DisallowRequestSuperglobalSniff.php
Namespace
PHP_CodeSniffer\Standards\Generic\Sniffs\PHPFile
-
vendor/
squizlabs/ php_codesniffer/ src/ Standards/ Generic/ Sniffs/ PHP/ DisallowRequestSuperglobalSniff.php
View source
<?php
/**
* Ensures the $_REQUEST superglobal is not used
*
* @author Jeantwan Teuma <jeant.m24@gmail.com>
* @copyright 2006-2019 Squiz Pty Ltd (ABN 77 084 670 600)
* @license https://github.com/PHPCSStandards/PHP_CodeSniffer/blob/master/licence.txt BSD Licence
*/
namespace PHP_CodeSniffer\Standards\Generic\Sniffs\PHP;
use PHP_CodeSniffer\Files\File;
use PHP_CodeSniffer\Sniffs\Sniff;
class DisallowRequestSuperglobalSniff implements Sniff {
/**
* Returns an array of tokens this test wants to listen for.
*
* @return array<int|string>
*/
public function register() {
return [
T_VARIABLE,
];
}
//end register()
/**
* Processes this sniff, when one of its tokens is encountered.
*
* @param \PHP_CodeSniffer\Files\File $phpcsFile The file being scanned.
* @param int $stackPtr The position of the current token in the stack
* passed in $tokens.
*
* @return void
*/
public function process(File $phpcsFile, $stackPtr) {
$tokens = $phpcsFile->getTokens();
$varName = $tokens[$stackPtr]['content'];
if ($varName !== '$_REQUEST') {
return;
}
$error = 'The $_REQUEST superglobal should not be used; use $_GET, $_POST, or $_COOKIE instead';
$phpcsFile->addError($error, $stackPtr, 'Found');
}
//end process()
}
//end class
Classes
Title | Deprecated | Summary |
---|---|---|
DisallowRequestSuperglobalSniff |