@@ -16,15 +16,13 @@ discard block |
||
| 16 | 16 | public static function init () { |
| 17 | 17 | if (settings::$multi) { |
| 18 | 18 | multi::init(); |
| 19 | - } |
|
| 20 | - else { |
|
| 19 | + } else { |
|
| 21 | 20 | if (lock::exist('BPT-HOOK')) { |
| 22 | 21 | receiver::telegramVerify(); |
| 23 | 22 | self::checkSecret(); |
| 24 | 23 | receiver::processUpdate(); |
| 25 | 24 | logger::write('Update received , lets process it ;)'); |
| 26 | - } |
|
| 27 | - else { |
|
| 25 | + } else { |
|
| 28 | 26 | self::processSetWebhook(); |
| 29 | 27 | } |
| 30 | 28 | } |
@@ -46,8 +44,7 @@ discard block |
||
| 46 | 44 | $res = telegram::setWebhook($url, settings::$certificate, max_connections: settings::$max_connection, allowed_updates: settings::$allowed_updates, drop_pending_updates: settings::$skip_old_updates, secret_token: $secret); |
| 47 | 45 | if (telegram::$status) { |
| 48 | 46 | logger::write('Webhook was set successfully',loggerTypes::INFO); |
| 49 | - } |
|
| 50 | - else { |
|
| 47 | + } else { |
|
| 51 | 48 | logger::write("There is some problem happened , telegram response : \n".json_encode($res),loggerTypes::ERROR); |
| 52 | 49 | BPT::exit(print_r($res,true)); |
| 53 | 50 | } |
@@ -69,8 +66,7 @@ discard block |
||
| 69 | 66 | if (is_string(settings::$certificate)) { |
| 70 | 67 | if (file_exists(settings::$certificate)) { |
| 71 | 68 | settings::$certificate = new CURLFile(settings::$certificate); |
| 72 | - } |
|
| 73 | - else { |
|
| 69 | + } else { |
|
| 74 | 70 | settings::$certificate = null; |
| 75 | 71 | } |
| 76 | 72 | } |
@@ -73,26 +73,21 @@ |
||
| 73 | 73 | if (self::handlerExist('message')) { |
| 74 | 74 | BPT::$handler->message(BPT::$update->message); |
| 75 | 75 | } |
| 76 | - } |
|
| 77 | - elseif (isset(BPT::$update->callback_query)) { |
|
| 76 | + } elseif (isset(BPT::$update->callback_query)) { |
|
| 78 | 77 | if (self::handlerExist('callback_query')) { |
| 79 | 78 | BPT::$handler->callback_query(BPT::$update->callback_query); |
| 80 | 79 | } |
| 81 | - } |
|
| 82 | - elseif (isset(BPT::$update->inline_query)) { |
|
| 80 | + } elseif (isset(BPT::$update->inline_query)) { |
|
| 83 | 81 | if (self::handlerExist('inline_query')) { |
| 84 | 82 | BPT::$handler->inline_query(BPT::$update->inline_query); |
| 85 | 83 | } |
| 86 | - } |
|
| 87 | - elseif (isset(BPT::$update->edited_message)) { |
|
| 84 | + } elseif (isset(BPT::$update->edited_message)) { |
|
| 88 | 85 | if (self::handlerExist('edited_message')) { |
| 89 | 86 | BPT::$handler->edited_message(BPT::$update->edited_message); |
| 90 | 87 | } |
| 91 | - } |
|
| 92 | - elseif (self::handlerExist('something_else')) { |
|
| 88 | + } elseif (self::handlerExist('something_else')) { |
|
| 93 | 89 | BPT::$handler->something_else(BPT::$update); |
| 94 | - } |
|
| 95 | - else { |
|
| 90 | + } else { |
|
| 96 | 91 | logger::write('Update received but handlers does not set',loggerTypes::WARNING); |
| 97 | 92 | } |
| 98 | 93 | } |
@@ -36,24 +36,20 @@ discard block |
||
| 36 | 36 | $iv = self::randomString(); |
| 37 | 37 | $output = base64_encode(openssl_encrypt($text, 'AES-256-CBC', $key, 1, $iv)); |
| 38 | 38 | return ['hash' => $output, 'key' => $key, 'iv' => $iv]; |
| 39 | - } |
|
| 40 | - elseif ($action === cryptoAction::DECRYPT) { |
|
| 39 | + } elseif ($action === cryptoAction::DECRYPT) { |
|
| 41 | 40 | if (empty($key)) { |
| 42 | 41 | logger::write("tools::crypto function used\nkey parameter is not set",loggerTypes::ERROR); |
| 43 | 42 | throw new bptException('ARGUMENT_NOT_FOUND_KEY'); |
| 44 | - } |
|
| 45 | - elseif (empty($iv)) { |
|
| 43 | + } elseif (empty($iv)) { |
|
| 46 | 44 | logger::write("tools::crypto function used\niv parameter is not set",loggerTypes::ERROR); |
| 47 | 45 | throw new bptException('ARGUMENT_NOT_FOUND_IV'); |
| 48 | 46 | } |
| 49 | 47 | return openssl_decrypt(base64_decode($text), 'AES-256-CBC', $key, 1, $iv); |
| 50 | - } |
|
| 51 | - else { |
|
| 48 | + } else { |
|
| 52 | 49 | logger::write("tools::crypto function used\naction is not right, its must be `encode` or `decode`",loggerTypes::WARNING); |
| 53 | 50 | return false; |
| 54 | 51 | } |
| 55 | - } |
|
| 56 | - else { |
|
| 52 | + } else { |
|
| 57 | 53 | logger::write("tools::crypto function used\nopenssl extension is not found , It may not be installed or enabled",loggerTypes::ERROR); |
| 58 | 54 | throw new bptException('OPENSSL_EXTENSION_MISSING'); |
| 59 | 55 | } |
@@ -75,7 +71,9 @@ discard block |
||
| 75 | 71 | $array[] = $num % 62; |
| 76 | 72 | $num = floor($num / 62); |
| 77 | 73 | } |
| 78 | - if (count($array) < 1) $array = [0]; |
|
| 74 | + if (count($array) < 1) { |
|
| 75 | + $array = [0]; |
|
| 76 | + } |
|
| 79 | 77 | foreach ($array as &$value) { |
| 80 | 78 | $value = $codes[$value]; |
| 81 | 79 | } |
@@ -17,8 +17,7 @@ discard block |
||
| 17 | 17 | if (file_exists(settings::$name.'BPT.log') && !(filesize(settings::$name.'BPT.log') > self::$log_size * 1024 * 1024)) { |
| 18 | 18 | $mode = 'a'; |
| 19 | 19 | $write = false; |
| 20 | - } |
|
| 21 | - else { |
|
| 20 | + } else { |
|
| 22 | 21 | $mode = 'w'; |
| 23 | 22 | $write = true; |
| 24 | 23 | } |
@@ -39,8 +38,7 @@ discard block |
||
| 39 | 38 | $text = date('Y/m/d H:i:s') . ( $type === loggerTypes::NONE ? " : $data\n\n" : " : ⤵\n$type : $data\n\n" ); |
| 40 | 39 | if (!is_null(self::$handler)) { |
| 41 | 40 | fwrite(self::$handler, $text); |
| 42 | - } |
|
| 43 | - else { |
|
| 41 | + } else { |
|
| 44 | 42 | self::$waited_logs[] = $text; |
| 45 | 43 | } |
| 46 | 44 | } |
@@ -35,8 +35,7 @@ discard block |
||
| 35 | 35 | $curl_handler = curl_init(settings::$base_url."/bot$token/"); |
| 36 | 36 | curl_setopt($curl_handler, CURLOPT_RETURNTRANSFER, true); |
| 37 | 37 | curl_setopt($curl_handler, CURLOPT_SSL_VERIFYPEER, false); |
| 38 | - } |
|
| 39 | - else{ |
|
| 38 | + } else{ |
|
| 40 | 39 | $token = settings::$token; |
| 41 | 40 | if (!isset(self::$curl_handler)){ |
| 42 | 41 | self::$curl_handler = curl_init(settings::$base_url."/bot$token/"); |
@@ -58,11 +57,9 @@ discard block |
||
| 58 | 57 | if (isset($data['forgot'])) { |
| 59 | 58 | curl_setopt($curl_handler, CURLOPT_TIMEOUT_MS, settings::$forgot_time); |
| 60 | 59 | unset($data['forgot']); |
| 61 | - } |
|
| 62 | - elseif ($method === 'getUpdates'){ |
|
| 60 | + } elseif ($method === 'getUpdates'){ |
|
| 63 | 61 | curl_setopt($curl_handler, CURLOPT_TIMEOUT_MS, 5000); |
| 64 | - } |
|
| 65 | - else{ |
|
| 62 | + } else{ |
|
| 66 | 63 | curl_setopt($curl_handler, CURLOPT_TIMEOUT_MS, 300); |
| 67 | 64 | } |
| 68 | 65 | } |
@@ -69,11 +69,9 @@ discard block |
||
| 69 | 69 | $value = 'bots_files/'.$value.'/'; |
| 70 | 70 | } |
| 71 | 71 | self::$$setting = $value; |
| 72 | - } |
|
| 73 | - catch (TypeError){ |
|
| 72 | + } catch (TypeError){ |
|
| 74 | 73 | logger::write("$setting setting has wrong type , its set to default value",loggerTypes::WARNING); |
| 75 | - } |
|
| 76 | - catch (Error){ |
|
| 74 | + } catch (Error){ |
|
| 77 | 75 | logger::write("$setting setting is not one of library settings",loggerTypes::WARNING); |
| 78 | 76 | } |
| 79 | 77 | } |
@@ -90,13 +88,11 @@ discard block |
||
| 90 | 88 | if (!empty(self::$receiver)) { |
| 91 | 89 | self::$receiver !== receiver::GETUPDATES ? self::webhook() : self::getUpdates(); |
| 92 | 90 | } |
| 93 | - } |
|
| 94 | - else { |
|
| 91 | + } else { |
|
| 95 | 92 | logger::write('token format is not right, check it and try again',loggerTypes::ERROR); |
| 96 | 93 | throw new bptException('TOKEN_NOT_TRUE'); |
| 97 | 94 | } |
| 98 | - } |
|
| 99 | - else { |
|
| 95 | + } else { |
|
| 100 | 96 | logger::write('You must specify token parameter in settings',loggerTypes::ERROR); |
| 101 | 97 | throw new bptException('TOKEN_NOT_FOUND'); |
| 102 | 98 | } |
@@ -153,8 +149,7 @@ discard block |
||
| 153 | 149 | private static function getUpdates(): void { |
| 154 | 150 | if (self::$handler) { |
| 155 | 151 | getUpdates::init(); |
| 156 | - } |
|
| 157 | - else { |
|
| 152 | + } else { |
|
| 158 | 153 | logger::write('You can\'t use getUpdates receiver when handler is off , use webhook or use handler',loggerTypes::ERROR); |
| 159 | 154 | throw new bptException('GETUPDATE_NEED_HANDLER'); |
| 160 | 155 | } |