-
Sub-task
-
Resolution: Fixed
-
Minor
-
2.3.4, 2.4.1, 2.5
-
None
-
MOODLE_23_STABLE, MOODLE_24_STABLE, MOODLE_25_STABLE
-
MOODLE_25_STABLE
Fred asked me my opinion about it, and I really think its way too magic and bad for security (can't see the source of a variable):
The php manual show it as this:
$size = "large";
|
$var_array = array("color" => "blue",
|
"size" => "medium",
|
"shape" => "sphere");
|
extract($var_array, EXTR_PREFIX_SAME, "wddx");
|
|
echo "$color, $size, $shape, $wddx_size\n";
|
Note: This requires documentation @ http://docs.moodle.org/dev/Coding_style#Dangerous_functions_and_constructs
- caused a regression
-
CONTRIB-5175 False positives with preg /e checker
- Closed