mirror of
https://github.com/pi-hole/web.git
synced 2026-05-08 09:39:05 +01:00
Trim excess whitespace
Signed-off-by: a1346054 <36859588+a1346054@users.noreply.github.com>
This commit is contained in:
+1
-1
@@ -1,4 +1,4 @@
|
||||
<?php /*
|
||||
<?php /*
|
||||
* Pi-hole: A black hole for Internet advertisements
|
||||
* (c) 2017 Pi-hole, LLC (https://pi-hole.net)
|
||||
* Network-wide ad blocking via your own hardware.
|
||||
|
||||
@@ -47,12 +47,12 @@ function check_cors() {
|
||||
$virtual_host = getenv('VIRTUAL_HOST');
|
||||
if (! empty($virtual_host))
|
||||
array_push($AUTHORIZED_HOSTNAMES, $virtual_host);
|
||||
|
||||
|
||||
# Allow user set CORS
|
||||
$cors_hosts = getenv('CORS_HOSTS');
|
||||
if (! empty($cors_hosts))
|
||||
array_push($AUTHORIZED_HOSTNAMES, ...explode(",", $cors_hosts));
|
||||
|
||||
|
||||
// Since the Host header is easily manipulated, we can only check if it's wrong and can't use it
|
||||
// to validate that the client is authorized, only unauthorized.
|
||||
$server_host = $_SERVER['HTTP_HOST'];
|
||||
@@ -105,7 +105,7 @@ function check_csrf($token) {
|
||||
// Start a new PHP session (or continue an existing one)
|
||||
// Prevents javascript XSS attacks aimed to steal the session ID
|
||||
ini_set('session.cookie_httponly', 1);
|
||||
// Prevent Session ID from being passed through URLs
|
||||
// Prevent Session ID from being passed through URLs
|
||||
ini_set('session.use_only_cookies', 1);
|
||||
session_start();
|
||||
}
|
||||
|
||||
@@ -14,7 +14,7 @@
|
||||
$hostname = gethostname() ? gethostname() : "";
|
||||
|
||||
check_cors();
|
||||
|
||||
|
||||
// Create cache busting version
|
||||
$cacheVer = filemtime(__FILE__);
|
||||
|
||||
@@ -610,10 +610,10 @@ if($auth) {
|
||||
<!-- Local DNS Records -->
|
||||
<li class="treeview <?php if(in_array($scriptname, array("dns_records.php", "cname_records.php"))){ ?>active<?php } ?>">
|
||||
<a href="#">
|
||||
<i class="fa fa-fw fa-address-book"></i> <span>Local DNS</span>
|
||||
<i class="fa fa-fw fa-address-book"></i> <span>Local DNS</span>
|
||||
<span class="pull-right-container">
|
||||
<i class="fa fa-angle-left pull-right"></i>
|
||||
</span>
|
||||
</span>
|
||||
</a>
|
||||
<ul class="treeview-menu">
|
||||
<li<?php if($scriptname === "dns_records.php"){ ?> class="active"<?php } ?>>
|
||||
|
||||
@@ -11,7 +11,7 @@
|
||||
// Start a new PHP session (or continue an existing one)
|
||||
// Prevents javascript XSS attacks aimed to steal the session ID
|
||||
ini_set('session.cookie_httponly', 1);
|
||||
// Prevent Session ID from being passed through URLs
|
||||
// Prevent Session ID from being passed through URLs
|
||||
ini_set('session.use_only_cookies', 1);
|
||||
session_start();
|
||||
|
||||
|
||||
@@ -538,7 +538,7 @@ if(isset($_POST["action"]))
|
||||
$line = str_replace("\r","", $line);
|
||||
$line = str_replace("\n","", $line);
|
||||
$explodedLine = explode (",", $line);
|
||||
|
||||
|
||||
$domain = implode(",", array_slice($explodedLine, 0, -1));
|
||||
$target = $explodedLine[count($explodedLine)-1];
|
||||
|
||||
|
||||
+1
-1
@@ -916,7 +916,7 @@ if (isset($_GET['tab']) && in_array($_GET['tab'], array("sysadmin", "dns", "piho
|
||||
</div>
|
||||
<br>
|
||||
<h4>Conditional forwarding</h4>
|
||||
<p>If not configured as your DHCP server, Pi-hole typically won't be able to
|
||||
<p>If not configured as your DHCP server, Pi-hole typically won't be able to
|
||||
determine the names of devices on your local network. As a
|
||||
result, tables such as Top Clients will only show IP addresses.</p>
|
||||
<p>One solution for this is to configure Pi-hole to forward these
|
||||
|
||||
Reference in New Issue
Block a user