From bae2d91e8cd05de36f5f64d44e67c600ac9cdb65 Mon Sep 17 00:00:00 2001 From: Ziver Koc Date: Sat, 12 Feb 2011 19:28:13 +0000 Subject: [PATCH] Changed method name --- src/zutil/io/file/FileUtil.java | 6 +++--- src/zutil/jee/upload/AjaxFileUpload.java | 4 ++-- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/src/zutil/io/file/FileUtil.java b/src/zutil/io/file/FileUtil.java index c31101a..975930d 100644 --- a/src/zutil/io/file/FileUtil.java +++ b/src/zutil/io/file/FileUtil.java @@ -249,8 +249,8 @@ public class FileUtil { * @param file is the file * @return The extension */ - public static String fileExtension(File file){ - return fileExtension(file.getName()); + public static String getFileExtension(File file){ + return getFileExtension(file.getName()); } /** @@ -259,7 +259,7 @@ public class FileUtil { * @param file is the file * @return The extension */ - public static String fileExtension(String file){ + public static String getFileExtension(String file){ if( file == null || file.lastIndexOf(".") == -1 ) return ""; return file.substring(file.lastIndexOf(".")+1, file.length()); diff --git a/src/zutil/jee/upload/AjaxFileUpload.java b/src/zutil/jee/upload/AjaxFileUpload.java index 693e086..f433a1d 100644 --- a/src/zutil/jee/upload/AjaxFileUpload.java +++ b/src/zutil/jee/upload/AjaxFileUpload.java @@ -194,8 +194,8 @@ public abstract class AjaxFileUpload extends HttpServlet { while( it.hasNext() ) { FileItemStream item = it.next(); // Is the file type allowed? - if( !item.isFormField() && !ALLOWED_EXTENSIONS.contains( FileUtil.fileExtension(item.getName()) )){ - String msg = "Filetype "+FileUtil.fileExtension(item.getName())+" is not allowed!"; + if( !item.isFormField() && !ALLOWED_EXTENSIONS.contains( FileUtil.getFileExtension(item.getName()) )){ + String msg = "Filetype "+FileUtil.getFileExtension(item.getName())+" is not allowed!"; logger.warning( msg ); listener.setStatus(Status.Error); listener.setFileName( item.getName() );