TimeTrex Community Edition v16.2.0

This commit is contained in:
2022-12-13 07:10:06 +01:00
commit 472f000c1b
6810 changed files with 2636142 additions and 0 deletions

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,111 @@
<?php
/**
* Squiz_Sniffs_Debug_JavaScriptLintSniff.
*
* PHP version 5
*
* @category PHP
* @package PHP_CodeSniffer
* @author Greg Sherwood <gsherwood@squiz.net>
* @copyright 2006-2012 Squiz Pty Ltd (ABN 77 084 670 600)
* @license https://github.com/squizlabs/PHP_CodeSniffer/blob/master/licence.txt BSD Licence
* @link http://pear.php.net/package/PHP_CodeSniffer
*/
/**
* Squiz_Sniffs_Debug_JavaScriptLintSniff.
*
* Runs JavaScript Lint on the file.
*
* @category PHP
* @package PHP_CodeSniffer
* @author Greg Sherwood <gsherwood@squiz.net>
* @copyright 2006-2012 Squiz Pty Ltd (ABN 77 084 670 600)
* @license https://github.com/squizlabs/PHP_CodeSniffer/blob/master/licence.txt BSD Licence
* @version Release: 1.5.0RC2
* @link http://pear.php.net/package/PHP_CodeSniffer
*/
class TTCodeStandard_Sniffs_Debug_JavaScriptLintSniff implements PHP_CodeSniffer_Sniff {
/**
* A list of tokenizers this sniff supports.
*
* @var array
*/
public $supportedTokenizers = array('JS');
/**
* Returns the token types that this sniff is interested in.
*
* @return array(int)
*/
public function register() {
return array(T_OPEN_TAG);
}//end register()
/**
* Processes the tokens that this sniff is interested in.
*
* @param PHP_CodeSniffer_File $phpcsFile The file where the token was found.
* @param int $stackPtr The position in the stack where
* the token was found.
*
* @return void
*/
public function process(PHP_CodeSniffer_File $phpcsFile, $stackPtr) {
$fileName = $phpcsFile->getFilename();
//$jslPath = PHP_CodeSniffer::getConfigData('jsl_path');
//if (is_null($jslPath) === true) {
// return;
//}
//$cmd = '"'.$jslPath.'" -nologo -nofilelisting -nocontext -nosummary -output-format __LINE__:__ERROR__ -process "'.$fileName.'"';
$cmd = '"/usr/local/bin/jshint" -c "/etc/maint/jshintrc" "'.$fileName.'"';
$msg = exec($cmd, $output, $retval);
#echo "<br>\nzzzTest1: ". $cmd ." MSG: ". $msg."<br>\n";
// $exitCode is the last line of $output if no error occurs, on error it
// is numeric. Try to handle various error conditions and provide useful
// error reporting.
if ($retval === 2 || $retval === 4) {
if (is_array($output) === TRUE ) {
$msg = str_replace( '\n', '', join('\n', $output) );
//$msg = str_replace('\n', "\n", $output);
}
throw new PHP_CodeSniffer_Exception("Failed invoking JavaScript Lint, retval was [$retval], output was [$msg]");
}
if (is_array($output) === TRUE ) {
$tokens = $phpcsFile->getTokens();
foreach ($output as $finding) {
$split = strpos($finding, ':');
$line = substr($finding, 0, $split);
$message = substr($finding, ($split + 1));
// Find the token at the start of the line.
$lineToken = NULL;
foreach ($tokens as $ptr => $info) {
if ($info['line'] == $line) {
$lineToken = $ptr;
break;
}
}
if ($lineToken !== NULL) {
$phpcsFile->addWarning(trim($message), $ptr, 'ExternalTool');
}
}//end foreach
}//end if
}//end process()
}//end class
?>

View File

@@ -0,0 +1,90 @@
<?php
/**
* Squiz_Sniffs_Operators_ValidLogicalOperatorsSniff.
*
* PHP version 5
*
* @category PHP
* @package PHP_CodeSniffer
* @author Greg Sherwood <gsherwood@squiz.net>
* @author Marc McIntyre <mmcintyre@squiz.net>
* @copyright 2006-2011 Squiz Pty Ltd (ABN 77 084 670 600)
* @license http://matrix.squiz.net/developer/tools/php_cs/licence BSD Licence
* @link http://pear.php.net/package/PHP_CodeSniffer
*/
/**
* Squiz_Sniffs_Operators_ValidLogicalOperatorsSniff.
*
* Checks to ensure that the logical operators 'AND' and 'OR' ARE not used.
*
* @category PHP
* @package PHP_CodeSniffer
* @author Greg Sherwood <gsherwood@squiz.net>
* @author Marc McIntyre <mmcintyre@squiz.net>
* @copyright 2006-2011 Squiz Pty Ltd (ABN 77 084 670 600)
* @license http://matrix.squiz.net/developer/tools/php_cs/licence BSD Licence
* @version Release: 1.3.6
* @link http://pear.php.net/package/PHP_CodeSniffer
*/
class TTCodeStandard_Sniffs_Operators_ValidLogicalOperatorsSniff implements PHP_CodeSniffer_Sniff
{
/**
* Returns an array of tokens this test wants to listen for.
*
* @return array
*/
public function register()
{
return array(
T_LOGICAL_AND,
T_LOGICAL_OR,
T_LOGICAL_XOR,
T_BOOLEAN_AND,
T_BOOLEAN_OR,
);
}//end register()
/**
* Processes this test, when one of its tokens is encountered.
*
* @param PHP_CodeSniffer_File $phpcsFile The current file being scanned.
* @param int $stackPtr The position of the current token in the
* stack passed in $tokens.
*
* @return void
*/
public function process(PHP_CodeSniffer_File $phpcsFile, $stackPtr)
{
$tokens = $phpcsFile->getTokens();
$replacements = array(
'&&' => 'AND',
'||' => 'OR',
'and' => 'AND',
'or' => 'OR',
//'xor' => '^',
);
$operator = $tokens[$stackPtr]['content'];
if (isset($replacements[$operator]) === false) {
return;
}
$error = 'Logical operator "%s" is prohibited; use "%s" instead';
$data = array(
$operator,
$replacements[$operator],
);
$phpcsFile->addError($error, $stackPtr, 'NotAllowed', $data);
}//end process()
}//end class
?>