From 4ba43cc5d0100fbedc082726621c6968cc72dd88 Mon Sep 17 00:00:00 2001 From: misol Date: Thu, 28 May 2009 16:13:53 +0000 Subject: [PATCH] =?UTF-8?q?=ED=95=9C=20=EA=B8=80=EC=97=90=20=EA=B0=99?= =?UTF-8?q?=EC=9D=80=20=EC=A0=9C=EB=AA=A9=EC=9D=98=20=EC=9D=B4=EB=AF=B8?= =?UTF-8?q?=EC=A7=80=20=ED=8C=8C=EC=9D=BC=EB=8F=84=20=EB=93=B1=EB=A1=9D?= =?UTF-8?q?=ED=95=A0=20=EC=88=98=20=EC=9E=88=EA=B2=8C=20=EC=88=98=EC=A0=95?= =?UTF-8?q?(=EC=9D=B4=EC=A0=84=EC=97=90=EB=8A=94=20=EA=B0=99=EC=9D=80=20?= =?UTF-8?q?=EC=9D=B4=EB=A6=84=EC=9C=BC=EB=A1=9C=20=EB=8B=A4=EB=A5=B8=20?= =?UTF-8?q?=ED=8C=8C=EC=9D=BC=EC=9D=80=20=EB=93=B1=EB=A1=9D=EC=9D=B4=20?= =?UTF-8?q?=EB=90=98=EC=96=B4=EB=8F=84=20=EC=8B=A4=EC=A7=88=EC=A0=81?= =?UTF-8?q?=EC=9C=BC=EB=A1=9C=20=EB=93=B1=EB=A1=9D=EC=9D=B4=20=EC=95=88?= =?UTF-8?q?=EB=90=98=EC=97=88=EC=9D=8C)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit git-svn-id: http://xe-core.googlecode.com/svn/sandbox@6436 201d5d3c-b55e-5fd7-737f-ddc643e51545 --- modules/file/file.controller.php | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/modules/file/file.controller.php b/modules/file/file.controller.php index f32218de1..5db836553 100644 --- a/modules/file/file.controller.php +++ b/modules/file/file.controller.php @@ -60,9 +60,9 @@ $file_info = Context::get('Filedata'); // 정상적으로 업로드된 파일이 아니면 오류 출력 if(is_uploaded_file($file_info['tmp_name'])){ - $output = $this->insertFile($file_info, $module_srl, $upload_target_srl); - Context::set('uploaded_fileinfo',$output); - } + $output = $this->insertFile($file_info, $module_srl, $upload_target_srl); + Context::set('uploaded_fileinfo',$output); + } $this->setTemplatePath($this->module_path.'tpl'); $this->setTemplateFile('iframe'); @@ -350,7 +350,7 @@ // direct 파일에 해킹을 의심할 수 있는 확장자가 포함되어 있으면 바로 삭제함 $file_info['name'] = preg_replace('/\.(php|phtm|htm|cgi|pl|exe|jsp|asp|inc)/i', '$0-x',$file_info['name']); - $path = sprintf("./files/attach/images/%s/%s", $module_srl,getNumberingPath($upload_target_srl,3)); + $path = sprintf("./files/attach/images/%s/%s%s/", $module_srl,getNumberingPath($upload_target_srl,3),md5(crypt(rand(1000000,900000), rand(0,100)))); $filename = $path.$file_info['name']; $direct_download = 'Y'; } else {