non security modules update
This commit is contained in:
@@ -144,6 +144,6 @@ class link_views_handler_argument_target extends views_handler_argument {
|
||||
$this->ensure_my_table();
|
||||
// Because attributes are stored serialized, our only option is to also
|
||||
// serialize the data we're searching for and use LIKE to find similar data.
|
||||
$this->query->add_where(0, $this->table_alias . '.' . $this->real_field . " LIKE '%%%s%'", serialize(array('target' => $this->argument)));
|
||||
$this->query->add_where(0, $this->table_alias . ' . ' . $this->real_field . " LIKE '%%%s%'", serialize(array('target' => $this->argument)));
|
||||
}
|
||||
}
|
||||
|
@@ -90,12 +90,12 @@ class link_views_handler_filter_protocol extends views_handler_filter_string {
|
||||
// PostGreSQL code has NOT been tested. Please report any problems to the link issue queue.
|
||||
// pgSQL requires all slashes to be double escaped in regular expressions.
|
||||
// See http://www.postgresql.org/docs/8.1/static/functions-matching.html#FUNCTIONS-POSIX-REGEXP
|
||||
$condition .= ' OR ' . $field .' ~* \''.'^(([a-z0-9]([a-z0-9\\-_]*\\.)+)(' . $LINK_DOMAINS . '|[a-z][a-z]))' . '\'';
|
||||
$condition .= ' OR ' . $field . ' ~* \'' . '^(([a-z0-9]([a-z0-9\\-_]*\\.)+)(' . $LINK_DOMAINS . '|[a-z][a-z]))' . '\'';
|
||||
}
|
||||
else {
|
||||
// mySQL requires backslashes to be double (triple?) escaped within character classes.
|
||||
// See http://dev.mysql.com/doc/refman/5.0/en/string-comparison-functions.html#operator_regexp
|
||||
$condition .= ' OR ' . $field . ' REGEXP \''.'^(([a-z0-9]([a-z0-9\\\-_]*\.)+)(' . $LINK_DOMAINS . '|[a-z][a-z]))' . '\'';
|
||||
$condition .= ' OR ' . $field . ' REGEXP \'' . '^(([a-z0-9]([a-z0-9\\\-_]*\.)+)(' . $LINK_DOMAINS . '|[a-z][a-z]))' . '\'';
|
||||
}
|
||||
}
|
||||
|
||||
|
Reference in New Issue
Block a user