57 lines
2.1 KiB
PHP
57 lines
2.1 KiB
PHP
<?php
|
|
ob_start();
|
|
session_start();
|
|
$ruang = $_SESSION['nama'];
|
|
$id_pasien = $_GET['id_pasien'];
|
|
$register = $_GET['register'];
|
|
$nama = $_GET['nama'];
|
|
|
|
include "koneksi.php";
|
|
if (isset($_POST['tindakan'])) {
|
|
if (strpos($_POST['tindakan'], "\n")) {
|
|
$entries = explode("\n", $_POST['tindakan']);
|
|
} else {
|
|
$entries = array($_POST['tindakan']);
|
|
}
|
|
// nilai yang akan dimasukkan
|
|
$perawat_ppa = $_POST['perawat_ppa'];
|
|
if (empty($_POST['tindakan']) || empty($_POST['perawat_ppa'])) {
|
|
|
|
?>
|
|
<script language="JavaScript">
|
|
alert('data tidak lengkap, silahkan ulangi');
|
|
document.location = '/perawat/user_tindakan.php?id_pasien=<?= $id_pasien; ?>®ister=<?= $register; ?>&nama=<?= $nama; ?>';
|
|
</script>
|
|
<?php
|
|
} else { //input data ke table datapasien dalam database
|
|
//filter dari nilai null
|
|
|
|
|
|
//lakukan filter dari nilai null{//
|
|
foreach (array_filter($entries, fn ($entries) => !is_null($entries) && $entries !== '') as $e) {
|
|
|
|
// build some type of Prepared Statement to protect from SQL Injection
|
|
$input = "INSERT INTO tb_tindakan (id_pasien,tindakan,masalah,perawat_ppa,ruang) VALUES ('$id_pasien','$e','selesai','$perawat_ppa','$ruang')";
|
|
$query_input = mysqli_query($open, $input);
|
|
if ($query_input) {
|
|
//Jika Sukses
|
|
?>
|
|
<script language="JavaScript">
|
|
alert('Tindakan berhasil tersimpan');
|
|
document.location = '/user/user_tindakan.php?id_pasien=<?= $id_pasien; ?>®ister=<?= $register; ?>&nama=<?= $nama; ?>&prwppa=<?= $perawat_ppa; ?>';
|
|
</script>
|
|
<?php
|
|
} else {
|
|
//Jika Gagal
|
|
echo "catatan user tindakan tindakan gagal, Silahkan diulangi!";
|
|
}
|
|
}
|
|
}
|
|
}
|
|
//Tutup koneksi engine MySQL
|
|
mysqli_close($open);
|
|
|
|
?>
|
|
<script language="JavaScript">
|
|
document.location = '/user/user_tindakan.php?id_pasien=<?= $id_pasien; ?>®ister=<?= $register; ?>&nama=<?= $nama; ?>';
|
|
</script>
|