@@ -26,66 +26,66 @@ discard block |
||
| 26 | 26 | class Google_APCCache extends Google_Cache { |
| 27 | 27 | |
| 28 | 28 | public function __construct() { |
| 29 | - if (! function_exists('apc_add')) { |
|
| 30 | - throw new Google_CacheException("Apc functions not available"); |
|
| 31 | - } |
|
| 29 | + if (! function_exists('apc_add')) { |
|
| 30 | + throw new Google_CacheException("Apc functions not available"); |
|
| 31 | + } |
|
| 32 | 32 | } |
| 33 | 33 | |
| 34 | 34 | private function isLocked($key) { |
| 35 | - if ((@apc_fetch($key . '.lock')) === false) { |
|
| 36 | - return false; |
|
| 37 | - } |
|
| 38 | - return true; |
|
| 35 | + if ((@apc_fetch($key . '.lock')) === false) { |
|
| 36 | + return false; |
|
| 37 | + } |
|
| 38 | + return true; |
|
| 39 | 39 | } |
| 40 | 40 | |
| 41 | 41 | private function createLock($key) { |
| 42 | - // the interesting thing is that this could fail if the lock was created in the meantime.. |
|
| 43 | - // but we'll ignore that out of convenience |
|
| 44 | - @apc_add($key . '.lock', '', 5); |
|
| 42 | + // the interesting thing is that this could fail if the lock was created in the meantime.. |
|
| 43 | + // but we'll ignore that out of convenience |
|
| 44 | + @apc_add($key . '.lock', '', 5); |
|
| 45 | 45 | } |
| 46 | 46 | |
| 47 | 47 | private function removeLock($key) { |
| 48 | - // suppress all warnings, if some other process removed it that's ok too |
|
| 49 | - @apc_delete($key . '.lock'); |
|
| 48 | + // suppress all warnings, if some other process removed it that's ok too |
|
| 49 | + @apc_delete($key . '.lock'); |
|
| 50 | 50 | } |
| 51 | 51 | |
| 52 | 52 | private function waitForLock($key) { |
| 53 | - // 20 x 250 = 5 seconds |
|
| 54 | - $tries = 20; |
|
| 55 | - $cnt = 0; |
|
| 56 | - do { |
|
| 57 | - // 250 ms is a long time to sleep, but it does stop the server from burning all resources on polling locks.. |
|
| 58 | - usleep(250); |
|
| 59 | - $cnt ++; |
|
| 60 | - } while ($cnt <= $tries && $this->isLocked($key)); |
|
| 61 | - if ($this->isLocked($key)) { |
|
| 62 | - // 5 seconds passed, assume the owning process died off and remove it |
|
| 63 | - $this->removeLock($key); |
|
| 64 | - } |
|
| 53 | + // 20 x 250 = 5 seconds |
|
| 54 | + $tries = 20; |
|
| 55 | + $cnt = 0; |
|
| 56 | + do { |
|
| 57 | + // 250 ms is a long time to sleep, but it does stop the server from burning all resources on polling locks.. |
|
| 58 | + usleep(250); |
|
| 59 | + $cnt ++; |
|
| 60 | + } while ($cnt <= $tries && $this->isLocked($key)); |
|
| 61 | + if ($this->isLocked($key)) { |
|
| 62 | + // 5 seconds passed, assume the owning process died off and remove it |
|
| 63 | + $this->removeLock($key); |
|
| 64 | + } |
|
| 65 | 65 | } |
| 66 | 66 | |
| 67 | 67 | /** |
| 68 | - * @inheritDoc |
|
| 69 | - */ |
|
| 68 | + * @inheritDoc |
|
| 69 | + */ |
|
| 70 | 70 | public function get($key, $expiration = false) { |
| 71 | 71 | |
| 72 | - if (($ret = @apc_fetch($key)) === false) { |
|
| 73 | - return false; |
|
| 74 | - } |
|
| 75 | - if (!$expiration || (time() - $ret['time'] > $expiration)) { |
|
| 76 | - $this->delete($key); |
|
| 77 | - return false; |
|
| 78 | - } |
|
| 79 | - return unserialize($ret['data']); |
|
| 72 | + if (($ret = @apc_fetch($key)) === false) { |
|
| 73 | + return false; |
|
| 74 | + } |
|
| 75 | + if (!$expiration || (time() - $ret['time'] > $expiration)) { |
|
| 76 | + $this->delete($key); |
|
| 77 | + return false; |
|
| 78 | + } |
|
| 79 | + return unserialize($ret['data']); |
|
| 80 | 80 | } |
| 81 | 81 | |
| 82 | 82 | /** |
| 83 | 83 | * @inheritDoc |
| 84 | 84 | */ |
| 85 | 85 | public function set($key, $value) { |
| 86 | - if (@apc_store($key, array('time' => time(), 'data' => serialize($value))) == false) { |
|
| 87 | - throw new Google_CacheException("Couldn't store data"); |
|
| 88 | - } |
|
| 86 | + if (@apc_store($key, array('time' => time(), 'data' => serialize($value))) == false) { |
|
| 87 | + throw new Google_CacheException("Couldn't store data"); |
|
| 88 | + } |
|
| 89 | 89 | } |
| 90 | 90 | |
| 91 | 91 | /** |
@@ -93,6 +93,6 @@ discard block |
||
| 93 | 93 | * @param String $key |
| 94 | 94 | */ |
| 95 | 95 | public function delete($key) { |
| 96 | - @apc_delete($key); |
|
| 96 | + @apc_delete($key); |
|
| 97 | 97 | } |
| 98 | 98 | } |
@@ -26,13 +26,13 @@ discard block |
||
| 26 | 26 | class Google_APCCache extends Google_Cache { |
| 27 | 27 | |
| 28 | 28 | public function __construct() { |
| 29 | - if (! function_exists('apc_add')) { |
|
| 29 | + if (!function_exists('apc_add')) { |
|
| 30 | 30 | throw new Google_CacheException("Apc functions not available"); |
| 31 | 31 | } |
| 32 | 32 | } |
| 33 | 33 | |
| 34 | 34 | private function isLocked($key) { |
| 35 | - if ((@apc_fetch($key . '.lock')) === false) { |
|
| 35 | + if ((@apc_fetch($key.'.lock')) === false) { |
|
| 36 | 36 | return false; |
| 37 | 37 | } |
| 38 | 38 | return true; |
@@ -41,12 +41,12 @@ discard block |
||
| 41 | 41 | private function createLock($key) { |
| 42 | 42 | // the interesting thing is that this could fail if the lock was created in the meantime.. |
| 43 | 43 | // but we'll ignore that out of convenience |
| 44 | - @apc_add($key . '.lock', '', 5); |
|
| 44 | + @apc_add($key.'.lock', '', 5); |
|
| 45 | 45 | } |
| 46 | 46 | |
| 47 | 47 | private function removeLock($key) { |
| 48 | 48 | // suppress all warnings, if some other process removed it that's ok too |
| 49 | - @apc_delete($key . '.lock'); |
|
| 49 | + @apc_delete($key.'.lock'); |
|
| 50 | 50 | } |
| 51 | 51 | |
| 52 | 52 | private function waitForLock($key) { |
@@ -56,7 +56,7 @@ discard block |
||
| 56 | 56 | do { |
| 57 | 57 | // 250 ms is a long time to sleep, but it does stop the server from burning all resources on polling locks.. |
| 58 | 58 | usleep(250); |
| 59 | - $cnt ++; |
|
| 59 | + $cnt++; |
|
| 60 | 60 | } while ($cnt <= $tries && $this->isLocked($key)); |
| 61 | 61 | if ($this->isLocked($key)) { |
| 62 | 62 | // 5 seconds passed, assume the owning process died off and remove it |
@@ -17,65 +17,65 @@ |
||
| 17 | 17 | |
| 18 | 18 | global $apiConfig; |
| 19 | 19 | $apiConfig = array( |
| 20 | - // True if objects should be returned by the service classes. |
|
| 21 | - // False if associative arrays should be returned (default behavior). |
|
| 22 | - 'use_objects' => false, |
|
| 20 | + // True if objects should be returned by the service classes. |
|
| 21 | + // False if associative arrays should be returned (default behavior). |
|
| 22 | + 'use_objects' => false, |
|
| 23 | 23 | |
| 24 | - // The application_name is included in the User-Agent HTTP header. |
|
| 25 | - 'application_name' => '', |
|
| 24 | + // The application_name is included in the User-Agent HTTP header. |
|
| 25 | + 'application_name' => '', |
|
| 26 | 26 | |
| 27 | - // OAuth2 Settings, you can get these keys at https://code.google.com/apis/console |
|
| 28 | - 'oauth2_client_id' => '', |
|
| 29 | - 'oauth2_client_secret' => '', |
|
| 30 | - 'oauth2_redirect_uri' => '', |
|
| 27 | + // OAuth2 Settings, you can get these keys at https://code.google.com/apis/console |
|
| 28 | + 'oauth2_client_id' => '', |
|
| 29 | + 'oauth2_client_secret' => '', |
|
| 30 | + 'oauth2_redirect_uri' => '', |
|
| 31 | 31 | |
| 32 | - // The developer key, you get this at https://code.google.com/apis/console |
|
| 33 | - 'developer_key' => '', |
|
| 32 | + // The developer key, you get this at https://code.google.com/apis/console |
|
| 33 | + 'developer_key' => '', |
|
| 34 | 34 | |
| 35 | - // Site name to show in the Google's OAuth 1 authentication screen. |
|
| 36 | - 'site_name' => 'www.example.org', |
|
| 35 | + // Site name to show in the Google's OAuth 1 authentication screen. |
|
| 36 | + 'site_name' => 'www.example.org', |
|
| 37 | 37 | |
| 38 | - // Which Authentication, Storage and HTTP IO classes to use. |
|
| 39 | - 'authClass' => 'Google_OAuth2', |
|
| 40 | - 'ioClass' => 'Google_CurlIO', |
|
| 41 | - 'cacheClass' => 'Google_FileCache', |
|
| 38 | + // Which Authentication, Storage and HTTP IO classes to use. |
|
| 39 | + 'authClass' => 'Google_OAuth2', |
|
| 40 | + 'ioClass' => 'Google_CurlIO', |
|
| 41 | + 'cacheClass' => 'Google_FileCache', |
|
| 42 | 42 | |
| 43 | - // Don't change these unless you're working against a special development or testing environment. |
|
| 44 | - 'basePath' => 'https://www.googleapis.com', |
|
| 43 | + // Don't change these unless you're working against a special development or testing environment. |
|
| 44 | + 'basePath' => 'https://www.googleapis.com', |
|
| 45 | 45 | |
| 46 | - // IO Class dependent configuration, you only have to configure the values |
|
| 47 | - // for the class that was configured as the ioClass above |
|
| 48 | - 'ioFileCache_directory' => |
|
| 49 | - (function_exists('sys_get_temp_dir') ? |
|
| 50 | - sys_get_temp_dir() . '/Google_Client' : |
|
| 51 | - '/tmp/Google_Client'), |
|
| 46 | + // IO Class dependent configuration, you only have to configure the values |
|
| 47 | + // for the class that was configured as the ioClass above |
|
| 48 | + 'ioFileCache_directory' => |
|
| 49 | + (function_exists('sys_get_temp_dir') ? |
|
| 50 | + sys_get_temp_dir() . '/Google_Client' : |
|
| 51 | + '/tmp/Google_Client'), |
|
| 52 | 52 | |
| 53 | - // Definition of service specific values like scopes, oauth token URLs, etc |
|
| 54 | - 'services' => array( |
|
| 55 | - 'analytics' => array('scope' => 'https://www.googleapis.com/auth/analytics.readonly'), |
|
| 56 | - 'calendar' => array( |
|
| 57 | - 'scope' => array( |
|
| 58 | - "https://www.googleapis.com/auth/calendar", |
|
| 59 | - "https://www.googleapis.com/auth/calendar.readonly", |
|
| 60 | - ) |
|
| 61 | - ), |
|
| 62 | - 'books' => array('scope' => 'https://www.googleapis.com/auth/books'), |
|
| 63 | - 'latitude' => array( |
|
| 64 | - 'scope' => array( |
|
| 65 | - 'https://www.googleapis.com/auth/latitude.all.best', |
|
| 66 | - 'https://www.googleapis.com/auth/latitude.all.city', |
|
| 67 | - ) |
|
| 68 | - ), |
|
| 69 | - 'moderator' => array('scope' => 'https://www.googleapis.com/auth/moderator'), |
|
| 70 | - 'oauth2' => array( |
|
| 71 | - 'scope' => array( |
|
| 72 | - 'https://www.googleapis.com/auth/userinfo.profile', |
|
| 73 | - 'https://www.googleapis.com/auth/userinfo.email', |
|
| 74 | - ) |
|
| 75 | - ), |
|
| 76 | - 'plus' => array('scope' => 'https://www.googleapis.com/auth/plus.login'), |
|
| 77 | - 'siteVerification' => array('scope' => 'https://www.googleapis.com/auth/siteverification'), |
|
| 78 | - 'tasks' => array('scope' => 'https://www.googleapis.com/auth/tasks'), |
|
| 79 | - 'urlshortener' => array('scope' => 'https://www.googleapis.com/auth/urlshortener') |
|
| 80 | - ) |
|
| 53 | + // Definition of service specific values like scopes, oauth token URLs, etc |
|
| 54 | + 'services' => array( |
|
| 55 | + 'analytics' => array('scope' => 'https://www.googleapis.com/auth/analytics.readonly'), |
|
| 56 | + 'calendar' => array( |
|
| 57 | + 'scope' => array( |
|
| 58 | + "https://www.googleapis.com/auth/calendar", |
|
| 59 | + "https://www.googleapis.com/auth/calendar.readonly", |
|
| 60 | + ) |
|
| 61 | + ), |
|
| 62 | + 'books' => array('scope' => 'https://www.googleapis.com/auth/books'), |
|
| 63 | + 'latitude' => array( |
|
| 64 | + 'scope' => array( |
|
| 65 | + 'https://www.googleapis.com/auth/latitude.all.best', |
|
| 66 | + 'https://www.googleapis.com/auth/latitude.all.city', |
|
| 67 | + ) |
|
| 68 | + ), |
|
| 69 | + 'moderator' => array('scope' => 'https://www.googleapis.com/auth/moderator'), |
|
| 70 | + 'oauth2' => array( |
|
| 71 | + 'scope' => array( |
|
| 72 | + 'https://www.googleapis.com/auth/userinfo.profile', |
|
| 73 | + 'https://www.googleapis.com/auth/userinfo.email', |
|
| 74 | + ) |
|
| 75 | + ), |
|
| 76 | + 'plus' => array('scope' => 'https://www.googleapis.com/auth/plus.login'), |
|
| 77 | + 'siteVerification' => array('scope' => 'https://www.googleapis.com/auth/siteverification'), |
|
| 78 | + 'tasks' => array('scope' => 'https://www.googleapis.com/auth/tasks'), |
|
| 79 | + 'urlshortener' => array('scope' => 'https://www.googleapis.com/auth/urlshortener') |
|
| 80 | + ) |
|
| 81 | 81 | ); |
@@ -47,8 +47,7 @@ |
||
| 47 | 47 | // for the class that was configured as the ioClass above |
| 48 | 48 | 'ioFileCache_directory' => |
| 49 | 49 | (function_exists('sys_get_temp_dir') ? |
| 50 | - sys_get_temp_dir() . '/Google_Client' : |
|
| 51 | - '/tmp/Google_Client'), |
|
| 50 | + sys_get_temp_dir().'/Google_Client' : '/tmp/Google_Client'), |
|
| 52 | 51 | |
| 53 | 52 | // Definition of service specific values like scopes, oauth token URLs, etc |
| 54 | 53 | 'services' => array( |
@@ -17,65 +17,65 @@ |
||
| 17 | 17 | |
| 18 | 18 | global $apiConfig; |
| 19 | 19 | $apiConfig = array( |
| 20 | - // True if objects should be returned by the service classes. |
|
| 21 | - // False if associative arrays should be returned (default behavior). |
|
| 22 | - 'use_objects' => false, |
|
| 20 | + // True if objects should be returned by the service classes. |
|
| 21 | + // False if associative arrays should be returned (default behavior). |
|
| 22 | + 'use_objects' => false, |
|
| 23 | 23 | |
| 24 | - // The application_name is included in the User-Agent HTTP header. |
|
| 25 | - 'application_name' => '', |
|
| 24 | + // The application_name is included in the User-Agent HTTP header. |
|
| 25 | + 'application_name' => '', |
|
| 26 | 26 | |
| 27 | - // OAuth2 Settings, you can get these keys at https://code.google.com/apis/console |
|
| 28 | - //'oauth2_client_id' => '', |
|
| 29 | - //'oauth2_client_secret' => '', |
|
| 30 | - //'oauth2_redirect_uri' => '', |
|
| 27 | + // OAuth2 Settings, you can get these keys at https://code.google.com/apis/console |
|
| 28 | + //'oauth2_client_id' => '', |
|
| 29 | + //'oauth2_client_secret' => '', |
|
| 30 | + //'oauth2_redirect_uri' => '', |
|
| 31 | 31 | |
| 32 | - // The developer key, you get this at https://code.google.com/apis/console |
|
| 33 | - 'developer_key' => '', |
|
| 32 | + // The developer key, you get this at https://code.google.com/apis/console |
|
| 33 | + 'developer_key' => '', |
|
| 34 | 34 | |
| 35 | - // Site name to show in the Google's OAuth 1 authentication screen. |
|
| 36 | - 'site_name' => 'www.example.org', |
|
| 35 | + // Site name to show in the Google's OAuth 1 authentication screen. |
|
| 36 | + 'site_name' => 'www.example.org', |
|
| 37 | 37 | |
| 38 | - // Which Authentication, Storage and HTTP IO classes to use. |
|
| 39 | - 'authClass' => 'Google_OAuth2', |
|
| 40 | - 'ioClass' => 'Google_CurlIO', |
|
| 41 | - 'cacheClass' => 'Google_FileCache', |
|
| 38 | + // Which Authentication, Storage and HTTP IO classes to use. |
|
| 39 | + 'authClass' => 'Google_OAuth2', |
|
| 40 | + 'ioClass' => 'Google_CurlIO', |
|
| 41 | + 'cacheClass' => 'Google_FileCache', |
|
| 42 | 42 | |
| 43 | - // Don't change these unless you're working against a special development or testing environment. |
|
| 44 | - 'basePath' => 'https://www.googleapis.com', |
|
| 43 | + // Don't change these unless you're working against a special development or testing environment. |
|
| 44 | + 'basePath' => 'https://www.googleapis.com', |
|
| 45 | 45 | |
| 46 | - // IO Class dependent configuration, you only have to configure the values |
|
| 47 | - // for the class that was configured as the ioClass above |
|
| 48 | - 'ioFileCache_directory' => |
|
| 49 | - (function_exists('get_temp_dir') ? |
|
| 50 | - get_temp_dir() . '/Google_Client' : |
|
| 51 | - '/tmp/Google_Client'), |
|
| 46 | + // IO Class dependent configuration, you only have to configure the values |
|
| 47 | + // for the class that was configured as the ioClass above |
|
| 48 | + 'ioFileCache_directory' => |
|
| 49 | + (function_exists('get_temp_dir') ? |
|
| 50 | + get_temp_dir() . '/Google_Client' : |
|
| 51 | + '/tmp/Google_Client'), |
|
| 52 | 52 | |
| 53 | - // Definition of service specific values like scopes, oauth token URLs, etc |
|
| 54 | - 'services' => array( |
|
| 55 | - 'analytics' => array('scope' => 'https://www.googleapis.com/auth/analytics.readonly'), |
|
| 56 | - 'calendar' => array( |
|
| 57 | - 'scope' => array( |
|
| 58 | - "https://www.googleapis.com/auth/calendar", |
|
| 59 | - "https://www.googleapis.com/auth/calendar.readonly", |
|
| 60 | - ) |
|
| 61 | - ), |
|
| 62 | - 'books' => array('scope' => 'https://www.googleapis.com/auth/books'), |
|
| 63 | - 'latitude' => array( |
|
| 64 | - 'scope' => array( |
|
| 65 | - 'https://www.googleapis.com/auth/latitude.all.best', |
|
| 66 | - 'https://www.googleapis.com/auth/latitude.all.city', |
|
| 67 | - ) |
|
| 68 | - ), |
|
| 69 | - 'moderator' => array('scope' => 'https://www.googleapis.com/auth/moderator'), |
|
| 70 | - 'oauth2' => array( |
|
| 71 | - 'scope' => array( |
|
| 72 | - 'https://www.googleapis.com/auth/userinfo.profile', |
|
| 73 | - 'https://www.googleapis.com/auth/userinfo.email', |
|
| 74 | - ) |
|
| 75 | - ), |
|
| 76 | - 'plus' => array('scope' => 'https://www.googleapis.com/auth/plus.me'), |
|
| 77 | - 'siteVerification' => array('scope' => 'https://www.googleapis.com/auth/siteverification'), |
|
| 78 | - 'tasks' => array('scope' => 'https://www.googleapis.com/auth/tasks'), |
|
| 79 | - 'urlshortener' => array('scope' => 'https://www.googleapis.com/auth/urlshortener') |
|
| 80 | - ) |
|
| 53 | + // Definition of service specific values like scopes, oauth token URLs, etc |
|
| 54 | + 'services' => array( |
|
| 55 | + 'analytics' => array('scope' => 'https://www.googleapis.com/auth/analytics.readonly'), |
|
| 56 | + 'calendar' => array( |
|
| 57 | + 'scope' => array( |
|
| 58 | + "https://www.googleapis.com/auth/calendar", |
|
| 59 | + "https://www.googleapis.com/auth/calendar.readonly", |
|
| 60 | + ) |
|
| 61 | + ), |
|
| 62 | + 'books' => array('scope' => 'https://www.googleapis.com/auth/books'), |
|
| 63 | + 'latitude' => array( |
|
| 64 | + 'scope' => array( |
|
| 65 | + 'https://www.googleapis.com/auth/latitude.all.best', |
|
| 66 | + 'https://www.googleapis.com/auth/latitude.all.city', |
|
| 67 | + ) |
|
| 68 | + ), |
|
| 69 | + 'moderator' => array('scope' => 'https://www.googleapis.com/auth/moderator'), |
|
| 70 | + 'oauth2' => array( |
|
| 71 | + 'scope' => array( |
|
| 72 | + 'https://www.googleapis.com/auth/userinfo.profile', |
|
| 73 | + 'https://www.googleapis.com/auth/userinfo.email', |
|
| 74 | + ) |
|
| 75 | + ), |
|
| 76 | + 'plus' => array('scope' => 'https://www.googleapis.com/auth/plus.me'), |
|
| 77 | + 'siteVerification' => array('scope' => 'https://www.googleapis.com/auth/siteverification'), |
|
| 78 | + 'tasks' => array('scope' => 'https://www.googleapis.com/auth/tasks'), |
|
| 79 | + 'urlshortener' => array('scope' => 'https://www.googleapis.com/auth/urlshortener') |
|
| 80 | + ) |
|
| 81 | 81 | ); |
| 82 | 82 | \ No newline at end of file |
@@ -47,8 +47,7 @@ |
||
| 47 | 47 | // for the class that was configured as the ioClass above |
| 48 | 48 | 'ioFileCache_directory' => |
| 49 | 49 | (function_exists('get_temp_dir') ? |
| 50 | - get_temp_dir() . '/Google_Client' : |
|
| 51 | - '/tmp/Google_Client'), |
|
| 50 | + get_temp_dir().'/Google_Client' : '/tmp/Google_Client'), |
|
| 52 | 51 | |
| 53 | 52 | // Definition of service specific values like scopes, oauth token URLs, etc |
| 54 | 53 | 'services' => array( |
@@ -53,31 +53,31 @@ discard block |
||
| 53 | 53 | * to the discretion of the caller (which is done by calling authenticate()). |
| 54 | 54 | */ |
| 55 | 55 | public function __construct() { |
| 56 | - global $apiConfig; |
|
| 56 | + global $apiConfig; |
|
| 57 | 57 | |
| 58 | - if (! empty($apiConfig['developer_key'])) { |
|
| 59 | - $this->developerKey = $apiConfig['developer_key']; |
|
| 60 | - } |
|
| 58 | + if (! empty($apiConfig['developer_key'])) { |
|
| 59 | + $this->developerKey = $apiConfig['developer_key']; |
|
| 60 | + } |
|
| 61 | 61 | |
| 62 | - if (! empty($apiConfig['oauth2_client_id'])) { |
|
| 63 | - $this->clientId = $apiConfig['oauth2_client_id']; |
|
| 64 | - } |
|
| 62 | + if (! empty($apiConfig['oauth2_client_id'])) { |
|
| 63 | + $this->clientId = $apiConfig['oauth2_client_id']; |
|
| 64 | + } |
|
| 65 | 65 | |
| 66 | - if (! empty($apiConfig['oauth2_client_secret'])) { |
|
| 67 | - $this->clientSecret = $apiConfig['oauth2_client_secret']; |
|
| 68 | - } |
|
| 66 | + if (! empty($apiConfig['oauth2_client_secret'])) { |
|
| 67 | + $this->clientSecret = $apiConfig['oauth2_client_secret']; |
|
| 68 | + } |
|
| 69 | 69 | |
| 70 | - if (! empty($apiConfig['oauth2_redirect_uri'])) { |
|
| 71 | - $this->redirectUri = $apiConfig['oauth2_redirect_uri']; |
|
| 72 | - } |
|
| 70 | + if (! empty($apiConfig['oauth2_redirect_uri'])) { |
|
| 71 | + $this->redirectUri = $apiConfig['oauth2_redirect_uri']; |
|
| 72 | + } |
|
| 73 | 73 | |
| 74 | - if (! empty($apiConfig['oauth2_access_type'])) { |
|
| 75 | - $this->accessType = $apiConfig['oauth2_access_type']; |
|
| 76 | - } |
|
| 74 | + if (! empty($apiConfig['oauth2_access_type'])) { |
|
| 75 | + $this->accessType = $apiConfig['oauth2_access_type']; |
|
| 76 | + } |
|
| 77 | 77 | |
| 78 | - if (! empty($apiConfig['oauth2_approval_prompt'])) { |
|
| 79 | - $this->approvalPrompt = $apiConfig['oauth2_approval_prompt']; |
|
| 80 | - } |
|
| 78 | + if (! empty($apiConfig['oauth2_approval_prompt'])) { |
|
| 79 | + $this->approvalPrompt = $apiConfig['oauth2_approval_prompt']; |
|
| 80 | + } |
|
| 81 | 81 | |
| 82 | 82 | } |
| 83 | 83 | |
@@ -88,37 +88,37 @@ discard block |
||
| 88 | 88 | * @return string |
| 89 | 89 | */ |
| 90 | 90 | public function authenticate($service, $code = null) { |
| 91 | - if (!$code && isset($_GET['code'])) { |
|
| 92 | - $code = $_GET['code']; |
|
| 93 | - } |
|
| 94 | - |
|
| 95 | - if ($code) { |
|
| 96 | - // We got here from the redirect from a successful authorization grant, fetch the access token |
|
| 97 | - $request = Google_Client::$io->makeRequest(new Google_HttpRequest(self::OAUTH2_TOKEN_URI, 'POST', array(), array( |
|
| 98 | - 'code' => $code, |
|
| 99 | - 'grant_type' => 'authorization_code', |
|
| 100 | - 'redirect_uri' => $this->redirectUri, |
|
| 101 | - 'client_id' => $this->clientId, |
|
| 102 | - 'client_secret' => $this->clientSecret |
|
| 103 | - ))); |
|
| 104 | - |
|
| 105 | - if ($request->getResponseHttpCode() == 200) { |
|
| 106 | - $this->setAccessToken($request->getResponseBody()); |
|
| 107 | - $this->token['created'] = time(); |
|
| 108 | - return $this->getAccessToken(); |
|
| 109 | - } else { |
|
| 110 | - $response = $request->getResponseBody(); |
|
| 111 | - $decodedResponse = json_decode($response, true); |
|
| 112 | - if ($decodedResponse != null && $decodedResponse['error']) { |
|
| 113 | - $response = $decodedResponse['error']; |
|
| 114 | - } |
|
| 115 | - throw new Google_AuthException("Error fetching OAuth2 access token, message: '$response'", $request->getResponseHttpCode()); |
|
| 116 | - } |
|
| 117 | - } |
|
| 118 | - |
|
| 119 | - $authUrl = $this->createAuthUrl($service['scope']); |
|
| 120 | - header('Location: ' . $authUrl); |
|
| 121 | - return true; |
|
| 91 | + if (!$code && isset($_GET['code'])) { |
|
| 92 | + $code = $_GET['code']; |
|
| 93 | + } |
|
| 94 | + |
|
| 95 | + if ($code) { |
|
| 96 | + // We got here from the redirect from a successful authorization grant, fetch the access token |
|
| 97 | + $request = Google_Client::$io->makeRequest(new Google_HttpRequest(self::OAUTH2_TOKEN_URI, 'POST', array(), array( |
|
| 98 | + 'code' => $code, |
|
| 99 | + 'grant_type' => 'authorization_code', |
|
| 100 | + 'redirect_uri' => $this->redirectUri, |
|
| 101 | + 'client_id' => $this->clientId, |
|
| 102 | + 'client_secret' => $this->clientSecret |
|
| 103 | + ))); |
|
| 104 | + |
|
| 105 | + if ($request->getResponseHttpCode() == 200) { |
|
| 106 | + $this->setAccessToken($request->getResponseBody()); |
|
| 107 | + $this->token['created'] = time(); |
|
| 108 | + return $this->getAccessToken(); |
|
| 109 | + } else { |
|
| 110 | + $response = $request->getResponseBody(); |
|
| 111 | + $decodedResponse = json_decode($response, true); |
|
| 112 | + if ($decodedResponse != null && $decodedResponse['error']) { |
|
| 113 | + $response = $decodedResponse['error']; |
|
| 114 | + } |
|
| 115 | + throw new Google_AuthException("Error fetching OAuth2 access token, message: '$response'", $request->getResponseHttpCode()); |
|
| 116 | + } |
|
| 117 | + } |
|
| 118 | + |
|
| 119 | + $authUrl = $this->createAuthUrl($service['scope']); |
|
| 120 | + header('Location: ' . $authUrl); |
|
| 121 | + return true; |
|
| 122 | 122 | } |
| 123 | 123 | |
| 124 | 124 | /** |
@@ -129,27 +129,27 @@ discard block |
||
| 129 | 129 | * @return string |
| 130 | 130 | */ |
| 131 | 131 | public function createAuthUrl($scope) { |
| 132 | - $params = array( |
|
| 133 | - 'response_type=code', |
|
| 134 | - 'redirect_uri=' . urlencode($this->redirectUri), |
|
| 135 | - 'client_id=' . urlencode($this->clientId), |
|
| 136 | - 'scope=' . urlencode($scope), |
|
| 137 | - 'access_type=' . urlencode($this->accessType), |
|
| 138 | - 'approval_prompt=' . urlencode($this->approvalPrompt), |
|
| 139 | - ); |
|
| 140 | - |
|
| 141 | - // if the list of scopes contains plus.login, add request_visible_actions |
|
| 142 | - // to auth URL |
|
| 143 | - if(strpos($scope, 'plus.login') && count($this->requestVisibleActions) > 0) { |
|
| 144 | - $params[] = 'request_visible_actions=' . |
|
| 145 | - urlencode($this->requestVisibleActions); |
|
| 146 | - } |
|
| 147 | - |
|
| 148 | - if (isset($this->state)) { |
|
| 149 | - $params[] = 'state=' . urlencode($this->state); |
|
| 150 | - } |
|
| 151 | - $params = implode('&', $params); |
|
| 152 | - return self::OAUTH2_AUTH_URL . "?$params"; |
|
| 132 | + $params = array( |
|
| 133 | + 'response_type=code', |
|
| 134 | + 'redirect_uri=' . urlencode($this->redirectUri), |
|
| 135 | + 'client_id=' . urlencode($this->clientId), |
|
| 136 | + 'scope=' . urlencode($scope), |
|
| 137 | + 'access_type=' . urlencode($this->accessType), |
|
| 138 | + 'approval_prompt=' . urlencode($this->approvalPrompt), |
|
| 139 | + ); |
|
| 140 | + |
|
| 141 | + // if the list of scopes contains plus.login, add request_visible_actions |
|
| 142 | + // to auth URL |
|
| 143 | + if(strpos($scope, 'plus.login') && count($this->requestVisibleActions) > 0) { |
|
| 144 | + $params[] = 'request_visible_actions=' . |
|
| 145 | + urlencode($this->requestVisibleActions); |
|
| 146 | + } |
|
| 147 | + |
|
| 148 | + if (isset($this->state)) { |
|
| 149 | + $params[] = 'state=' . urlencode($this->state); |
|
| 150 | + } |
|
| 151 | + $params = implode('&', $params); |
|
| 152 | + return self::OAUTH2_AUTH_URL . "?$params"; |
|
| 153 | 153 | } |
| 154 | 154 | |
| 155 | 155 | /** |
@@ -157,38 +157,38 @@ discard block |
||
| 157 | 157 | * @throws Google_AuthException |
| 158 | 158 | */ |
| 159 | 159 | public function setAccessToken($token) { |
| 160 | - $token = json_decode($token, true); |
|
| 161 | - if ($token == null) { |
|
| 162 | - throw new Google_AuthException('Could not json decode the token'); |
|
| 163 | - } |
|
| 164 | - if (! isset($token['access_token'])) { |
|
| 165 | - throw new Google_AuthException("Invalid token format"); |
|
| 166 | - } |
|
| 167 | - $this->token = $token; |
|
| 160 | + $token = json_decode($token, true); |
|
| 161 | + if ($token == null) { |
|
| 162 | + throw new Google_AuthException('Could not json decode the token'); |
|
| 163 | + } |
|
| 164 | + if (! isset($token['access_token'])) { |
|
| 165 | + throw new Google_AuthException("Invalid token format"); |
|
| 166 | + } |
|
| 167 | + $this->token = $token; |
|
| 168 | 168 | } |
| 169 | 169 | |
| 170 | 170 | public function getAccessToken() { |
| 171 | - return json_encode($this->token); |
|
| 171 | + return json_encode($this->token); |
|
| 172 | 172 | } |
| 173 | 173 | |
| 174 | 174 | public function setDeveloperKey($developerKey) { |
| 175 | - $this->developerKey = $developerKey; |
|
| 175 | + $this->developerKey = $developerKey; |
|
| 176 | 176 | } |
| 177 | 177 | |
| 178 | 178 | public function setState($state) { |
| 179 | - $this->state = $state; |
|
| 179 | + $this->state = $state; |
|
| 180 | 180 | } |
| 181 | 181 | |
| 182 | 182 | public function setAccessType($accessType) { |
| 183 | - $this->accessType = $accessType; |
|
| 183 | + $this->accessType = $accessType; |
|
| 184 | 184 | } |
| 185 | 185 | |
| 186 | 186 | public function setApprovalPrompt($approvalPrompt) { |
| 187 | - $this->approvalPrompt = $approvalPrompt; |
|
| 187 | + $this->approvalPrompt = $approvalPrompt; |
|
| 188 | 188 | } |
| 189 | 189 | |
| 190 | 190 | public function setAssertionCredentials(Google_AssertionCredentials $creds) { |
| 191 | - $this->assertionCredentials = $creds; |
|
| 191 | + $this->assertionCredentials = $creds; |
|
| 192 | 192 | } |
| 193 | 193 | |
| 194 | 194 | /** |
@@ -198,40 +198,40 @@ discard block |
||
| 198 | 198 | * @throws Google_AuthException |
| 199 | 199 | */ |
| 200 | 200 | public function sign(Google_HttpRequest $request) { |
| 201 | - // add the developer key to the request before signing it |
|
| 202 | - if ($this->developerKey) { |
|
| 203 | - $requestUrl = $request->getUrl(); |
|
| 204 | - $requestUrl .= (strpos($request->getUrl(), '?') === false) ? '?' : '&'; |
|
| 205 | - $requestUrl .= 'key=' . urlencode($this->developerKey); |
|
| 206 | - $request->setUrl($requestUrl); |
|
| 207 | - } |
|
| 208 | - |
|
| 209 | - // Cannot sign the request without an OAuth access token. |
|
| 210 | - if (null == $this->token && null == $this->assertionCredentials) { |
|
| 211 | - return $request; |
|
| 212 | - } |
|
| 213 | - |
|
| 214 | - // Check if the token is set to expire in the next 30 seconds |
|
| 215 | - // (or has already expired). |
|
| 216 | - if ($this->isAccessTokenExpired()) { |
|
| 217 | - if ($this->assertionCredentials) { |
|
| 218 | - $this->refreshTokenWithAssertion(); |
|
| 219 | - } else { |
|
| 220 | - if (! array_key_exists('refresh_token', $this->token)) { |
|
| 221 | - throw new Google_AuthException("The OAuth 2.0 access token has expired, " |
|
| 222 | - . "and a refresh token is not available. Refresh tokens are not " |
|
| 223 | - . "returned for responses that were auto-approved."); |
|
| 224 | - } |
|
| 225 | - $this->refreshToken($this->token['refresh_token']); |
|
| 226 | - } |
|
| 227 | - } |
|
| 228 | - |
|
| 229 | - // Add the OAuth2 header to the request |
|
| 230 | - $request->setRequestHeaders( |
|
| 231 | - array('Authorization' => 'Bearer ' . $this->token['access_token']) |
|
| 232 | - ); |
|
| 233 | - |
|
| 234 | - return $request; |
|
| 201 | + // add the developer key to the request before signing it |
|
| 202 | + if ($this->developerKey) { |
|
| 203 | + $requestUrl = $request->getUrl(); |
|
| 204 | + $requestUrl .= (strpos($request->getUrl(), '?') === false) ? '?' : '&'; |
|
| 205 | + $requestUrl .= 'key=' . urlencode($this->developerKey); |
|
| 206 | + $request->setUrl($requestUrl); |
|
| 207 | + } |
|
| 208 | + |
|
| 209 | + // Cannot sign the request without an OAuth access token. |
|
| 210 | + if (null == $this->token && null == $this->assertionCredentials) { |
|
| 211 | + return $request; |
|
| 212 | + } |
|
| 213 | + |
|
| 214 | + // Check if the token is set to expire in the next 30 seconds |
|
| 215 | + // (or has already expired). |
|
| 216 | + if ($this->isAccessTokenExpired()) { |
|
| 217 | + if ($this->assertionCredentials) { |
|
| 218 | + $this->refreshTokenWithAssertion(); |
|
| 219 | + } else { |
|
| 220 | + if (! array_key_exists('refresh_token', $this->token)) { |
|
| 221 | + throw new Google_AuthException("The OAuth 2.0 access token has expired, " |
|
| 222 | + . "and a refresh token is not available. Refresh tokens are not " |
|
| 223 | + . "returned for responses that were auto-approved."); |
|
| 224 | + } |
|
| 225 | + $this->refreshToken($this->token['refresh_token']); |
|
| 226 | + } |
|
| 227 | + } |
|
| 228 | + |
|
| 229 | + // Add the OAuth2 header to the request |
|
| 230 | + $request->setRequestHeaders( |
|
| 231 | + array('Authorization' => 'Bearer ' . $this->token['access_token']) |
|
| 232 | + ); |
|
| 233 | + |
|
| 234 | + return $request; |
|
| 235 | 235 | } |
| 236 | 236 | |
| 237 | 237 | /** |
@@ -240,12 +240,12 @@ discard block |
||
| 240 | 240 | * @return void |
| 241 | 241 | */ |
| 242 | 242 | public function refreshToken($refreshToken) { |
| 243 | - $this->refreshTokenRequest(array( |
|
| 244 | - 'client_id' => $this->clientId, |
|
| 245 | - 'client_secret' => $this->clientSecret, |
|
| 246 | - 'refresh_token' => $refreshToken, |
|
| 247 | - 'grant_type' => 'refresh_token' |
|
| 248 | - )); |
|
| 243 | + $this->refreshTokenRequest(array( |
|
| 244 | + 'client_id' => $this->clientId, |
|
| 245 | + 'client_secret' => $this->clientSecret, |
|
| 246 | + 'refresh_token' => $refreshToken, |
|
| 247 | + 'grant_type' => 'refresh_token' |
|
| 248 | + )); |
|
| 249 | 249 | } |
| 250 | 250 | |
| 251 | 251 | /** |
@@ -254,61 +254,61 @@ discard block |
||
| 254 | 254 | * @return void |
| 255 | 255 | */ |
| 256 | 256 | public function refreshTokenWithAssertion($assertionCredentials = null) { |
| 257 | - if (!$assertionCredentials) { |
|
| 258 | - $assertionCredentials = $this->assertionCredentials; |
|
| 259 | - } |
|
| 260 | - |
|
| 261 | - $this->refreshTokenRequest(array( |
|
| 262 | - 'grant_type' => 'assertion', |
|
| 263 | - 'assertion_type' => $assertionCredentials->assertionType, |
|
| 264 | - 'assertion' => $assertionCredentials->generateAssertion(), |
|
| 265 | - )); |
|
| 257 | + if (!$assertionCredentials) { |
|
| 258 | + $assertionCredentials = $this->assertionCredentials; |
|
| 259 | + } |
|
| 260 | + |
|
| 261 | + $this->refreshTokenRequest(array( |
|
| 262 | + 'grant_type' => 'assertion', |
|
| 263 | + 'assertion_type' => $assertionCredentials->assertionType, |
|
| 264 | + 'assertion' => $assertionCredentials->generateAssertion(), |
|
| 265 | + )); |
|
| 266 | 266 | } |
| 267 | 267 | |
| 268 | 268 | private function refreshTokenRequest($params) { |
| 269 | - $http = new Google_HttpRequest(self::OAUTH2_TOKEN_URI, 'POST', array(), $params); |
|
| 270 | - $request = Google_Client::$io->makeRequest($http); |
|
| 271 | - |
|
| 272 | - $code = $request->getResponseHttpCode(); |
|
| 273 | - $body = $request->getResponseBody(); |
|
| 274 | - if (200 == $code) { |
|
| 275 | - $token = json_decode($body, true); |
|
| 276 | - if ($token == null) { |
|
| 277 | - throw new Google_AuthException("Could not json decode the access token"); |
|
| 278 | - } |
|
| 279 | - |
|
| 280 | - if (! isset($token['access_token']) || ! isset($token['expires_in'])) { |
|
| 281 | - throw new Google_AuthException("Invalid token format"); |
|
| 282 | - } |
|
| 283 | - |
|
| 284 | - $this->token['access_token'] = $token['access_token']; |
|
| 285 | - $this->token['expires_in'] = $token['expires_in']; |
|
| 286 | - $this->token['created'] = time(); |
|
| 287 | - } else { |
|
| 288 | - throw new Google_AuthException("Error refreshing the OAuth2 token, message: '$body'", $code); |
|
| 289 | - } |
|
| 269 | + $http = new Google_HttpRequest(self::OAUTH2_TOKEN_URI, 'POST', array(), $params); |
|
| 270 | + $request = Google_Client::$io->makeRequest($http); |
|
| 271 | + |
|
| 272 | + $code = $request->getResponseHttpCode(); |
|
| 273 | + $body = $request->getResponseBody(); |
|
| 274 | + if (200 == $code) { |
|
| 275 | + $token = json_decode($body, true); |
|
| 276 | + if ($token == null) { |
|
| 277 | + throw new Google_AuthException("Could not json decode the access token"); |
|
| 278 | + } |
|
| 279 | + |
|
| 280 | + if (! isset($token['access_token']) || ! isset($token['expires_in'])) { |
|
| 281 | + throw new Google_AuthException("Invalid token format"); |
|
| 282 | + } |
|
| 283 | + |
|
| 284 | + $this->token['access_token'] = $token['access_token']; |
|
| 285 | + $this->token['expires_in'] = $token['expires_in']; |
|
| 286 | + $this->token['created'] = time(); |
|
| 287 | + } else { |
|
| 288 | + throw new Google_AuthException("Error refreshing the OAuth2 token, message: '$body'", $code); |
|
| 289 | + } |
|
| 290 | 290 | } |
| 291 | 291 | |
| 292 | - /** |
|
| 293 | - * Revoke an OAuth2 access token or refresh token. This method will revoke the current access |
|
| 294 | - * token, if a token isn't provided. |
|
| 295 | - * @throws Google_AuthException |
|
| 296 | - * @param string|null $token The token (access token or a refresh token) that should be revoked. |
|
| 297 | - * @return boolean Returns True if the revocation was successful, otherwise False. |
|
| 298 | - */ |
|
| 292 | + /** |
|
| 293 | + * Revoke an OAuth2 access token or refresh token. This method will revoke the current access |
|
| 294 | + * token, if a token isn't provided. |
|
| 295 | + * @throws Google_AuthException |
|
| 296 | + * @param string|null $token The token (access token or a refresh token) that should be revoked. |
|
| 297 | + * @return boolean Returns True if the revocation was successful, otherwise False. |
|
| 298 | + */ |
|
| 299 | 299 | public function revokeToken($token = null) { |
| 300 | - if (!$token) { |
|
| 301 | - $token = $this->token['access_token']; |
|
| 302 | - } |
|
| 303 | - $request = new Google_HttpRequest(self::OAUTH2_REVOKE_URI, 'POST', array(), "token=$token"); |
|
| 304 | - $response = Google_Client::$io->makeRequest($request); |
|
| 305 | - $code = $response->getResponseHttpCode(); |
|
| 306 | - if ($code == 200) { |
|
| 307 | - $this->token = null; |
|
| 308 | - return true; |
|
| 309 | - } |
|
| 310 | - |
|
| 311 | - return false; |
|
| 300 | + if (!$token) { |
|
| 301 | + $token = $this->token['access_token']; |
|
| 302 | + } |
|
| 303 | + $request = new Google_HttpRequest(self::OAUTH2_REVOKE_URI, 'POST', array(), "token=$token"); |
|
| 304 | + $response = Google_Client::$io->makeRequest($request); |
|
| 305 | + $code = $response->getResponseHttpCode(); |
|
| 306 | + if ($code == 200) { |
|
| 307 | + $this->token = null; |
|
| 308 | + return true; |
|
| 309 | + } |
|
| 310 | + |
|
| 311 | + return false; |
|
| 312 | 312 | } |
| 313 | 313 | |
| 314 | 314 | /** |
@@ -316,34 +316,34 @@ discard block |
||
| 316 | 316 | * @return bool Returns True if the access_token is expired. |
| 317 | 317 | */ |
| 318 | 318 | public function isAccessTokenExpired() { |
| 319 | - if (null == $this->token) { |
|
| 320 | - return true; |
|
| 321 | - } |
|
| 319 | + if (null == $this->token) { |
|
| 320 | + return true; |
|
| 321 | + } |
|
| 322 | 322 | |
| 323 | - // If the token is set to expire in the next 30 seconds. |
|
| 324 | - $expired = ($this->token['created'] |
|
| 325 | - + ($this->token['expires_in'] - 30)) < time(); |
|
| 323 | + // If the token is set to expire in the next 30 seconds. |
|
| 324 | + $expired = ($this->token['created'] |
|
| 325 | + + ($this->token['expires_in'] - 30)) < time(); |
|
| 326 | 326 | |
| 327 | - return $expired; |
|
| 327 | + return $expired; |
|
| 328 | 328 | } |
| 329 | 329 | |
| 330 | 330 | // Gets federated sign-on certificates to use for verifying identity tokens. |
| 331 | 331 | // Returns certs as array structure, where keys are key ids, and values |
| 332 | 332 | // are PEM encoded certificates. |
| 333 | 333 | private function getFederatedSignOnCerts() { |
| 334 | - // This relies on makeRequest caching certificate responses. |
|
| 335 | - $request = Google_Client::$io->makeRequest(new Google_HttpRequest( |
|
| 336 | - self::OAUTH2_FEDERATED_SIGNON_CERTS_URL)); |
|
| 337 | - if ($request->getResponseHttpCode() == 200) { |
|
| 338 | - $certs = json_decode($request->getResponseBody(), true); |
|
| 339 | - if ($certs) { |
|
| 340 | - return $certs; |
|
| 341 | - } |
|
| 342 | - } |
|
| 343 | - throw new Google_AuthException( |
|
| 344 | - "Failed to retrieve verification certificates: '" . |
|
| 345 | - $request->getResponseBody() . "'.", |
|
| 346 | - $request->getResponseHttpCode()); |
|
| 334 | + // This relies on makeRequest caching certificate responses. |
|
| 335 | + $request = Google_Client::$io->makeRequest(new Google_HttpRequest( |
|
| 336 | + self::OAUTH2_FEDERATED_SIGNON_CERTS_URL)); |
|
| 337 | + if ($request->getResponseHttpCode() == 200) { |
|
| 338 | + $certs = json_decode($request->getResponseBody(), true); |
|
| 339 | + if ($certs) { |
|
| 340 | + return $certs; |
|
| 341 | + } |
|
| 342 | + } |
|
| 343 | + throw new Google_AuthException( |
|
| 344 | + "Failed to retrieve verification certificates: '" . |
|
| 345 | + $request->getResponseBody() . "'.", |
|
| 346 | + $request->getResponseHttpCode()); |
|
| 347 | 347 | } |
| 348 | 348 | |
| 349 | 349 | /** |
@@ -357,97 +357,97 @@ discard block |
||
| 357 | 357 | * @return Google_LoginTicket |
| 358 | 358 | */ |
| 359 | 359 | public function verifyIdToken($id_token = null, $audience = null) { |
| 360 | - if (!$id_token) { |
|
| 361 | - $id_token = $this->token['id_token']; |
|
| 362 | - } |
|
| 363 | - |
|
| 364 | - $certs = $this->getFederatedSignonCerts(); |
|
| 365 | - if (!$audience) { |
|
| 366 | - $audience = $this->clientId; |
|
| 367 | - } |
|
| 368 | - return $this->verifySignedJwtWithCerts($id_token, $certs, $audience); |
|
| 360 | + if (!$id_token) { |
|
| 361 | + $id_token = $this->token['id_token']; |
|
| 362 | + } |
|
| 363 | + |
|
| 364 | + $certs = $this->getFederatedSignonCerts(); |
|
| 365 | + if (!$audience) { |
|
| 366 | + $audience = $this->clientId; |
|
| 367 | + } |
|
| 368 | + return $this->verifySignedJwtWithCerts($id_token, $certs, $audience); |
|
| 369 | 369 | } |
| 370 | 370 | |
| 371 | 371 | // Verifies the id token, returns the verified token contents. |
| 372 | 372 | // Visible for testing. |
| 373 | 373 | function verifySignedJwtWithCerts($jwt, $certs, $required_audience) { |
| 374 | - $segments = explode(".", $jwt); |
|
| 375 | - if (count($segments) != 3) { |
|
| 376 | - throw new Google_AuthException("Wrong number of segments in token: $jwt"); |
|
| 377 | - } |
|
| 378 | - $signed = $segments[0] . "." . $segments[1]; |
|
| 379 | - $signature = Google_Utils::urlSafeB64Decode($segments[2]); |
|
| 380 | - |
|
| 381 | - // Parse envelope. |
|
| 382 | - $envelope = json_decode(Google_Utils::urlSafeB64Decode($segments[0]), true); |
|
| 383 | - if (!$envelope) { |
|
| 384 | - throw new Google_AuthException("Can't parse token envelope: " . $segments[0]); |
|
| 385 | - } |
|
| 386 | - |
|
| 387 | - // Parse token |
|
| 388 | - $json_body = Google_Utils::urlSafeB64Decode($segments[1]); |
|
| 389 | - $payload = json_decode($json_body, true); |
|
| 390 | - if (!$payload) { |
|
| 391 | - throw new Google_AuthException("Can't parse token payload: " . $segments[1]); |
|
| 392 | - } |
|
| 393 | - |
|
| 394 | - // Check signature |
|
| 395 | - $verified = false; |
|
| 396 | - foreach ($certs as $keyName => $pem) { |
|
| 397 | - $public_key = new Google_PemVerifier($pem); |
|
| 398 | - if ($public_key->verify($signed, $signature)) { |
|
| 399 | - $verified = true; |
|
| 400 | - break; |
|
| 401 | - } |
|
| 402 | - } |
|
| 403 | - |
|
| 404 | - if (!$verified) { |
|
| 405 | - throw new Google_AuthException("Invalid token signature: $jwt"); |
|
| 406 | - } |
|
| 407 | - |
|
| 408 | - // Check issued-at timestamp |
|
| 409 | - $iat = 0; |
|
| 410 | - if (array_key_exists("iat", $payload)) { |
|
| 411 | - $iat = $payload["iat"]; |
|
| 412 | - } |
|
| 413 | - if (!$iat) { |
|
| 414 | - throw new Google_AuthException("No issue time in token: $json_body"); |
|
| 415 | - } |
|
| 416 | - $earliest = $iat - self::CLOCK_SKEW_SECS; |
|
| 417 | - |
|
| 418 | - // Check expiration timestamp |
|
| 419 | - $now = time(); |
|
| 420 | - $exp = 0; |
|
| 421 | - if (array_key_exists("exp", $payload)) { |
|
| 422 | - $exp = $payload["exp"]; |
|
| 423 | - } |
|
| 424 | - if (!$exp) { |
|
| 425 | - throw new Google_AuthException("No expiration time in token: $json_body"); |
|
| 426 | - } |
|
| 427 | - if ($exp >= $now + self::MAX_TOKEN_LIFETIME_SECS) { |
|
| 428 | - throw new Google_AuthException( |
|
| 429 | - "Expiration time too far in future: $json_body"); |
|
| 430 | - } |
|
| 431 | - |
|
| 432 | - $latest = $exp + self::CLOCK_SKEW_SECS; |
|
| 433 | - if ($now < $earliest) { |
|
| 434 | - throw new Google_AuthException( |
|
| 435 | - "Token used too early, $now < $earliest: $json_body"); |
|
| 436 | - } |
|
| 437 | - if ($now > $latest) { |
|
| 438 | - throw new Google_AuthException( |
|
| 439 | - "Token used too late, $now > $latest: $json_body"); |
|
| 440 | - } |
|
| 441 | - |
|
| 442 | - // TODO(beaton): check issuer field? |
|
| 443 | - |
|
| 444 | - // Check audience |
|
| 445 | - $aud = $payload["aud"]; |
|
| 446 | - if ($aud != $required_audience) { |
|
| 447 | - throw new Google_AuthException("Wrong recipient, $aud != $required_audience: $json_body"); |
|
| 448 | - } |
|
| 449 | - |
|
| 450 | - // All good. |
|
| 451 | - return new Google_LoginTicket($envelope, $payload); |
|
| 374 | + $segments = explode(".", $jwt); |
|
| 375 | + if (count($segments) != 3) { |
|
| 376 | + throw new Google_AuthException("Wrong number of segments in token: $jwt"); |
|
| 377 | + } |
|
| 378 | + $signed = $segments[0] . "." . $segments[1]; |
|
| 379 | + $signature = Google_Utils::urlSafeB64Decode($segments[2]); |
|
| 380 | + |
|
| 381 | + // Parse envelope. |
|
| 382 | + $envelope = json_decode(Google_Utils::urlSafeB64Decode($segments[0]), true); |
|
| 383 | + if (!$envelope) { |
|
| 384 | + throw new Google_AuthException("Can't parse token envelope: " . $segments[0]); |
|
| 385 | + } |
|
| 386 | + |
|
| 387 | + // Parse token |
|
| 388 | + $json_body = Google_Utils::urlSafeB64Decode($segments[1]); |
|
| 389 | + $payload = json_decode($json_body, true); |
|
| 390 | + if (!$payload) { |
|
| 391 | + throw new Google_AuthException("Can't parse token payload: " . $segments[1]); |
|
| 392 | + } |
|
| 393 | + |
|
| 394 | + // Check signature |
|
| 395 | + $verified = false; |
|
| 396 | + foreach ($certs as $keyName => $pem) { |
|
| 397 | + $public_key = new Google_PemVerifier($pem); |
|
| 398 | + if ($public_key->verify($signed, $signature)) { |
|
| 399 | + $verified = true; |
|
| 400 | + break; |
|
| 401 | + } |
|
| 402 | + } |
|
| 403 | + |
|
| 404 | + if (!$verified) { |
|
| 405 | + throw new Google_AuthException("Invalid token signature: $jwt"); |
|
| 406 | + } |
|
| 407 | + |
|
| 408 | + // Check issued-at timestamp |
|
| 409 | + $iat = 0; |
|
| 410 | + if (array_key_exists("iat", $payload)) { |
|
| 411 | + $iat = $payload["iat"]; |
|
| 412 | + } |
|
| 413 | + if (!$iat) { |
|
| 414 | + throw new Google_AuthException("No issue time in token: $json_body"); |
|
| 415 | + } |
|
| 416 | + $earliest = $iat - self::CLOCK_SKEW_SECS; |
|
| 417 | + |
|
| 418 | + // Check expiration timestamp |
|
| 419 | + $now = time(); |
|
| 420 | + $exp = 0; |
|
| 421 | + if (array_key_exists("exp", $payload)) { |
|
| 422 | + $exp = $payload["exp"]; |
|
| 423 | + } |
|
| 424 | + if (!$exp) { |
|
| 425 | + throw new Google_AuthException("No expiration time in token: $json_body"); |
|
| 426 | + } |
|
| 427 | + if ($exp >= $now + self::MAX_TOKEN_LIFETIME_SECS) { |
|
| 428 | + throw new Google_AuthException( |
|
| 429 | + "Expiration time too far in future: $json_body"); |
|
| 430 | + } |
|
| 431 | + |
|
| 432 | + $latest = $exp + self::CLOCK_SKEW_SECS; |
|
| 433 | + if ($now < $earliest) { |
|
| 434 | + throw new Google_AuthException( |
|
| 435 | + "Token used too early, $now < $earliest: $json_body"); |
|
| 436 | + } |
|
| 437 | + if ($now > $latest) { |
|
| 438 | + throw new Google_AuthException( |
|
| 439 | + "Token used too late, $now > $latest: $json_body"); |
|
| 440 | + } |
|
| 441 | + |
|
| 442 | + // TODO(beaton): check issuer field? |
|
| 443 | + |
|
| 444 | + // Check audience |
|
| 445 | + $aud = $payload["aud"]; |
|
| 446 | + if ($aud != $required_audience) { |
|
| 447 | + throw new Google_AuthException("Wrong recipient, $aud != $required_audience: $json_body"); |
|
| 448 | + } |
|
| 449 | + |
|
| 450 | + // All good. |
|
| 451 | + return new Google_LoginTicket($envelope, $payload); |
|
| 452 | 452 | } |
| 453 | 453 | } |
@@ -17,7 +17,7 @@ discard block |
||
| 17 | 17 | |
| 18 | 18 | require_once "Google_Verifier.php"; |
| 19 | 19 | require_once "Google_LoginTicket.php"; |
| 20 | -require_once GA_API_Path. "service/Google_Utils.php"; |
|
| 20 | +require_once GA_API_Path."service/Google_Utils.php"; |
|
| 21 | 21 | |
| 22 | 22 | /** |
| 23 | 23 | * Authentication class that deals with the OAuth 2 web-server authentication flow |
@@ -55,27 +55,27 @@ discard block |
||
| 55 | 55 | public function __construct() { |
| 56 | 56 | global $apiConfig; |
| 57 | 57 | |
| 58 | - if (! empty($apiConfig['developer_key'])) { |
|
| 58 | + if (!empty($apiConfig['developer_key'])) { |
|
| 59 | 59 | $this->developerKey = $apiConfig['developer_key']; |
| 60 | 60 | } |
| 61 | 61 | |
| 62 | - if (! empty($apiConfig['oauth2_client_id'])) { |
|
| 62 | + if (!empty($apiConfig['oauth2_client_id'])) { |
|
| 63 | 63 | $this->clientId = $apiConfig['oauth2_client_id']; |
| 64 | 64 | } |
| 65 | 65 | |
| 66 | - if (! empty($apiConfig['oauth2_client_secret'])) { |
|
| 66 | + if (!empty($apiConfig['oauth2_client_secret'])) { |
|
| 67 | 67 | $this->clientSecret = $apiConfig['oauth2_client_secret']; |
| 68 | 68 | } |
| 69 | 69 | |
| 70 | - if (! empty($apiConfig['oauth2_redirect_uri'])) { |
|
| 70 | + if (!empty($apiConfig['oauth2_redirect_uri'])) { |
|
| 71 | 71 | $this->redirectUri = $apiConfig['oauth2_redirect_uri']; |
| 72 | 72 | } |
| 73 | 73 | |
| 74 | - if (! empty($apiConfig['oauth2_access_type'])) { |
|
| 74 | + if (!empty($apiConfig['oauth2_access_type'])) { |
|
| 75 | 75 | $this->accessType = $apiConfig['oauth2_access_type']; |
| 76 | 76 | } |
| 77 | 77 | |
| 78 | - if (! empty($apiConfig['oauth2_approval_prompt'])) { |
|
| 78 | + if (!empty($apiConfig['oauth2_approval_prompt'])) { |
|
| 79 | 79 | $this->approvalPrompt = $apiConfig['oauth2_approval_prompt']; |
| 80 | 80 | } |
| 81 | 81 | |
@@ -117,7 +117,7 @@ discard block |
||
| 117 | 117 | } |
| 118 | 118 | |
| 119 | 119 | $authUrl = $this->createAuthUrl($service['scope']); |
| 120 | - header('Location: ' . $authUrl); |
|
| 120 | + header('Location: '.$authUrl); |
|
| 121 | 121 | return true; |
| 122 | 122 | } |
| 123 | 123 | |
@@ -131,25 +131,25 @@ discard block |
||
| 131 | 131 | public function createAuthUrl($scope) { |
| 132 | 132 | $params = array( |
| 133 | 133 | 'response_type=code', |
| 134 | - 'redirect_uri=' . urlencode($this->redirectUri), |
|
| 135 | - 'client_id=' . urlencode($this->clientId), |
|
| 136 | - 'scope=' . urlencode($scope), |
|
| 137 | - 'access_type=' . urlencode($this->accessType), |
|
| 138 | - 'approval_prompt=' . urlencode($this->approvalPrompt), |
|
| 134 | + 'redirect_uri='.urlencode($this->redirectUri), |
|
| 135 | + 'client_id='.urlencode($this->clientId), |
|
| 136 | + 'scope='.urlencode($scope), |
|
| 137 | + 'access_type='.urlencode($this->accessType), |
|
| 138 | + 'approval_prompt='.urlencode($this->approvalPrompt), |
|
| 139 | 139 | ); |
| 140 | 140 | |
| 141 | 141 | // if the list of scopes contains plus.login, add request_visible_actions |
| 142 | 142 | // to auth URL |
| 143 | - if(strpos($scope, 'plus.login') && count($this->requestVisibleActions) > 0) { |
|
| 144 | - $params[] = 'request_visible_actions=' . |
|
| 143 | + if (strpos($scope, 'plus.login') && count($this->requestVisibleActions) > 0) { |
|
| 144 | + $params[] = 'request_visible_actions='. |
|
| 145 | 145 | urlencode($this->requestVisibleActions); |
| 146 | 146 | } |
| 147 | 147 | |
| 148 | 148 | if (isset($this->state)) { |
| 149 | - $params[] = 'state=' . urlencode($this->state); |
|
| 149 | + $params[] = 'state='.urlencode($this->state); |
|
| 150 | 150 | } |
| 151 | 151 | $params = implode('&', $params); |
| 152 | - return self::OAUTH2_AUTH_URL . "?$params"; |
|
| 152 | + return self::OAUTH2_AUTH_URL."?$params"; |
|
| 153 | 153 | } |
| 154 | 154 | |
| 155 | 155 | /** |
@@ -161,7 +161,7 @@ discard block |
||
| 161 | 161 | if ($token == null) { |
| 162 | 162 | throw new Google_AuthException('Could not json decode the token'); |
| 163 | 163 | } |
| 164 | - if (! isset($token['access_token'])) { |
|
| 164 | + if (!isset($token['access_token'])) { |
|
| 165 | 165 | throw new Google_AuthException("Invalid token format"); |
| 166 | 166 | } |
| 167 | 167 | $this->token = $token; |
@@ -202,7 +202,7 @@ discard block |
||
| 202 | 202 | if ($this->developerKey) { |
| 203 | 203 | $requestUrl = $request->getUrl(); |
| 204 | 204 | $requestUrl .= (strpos($request->getUrl(), '?') === false) ? '?' : '&'; |
| 205 | - $requestUrl .= 'key=' . urlencode($this->developerKey); |
|
| 205 | + $requestUrl .= 'key='.urlencode($this->developerKey); |
|
| 206 | 206 | $request->setUrl($requestUrl); |
| 207 | 207 | } |
| 208 | 208 | |
@@ -217,7 +217,7 @@ discard block |
||
| 217 | 217 | if ($this->assertionCredentials) { |
| 218 | 218 | $this->refreshTokenWithAssertion(); |
| 219 | 219 | } else { |
| 220 | - if (! array_key_exists('refresh_token', $this->token)) { |
|
| 220 | + if (!array_key_exists('refresh_token', $this->token)) { |
|
| 221 | 221 | throw new Google_AuthException("The OAuth 2.0 access token has expired, " |
| 222 | 222 | . "and a refresh token is not available. Refresh tokens are not " |
| 223 | 223 | . "returned for responses that were auto-approved."); |
@@ -228,7 +228,7 @@ discard block |
||
| 228 | 228 | |
| 229 | 229 | // Add the OAuth2 header to the request |
| 230 | 230 | $request->setRequestHeaders( |
| 231 | - array('Authorization' => 'Bearer ' . $this->token['access_token']) |
|
| 231 | + array('Authorization' => 'Bearer '.$this->token['access_token']) |
|
| 232 | 232 | ); |
| 233 | 233 | |
| 234 | 234 | return $request; |
@@ -277,7 +277,7 @@ discard block |
||
| 277 | 277 | throw new Google_AuthException("Could not json decode the access token"); |
| 278 | 278 | } |
| 279 | 279 | |
| 280 | - if (! isset($token['access_token']) || ! isset($token['expires_in'])) { |
|
| 280 | + if (!isset($token['access_token']) || !isset($token['expires_in'])) { |
|
| 281 | 281 | throw new Google_AuthException("Invalid token format"); |
| 282 | 282 | } |
| 283 | 283 | |
@@ -341,8 +341,8 @@ discard block |
||
| 341 | 341 | } |
| 342 | 342 | } |
| 343 | 343 | throw new Google_AuthException( |
| 344 | - "Failed to retrieve verification certificates: '" . |
|
| 345 | - $request->getResponseBody() . "'.", |
|
| 344 | + "Failed to retrieve verification certificates: '". |
|
| 345 | + $request->getResponseBody()."'.", |
|
| 346 | 346 | $request->getResponseHttpCode()); |
| 347 | 347 | } |
| 348 | 348 | |
@@ -375,20 +375,20 @@ discard block |
||
| 375 | 375 | if (count($segments) != 3) { |
| 376 | 376 | throw new Google_AuthException("Wrong number of segments in token: $jwt"); |
| 377 | 377 | } |
| 378 | - $signed = $segments[0] . "." . $segments[1]; |
|
| 378 | + $signed = $segments[0].".".$segments[1]; |
|
| 379 | 379 | $signature = Google_Utils::urlSafeB64Decode($segments[2]); |
| 380 | 380 | |
| 381 | 381 | // Parse envelope. |
| 382 | 382 | $envelope = json_decode(Google_Utils::urlSafeB64Decode($segments[0]), true); |
| 383 | 383 | if (!$envelope) { |
| 384 | - throw new Google_AuthException("Can't parse token envelope: " . $segments[0]); |
|
| 384 | + throw new Google_AuthException("Can't parse token envelope: ".$segments[0]); |
|
| 385 | 385 | } |
| 386 | 386 | |
| 387 | 387 | // Parse token |
| 388 | 388 | $json_body = Google_Utils::urlSafeB64Decode($segments[1]); |
| 389 | 389 | $payload = json_decode($json_body, true); |
| 390 | 390 | if (!$payload) { |
| 391 | - throw new Google_AuthException("Can't parse token payload: " . $segments[1]); |
|
| 391 | + throw new Google_AuthException("Can't parse token payload: ".$segments[1]); |
|
| 392 | 392 | } |
| 393 | 393 | |
| 394 | 394 | // Check signature |
@@ -24,10 +24,10 @@ discard block |
||
| 24 | 24 | public $key = null; |
| 25 | 25 | |
| 26 | 26 | public function __construct() { |
| 27 | - global $apiConfig; |
|
| 28 | - if (!empty($apiConfig['developer_key'])) { |
|
| 29 | - $this->setDeveloperKey($apiConfig['developer_key']); |
|
| 30 | - } |
|
| 27 | + global $apiConfig; |
|
| 28 | + if (!empty($apiConfig['developer_key'])) { |
|
| 29 | + $this->setDeveloperKey($apiConfig['developer_key']); |
|
| 30 | + } |
|
| 31 | 31 | } |
| 32 | 32 | |
| 33 | 33 | public function setDeveloperKey($key) {$this->key = $key;} |
@@ -39,10 +39,10 @@ discard block |
||
| 39 | 39 | public function revokeToken() {/* noop*/} |
| 40 | 40 | |
| 41 | 41 | public function sign(Google_HttpRequest $request) { |
| 42 | - if ($this->key) { |
|
| 43 | - $request->setUrl($request->getUrl() . ((strpos($request->getUrl(), '?') === false) ? '?' : '&') |
|
| 44 | - . 'key='.urlencode($this->key)); |
|
| 45 | - } |
|
| 46 | - return $request; |
|
| 42 | + if ($this->key) { |
|
| 43 | + $request->setUrl($request->getUrl() . ((strpos($request->getUrl(), '?') === false) ? '?' : '&') |
|
| 44 | + . 'key='.urlencode($this->key)); |
|
| 45 | + } |
|
| 46 | + return $request; |
|
| 47 | 47 | } |
| 48 | 48 | } |
@@ -30,17 +30,17 @@ |
||
| 30 | 30 | } |
| 31 | 31 | } |
| 32 | 32 | |
| 33 | - public function setDeveloperKey($key) {$this->key = $key;} |
|
| 33 | + public function setDeveloperKey($key) {$this->key = $key; } |
|
| 34 | 34 | public function authenticate($service) {/*noop*/} |
| 35 | 35 | public function setAccessToken($accessToken) {/* noop*/} |
| 36 | - public function getAccessToken() {return null;} |
|
| 37 | - public function createAuthUrl($scope) {return null;} |
|
| 36 | + public function getAccessToken() {return null; } |
|
| 37 | + public function createAuthUrl($scope) {return null; } |
|
| 38 | 38 | public function refreshToken($refreshToken) {/* noop*/} |
| 39 | 39 | public function revokeToken() {/* noop*/} |
| 40 | 40 | |
| 41 | 41 | public function sign(Google_HttpRequest $request) { |
| 42 | 42 | if ($this->key) { |
| 43 | - $request->setUrl($request->getUrl() . ((strpos($request->getUrl(), '?') === false) ? '?' : '&') |
|
| 43 | + $request->setUrl($request->getUrl().((strpos($request->getUrl(), '?') === false) ? '?' : '&') |
|
| 44 | 44 | . 'key='.urlencode($this->key)); |
| 45 | 45 | } |
| 46 | 46 | return $request; |
@@ -36,8 +36,8 @@ discard block |
||
| 36 | 36 | * @param string $payload Information from a verified authentication token. |
| 37 | 37 | */ |
| 38 | 38 | public function __construct($envelope, $payload) { |
| 39 | - $this->envelope = $envelope; |
|
| 40 | - $this->payload = $payload; |
|
| 39 | + $this->envelope = $envelope; |
|
| 40 | + $this->payload = $payload; |
|
| 41 | 41 | } |
| 42 | 42 | |
| 43 | 43 | /** |
@@ -46,10 +46,10 @@ discard block |
||
| 46 | 46 | * @return |
| 47 | 47 | */ |
| 48 | 48 | public function getUserId() { |
| 49 | - if (array_key_exists(self::USER_ATTR, $this->payload)) { |
|
| 50 | - return $this->payload[self::USER_ATTR]; |
|
| 51 | - } |
|
| 52 | - throw new Google_AuthException("No user_id in token"); |
|
| 49 | + if (array_key_exists(self::USER_ATTR, $this->payload)) { |
|
| 50 | + return $this->payload[self::USER_ATTR]; |
|
| 51 | + } |
|
| 52 | + throw new Google_AuthException("No user_id in token"); |
|
| 53 | 53 | } |
| 54 | 54 | |
| 55 | 55 | /** |
@@ -58,6 +58,6 @@ discard block |
||
| 58 | 58 | * @return array |
| 59 | 59 | */ |
| 60 | 60 | public function getAttributes() { |
| 61 | - return array("envelope" => $this->envelope, "payload" => $this->payload); |
|
| 61 | + return array("envelope" => $this->envelope, "payload" => $this->payload); |
|
| 62 | 62 | } |
| 63 | 63 | } |
@@ -45,39 +45,39 @@ discard block |
||
| 45 | 45 | * application is requesting delegated access. |
| 46 | 46 | */ |
| 47 | 47 | public function __construct( |
| 48 | - $serviceAccountName, |
|
| 49 | - $scopes, |
|
| 50 | - $privateKey, |
|
| 51 | - $privateKeyPassword = 'notasecret', |
|
| 52 | - $assertionType = 'http://oauth.net/grant_type/jwt/1.0/bearer', |
|
| 53 | - $sub = false) { |
|
| 54 | - $this->serviceAccountName = $serviceAccountName; |
|
| 55 | - $this->scopes = is_string($scopes) ? $scopes : implode(' ', $scopes); |
|
| 56 | - $this->privateKey = $privateKey; |
|
| 57 | - $this->privateKeyPassword = $privateKeyPassword; |
|
| 58 | - $this->assertionType = $assertionType; |
|
| 59 | - $this->sub = $sub; |
|
| 60 | - $this->prn = $sub; |
|
| 48 | + $serviceAccountName, |
|
| 49 | + $scopes, |
|
| 50 | + $privateKey, |
|
| 51 | + $privateKeyPassword = 'notasecret', |
|
| 52 | + $assertionType = 'http://oauth.net/grant_type/jwt/1.0/bearer', |
|
| 53 | + $sub = false) { |
|
| 54 | + $this->serviceAccountName = $serviceAccountName; |
|
| 55 | + $this->scopes = is_string($scopes) ? $scopes : implode(' ', $scopes); |
|
| 56 | + $this->privateKey = $privateKey; |
|
| 57 | + $this->privateKeyPassword = $privateKeyPassword; |
|
| 58 | + $this->assertionType = $assertionType; |
|
| 59 | + $this->sub = $sub; |
|
| 60 | + $this->prn = $sub; |
|
| 61 | 61 | } |
| 62 | 62 | |
| 63 | 63 | public function generateAssertion() { |
| 64 | - $now = time(); |
|
| 64 | + $now = time(); |
|
| 65 | 65 | |
| 66 | - $jwtParams = array( |
|
| 67 | - 'aud' => Google_OAuth2::OAUTH2_TOKEN_URI, |
|
| 68 | - 'scope' => $this->scopes, |
|
| 69 | - 'iat' => $now, |
|
| 70 | - 'exp' => $now + self::MAX_TOKEN_LIFETIME_SECS, |
|
| 71 | - 'iss' => $this->serviceAccountName, |
|
| 72 | - ); |
|
| 66 | + $jwtParams = array( |
|
| 67 | + 'aud' => Google_OAuth2::OAUTH2_TOKEN_URI, |
|
| 68 | + 'scope' => $this->scopes, |
|
| 69 | + 'iat' => $now, |
|
| 70 | + 'exp' => $now + self::MAX_TOKEN_LIFETIME_SECS, |
|
| 71 | + 'iss' => $this->serviceAccountName, |
|
| 72 | + ); |
|
| 73 | 73 | |
| 74 | - if ($this->sub !== false) { |
|
| 75 | - $jwtParams['sub'] = $this->sub; |
|
| 76 | - } else if ($this->prn !== false) { |
|
| 77 | - $jwtParams['prn'] = $this->prn; |
|
| 78 | - } |
|
| 74 | + if ($this->sub !== false) { |
|
| 75 | + $jwtParams['sub'] = $this->sub; |
|
| 76 | + } else if ($this->prn !== false) { |
|
| 77 | + $jwtParams['prn'] = $this->prn; |
|
| 78 | + } |
|
| 79 | 79 | |
| 80 | - return $this->makeSignedJwt($jwtParams); |
|
| 80 | + return $this->makeSignedJwt($jwtParams); |
|
| 81 | 81 | } |
| 82 | 82 | |
| 83 | 83 | /** |
@@ -86,18 +86,18 @@ discard block |
||
| 86 | 86 | * @return string The signed JWT. |
| 87 | 87 | */ |
| 88 | 88 | private function makeSignedJwt($payload) { |
| 89 | - $header = array('typ' => 'JWT', 'alg' => 'RS256'); |
|
| 89 | + $header = array('typ' => 'JWT', 'alg' => 'RS256'); |
|
| 90 | 90 | |
| 91 | - $segments = array( |
|
| 92 | - Google_Utils::urlSafeB64Encode(json_encode($header)), |
|
| 93 | - Google_Utils::urlSafeB64Encode(json_encode($payload)) |
|
| 94 | - ); |
|
| 91 | + $segments = array( |
|
| 92 | + Google_Utils::urlSafeB64Encode(json_encode($header)), |
|
| 93 | + Google_Utils::urlSafeB64Encode(json_encode($payload)) |
|
| 94 | + ); |
|
| 95 | 95 | |
| 96 | - $signingInput = implode('.', $segments); |
|
| 97 | - $signer = new Google_P12Signer($this->privateKey, $this->privateKeyPassword); |
|
| 98 | - $signature = $signer->sign($signingInput); |
|
| 99 | - $segments[] = Google_Utils::urlSafeB64Encode($signature); |
|
| 96 | + $signingInput = implode('.', $segments); |
|
| 97 | + $signer = new Google_P12Signer($this->privateKey, $this->privateKeyPassword); |
|
| 98 | + $signature = $signer->sign($signingInput); |
|
| 99 | + $segments[] = Google_Utils::urlSafeB64Encode($signature); |
|
| 100 | 100 | |
| 101 | - return implode(".", $segments); |
|
| 101 | + return implode(".", $segments); |
|
| 102 | 102 | } |
| 103 | 103 | } |
@@ -57,13 +57,13 @@ discard block |
||
| 57 | 57 | * Otherwise, return false. |
| 58 | 58 | */ |
| 59 | 59 | protected function setCachedRequest(Google_HttpRequest $request) { |
| 60 | - // Determine if the request is cacheable. |
|
| 61 | - if (Google_CacheParser::isResponseCacheable($request)) { |
|
| 62 | - Google_Client::$cache->set($request->getCacheKey(), $request); |
|
| 63 | - return true; |
|
| 64 | - } |
|
| 60 | + // Determine if the request is cacheable. |
|
| 61 | + if (Google_CacheParser::isResponseCacheable($request)) { |
|
| 62 | + Google_Client::$cache->set($request->getCacheKey(), $request); |
|
| 63 | + return true; |
|
| 64 | + } |
|
| 65 | 65 | |
| 66 | - return false; |
|
| 66 | + return false; |
|
| 67 | 67 | } |
| 68 | 68 | |
| 69 | 69 | /** |
@@ -73,11 +73,11 @@ discard block |
||
| 73 | 73 | * false if the operation was unsuccessful. |
| 74 | 74 | */ |
| 75 | 75 | protected function getCachedRequest(Google_HttpRequest $request) { |
| 76 | - if (false == Google_CacheParser::isRequestCacheable($request)) { |
|
| 77 | - false; |
|
| 78 | - } |
|
| 76 | + if (false == Google_CacheParser::isRequestCacheable($request)) { |
|
| 77 | + false; |
|
| 78 | + } |
|
| 79 | 79 | |
| 80 | - return Google_Client::$cache->get($request->getCacheKey()); |
|
| 80 | + return Google_Client::$cache->get($request->getCacheKey()); |
|
| 81 | 81 | } |
| 82 | 82 | |
| 83 | 83 | /** |
@@ -87,28 +87,28 @@ discard block |
||
| 87 | 87 | * @return Google_HttpRequest Processed request with the enclosed entity. |
| 88 | 88 | */ |
| 89 | 89 | protected function processEntityRequest(Google_HttpRequest $request) { |
| 90 | - $postBody = $request->getPostBody(); |
|
| 91 | - $contentType = $request->getRequestHeader("content-type"); |
|
| 92 | - |
|
| 93 | - // Set the default content-type as application/x-www-form-urlencoded. |
|
| 94 | - if (false == $contentType) { |
|
| 95 | - $contentType = self::FORM_URLENCODED; |
|
| 96 | - $request->setRequestHeaders(array('content-type' => $contentType)); |
|
| 97 | - } |
|
| 98 | - |
|
| 99 | - // Force the payload to match the content-type asserted in the header. |
|
| 100 | - if ($contentType == self::FORM_URLENCODED && is_array($postBody)) { |
|
| 101 | - $postBody = http_build_query($postBody, '', '&'); |
|
| 102 | - $request->setPostBody($postBody); |
|
| 103 | - } |
|
| 104 | - |
|
| 105 | - // Make sure the content-length header is set. |
|
| 106 | - if (!$postBody || is_string($postBody)) { |
|
| 107 | - $postsLength = strlen($postBody); |
|
| 108 | - $request->setRequestHeaders(array('content-length' => $postsLength)); |
|
| 109 | - } |
|
| 110 | - |
|
| 111 | - return $request; |
|
| 90 | + $postBody = $request->getPostBody(); |
|
| 91 | + $contentType = $request->getRequestHeader("content-type"); |
|
| 92 | + |
|
| 93 | + // Set the default content-type as application/x-www-form-urlencoded. |
|
| 94 | + if (false == $contentType) { |
|
| 95 | + $contentType = self::FORM_URLENCODED; |
|
| 96 | + $request->setRequestHeaders(array('content-type' => $contentType)); |
|
| 97 | + } |
|
| 98 | + |
|
| 99 | + // Force the payload to match the content-type asserted in the header. |
|
| 100 | + if ($contentType == self::FORM_URLENCODED && is_array($postBody)) { |
|
| 101 | + $postBody = http_build_query($postBody, '', '&'); |
|
| 102 | + $request->setPostBody($postBody); |
|
| 103 | + } |
|
| 104 | + |
|
| 105 | + // Make sure the content-length header is set. |
|
| 106 | + if (!$postBody || is_string($postBody)) { |
|
| 107 | + $postsLength = strlen($postBody); |
|
| 108 | + $request->setRequestHeaders(array('content-length' => $postsLength)); |
|
| 109 | + } |
|
| 110 | + |
|
| 111 | + return $request; |
|
| 112 | 112 | } |
| 113 | 113 | |
| 114 | 114 | /** |
@@ -120,21 +120,21 @@ discard block |
||
| 120 | 120 | * still current and can be re-used. |
| 121 | 121 | */ |
| 122 | 122 | protected function checkMustRevaliadateCachedRequest($cached, $request) { |
| 123 | - if (Google_CacheParser::mustRevalidate($cached)) { |
|
| 124 | - $addHeaders = array(); |
|
| 125 | - if ($cached->getResponseHeader('etag')) { |
|
| 126 | - // [13.3.4] If an entity tag has been provided by the origin server, |
|
| 127 | - // we must use that entity tag in any cache-conditional request. |
|
| 128 | - $addHeaders['If-None-Match'] = $cached->getResponseHeader('etag'); |
|
| 129 | - } elseif ($cached->getResponseHeader('date')) { |
|
| 130 | - $addHeaders['If-Modified-Since'] = $cached->getResponseHeader('date'); |
|
| 131 | - } |
|
| 132 | - |
|
| 133 | - $request->setRequestHeaders($addHeaders); |
|
| 134 | - return true; |
|
| 135 | - } else { |
|
| 136 | - return false; |
|
| 137 | - } |
|
| 123 | + if (Google_CacheParser::mustRevalidate($cached)) { |
|
| 124 | + $addHeaders = array(); |
|
| 125 | + if ($cached->getResponseHeader('etag')) { |
|
| 126 | + // [13.3.4] If an entity tag has been provided by the origin server, |
|
| 127 | + // we must use that entity tag in any cache-conditional request. |
|
| 128 | + $addHeaders['If-None-Match'] = $cached->getResponseHeader('etag'); |
|
| 129 | + } elseif ($cached->getResponseHeader('date')) { |
|
| 130 | + $addHeaders['If-Modified-Since'] = $cached->getResponseHeader('date'); |
|
| 131 | + } |
|
| 132 | + |
|
| 133 | + $request->setRequestHeaders($addHeaders); |
|
| 134 | + return true; |
|
| 135 | + } else { |
|
| 136 | + return false; |
|
| 137 | + } |
|
| 138 | 138 | } |
| 139 | 139 | |
| 140 | 140 | /** |
@@ -143,19 +143,19 @@ discard block |
||
| 143 | 143 | * @param mixed Associative array of response headers from the last request. |
| 144 | 144 | */ |
| 145 | 145 | protected function updateCachedRequest($cached, $responseHeaders) { |
| 146 | - if (isset($responseHeaders['connection'])) { |
|
| 147 | - $hopByHop = array_merge( |
|
| 148 | - self::$HOP_BY_HOP, |
|
| 149 | - explode(',', $responseHeaders['connection']) |
|
| 150 | - ); |
|
| 151 | - |
|
| 152 | - $endToEnd = array(); |
|
| 153 | - foreach($hopByHop as $key) { |
|
| 154 | - if (isset($responseHeaders[$key])) { |
|
| 155 | - $endToEnd[$key] = $responseHeaders[$key]; |
|
| 156 | - } |
|
| 157 | - } |
|
| 158 | - $cached->setResponseHeaders($endToEnd); |
|
| 159 | - } |
|
| 146 | + if (isset($responseHeaders['connection'])) { |
|
| 147 | + $hopByHop = array_merge( |
|
| 148 | + self::$HOP_BY_HOP, |
|
| 149 | + explode(',', $responseHeaders['connection']) |
|
| 150 | + ); |
|
| 151 | + |
|
| 152 | + $endToEnd = array(); |
|
| 153 | + foreach($hopByHop as $key) { |
|
| 154 | + if (isset($responseHeaders[$key])) { |
|
| 155 | + $endToEnd[$key] = $responseHeaders[$key]; |
|
| 156 | + } |
|
| 157 | + } |
|
| 158 | + $cached->setResponseHeaders($endToEnd); |
|
| 159 | + } |
|
| 160 | 160 | } |
| 161 | 161 | } |
@@ -15,10 +15,10 @@ discard block |
||
| 15 | 15 | * limitations under the License. |
| 16 | 16 | */ |
| 17 | 17 | |
| 18 | -require_once GA_API_Path. 'io/Google_HttpRequest.php'; |
|
| 19 | -require_once GA_API_Path. 'io/Google_HttpStreamIO.php'; |
|
| 20 | -require_once GA_API_Path. 'io/Google_CurlIO.php'; |
|
| 21 | -require_once GA_API_Path. 'io/Google_REST.php'; |
|
| 18 | +require_once GA_API_Path.'io/Google_HttpRequest.php'; |
|
| 19 | +require_once GA_API_Path.'io/Google_HttpStreamIO.php'; |
|
| 20 | +require_once GA_API_Path.'io/Google_CurlIO.php'; |
|
| 21 | +require_once GA_API_Path.'io/Google_REST.php'; |
|
| 22 | 22 | |
| 23 | 23 | /** |
| 24 | 24 | * Abstract IO class |
@@ -150,7 +150,7 @@ discard block |
||
| 150 | 150 | ); |
| 151 | 151 | |
| 152 | 152 | $endToEnd = array(); |
| 153 | - foreach($hopByHop as $key) { |
|
| 153 | + foreach ($hopByHop as $key) { |
|
| 154 | 154 | if (isset($responseHeaders[$key])) { |
| 155 | 155 | $endToEnd[$key] = $responseHeaders[$key]; |
| 156 | 156 | } |
@@ -32,11 +32,11 @@ discard block |
||
| 32 | 32 | * invalid or malformed post body, invalid url) |
| 33 | 33 | */ |
| 34 | 34 | static public function execute(Google_HttpRequest $req) { |
| 35 | - $httpRequest = Google_Client::$io->makeRequest($req); |
|
| 36 | - $decodedResponse = self::decodeHttpResponse($httpRequest); |
|
| 37 | - $ret = isset($decodedResponse['data']) |
|
| 38 | - ? $decodedResponse['data'] : $decodedResponse; |
|
| 39 | - return $ret; |
|
| 35 | + $httpRequest = Google_Client::$io->makeRequest($req); |
|
| 36 | + $decodedResponse = self::decodeHttpResponse($httpRequest); |
|
| 37 | + $ret = isset($decodedResponse['data']) |
|
| 38 | + ? $decodedResponse['data'] : $decodedResponse; |
|
| 39 | + return $ret; |
|
| 40 | 40 | } |
| 41 | 41 | |
| 42 | 42 | |
@@ -48,32 +48,32 @@ discard block |
||
| 48 | 48 | * @return mixed|null |
| 49 | 49 | */ |
| 50 | 50 | public static function decodeHttpResponse($response) { |
| 51 | - $code = $response->getResponseHttpCode(); |
|
| 52 | - $body = $response->getResponseBody(); |
|
| 53 | - $decoded = null; |
|
| 51 | + $code = $response->getResponseHttpCode(); |
|
| 52 | + $body = $response->getResponseBody(); |
|
| 53 | + $decoded = null; |
|
| 54 | 54 | |
| 55 | - if ((intVal($code)) >= 300) { |
|
| 56 | - $decoded = json_decode($body, true); |
|
| 57 | - $err = 'Error calling ' . $response->getRequestMethod() . ' ' . $response->getUrl(); |
|
| 58 | - if ($decoded != null && isset($decoded['error']['message']) && isset($decoded['error']['code'])) { |
|
| 59 | - // if we're getting a json encoded error definition, use that instead of the raw response |
|
| 60 | - // body for improved readability |
|
| 61 | - $err .= ": ({$decoded['error']['code']}) {$decoded['error']['message']}"; |
|
| 62 | - } else { |
|
| 63 | - $err .= ": ($code) $body"; |
|
| 64 | - } |
|
| 55 | + if ((intVal($code)) >= 300) { |
|
| 56 | + $decoded = json_decode($body, true); |
|
| 57 | + $err = 'Error calling ' . $response->getRequestMethod() . ' ' . $response->getUrl(); |
|
| 58 | + if ($decoded != null && isset($decoded['error']['message']) && isset($decoded['error']['code'])) { |
|
| 59 | + // if we're getting a json encoded error definition, use that instead of the raw response |
|
| 60 | + // body for improved readability |
|
| 61 | + $err .= ": ({$decoded['error']['code']}) {$decoded['error']['message']}"; |
|
| 62 | + } else { |
|
| 63 | + $err .= ": ($code) $body"; |
|
| 64 | + } |
|
| 65 | 65 | |
| 66 | - throw new Google_ServiceException($err, $code, null, $decoded['error']['errors']); |
|
| 67 | - } |
|
| 66 | + throw new Google_ServiceException($err, $code, null, $decoded['error']['errors']); |
|
| 67 | + } |
|
| 68 | 68 | |
| 69 | - // Only attempt to decode the response, if the response code wasn't (204) 'no content' |
|
| 70 | - if ($code != '204') { |
|
| 71 | - $decoded = json_decode($body, true); |
|
| 72 | - if ($decoded === null || $decoded === "") { |
|
| 73 | - throw new Google_ServiceException("Invalid json in service response: $body"); |
|
| 74 | - } |
|
| 75 | - } |
|
| 76 | - return $decoded; |
|
| 69 | + // Only attempt to decode the response, if the response code wasn't (204) 'no content' |
|
| 70 | + if ($code != '204') { |
|
| 71 | + $decoded = json_decode($body, true); |
|
| 72 | + if ($decoded === null || $decoded === "") { |
|
| 73 | + throw new Google_ServiceException("Invalid json in service response: $body"); |
|
| 74 | + } |
|
| 75 | + } |
|
| 76 | + return $decoded; |
|
| 77 | 77 | } |
| 78 | 78 | |
| 79 | 79 | /** |
@@ -86,43 +86,43 @@ discard block |
||
| 86 | 86 | * @return string $requestUrl |
| 87 | 87 | */ |
| 88 | 88 | static function createRequestUri($servicePath, $restPath, $params) { |
| 89 | - $requestUrl = $servicePath . $restPath; |
|
| 90 | - $uriTemplateVars = array(); |
|
| 91 | - $queryVars = array(); |
|
| 92 | - foreach ($params as $paramName => $paramSpec) { |
|
| 93 | - // Discovery v1.0 puts the canonical location under the 'location' field. |
|
| 94 | - if (! isset($paramSpec['location'])) { |
|
| 95 | - $paramSpec['location'] = $paramSpec['restParameterType']; |
|
| 96 | - } |
|
| 89 | + $requestUrl = $servicePath . $restPath; |
|
| 90 | + $uriTemplateVars = array(); |
|
| 91 | + $queryVars = array(); |
|
| 92 | + foreach ($params as $paramName => $paramSpec) { |
|
| 93 | + // Discovery v1.0 puts the canonical location under the 'location' field. |
|
| 94 | + if (! isset($paramSpec['location'])) { |
|
| 95 | + $paramSpec['location'] = $paramSpec['restParameterType']; |
|
| 96 | + } |
|
| 97 | 97 | |
| 98 | - if ($paramSpec['type'] == 'boolean') { |
|
| 99 | - $paramSpec['value'] = ($paramSpec['value']) ? 'true' : 'false'; |
|
| 100 | - } |
|
| 101 | - if ($paramSpec['location'] == 'path') { |
|
| 102 | - $uriTemplateVars[$paramName] = $paramSpec['value']; |
|
| 103 | - } else { |
|
| 104 | - if (isset($paramSpec['repeated']) && is_array($paramSpec['value'])) { |
|
| 105 | - foreach ($paramSpec['value'] as $value) { |
|
| 106 | - $queryVars[] = $paramName . '=' . rawurlencode($value); |
|
| 107 | - } |
|
| 108 | - } else { |
|
| 109 | - $queryVars[] = $paramName . '=' . rawurlencode($paramSpec['value']); |
|
| 110 | - } |
|
| 111 | - } |
|
| 112 | - } |
|
| 98 | + if ($paramSpec['type'] == 'boolean') { |
|
| 99 | + $paramSpec['value'] = ($paramSpec['value']) ? 'true' : 'false'; |
|
| 100 | + } |
|
| 101 | + if ($paramSpec['location'] == 'path') { |
|
| 102 | + $uriTemplateVars[$paramName] = $paramSpec['value']; |
|
| 103 | + } else { |
|
| 104 | + if (isset($paramSpec['repeated']) && is_array($paramSpec['value'])) { |
|
| 105 | + foreach ($paramSpec['value'] as $value) { |
|
| 106 | + $queryVars[] = $paramName . '=' . rawurlencode($value); |
|
| 107 | + } |
|
| 108 | + } else { |
|
| 109 | + $queryVars[] = $paramName . '=' . rawurlencode($paramSpec['value']); |
|
| 110 | + } |
|
| 111 | + } |
|
| 112 | + } |
|
| 113 | 113 | |
| 114 | - if (count($uriTemplateVars)) { |
|
| 115 | - $uriTemplateParser = new URI_Template_Parser($requestUrl); |
|
| 116 | - $requestUrl = $uriTemplateParser->expand($uriTemplateVars); |
|
| 117 | - } |
|
| 118 | - //FIXME work around for the the uri template lib which url encodes |
|
| 119 | - // the @'s & confuses our servers. |
|
| 120 | - $requestUrl = str_replace('%40', '@', $requestUrl); |
|
| 114 | + if (count($uriTemplateVars)) { |
|
| 115 | + $uriTemplateParser = new URI_Template_Parser($requestUrl); |
|
| 116 | + $requestUrl = $uriTemplateParser->expand($uriTemplateVars); |
|
| 117 | + } |
|
| 118 | + //FIXME work around for the the uri template lib which url encodes |
|
| 119 | + // the @'s & confuses our servers. |
|
| 120 | + $requestUrl = str_replace('%40', '@', $requestUrl); |
|
| 121 | 121 | |
| 122 | - if (count($queryVars)) { |
|
| 123 | - $requestUrl .= '?' . implode($queryVars, '&'); |
|
| 124 | - } |
|
| 122 | + if (count($queryVars)) { |
|
| 123 | + $requestUrl .= '?' . implode($queryVars, '&'); |
|
| 124 | + } |
|
| 125 | 125 | |
| 126 | - return $requestUrl; |
|
| 126 | + return $requestUrl; |
|
| 127 | 127 | } |
| 128 | 128 | } |
@@ -54,8 +54,8 @@ discard block |
||
| 54 | 54 | |
| 55 | 55 | if ((intVal($code)) >= 300) { |
| 56 | 56 | $decoded = json_decode($body, true); |
| 57 | - $err = 'Error calling ' . $response->getRequestMethod() . ' ' . $response->getUrl(); |
|
| 58 | - if ($decoded != null && isset($decoded['error']['message']) && isset($decoded['error']['code'])) { |
|
| 57 | + $err = 'Error calling '.$response->getRequestMethod().' '.$response->getUrl(); |
|
| 58 | + if ($decoded != null && isset($decoded['error']['message']) && isset($decoded['error']['code'])) { |
|
| 59 | 59 | // if we're getting a json encoded error definition, use that instead of the raw response |
| 60 | 60 | // body for improved readability |
| 61 | 61 | $err .= ": ({$decoded['error']['code']}) {$decoded['error']['message']}"; |
@@ -86,12 +86,12 @@ discard block |
||
| 86 | 86 | * @return string $requestUrl |
| 87 | 87 | */ |
| 88 | 88 | static function createRequestUri($servicePath, $restPath, $params) { |
| 89 | - $requestUrl = $servicePath . $restPath; |
|
| 89 | + $requestUrl = $servicePath.$restPath; |
|
| 90 | 90 | $uriTemplateVars = array(); |
| 91 | 91 | $queryVars = array(); |
| 92 | 92 | foreach ($params as $paramName => $paramSpec) { |
| 93 | 93 | // Discovery v1.0 puts the canonical location under the 'location' field. |
| 94 | - if (! isset($paramSpec['location'])) { |
|
| 94 | + if (!isset($paramSpec['location'])) { |
|
| 95 | 95 | $paramSpec['location'] = $paramSpec['restParameterType']; |
| 96 | 96 | } |
| 97 | 97 | |
@@ -103,10 +103,10 @@ discard block |
||
| 103 | 103 | } else { |
| 104 | 104 | if (isset($paramSpec['repeated']) && is_array($paramSpec['value'])) { |
| 105 | 105 | foreach ($paramSpec['value'] as $value) { |
| 106 | - $queryVars[] = $paramName . '=' . rawurlencode($value); |
|
| 106 | + $queryVars[] = $paramName.'='.rawurlencode($value); |
|
| 107 | 107 | } |
| 108 | 108 | } else { |
| 109 | - $queryVars[] = $paramName . '=' . rawurlencode($paramSpec['value']); |
|
| 109 | + $queryVars[] = $paramName.'='.rawurlencode($paramSpec['value']); |
|
| 110 | 110 | } |
| 111 | 111 | } |
| 112 | 112 | } |
@@ -120,7 +120,7 @@ discard block |
||
| 120 | 120 | $requestUrl = str_replace('%40', '@', $requestUrl); |
| 121 | 121 | |
| 122 | 122 | if (count($queryVars)) { |
| 123 | - $requestUrl .= '?' . implode($queryVars, '&'); |
|
| 123 | + $requestUrl .= '?'.implode($queryVars, '&'); |
|
| 124 | 124 | } |
| 125 | 125 | |
| 126 | 126 | return $requestUrl; |