You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
And pass that function to array_map. However, doing so still presents errors in PHPCS.
$_POST data not unslashed before sanitization. Use wp_unslash() or similarphpcs
Detected usage of a non-sanitized input variable: $_POST['display_wpstp_post_type']phpcs
Would it be possible for this to be supported in the future? Or is there a better way to do what I am trying to do?
The text was updated successfully, but these errors were encountered:
Hm, it's Wordpress code and Code Quality is made a bit towards Drupal - it has phpcs checker with Drupal rules ( PHP Drupal CS and PHP Code security ) pre-configured. Then again it does not matter much. It has some other cool scanners you can use and it should work for Wordpress just fine.
Still, for Wordpress I've used phpro/grumphp project directly (Code Quality bases it's logic on that project) together with wp-coding-standards/wpcs
This was my grumphp.yml for one of the WP projects. It's also being built with https://lando.dev/ so it has that special EXEC_GRUMPHP_COMMAND variable:
I have this code:
( isset( $_POST['display_wpstp_post_type'] ) ) ? array_map( 'sanitize_text_field', $_POST['display_wpstp_post_type'] ) : array();
This works fine with sanitize_text_field, but I would prefer to use a custom function such as this:
And pass that function to array_map. However, doing so still presents errors in PHPCS.
Would it be possible for this to be supported in the future? Or is there a better way to do what I am trying to do?
The text was updated successfully, but these errors were encountered: