diff --git a/install/patches/upd_0085.php b/install/patches/upd_0085.php index e2b57e3e3918ffe1f4e2557cb6fbc811852b19c0..7d9ec85fff991c88f1fd526f3639cfe63c641267 100644 --- a/install/patches/upd_0085.php +++ b/install/patches/upd_0085.php @@ -37,16 +37,16 @@ class upd_0085 extends installer_patch_update { } elseif(preg_match('/^\w+=/', $line)) { if(preg_match('/\s/', $line)) { // warning line with env var and space! - swriteln($inst->lng('[WARNING] Cron line in file ' . $cron_file . ' contains environment variable.')); + swriteln($inst->lng("\n" . '[WARNING] Cron line in file ' . $cron_file . ' contains environment variable.' . "\n")); } } elseif(!isset($fields[5])) { // invalid line (missing user) - swriteln($inst->lng('[WARNING] Cron line in file ' . $cron_file . ' misses user field.')); + swriteln($inst->lng("\n" . '[WARNING] Cron line in file ' . $cron_file . ' misses user field.' . "\n")); } else { $check_filename = trim($fields[5]) . $check_suffix; if(substr($cron_file, -strlen($check_filename)) != $check_filename) { // warning user not equal to file name - swriteln($inst->lng('[WARNING] SUSPECT USER IN CRON FILE ' . $cron_file . '! CHECK CRON FILE FOR MALICIOUS ENTRIES!')); + swriteln($inst->lng("\n" . '[WARNING] SUSPECT USER IN CRON FILE ' . $cron_file . '! CHECK CRON FILE FOR MALICIOUS ENTRIES!' . "\n")); } } }