severity: Minor
Found in htmly-installer.php by phpcodesniffer

Line exceeds 120 characters; contains 161 characters
Open

Severity: Minor
Found in htmly-installer.php by phpcodesniffer
Severity
Category
Status
Source
Language