@@ -5,6 +5,9 @@ discard block |
||
| 5 | 5 | $in_started = false; |
| 6 | 6 | $count = false; |
| 7 | 7 | |
| 8 | +/** |
|
| 9 | + * @param integer $count |
|
| 10 | + */ |
|
| 8 | 11 | function incrementN($lexer, $count) |
| 9 | 12 | { |
| 10 | 13 | $i = 0; |
@@ -160,6 +163,9 @@ discard block |
||
| 160 | 163 | } |
| 161 | 164 | } |
| 162 | 165 | |
| 166 | +/** |
|
| 167 | + * @param VTQL_Lexer $lexer |
|
| 168 | + */ |
|
| 163 | 169 | function handleend($lexer, $val) |
| 164 | 170 | { |
| 165 | 171 | return VTQL_Parser::SEMICOLON; |
@@ -179,6 +185,9 @@ discard block |
||
| 179 | 185 | public $mandatory; |
| 180 | 186 | public $current_state; |
| 181 | 187 | |
| 188 | + /** |
|
| 189 | + * @param string $data |
|
| 190 | + */ |
|
| 182 | 191 | public function __construct($data) |
| 183 | 192 | { |
| 184 | 193 | $this->index = 0; |
@@ -159,6 +159,9 @@ |
||
| 159 | 159 | private $syntax_error; |
| 160 | 160 | private $user; |
| 161 | 161 | |
| 162 | + /** |
|
| 163 | + * @param VTQL_Lexer $lex |
|
| 164 | + */ |
|
| 162 | 165 | public function __construct($user, $lex, $out) |
| 163 | 166 | { |
| 164 | 167 | if (!is_array($out)) { |
@@ -89,7 +89,7 @@ discard block |
||
| 89 | 89 | { |
| 90 | 90 | |
| 91 | 91 | public $stateno; /* The state-number */ |
| 92 | - public $major; /* The major token value. This is the code |
|
| 92 | + public $major; /* The major token value. This is the code |
|
| 93 | 93 | * * number for the token at this stack level */ |
| 94 | 94 | public $minor; /* The user-supplied minor token value. This |
| 95 | 95 | * * is the value of the token */ |
@@ -663,17 +663,17 @@ discard block |
||
| 663 | 663 | /** |
| 664 | 664 | * @var int |
| 665 | 665 | */ |
| 666 | - public $yyidx; /* Index of top element in stack */ |
|
| 666 | + public $yyidx; /* Index of top element in stack */ |
|
| 667 | 667 | |
| 668 | 668 | /** |
| 669 | 669 | * @var int |
| 670 | 670 | */ |
| 671 | - public $yyerrcnt; /* Shifts left before out of the error */ |
|
| 671 | + public $yyerrcnt; /* Shifts left before out of the error */ |
|
| 672 | 672 | |
| 673 | 673 | /** |
| 674 | 674 | * @var array |
| 675 | 675 | */ |
| 676 | - public $yystack = []; /* The parser's stack */ |
|
| 676 | + public $yystack = []; /* The parser's stack */ |
|
| 677 | 677 | |
| 678 | 678 | /** |
| 679 | 679 | * For tracing shifts, the names of all terminals and nonterminals |
@@ -782,7 +782,7 @@ discard block |
||
| 782 | 782 | * * which appear on the RHS of the rule, but which are not used |
| 783 | 783 | * * inside the C code. |
| 784 | 784 | */ |
| 785 | - default: break; /* If no destructor action specified: do nothing */ |
|
| 785 | + default: break; /* If no destructor action specified: do nothing */ |
|
| 786 | 786 | } |
| 787 | 787 | } |
| 788 | 788 | |
@@ -1608,7 +1608,7 @@ discard block |
||
| 1608 | 1608 | { |
| 1609 | 1609 | // $yyact; /* The parser action. */ |
| 1610 | 1610 | // $yyendofinput; /* True if we are at the end of input */ |
| 1611 | - $yyerrorhit = 0; /* True if yymajor has invoked an error */ |
|
| 1611 | + $yyerrorhit = 0; /* True if yymajor has invoked an error */ |
|
| 1612 | 1612 | |
| 1613 | 1613 | /* (re)initialize the parser, if necessary */ |
| 1614 | 1614 | if ($this->yyidx === null || $this->yyidx < 0) { |
@@ -84,6 +84,9 @@ discard block |
||
| 84 | 84 | } |
| 85 | 85 | } |
| 86 | 86 | |
| 87 | + /** |
|
| 88 | + * @param integer $rowNumber |
|
| 89 | + */ |
|
| 87 | 90 | public static function fromQueryResult($adb, $result, $rowNumber) |
| 88 | 91 | { |
| 89 | 92 | return new WebserviceField($adb, $adb->query_result_rowdata($result, $rowNumber)); |
@@ -147,6 +150,9 @@ discard block |
||
| 147 | 150 | return $this->default; |
| 148 | 151 | } |
| 149 | 152 | |
| 153 | + /** |
|
| 154 | + * @return string |
|
| 155 | + */ |
|
| 150 | 156 | public function getColumnName() |
| 151 | 157 | { |
| 152 | 158 | return $this->columnName; |
@@ -203,6 +209,9 @@ discard block |
||
| 203 | 209 | return false; |
| 204 | 210 | } |
| 205 | 211 | |
| 212 | + /** |
|
| 213 | + * @param boolean $nullable |
|
| 214 | + */ |
|
| 206 | 215 | private function setNullable($nullable) |
| 207 | 216 | { |
| 208 | 217 | $this->nullable = $nullable; |
@@ -198,8 +198,9 @@ discard block |
||
| 198 | 198 | |
| 199 | 199 | public function isReadOnly() |
| 200 | 200 | { |
| 201 | - if ($this->readOnly == 1) |
|
| 202 | - return true; |
|
| 201 | + if ($this->readOnly == 1) { |
|
| 202 | + return true; |
|
| 203 | + } |
|
| 203 | 204 | return false; |
| 204 | 205 | } |
| 205 | 206 | |
@@ -307,8 +308,9 @@ discard block |
||
| 307 | 308 | $numRows = $this->pearDB->num_rows($result); |
| 308 | 309 | for ($i = 0; $i < $numRows; ++$i) { |
| 309 | 310 | $referenceType = $this->pearDB->query_result($result, $i, "type"); |
| 310 | - if (in_array($referenceType, $accessibleTypes)) |
|
| 311 | - array_push($referenceTypes, $referenceType); |
|
| 311 | + if (in_array($referenceType, $accessibleTypes)) { |
|
| 312 | + array_push($referenceTypes, $referenceType); |
|
| 313 | + } |
|
| 312 | 314 | } |
| 313 | 315 | } else { |
| 314 | 316 | $fieldModel = Vtiger_Field_Model::getInstanceFromFieldId($this->getFieldId()); |
@@ -425,21 +427,23 @@ discard block |
||
| 425 | 427 | $picklistValue = $this->pearDB->query_result($result, $i, $fieldName); |
| 426 | 428 | $picklistValue = decode_html($picklistValue); |
| 427 | 429 | $moduleName = getTabModuleName($this->getTabId()); |
| 428 | - if ($moduleName == 'Events') |
|
| 429 | - $moduleName = 'Calendar'; |
|
| 430 | + if ($moduleName == 'Events') { |
|
| 431 | + $moduleName = 'Calendar'; |
|
| 432 | + } |
|
| 430 | 433 | $elem["label"] = \includes\Language::translate($picklistValue, $moduleName); |
| 431 | 434 | $elem["value"] = $picklistValue; |
| 432 | 435 | array_push($options, $elem); |
| 433 | 436 | } |
| 434 | - }else { |
|
| 437 | + } else { |
|
| 435 | 438 | $user = VTWS_PreserveGlobal::getGlobal('current_user'); |
| 436 | 439 | $details = \includes\fields\Picklist::getRoleBasedPicklistValues($fieldName, $user->roleid); |
| 437 | 440 | for ($i = 0; $i < sizeof($details); ++$i) { |
| 438 | 441 | $elem = []; |
| 439 | 442 | $picklistValue = decode_html($details[$i]); |
| 440 | 443 | $moduleName = getTabModuleName($this->getTabId()); |
| 441 | - if ($moduleName == 'Events') |
|
| 442 | - $moduleName = 'Calendar'; |
|
| 444 | + if ($moduleName == 'Events') { |
|
| 445 | + $moduleName = 'Calendar'; |
|
| 446 | + } |
|
| 443 | 447 | $elem["label"] = \includes\Language::translate($picklistValue, $moduleName); |
| 444 | 448 | $elem["value"] = $picklistValue; |
| 445 | 449 | array_push($options, $elem); |
@@ -41,7 +41,7 @@ |
||
| 41 | 41 | module_name=?, summary=?, test=?, execution_condition=?, defaultworkflow=?, filtersavedinnew=?, |
| 42 | 42 | schtypeid=?, schtime=?, schdayofmonth=?, schdayofweek=?, schannualdates=?, nexttrigger_time=? where workflow_id=?", array($wf->moduleName, $wf->description, $wf->test, $wf->executionCondition, $wf->defaultworkflow, $wf->filtersavedinnew, |
| 43 | 43 | $wf->schtypeid, $wf->schtime, $wf->schdayofmonth, $wf->schdayofweek, $wf->schannualdates, $wf->nexttrigger_time, $wf->id)); |
| 44 | - }else { |
|
| 44 | + } else { |
|
| 45 | 45 | $workflowId = $adb->getUniqueID("com_vtiger_workflows"); |
| 46 | 46 | $workflow->id = $workflowId; |
| 47 | 47 | $wf = $workflow; |
@@ -19,6 +19,11 @@ |
||
| 19 | 19 | return false; |
| 20 | 20 | } |
| 21 | 21 | |
| 22 | + /** |
|
| 23 | + * @param Vtiger_Request $request |
|
| 24 | + * |
|
| 25 | + * @return Vtiger_Request |
|
| 26 | + */ |
|
| 22 | 27 | public function setLanguage($request) |
| 23 | 28 | { |
| 24 | 29 | if (!$request->get('lang')) { |
@@ -87,8 +87,9 @@ |
||
| 87 | 87 | public function process(Vtiger_Request $request) |
| 88 | 88 | { |
| 89 | 89 | $default_charset = AppConfig::main('default_charset'); |
| 90 | - if (empty($default_charset)) |
|
| 91 | - $default_charset = 'UTF-8'; |
|
| 90 | + if (empty($default_charset)) { |
|
| 91 | + $default_charset = 'UTF-8'; |
|
| 92 | + } |
|
| 92 | 93 | $mode = $request->getMode(); |
| 93 | 94 | if (!empty($mode) && $this->isMethodExposed($mode)) { |
| 94 | 95 | return $this->$mode($request); |
@@ -211,7 +211,7 @@ discard block |
||
| 211 | 211 | /** |
| 212 | 212 | * Checks if this is a post request, and if it is, checks if the nonce is valid. |
| 213 | 213 | * @param bool $fatal Whether or not to fatally error out if there is a problem. |
| 214 | - * @return True if check passes or is not necessary, false if failure. |
|
| 214 | + * @return boolean|null if check passes or is not necessary, false if failure. |
|
| 215 | 215 | */ |
| 216 | 216 | function csrf_check($fatal = true) { |
| 217 | 217 | if ($_SERVER['REQUEST_METHOD'] !== 'POST') return true; |
@@ -281,6 +281,9 @@ discard block |
||
| 281 | 281 | } |
| 282 | 282 | return $ret; |
| 283 | 283 | } |
| 284 | +/** |
|
| 285 | + * @param integer $level |
|
| 286 | + */ |
|
| 284 | 287 | function csrf_flattenpost2($level, $key, $data) { |
| 285 | 288 | if(!is_array($data)) return array($key => $data); |
| 286 | 289 | $ret = array(); |
@@ -166,35 +166,35 @@ discard block |
||
| 166 | 166 | if (!$is_html) return $buffer; |
| 167 | 167 | } |
| 168 | 168 | } |
| 169 | - $count=1; |
|
| 169 | + $count = 1; |
|
| 170 | 170 | $tokens = csrf_get_tokens(); |
| 171 | 171 | $name = $GLOBALS['csrf']['input-name']; |
| 172 | 172 | $endslash = $GLOBALS['csrf']['xhtml'] ? ' /' : ''; |
| 173 | 173 | $input = "<input type='hidden' name='$name' value=\"$tokens\"$endslash>"; |
| 174 | 174 | $buffer = preg_replace('#(<form[^>]*method\s*=\s*["\']post["\'][^>]*>)#i', '$1' . $input, $buffer); |
| 175 | 175 | if ($GLOBALS['csrf']['frame-breaker'] && !$is_partial) { |
| 176 | - $buffer = preg_replace('/<\/head>/', '<script type="text/javascript">if (top != self) {top.location.href = self.location.href;}</script></head>', $buffer,$count); |
|
| 176 | + $buffer = preg_replace('/<\/head>/', '<script type="text/javascript">if (top != self) {top.location.href = self.location.href;}</script></head>', $buffer, $count); |
|
| 177 | 177 | } |
| 178 | 178 | if (($js = $GLOBALS['csrf']['rewrite-js']) && !$is_partial) { |
| 179 | 179 | global $dbconfig; |
| 180 | 180 | if (empty($dbconfig) || empty($dbconfig['db_name']) || $dbconfig['db_name'] == '_DBC_TYPE_') { |
| 181 | 181 | $buffer = preg_replace( |
| 182 | 182 | '/<\/head>/', |
| 183 | - '<script type="text/javascript">'. |
|
| 184 | - 'var csrfMagicToken = "'.$tokens.'";'. |
|
| 185 | - 'var csrfMagicName = "'.$name.'";</script>'. |
|
| 186 | - '<script src="../'.$js.'" type="text/javascript"></script></head>', |
|
| 187 | - $buffer,$count |
|
| 183 | + '<script type="text/javascript">' . |
|
| 184 | + 'var csrfMagicToken = "' . $tokens . '";' . |
|
| 185 | + 'var csrfMagicName = "' . $name . '";</script>' . |
|
| 186 | + '<script src="../' . $js . '" type="text/javascript"></script></head>', |
|
| 187 | + $buffer, $count |
|
| 188 | 188 | ); |
| 189 | 189 | |
| 190 | 190 | } else { |
| 191 | 191 | $buffer = preg_replace( |
| 192 | 192 | '/<\/head>/', |
| 193 | - '<script type="text/javascript">'. |
|
| 194 | - 'var csrfMagicToken = "'.$tokens.'";'. |
|
| 195 | - 'var csrfMagicName = "'.$name.'";</script>'. |
|
| 196 | - '<script src="'.$js.'" type="text/javascript"></script></head>', |
|
| 197 | - $buffer,$count |
|
| 193 | + '<script type="text/javascript">' . |
|
| 194 | + 'var csrfMagicToken = "' . $tokens . '";' . |
|
| 195 | + 'var csrfMagicName = "' . $name . '";</script>' . |
|
| 196 | + '<script src="' . $js . '" type="text/javascript"></script></head>', |
|
| 197 | + $buffer, $count |
|
| 198 | 198 | ); |
| 199 | 199 | } |
| 200 | 200 | |
@@ -276,17 +276,17 @@ discard block |
||
| 276 | 276 | |
| 277 | 277 | function csrf_flattenpost($data) { |
| 278 | 278 | $ret = array(); |
| 279 | - foreach($data as $n => $v) { |
|
| 279 | + foreach ($data as $n => $v) { |
|
| 280 | 280 | $ret = array_merge($ret, csrf_flattenpost2(1, $n, $v)); |
| 281 | 281 | } |
| 282 | 282 | return $ret; |
| 283 | 283 | } |
| 284 | 284 | function csrf_flattenpost2($level, $key, $data) { |
| 285 | - if(!is_array($data)) return array($key => $data); |
|
| 285 | + if (!is_array($data)) return array($key => $data); |
|
| 286 | 286 | $ret = array(); |
| 287 | - foreach($data as $n => $v) { |
|
| 288 | - $nk = $level >= 1 ? $key."[$n]" : "[$n]"; |
|
| 289 | - $ret = array_merge($ret, csrf_flattenpost2($level+1, $nk, $v)); |
|
| 287 | + foreach ($data as $n => $v) { |
|
| 288 | + $nk = $level >= 1 ? $key . "[$n]" : "[$n]"; |
|
| 289 | + $ret = array_merge($ret, csrf_flattenpost2($level + 1, $nk, $v)); |
|
| 290 | 290 | } |
| 291 | 291 | return $ret; |
| 292 | 292 | } |
@@ -300,7 +300,7 @@ discard block |
||
| 300 | 300 | $data = ''; |
| 301 | 301 | foreach (csrf_flattenpost($_POST) as $key => $value) { |
| 302 | 302 | if ($key == $GLOBALS['csrf']['input-name']) continue; |
| 303 | - $data .= '<input type="hidden" name="'.htmlspecialchars($key).'" value="'.htmlspecialchars($value).'" />'; |
|
| 303 | + $data .= '<input type="hidden" name="' . htmlspecialchars($key) . '" value="' . htmlspecialchars($value) . '" />'; |
|
| 304 | 304 | } |
| 305 | 305 | echo "<html><head><title>CSRF check failed</title></head> |
| 306 | 306 | <body> |
@@ -408,7 +408,7 @@ discard block |
||
| 408 | 408 | if (is_writable($dir)) { |
| 409 | 409 | $secret = csrf_generate_secret(); |
| 410 | 410 | $fh = fopen($file, 'w'); |
| 411 | - fwrite($fh, '<?php $secret = "'.$secret.'";' . PHP_EOL); |
|
| 411 | + fwrite($fh, '<?php $secret = "' . $secret . '";' . PHP_EOL); |
|
| 412 | 412 | fclose($fh); |
| 413 | 413 | return $secret; |
| 414 | 414 | } |
@@ -157,13 +157,16 @@ discard block |
||
| 157 | 157 | // Determine based on content type. |
| 158 | 158 | $headers = headers_list(); |
| 159 | 159 | foreach ($headers as $header) { |
| 160 | - if ($is_html) break; |
|
| 161 | - else if (stripos('Content-type', $header) !== false && stripos('/html', $header) === false) { |
|
| 160 | + if ($is_html) { |
|
| 161 | + break; |
|
| 162 | + } else if (stripos('Content-type', $header) !== false && stripos('/html', $header) === false) { |
|
| 162 | 163 | $is_html = false; |
| 163 | 164 | } |
| 164 | 165 | } |
| 165 | 166 | |
| 166 | - if (!$is_html) return $buffer; |
|
| 167 | + if (!$is_html) { |
|
| 168 | + return $buffer; |
|
| 169 | + } |
|
| 167 | 170 | } |
| 168 | 171 | } |
| 169 | 172 | $count=1; |
@@ -214,22 +217,30 @@ discard block |
||
| 214 | 217 | * @return True if check passes or is not necessary, false if failure. |
| 215 | 218 | */ |
| 216 | 219 | function csrf_check($fatal = true) { |
| 217 | - if ($_SERVER['REQUEST_METHOD'] !== 'POST') return true; |
|
| 220 | + if ($_SERVER['REQUEST_METHOD'] !== 'POST') { |
|
| 221 | + return true; |
|
| 222 | + } |
|
| 218 | 223 | csrf_start(); |
| 219 | 224 | $name = $GLOBALS['csrf']['input-name']; |
| 220 | 225 | $ok = false; |
| 221 | 226 | $tokens = ''; |
| 222 | 227 | do { |
| 223 | - if (!isset($_POST[$name])) break; |
|
| 228 | + if (!isset($_POST[$name])) { |
|
| 229 | + break; |
|
| 230 | + } |
|
| 224 | 231 | // we don't regenerate a token and check it because some token creation |
| 225 | 232 | // schemes are volatile. |
| 226 | 233 | $tokens = $_POST[$name]; |
| 227 | - if (!csrf_check_tokens($tokens)) break; |
|
| 234 | + if (!csrf_check_tokens($tokens)) { |
|
| 235 | + break; |
|
| 236 | + } |
|
| 228 | 237 | $ok = true; |
| 229 | 238 | } while (false); |
| 230 | 239 | if ($fatal && !$ok) { |
| 231 | 240 | $callback = $GLOBALS['csrf']['callback']; |
| 232 | - if (trim($tokens, 'A..Za..z0..9:;,') !== '') $tokens = 'hidden'; |
|
| 241 | + if (trim($tokens, 'A..Za..z0..9:;,') !== '') { |
|
| 242 | + $tokens = 'hidden'; |
|
| 243 | + } |
|
| 233 | 244 | $callback($tokens); |
| 234 | 245 | exit; |
| 235 | 246 | } |
@@ -256,15 +267,21 @@ discard block |
||
| 256 | 267 | csrf_start(); |
| 257 | 268 | |
| 258 | 269 | // These are "strong" algorithms that don't require per se a secret |
| 259 | - if (session_id()) return 'sid:' . csrf_hash(session_id()) . $ip; |
|
| 270 | + if (session_id()) { |
|
| 271 | + return 'sid:' . csrf_hash(session_id()) . $ip; |
|
| 272 | + } |
|
| 260 | 273 | if ($GLOBALS['csrf']['cookie']) { |
| 261 | 274 | $val = csrf_generate_secret(); |
| 262 | 275 | setcookie($GLOBALS['csrf']['cookie'], $val); |
| 263 | 276 | return 'cookie:' . csrf_hash($val) . $ip; |
| 264 | 277 | } |
| 265 | - if ($GLOBALS['csrf']['key']) return 'key:' . csrf_hash($GLOBALS['csrf']['key']) . $ip; |
|
| 278 | + if ($GLOBALS['csrf']['key']) { |
|
| 279 | + return 'key:' . csrf_hash($GLOBALS['csrf']['key']) . $ip; |
|
| 280 | + } |
|
| 266 | 281 | // These further algorithms require a server-side secret |
| 267 | - if (!$secret) return 'invalid'; |
|
| 282 | + if (!$secret) { |
|
| 283 | + return 'invalid'; |
|
| 284 | + } |
|
| 268 | 285 | if ($GLOBALS['csrf']['user'] !== false) { |
| 269 | 286 | return 'user:' . csrf_hash($GLOBALS['csrf']['user']); |
| 270 | 287 | } |
@@ -282,7 +299,9 @@ discard block |
||
| 282 | 299 | return $ret; |
| 283 | 300 | } |
| 284 | 301 | function csrf_flattenpost2($level, $key, $data) { |
| 285 | - if(!is_array($data)) return array($key => $data); |
|
| 302 | + if(!is_array($data)) { |
|
| 303 | + return array($key => $data); |
|
| 304 | + } |
|
| 286 | 305 | $ret = array(); |
| 287 | 306 | foreach($data as $n => $v) { |
| 288 | 307 | $nk = $level >= 1 ? $key."[$n]" : "[$n]"; |
@@ -299,7 +318,9 @@ discard block |
||
| 299 | 318 | header($_SERVER['SERVER_PROTOCOL'] . ' 403 Forbidden'); |
| 300 | 319 | $data = ''; |
| 301 | 320 | foreach (csrf_flattenpost($_POST) as $key => $value) { |
| 302 | - if ($key == $GLOBALS['csrf']['input-name']) continue; |
|
| 321 | + if ($key == $GLOBALS['csrf']['input-name']) { |
|
| 322 | + continue; |
|
| 323 | + } |
|
| 303 | 324 | $data .= '<input type="hidden" name="'.htmlspecialchars($key).'" value="'.htmlspecialchars($value).'" />'; |
| 304 | 325 | } |
| 305 | 326 | echo "<html><head><title>CSRF check failed</title></head> |
@@ -325,9 +346,13 @@ discard block |
||
| 325 | 346 | * instead of csrf_check_token() |
| 326 | 347 | */ |
| 327 | 348 | function csrf_check_tokens($tokens) { |
| 328 | - if (is_string($tokens)) $tokens = explode(';', $tokens); |
|
| 349 | + if (is_string($tokens)) { |
|
| 350 | + $tokens = explode(';', $tokens); |
|
| 351 | + } |
|
| 329 | 352 | foreach ($tokens as $token) { |
| 330 | - if (csrf_check_token($token)) return true; |
|
| 353 | + if (csrf_check_token($token)) { |
|
| 354 | + return true; |
|
| 355 | + } |
|
| 331 | 356 | } |
| 332 | 357 | return false; |
| 333 | 358 | } |
@@ -336,38 +361,62 @@ discard block |
||
| 336 | 361 | * Checks if a token is valid. |
| 337 | 362 | */ |
| 338 | 363 | function csrf_check_token($token) { |
| 339 | - if (strpos($token, ':') === false) return false; |
|
| 364 | + if (strpos($token, ':') === false) { |
|
| 365 | + return false; |
|
| 366 | + } |
|
| 340 | 367 | list($type, $value) = explode(':', $token, 2); |
| 341 | - if (strpos($value, ',') === false) return false; |
|
| 368 | + if (strpos($value, ',') === false) { |
|
| 369 | + return false; |
|
| 370 | + } |
|
| 342 | 371 | list($x, $time) = explode(',', $token, 2); |
| 343 | 372 | if ($GLOBALS['csrf']['expires']) { |
| 344 | - if (time() > $time + $GLOBALS['csrf']['expires']) return false; |
|
| 373 | + if (time() > $time + $GLOBALS['csrf']['expires']) { |
|
| 374 | + return false; |
|
| 375 | + } |
|
| 345 | 376 | } |
| 346 | 377 | switch ($type) { |
| 347 | 378 | case 'sid': |
| 348 | 379 | return $value === csrf_hash(session_id(), $time); |
| 349 | 380 | case 'cookie': |
| 350 | 381 | $n = $GLOBALS['csrf']['cookie']; |
| 351 | - if (!$n) return false; |
|
| 352 | - if (!isset($_COOKIE[$n])) return false; |
|
| 382 | + if (!$n) { |
|
| 383 | + return false; |
|
| 384 | + } |
|
| 385 | + if (!isset($_COOKIE[$n])) { |
|
| 386 | + return false; |
|
| 387 | + } |
|
| 353 | 388 | return $value === csrf_hash($_COOKIE[$n], $time); |
| 354 | 389 | case 'key': |
| 355 | - if (!$GLOBALS['csrf']['key']) return false; |
|
| 390 | + if (!$GLOBALS['csrf']['key']) { |
|
| 391 | + return false; |
|
| 392 | + } |
|
| 356 | 393 | return $value === csrf_hash($GLOBALS['csrf']['key'], $time); |
| 357 | 394 | // We could disable these 'weaker' checks if 'key' was set, but |
| 358 | 395 | // that doesn't make me feel good then about the cookie-based |
| 359 | 396 | // implementation. |
| 360 | 397 | case 'user': |
| 361 | - if (!csrf_get_secret()) return false; |
|
| 362 | - if ($GLOBALS['csrf']['user'] === false) return false; |
|
| 398 | + if (!csrf_get_secret()) { |
|
| 399 | + return false; |
|
| 400 | + } |
|
| 401 | + if ($GLOBALS['csrf']['user'] === false) { |
|
| 402 | + return false; |
|
| 403 | + } |
|
| 363 | 404 | return $value === csrf_hash($GLOBALS['csrf']['user'], $time); |
| 364 | 405 | case 'ip': |
| 365 | - if (!csrf_get_secret()) return false; |
|
| 406 | + if (!csrf_get_secret()) { |
|
| 407 | + return false; |
|
| 408 | + } |
|
| 366 | 409 | // do not allow IP-based checks if the username is set, or if |
| 367 | 410 | // the browser sent cookies |
| 368 | - if ($GLOBALS['csrf']['user'] !== false) return false; |
|
| 369 | - if (!empty($_COOKIE)) return false; |
|
| 370 | - if (!$GLOBALS['csrf']['allow-ip']) return false; |
|
| 411 | + if ($GLOBALS['csrf']['user'] !== false) { |
|
| 412 | + return false; |
|
| 413 | + } |
|
| 414 | + if (!empty($_COOKIE)) { |
|
| 415 | + return false; |
|
| 416 | + } |
|
| 417 | + if (!$GLOBALS['csrf']['allow-ip']) { |
|
| 418 | + return false; |
|
| 419 | + } |
|
| 371 | 420 | return $value === csrf_hash($_SERVER['IP_ADDRESS'], $time); |
| 372 | 421 | } |
| 373 | 422 | return false; |
@@ -397,7 +446,9 @@ discard block |
||
| 397 | 446 | * Retrieves the secret, and generates one if necessary. |
| 398 | 447 | */ |
| 399 | 448 | function csrf_get_secret() { |
| 400 | - if ($GLOBALS['csrf']['secret']) return $GLOBALS['csrf']['secret']; |
|
| 449 | + if ($GLOBALS['csrf']['secret']) { |
|
| 450 | + return $GLOBALS['csrf']['secret']; |
|
| 451 | + } |
|
| 401 | 452 | $dir = dirname(__FILE__); |
| 402 | 453 | $file = $dir . '/../../config/csrf_secret.php'; |
| 403 | 454 | $secret = ''; |
@@ -432,13 +483,21 @@ discard block |
||
| 432 | 483 | * from the current time. |
| 433 | 484 | */ |
| 434 | 485 | function csrf_hash($value, $time = null) { |
| 435 | - if (!$time) $time = time(); |
|
| 486 | + if (!$time) { |
|
| 487 | + $time = time(); |
|
| 488 | + } |
|
| 436 | 489 | return sha1(csrf_get_secret() . $value . $time) . ',' . $time; |
| 437 | 490 | } |
| 438 | 491 | |
| 439 | 492 | // Load user configuration |
| 440 | -if (function_exists('csrf_startup')) csrf_startup(); |
|
| 493 | +if (function_exists('csrf_startup')) { |
|
| 494 | + csrf_startup(); |
|
| 495 | +} |
|
| 441 | 496 | // Initialize our handler |
| 442 | -if ($GLOBALS['csrf']['rewrite']) ob_start('csrf_ob_handler'); |
|
| 497 | +if ($GLOBALS['csrf']['rewrite']) { |
|
| 498 | + ob_start('csrf_ob_handler'); |
|
| 499 | +} |
|
| 443 | 500 | // Perform check |
| 444 | -if (!$GLOBALS['csrf']['defer']) csrf_check(); |
|
| 501 | +if (!$GLOBALS['csrf']['defer']) { |
|
| 502 | + csrf_check(); |
|
| 503 | +} |
|
@@ -138,17 +138,17 @@ discard block |
||
| 138 | 138 | * inject our JavaScript library. |
| 139 | 139 | */ |
| 140 | 140 | function csrf_ob_handler($buffer, $flags) { |
| 141 | - // Even though the user told us to rewrite, we should do a quick heuristic |
|
| 142 | - // to check if the page is *actually* HTML. We don't begin rewriting until |
|
| 143 | - // we hit the first <html tag. |
|
| 144 | - static $is_html = false; |
|
| 145 | - static $is_partial = false; |
|
| 141 | + // Even though the user told us to rewrite, we should do a quick heuristic |
|
| 142 | + // to check if the page is *actually* HTML. We don't begin rewriting until |
|
| 143 | + // we hit the first <html tag. |
|
| 144 | + static $is_html = false; |
|
| 145 | + static $is_partial = false; |
|
| 146 | 146 | |
| 147 | - if (!$is_html) { |
|
| 148 | - // not HTML until proven otherwise |
|
| 149 | - if (stripos($buffer, '<html') !== false) { |
|
| 150 | - $is_html = true; |
|
| 151 | - } else { |
|
| 147 | + if (!$is_html) { |
|
| 148 | + // not HTML until proven otherwise |
|
| 149 | + if (stripos($buffer, '<html') !== false) { |
|
| 150 | + $is_html = true; |
|
| 151 | + } else { |
|
| 152 | 152 | |
| 153 | 153 | // Customized to take the partial HTML with form |
| 154 | 154 | $is_html = true; |
@@ -164,48 +164,48 @@ discard block |
||
| 164 | 164 | } |
| 165 | 165 | |
| 166 | 166 | if (!$is_html) return $buffer; |
| 167 | - } |
|
| 168 | - } |
|
| 169 | - $count=1; |
|
| 170 | - $tokens = csrf_get_tokens(); |
|
| 171 | - $name = $GLOBALS['csrf']['input-name']; |
|
| 172 | - $endslash = $GLOBALS['csrf']['xhtml'] ? ' /' : ''; |
|
| 173 | - $input = "<input type='hidden' name='$name' value=\"$tokens\"$endslash>"; |
|
| 174 | - $buffer = preg_replace('#(<form[^>]*method\s*=\s*["\']post["\'][^>]*>)#i', '$1' . $input, $buffer); |
|
| 175 | - if ($GLOBALS['csrf']['frame-breaker'] && !$is_partial) { |
|
| 176 | - $buffer = preg_replace('/<\/head>/', '<script type="text/javascript">if (top != self) {top.location.href = self.location.href;}</script></head>', $buffer,$count); |
|
| 177 | - } |
|
| 178 | - if (($js = $GLOBALS['csrf']['rewrite-js']) && !$is_partial) { |
|
| 167 | + } |
|
| 168 | + } |
|
| 169 | + $count=1; |
|
| 170 | + $tokens = csrf_get_tokens(); |
|
| 171 | + $name = $GLOBALS['csrf']['input-name']; |
|
| 172 | + $endslash = $GLOBALS['csrf']['xhtml'] ? ' /' : ''; |
|
| 173 | + $input = "<input type='hidden' name='$name' value=\"$tokens\"$endslash>"; |
|
| 174 | + $buffer = preg_replace('#(<form[^>]*method\s*=\s*["\']post["\'][^>]*>)#i', '$1' . $input, $buffer); |
|
| 175 | + if ($GLOBALS['csrf']['frame-breaker'] && !$is_partial) { |
|
| 176 | + $buffer = preg_replace('/<\/head>/', '<script type="text/javascript">if (top != self) {top.location.href = self.location.href;}</script></head>', $buffer,$count); |
|
| 177 | + } |
|
| 178 | + if (($js = $GLOBALS['csrf']['rewrite-js']) && !$is_partial) { |
|
| 179 | 179 | global $dbconfig; |
| 180 | - if (empty($dbconfig) || empty($dbconfig['db_name']) || $dbconfig['db_name'] == '_DBC_TYPE_') { |
|
| 180 | + if (empty($dbconfig) || empty($dbconfig['db_name']) || $dbconfig['db_name'] == '_DBC_TYPE_') { |
|
| 181 | 181 | $buffer = preg_replace( |
| 182 | - '/<\/head>/', |
|
| 183 | - '<script type="text/javascript">'. |
|
| 184 | - 'var csrfMagicToken = "'.$tokens.'";'. |
|
| 185 | - 'var csrfMagicName = "'.$name.'";</script>'. |
|
| 186 | - '<script src="../'.$js.'" type="text/javascript"></script></head>', |
|
| 187 | - $buffer,$count |
|
| 182 | + '/<\/head>/', |
|
| 183 | + '<script type="text/javascript">'. |
|
| 184 | + 'var csrfMagicToken = "'.$tokens.'";'. |
|
| 185 | + 'var csrfMagicName = "'.$name.'";</script>'. |
|
| 186 | + '<script src="../'.$js.'" type="text/javascript"></script></head>', |
|
| 187 | + $buffer,$count |
|
| 188 | 188 | ); |
| 189 | 189 | |
| 190 | 190 | } else { |
| 191 | 191 | $buffer = preg_replace( |
| 192 | - '/<\/head>/', |
|
| 193 | - '<script type="text/javascript">'. |
|
| 194 | - 'var csrfMagicToken = "'.$tokens.'";'. |
|
| 195 | - 'var csrfMagicName = "'.$name.'";</script>'. |
|
| 196 | - '<script src="'.$js.'" type="text/javascript"></script></head>', |
|
| 197 | - $buffer,$count |
|
| 192 | + '/<\/head>/', |
|
| 193 | + '<script type="text/javascript">'. |
|
| 194 | + 'var csrfMagicToken = "'.$tokens.'";'. |
|
| 195 | + 'var csrfMagicName = "'.$name.'";</script>'. |
|
| 196 | + '<script src="'.$js.'" type="text/javascript"></script></head>', |
|
| 197 | + $buffer,$count |
|
| 198 | 198 | ); |
| 199 | 199 | } |
| 200 | 200 | |
| 201 | - $script = '<script type="text/javascript">CsrfMagic.end();</script>'; |
|
| 201 | + $script = '<script type="text/javascript">CsrfMagic.end();</script>'; |
|
| 202 | 202 | |
| 203 | - $buffer = preg_replace('/<\/body>/', $script . '</body>', $buffer, $count); |
|
| 204 | - if (!$count) { |
|
| 205 | - $buffer .= $script; |
|
| 206 | - } |
|
| 207 | - } |
|
| 208 | - return $buffer; |
|
| 203 | + $buffer = preg_replace('/<\/body>/', $script . '</body>', $buffer, $count); |
|
| 204 | + if (!$count) { |
|
| 205 | + $buffer .= $script; |
|
| 206 | + } |
|
| 207 | + } |
|
| 208 | + return $buffer; |
|
| 209 | 209 | } |
| 210 | 210 | |
| 211 | 211 | /** |
@@ -214,26 +214,26 @@ discard block |
||
| 214 | 214 | * @return True if check passes or is not necessary, false if failure. |
| 215 | 215 | */ |
| 216 | 216 | function csrf_check($fatal = true) { |
| 217 | - if ($_SERVER['REQUEST_METHOD'] !== 'POST') return true; |
|
| 218 | - csrf_start(); |
|
| 219 | - $name = $GLOBALS['csrf']['input-name']; |
|
| 220 | - $ok = false; |
|
| 221 | - $tokens = ''; |
|
| 222 | - do { |
|
| 223 | - if (!isset($_POST[$name])) break; |
|
| 224 | - // we don't regenerate a token and check it because some token creation |
|
| 225 | - // schemes are volatile. |
|
| 226 | - $tokens = $_POST[$name]; |
|
| 227 | - if (!csrf_check_tokens($tokens)) break; |
|
| 228 | - $ok = true; |
|
| 229 | - } while (false); |
|
| 230 | - if ($fatal && !$ok) { |
|
| 231 | - $callback = $GLOBALS['csrf']['callback']; |
|
| 232 | - if (trim($tokens, 'A..Za..z0..9:;,') !== '') $tokens = 'hidden'; |
|
| 233 | - $callback($tokens); |
|
| 234 | - exit; |
|
| 235 | - } |
|
| 236 | - return $ok; |
|
| 217 | + if ($_SERVER['REQUEST_METHOD'] !== 'POST') return true; |
|
| 218 | + csrf_start(); |
|
| 219 | + $name = $GLOBALS['csrf']['input-name']; |
|
| 220 | + $ok = false; |
|
| 221 | + $tokens = ''; |
|
| 222 | + do { |
|
| 223 | + if (!isset($_POST[$name])) break; |
|
| 224 | + // we don't regenerate a token and check it because some token creation |
|
| 225 | + // schemes are volatile. |
|
| 226 | + $tokens = $_POST[$name]; |
|
| 227 | + if (!csrf_check_tokens($tokens)) break; |
|
| 228 | + $ok = true; |
|
| 229 | + } while (false); |
|
| 230 | + if ($fatal && !$ok) { |
|
| 231 | + $callback = $GLOBALS['csrf']['callback']; |
|
| 232 | + if (trim($tokens, 'A..Za..z0..9:;,') !== '') $tokens = 'hidden'; |
|
| 233 | + $callback($tokens); |
|
| 234 | + exit; |
|
| 235 | + } |
|
| 236 | + return $ok; |
|
| 237 | 237 | } |
| 238 | 238 | |
| 239 | 239 | /** |
@@ -241,67 +241,67 @@ discard block |
||
| 241 | 241 | * by semicolons. |
| 242 | 242 | */ |
| 243 | 243 | function csrf_get_tokens() { |
| 244 | - $has_cookies = !empty($_COOKIE); |
|
| 245 | - |
|
| 246 | - // $ip implements a composite key, which is sent if the user hasn't sent |
|
| 247 | - // any cookies. It may or may not be used, depending on whether or not |
|
| 248 | - // the cookies "stick" |
|
| 249 | - $secret = csrf_get_secret(); |
|
| 250 | - if (!$has_cookies && $secret) { |
|
| 251 | - $ip = ';ip:' . csrf_hash($_SERVER['IP_ADDRESS']); |
|
| 252 | - } else { |
|
| 253 | - $ip = ''; |
|
| 254 | - } |
|
| 255 | - csrf_start(); |
|
| 256 | - |
|
| 257 | - // These are "strong" algorithms that don't require per se a secret |
|
| 258 | - if (session_id()) return 'sid:' . csrf_hash(session_id()) . $ip; |
|
| 259 | - if ($GLOBALS['csrf']['cookie']) { |
|
| 260 | - $val = csrf_generate_secret(); |
|
| 261 | - setcookie($GLOBALS['csrf']['cookie'], $val); |
|
| 262 | - return 'cookie:' . csrf_hash($val) . $ip; |
|
| 263 | - } |
|
| 264 | - if ($GLOBALS['csrf']['key']) return 'key:' . csrf_hash($GLOBALS['csrf']['key']) . $ip; |
|
| 265 | - // These further algorithms require a server-side secret |
|
| 266 | - if (!$secret) return 'invalid'; |
|
| 267 | - if ($GLOBALS['csrf']['user'] !== false) { |
|
| 268 | - return 'user:' . csrf_hash($GLOBALS['csrf']['user']); |
|
| 269 | - } |
|
| 270 | - if ($GLOBALS['csrf']['allow-ip']) { |
|
| 271 | - return ltrim($ip, ';'); |
|
| 272 | - } |
|
| 273 | - return 'invalid'; |
|
| 244 | + $has_cookies = !empty($_COOKIE); |
|
| 245 | + |
|
| 246 | + // $ip implements a composite key, which is sent if the user hasn't sent |
|
| 247 | + // any cookies. It may or may not be used, depending on whether or not |
|
| 248 | + // the cookies "stick" |
|
| 249 | + $secret = csrf_get_secret(); |
|
| 250 | + if (!$has_cookies && $secret) { |
|
| 251 | + $ip = ';ip:' . csrf_hash($_SERVER['IP_ADDRESS']); |
|
| 252 | + } else { |
|
| 253 | + $ip = ''; |
|
| 254 | + } |
|
| 255 | + csrf_start(); |
|
| 256 | + |
|
| 257 | + // These are "strong" algorithms that don't require per se a secret |
|
| 258 | + if (session_id()) return 'sid:' . csrf_hash(session_id()) . $ip; |
|
| 259 | + if ($GLOBALS['csrf']['cookie']) { |
|
| 260 | + $val = csrf_generate_secret(); |
|
| 261 | + setcookie($GLOBALS['csrf']['cookie'], $val); |
|
| 262 | + return 'cookie:' . csrf_hash($val) . $ip; |
|
| 263 | + } |
|
| 264 | + if ($GLOBALS['csrf']['key']) return 'key:' . csrf_hash($GLOBALS['csrf']['key']) . $ip; |
|
| 265 | + // These further algorithms require a server-side secret |
|
| 266 | + if (!$secret) return 'invalid'; |
|
| 267 | + if ($GLOBALS['csrf']['user'] !== false) { |
|
| 268 | + return 'user:' . csrf_hash($GLOBALS['csrf']['user']); |
|
| 269 | + } |
|
| 270 | + if ($GLOBALS['csrf']['allow-ip']) { |
|
| 271 | + return ltrim($ip, ';'); |
|
| 272 | + } |
|
| 273 | + return 'invalid'; |
|
| 274 | 274 | } |
| 275 | 275 | |
| 276 | 276 | function csrf_flattenpost($data) { |
| 277 | - $ret = array(); |
|
| 278 | - foreach($data as $n => $v) { |
|
| 279 | - $ret = array_merge($ret, csrf_flattenpost2(1, $n, $v)); |
|
| 280 | - } |
|
| 281 | - return $ret; |
|
| 277 | + $ret = array(); |
|
| 278 | + foreach($data as $n => $v) { |
|
| 279 | + $ret = array_merge($ret, csrf_flattenpost2(1, $n, $v)); |
|
| 280 | + } |
|
| 281 | + return $ret; |
|
| 282 | 282 | } |
| 283 | 283 | function csrf_flattenpost2($level, $key, $data) { |
| 284 | - if(!is_array($data)) return array($key => $data); |
|
| 285 | - $ret = array(); |
|
| 286 | - foreach($data as $n => $v) { |
|
| 287 | - $nk = $level >= 1 ? $key."[$n]" : "[$n]"; |
|
| 288 | - $ret = array_merge($ret, csrf_flattenpost2($level+1, $nk, $v)); |
|
| 289 | - } |
|
| 290 | - return $ret; |
|
| 284 | + if(!is_array($data)) return array($key => $data); |
|
| 285 | + $ret = array(); |
|
| 286 | + foreach($data as $n => $v) { |
|
| 287 | + $nk = $level >= 1 ? $key."[$n]" : "[$n]"; |
|
| 288 | + $ret = array_merge($ret, csrf_flattenpost2($level+1, $nk, $v)); |
|
| 289 | + } |
|
| 290 | + return $ret; |
|
| 291 | 291 | } |
| 292 | 292 | |
| 293 | 293 | /** |
| 294 | 294 | * @param $tokens is safe for HTML consumption |
| 295 | 295 | */ |
| 296 | 296 | function csrf_callback($tokens) { |
| 297 | - // (yes, $tokens is safe to echo without escaping) |
|
| 298 | - header($_SERVER['SERVER_PROTOCOL'] . ' 403 Forbidden'); |
|
| 299 | - $data = ''; |
|
| 300 | - foreach (csrf_flattenpost($_POST) as $key => $value) { |
|
| 301 | - if ($key == $GLOBALS['csrf']['input-name']) continue; |
|
| 302 | - $data .= '<input type="hidden" name="'.htmlspecialchars($key).'" value="'.htmlspecialchars($value).'" />'; |
|
| 303 | - } |
|
| 304 | - echo "<html><head><title>CSRF check failed</title></head> |
|
| 297 | + // (yes, $tokens is safe to echo without escaping) |
|
| 298 | + header($_SERVER['SERVER_PROTOCOL'] . ' 403 Forbidden'); |
|
| 299 | + $data = ''; |
|
| 300 | + foreach (csrf_flattenpost($_POST) as $key => $value) { |
|
| 301 | + if ($key == $GLOBALS['csrf']['input-name']) continue; |
|
| 302 | + $data .= '<input type="hidden" name="'.htmlspecialchars($key).'" value="'.htmlspecialchars($value).'" />'; |
|
| 303 | + } |
|
| 304 | + echo "<html><head><title>CSRF check failed</title></head> |
|
| 305 | 305 | <body> |
| 306 | 306 | <p>CSRF check failed. Your form session may have expired, or you may not have |
| 307 | 307 | cookies enabled.</p> |
@@ -316,7 +316,7 @@ discard block |
||
| 316 | 316 | * It is configurable by setting $GLOBALS['csrf']['callback'] in this file |
| 317 | 317 | */ |
| 318 | 318 | function vtResponseForIllegalAccess() { |
| 319 | - echo 'Invalid request - Response For Illegal Access'; |
|
| 319 | + echo 'Invalid request - Response For Illegal Access'; |
|
| 320 | 320 | } |
| 321 | 321 | |
| 322 | 322 | /** |
@@ -324,106 +324,106 @@ discard block |
||
| 324 | 324 | * instead of csrf_check_token() |
| 325 | 325 | */ |
| 326 | 326 | function csrf_check_tokens($tokens) { |
| 327 | - if (is_string($tokens)) $tokens = explode(';', $tokens); |
|
| 328 | - foreach ($tokens as $token) { |
|
| 329 | - if (csrf_check_token($token)) return true; |
|
| 330 | - } |
|
| 331 | - return false; |
|
| 327 | + if (is_string($tokens)) $tokens = explode(';', $tokens); |
|
| 328 | + foreach ($tokens as $token) { |
|
| 329 | + if (csrf_check_token($token)) return true; |
|
| 330 | + } |
|
| 331 | + return false; |
|
| 332 | 332 | } |
| 333 | 333 | |
| 334 | 334 | /** |
| 335 | 335 | * Checks if a token is valid. |
| 336 | 336 | */ |
| 337 | 337 | function csrf_check_token($token) { |
| 338 | - if (strpos($token, ':') === false) return false; |
|
| 339 | - list($type, $value) = explode(':', $token, 2); |
|
| 340 | - if (strpos($value, ',') === false) return false; |
|
| 341 | - list($x, $time) = explode(',', $token, 2); |
|
| 342 | - if ($GLOBALS['csrf']['expires']) { |
|
| 343 | - if (time() > $time + $GLOBALS['csrf']['expires']) return false; |
|
| 344 | - } |
|
| 345 | - switch ($type) { |
|
| 346 | - case 'sid': |
|
| 347 | - return $value === csrf_hash(session_id(), $time); |
|
| 348 | - case 'cookie': |
|
| 349 | - $n = $GLOBALS['csrf']['cookie']; |
|
| 350 | - if (!$n) return false; |
|
| 351 | - if (!isset($_COOKIE[$n])) return false; |
|
| 352 | - return $value === csrf_hash($_COOKIE[$n], $time); |
|
| 353 | - case 'key': |
|
| 354 | - if (!$GLOBALS['csrf']['key']) return false; |
|
| 355 | - return $value === csrf_hash($GLOBALS['csrf']['key'], $time); |
|
| 356 | - // We could disable these 'weaker' checks if 'key' was set, but |
|
| 357 | - // that doesn't make me feel good then about the cookie-based |
|
| 358 | - // implementation. |
|
| 359 | - case 'user': |
|
| 360 | - if (!csrf_get_secret()) return false; |
|
| 361 | - if ($GLOBALS['csrf']['user'] === false) return false; |
|
| 362 | - return $value === csrf_hash($GLOBALS['csrf']['user'], $time); |
|
| 363 | - case 'ip': |
|
| 364 | - if (!csrf_get_secret()) return false; |
|
| 365 | - // do not allow IP-based checks if the username is set, or if |
|
| 366 | - // the browser sent cookies |
|
| 367 | - if ($GLOBALS['csrf']['user'] !== false) return false; |
|
| 368 | - if (!empty($_COOKIE)) return false; |
|
| 369 | - if (!$GLOBALS['csrf']['allow-ip']) return false; |
|
| 370 | - return $value === csrf_hash($_SERVER['IP_ADDRESS'], $time); |
|
| 371 | - } |
|
| 372 | - return false; |
|
| 338 | + if (strpos($token, ':') === false) return false; |
|
| 339 | + list($type, $value) = explode(':', $token, 2); |
|
| 340 | + if (strpos($value, ',') === false) return false; |
|
| 341 | + list($x, $time) = explode(',', $token, 2); |
|
| 342 | + if ($GLOBALS['csrf']['expires']) { |
|
| 343 | + if (time() > $time + $GLOBALS['csrf']['expires']) return false; |
|
| 344 | + } |
|
| 345 | + switch ($type) { |
|
| 346 | + case 'sid': |
|
| 347 | + return $value === csrf_hash(session_id(), $time); |
|
| 348 | + case 'cookie': |
|
| 349 | + $n = $GLOBALS['csrf']['cookie']; |
|
| 350 | + if (!$n) return false; |
|
| 351 | + if (!isset($_COOKIE[$n])) return false; |
|
| 352 | + return $value === csrf_hash($_COOKIE[$n], $time); |
|
| 353 | + case 'key': |
|
| 354 | + if (!$GLOBALS['csrf']['key']) return false; |
|
| 355 | + return $value === csrf_hash($GLOBALS['csrf']['key'], $time); |
|
| 356 | + // We could disable these 'weaker' checks if 'key' was set, but |
|
| 357 | + // that doesn't make me feel good then about the cookie-based |
|
| 358 | + // implementation. |
|
| 359 | + case 'user': |
|
| 360 | + if (!csrf_get_secret()) return false; |
|
| 361 | + if ($GLOBALS['csrf']['user'] === false) return false; |
|
| 362 | + return $value === csrf_hash($GLOBALS['csrf']['user'], $time); |
|
| 363 | + case 'ip': |
|
| 364 | + if (!csrf_get_secret()) return false; |
|
| 365 | + // do not allow IP-based checks if the username is set, or if |
|
| 366 | + // the browser sent cookies |
|
| 367 | + if ($GLOBALS['csrf']['user'] !== false) return false; |
|
| 368 | + if (!empty($_COOKIE)) return false; |
|
| 369 | + if (!$GLOBALS['csrf']['allow-ip']) return false; |
|
| 370 | + return $value === csrf_hash($_SERVER['IP_ADDRESS'], $time); |
|
| 371 | + } |
|
| 372 | + return false; |
|
| 373 | 373 | } |
| 374 | 374 | |
| 375 | 375 | /** |
| 376 | 376 | * Sets a configuration value. |
| 377 | 377 | */ |
| 378 | 378 | function csrf_conf($key, $val) { |
| 379 | - if (!isset($GLOBALS['csrf'][$key])) { |
|
| 380 | - trigger_error('No such configuration ' . $key, E_USER_WARNING); |
|
| 381 | - return; |
|
| 382 | - } |
|
| 383 | - $GLOBALS['csrf'][$key] = $val; |
|
| 379 | + if (!isset($GLOBALS['csrf'][$key])) { |
|
| 380 | + trigger_error('No such configuration ' . $key, E_USER_WARNING); |
|
| 381 | + return; |
|
| 382 | + } |
|
| 383 | + $GLOBALS['csrf'][$key] = $val; |
|
| 384 | 384 | } |
| 385 | 385 | |
| 386 | 386 | /** |
| 387 | 387 | * Starts a session if we're allowed to. |
| 388 | 388 | */ |
| 389 | 389 | function csrf_start() { |
| 390 | - if ($GLOBALS['csrf']['auto-session'] && !session_id()) { |
|
| 391 | - session_start(); |
|
| 392 | - } |
|
| 390 | + if ($GLOBALS['csrf']['auto-session'] && !session_id()) { |
|
| 391 | + session_start(); |
|
| 392 | + } |
|
| 393 | 393 | } |
| 394 | 394 | |
| 395 | 395 | /** |
| 396 | 396 | * Retrieves the secret, and generates one if necessary. |
| 397 | 397 | */ |
| 398 | 398 | function csrf_get_secret() { |
| 399 | - if ($GLOBALS['csrf']['secret']) return $GLOBALS['csrf']['secret']; |
|
| 400 | - $dir = dirname(__FILE__); |
|
| 401 | - $file = $dir . '/../../config/csrf_secret.php'; |
|
| 402 | - $secret = ''; |
|
| 403 | - if (file_exists($file)) { |
|
| 404 | - include $file; |
|
| 405 | - return $secret; |
|
| 406 | - } |
|
| 407 | - if (is_writable($dir)) { |
|
| 408 | - $secret = csrf_generate_secret(); |
|
| 409 | - $fh = fopen($file, 'w'); |
|
| 410 | - fwrite($fh, '<?php $secret = "'.$secret.'";' . PHP_EOL); |
|
| 411 | - fclose($fh); |
|
| 412 | - return $secret; |
|
| 413 | - } |
|
| 414 | - return ''; |
|
| 399 | + if ($GLOBALS['csrf']['secret']) return $GLOBALS['csrf']['secret']; |
|
| 400 | + $dir = dirname(__FILE__); |
|
| 401 | + $file = $dir . '/../../config/csrf_secret.php'; |
|
| 402 | + $secret = ''; |
|
| 403 | + if (file_exists($file)) { |
|
| 404 | + include $file; |
|
| 405 | + return $secret; |
|
| 406 | + } |
|
| 407 | + if (is_writable($dir)) { |
|
| 408 | + $secret = csrf_generate_secret(); |
|
| 409 | + $fh = fopen($file, 'w'); |
|
| 410 | + fwrite($fh, '<?php $secret = "'.$secret.'";' . PHP_EOL); |
|
| 411 | + fclose($fh); |
|
| 412 | + return $secret; |
|
| 413 | + } |
|
| 414 | + return ''; |
|
| 415 | 415 | } |
| 416 | 416 | |
| 417 | 417 | /** |
| 418 | 418 | * Generates a random string as the hash of time, microtime, and mt_rand. |
| 419 | 419 | */ |
| 420 | 420 | function csrf_generate_secret($len = 32) { |
| 421 | - $r = ''; |
|
| 422 | - for ($i = 0; $i < 32; $i++) { |
|
| 423 | - $r .= chr(mt_rand(0, 255)); |
|
| 424 | - } |
|
| 425 | - $r .= time() . microtime(); |
|
| 426 | - return sha1($r); |
|
| 421 | + $r = ''; |
|
| 422 | + for ($i = 0; $i < 32; $i++) { |
|
| 423 | + $r .= chr(mt_rand(0, 255)); |
|
| 424 | + } |
|
| 425 | + $r .= time() . microtime(); |
|
| 426 | + return sha1($r); |
|
| 427 | 427 | } |
| 428 | 428 | |
| 429 | 429 | /** |
@@ -431,8 +431,8 @@ discard block |
||
| 431 | 431 | * from the current time. |
| 432 | 432 | */ |
| 433 | 433 | function csrf_hash($value, $time = null) { |
| 434 | - if (!$time) $time = time(); |
|
| 435 | - return sha1(csrf_get_secret() . $value . $time) . ',' . $time; |
|
| 434 | + if (!$time) $time = time(); |
|
| 435 | + return sha1(csrf_get_secret() . $value . $time) . ',' . $time; |
|
| 436 | 436 | } |
| 437 | 437 | |
| 438 | 438 | // Load user configuration |
@@ -405,6 +405,7 @@ discard block |
||
| 405 | 405 | * @param int The unique ID of the person who tagged the object with this tag. |
| 406 | 406 | * @param int The unique ID of the object in question. |
| 407 | 407 | * @param string A raw string from a web form containing tags. |
| 408 | + * @param string $tag |
|
| 408 | 409 | * |
| 409 | 410 | * @return boolean Returns true if successful, false otherwise. Does not operate as a transaction. |
| 410 | 411 | */ |
@@ -662,7 +663,7 @@ discard block |
||
| 662 | 663 | * @param string The raw string form of the tag to delete. See above for vtiger_notes. |
| 663 | 664 | * @param int Whether to skip the update portion for objects that haven't been tagged. (Default: 1) |
| 664 | 665 | * |
| 665 | - * @return string Returns the tag in normalized form. |
|
| 666 | + * @return boolean Returns the tag in normalized form. |
|
| 666 | 667 | */ |
| 667 | 668 | public function tag_object($tagger_id, $object_id, $tag_string, $module, $skip_updates = 1) { |
| 668 | 669 | if($tag_string == '') { |
@@ -1127,6 +1128,10 @@ discard block |
||
| 1127 | 1128 | * @param string The text to output |
| 1128 | 1129 | * @return boolean Always returns true |
| 1129 | 1130 | */ |
| 1131 | + |
|
| 1132 | + /** |
|
| 1133 | + * @param string $text |
|
| 1134 | + */ |
|
| 1130 | 1135 | public function debug_text($text) { |
| 1131 | 1136 | if ($this->_debug) { |
| 1132 | 1137 | echo "$text<br>\n"; |
@@ -175,7 +175,7 @@ discard block |
||
| 175 | 175 | WHERE $where |
| 176 | 176 | ORDER BY object_id ASC |
| 177 | 177 | LIMIT $offset, $limit"; |
| 178 | - echo $sql; |
|
| 178 | + echo $sql; |
|
| 179 | 179 | $rs = $adb->pquery($sql, $params); |
| 180 | 180 | $retarr = array(); |
| 181 | 181 | while ($row = $adb->fetch_array($rs)) { |
@@ -220,7 +220,7 @@ discard block |
||
| 220 | 220 | WHERE $where |
| 221 | 221 | ORDER BY object_id ASC |
| 222 | 222 | "; |
| 223 | - //echo $sql; |
|
| 223 | + //echo $sql; |
|
| 224 | 224 | $rs = $adb->pquery($sql, $params); |
| 225 | 225 | $retarr = array(); |
| 226 | 226 | while ($row = $adb->fetch_array($rs)) { |
@@ -970,7 +970,7 @@ discard block |
||
| 970 | 970 | $tagger_sql |
| 971 | 971 | GROUP BY tag |
| 972 | 972 | ORDER BY quantity DESC LIMIT 0, $max"; |
| 973 | - //echo $sql; |
|
| 973 | + //echo $sql; |
|
| 974 | 974 | $rs = $adb->pquery($sql, $params); |
| 975 | 975 | $retarr = array(); |
| 976 | 976 | while ($row = $adb->fetch_array($rs)) { |
@@ -427,7 +427,9 @@ discard block |
||
| 427 | 427 | if ($this->_block_multiuser_tag_on_object == 0) { |
| 428 | 428 | $tagger_sql = " && tagger_id = ? "; |
| 429 | 429 | array_push($params, $tagger_id); |
| 430 | - } else $tagger_sql = ""; |
|
| 430 | + } else { |
|
| 431 | + $tagger_sql = ""; |
|
| 432 | + } |
|
| 431 | 433 | $sql = "SELECT COUNT(*) as count |
| 432 | 434 | FROM ${prefix}freetagged_objects INNER JOIN ${prefix}freetags ON (tag_id = id) |
| 433 | 435 | WHERE 1=1 |
@@ -902,8 +904,9 @@ discard block |
||
| 902 | 904 | // by $step. |
| 903 | 905 | $cloud_html = ''; |
| 904 | 906 | $cloud_spans = array(); |
| 905 | - if($module =='') |
|
| 906 | - $module = 'All'; |
|
| 907 | + if($module =='') { |
|
| 908 | + $module = 'All'; |
|
| 909 | + } |
|
| 907 | 910 | if($module != 'All') { |
| 908 | 911 | foreach ($tag_list[0] as $tag => $qty) { |
| 909 | 912 | $size = $min_font_size + ($qty - $min_qty) * $step; |
@@ -978,8 +981,12 @@ discard block |
||
| 978 | 981 | $retarr[$row['tag']] = $row['quantity']; |
| 979 | 982 | $retarr1[$row['tag']] = $row['tag_id']; |
| 980 | 983 | } |
| 981 | - if($retarr) ksort($retarr); |
|
| 982 | - if($retarr1) ksort($retarr1); |
|
| 984 | + if($retarr) { |
|
| 985 | + ksort($retarr); |
|
| 986 | + } |
|
| 987 | + if($retarr1) { |
|
| 988 | + ksort($retarr1); |
|
| 989 | + } |
|
| 983 | 990 | $return_value[]=$retarr; |
| 984 | 991 | $return_value[]=$retarr1; |
| 985 | 992 | return $return_value; |
@@ -65,7 +65,7 @@ discard block |
||
| 65 | 65 | * @access private |
| 66 | 66 | * @param string Whether to prevent multiple vtiger_users from tagging the same object. By default, set to block (ala Upcoming.org) |
| 67 | 67 | */ |
| 68 | - public $_block_multiuser_tag_on_object =0; |
|
| 68 | + public $_block_multiuser_tag_on_object = 0; |
|
| 69 | 69 | |
| 70 | 70 | /** |
| 71 | 71 | * @access private |
@@ -151,7 +151,7 @@ discard block |
||
| 151 | 151 | * @return An array of Object ID numbers that reference your original objects. |
| 152 | 152 | */ |
| 153 | 153 | public function get_objects_with_tag($tag, $offset = 0, $limit = 100, $tagger_id = NULL) { |
| 154 | - if(!isset($tag)) { |
|
| 154 | + if (!isset($tag)) { |
|
| 155 | 155 | return false; |
| 156 | 156 | } |
| 157 | 157 | $adb = PearDatabase::getInstance(); |
@@ -159,7 +159,7 @@ discard block |
||
| 159 | 159 | $where = "tag = ? "; |
| 160 | 160 | $params = array($tag); |
| 161 | 161 | |
| 162 | - if(isset($tagger_id) && ($tagger_id > 0)) { |
|
| 162 | + if (isset($tagger_id) && ($tagger_id > 0)) { |
|
| 163 | 163 | $where .= "AND tagger_id = ? "; |
| 164 | 164 | array_push($params, $tagger_id); |
| 165 | 165 | } |
@@ -197,7 +197,7 @@ discard block |
||
| 197 | 197 | * @return An array of Object ID numbers that reference your original objects. |
| 198 | 198 | */ |
| 199 | 199 | public function get_objects_with_tag_all($tag, $tagger_id = NULL) { |
| 200 | - if(!isset($tag)) { |
|
| 200 | + if (!isset($tag)) { |
|
| 201 | 201 | return false; |
| 202 | 202 | } |
| 203 | 203 | $adb = PearDatabase::getInstance(); |
@@ -205,7 +205,7 @@ discard block |
||
| 205 | 205 | $where = "tag = ? "; |
| 206 | 206 | $params = array($tag); |
| 207 | 207 | |
| 208 | - if(isset($tagger_id) && ($tagger_id > 0)) { |
|
| 208 | + if (isset($tagger_id) && ($tagger_id > 0)) { |
|
| 209 | 209 | $where .= "AND tagger_id = ? "; |
| 210 | 210 | array_push($params, $tagger_id); |
| 211 | 211 | } |
@@ -249,7 +249,7 @@ discard block |
||
| 249 | 249 | return $retarr; |
| 250 | 250 | } |
| 251 | 251 | $params = array($tagArray); |
| 252 | - if(isset($tagger_id) && ($tagger_id > 0)) { |
|
| 252 | + if (isset($tagger_id) && ($tagger_id > 0)) { |
|
| 253 | 253 | $tagger_sql = "AND tagger_id = ?"; |
| 254 | 254 | array_push($params, $tagger_id); |
| 255 | 255 | } else { |
@@ -270,7 +270,7 @@ discard block |
||
| 270 | 270 | $sql = "SELECT ${prefix}freetagged_objects.object_id, tag, COUNT(DISTINCT tag) AS uniques |
| 271 | 271 | FROM ${prefix}freetagged_objects |
| 272 | 272 | INNER JOIN ${prefix}freetags ON (${prefix}freetagged_objects.tag_id = ${prefix}freetags.id) |
| 273 | - WHERE ${prefix}freetags.tag IN (". generateQuestionMarks($tagArray) .") |
|
| 273 | + WHERE ${prefix}freetags.tag IN (" . generateQuestionMarks($tagArray) . ") |
|
| 274 | 274 | $tagger_sql |
| 275 | 275 | GROUP BY ${prefix}freetagged_objects.object_id |
| 276 | 276 | HAVING uniques = $numTags |
@@ -300,7 +300,7 @@ discard block |
||
| 300 | 300 | * @return An array of Object ID numbers that reference your original objects. |
| 301 | 301 | */ |
| 302 | 302 | public function get_objects_with_tag_id($tag_id, $offset = 0, $limit = 100, $tagger_id = NULL) { |
| 303 | - if(!isset($tag_id)) { |
|
| 303 | + if (!isset($tag_id)) { |
|
| 304 | 304 | return false; |
| 305 | 305 | } |
| 306 | 306 | $adb = PearDatabase::getInstance(); |
@@ -308,7 +308,7 @@ discard block |
||
| 308 | 308 | $where = "id = ? "; |
| 309 | 309 | $params = array($tag_id); |
| 310 | 310 | |
| 311 | - if(isset($tagger_id) && ($tagger_id > 0)) { |
|
| 311 | + if (isset($tagger_id) && ($tagger_id > 0)) { |
|
| 312 | 312 | $where .= "AND tagger_id = ?"; |
| 313 | 313 | array_push($params, $tagger_id); |
| 314 | 314 | } |
@@ -349,19 +349,19 @@ discard block |
||
| 349 | 349 | * - 'tagger_id' => The unique ID of the person who tagged the object with this tag. |
| 350 | 350 | */ |
| 351 | 351 | public function get_tags_on_object($object_id, $offset = 0, $limit = 10, $tagger_id = NULL) { |
| 352 | - if(!isset($object_id)) { |
|
| 352 | + if (!isset($object_id)) { |
|
| 353 | 353 | return false; |
| 354 | 354 | } |
| 355 | 355 | |
| 356 | 356 | $where = "object_id = ? "; |
| 357 | 357 | $params = array($object_id); |
| 358 | 358 | |
| 359 | - if(isset($tagger_id) && ($tagger_id > 0)) { |
|
| 359 | + if (isset($tagger_id) && ($tagger_id > 0)) { |
|
| 360 | 360 | $where .= "AND tagger_id = ? "; |
| 361 | 361 | array_push($params, $tagger_id); |
| 362 | 362 | } |
| 363 | 363 | |
| 364 | - if($limit <= 0) { |
|
| 364 | + if ($limit <= 0) { |
|
| 365 | 365 | $limit_sql = ""; |
| 366 | 366 | } else { |
| 367 | 367 | $limit_sql = "LIMIT $offset, $limit"; |
@@ -406,7 +406,7 @@ discard block |
||
| 406 | 406 | */ |
| 407 | 407 | |
| 408 | 408 | public function safe_tag($tagger_id, $object_id, $tag, $module) { |
| 409 | - if(!isset($tagger_id)||!isset($object_id)||!isset($tag)) { |
|
| 409 | + if (!isset($tagger_id) || !isset($object_id) || !isset($tag)) { |
|
| 410 | 410 | die("safe_tag argument missing"); |
| 411 | 411 | return false; |
| 412 | 412 | } |
@@ -433,7 +433,7 @@ discard block |
||
| 433 | 433 | |
| 434 | 434 | array_push($params, $object_id, $normalized_tag); |
| 435 | 435 | $rs = $adb->pquery($sql, $params); |
| 436 | - if($rs->fields['count'] > 0) { |
|
| 436 | + if ($rs->fields['count'] > 0) { |
|
| 437 | 437 | return true; |
| 438 | 438 | } |
| 439 | 439 | // Then see if a raw tag in this form exists. |
@@ -442,7 +442,7 @@ discard block |
||
| 442 | 442 | WHERE raw_tag = ? "; |
| 443 | 443 | $rs = $adb->pquery($sql, array($tag)); |
| 444 | 444 | $row = $adb->fetch_array($rs); |
| 445 | - if($row) { |
|
| 445 | + if ($row) { |
|
| 446 | 446 | $tag_id = $row['id']; |
| 447 | 447 | } else { |
| 448 | 448 | // Add new tag! |
@@ -452,7 +452,7 @@ discard block |
||
| 452 | 452 | $rs = $adb->pquery($sql, $params); |
| 453 | 453 | |
| 454 | 454 | } |
| 455 | - if(!($tag_id > 0)) { |
|
| 455 | + if (!($tag_id > 0)) { |
|
| 456 | 456 | return false; |
| 457 | 457 | } |
| 458 | 458 | $sql = "INSERT INTO ${prefix}freetagged_objects |
@@ -509,14 +509,14 @@ discard block |
||
| 509 | 509 | * @return string Returns the tag in normalized form. |
| 510 | 510 | */ |
| 511 | 511 | public function delete_object_tag($tagger_id, $object_id, $tag) { |
| 512 | - if(!isset($tagger_id)||!isset($object_id)||!isset($tag)) { |
|
| 512 | + if (!isset($tagger_id) || !isset($object_id) || !isset($tag)) { |
|
| 513 | 513 | die("delete_object_tag argument missing"); |
| 514 | 514 | return false; |
| 515 | 515 | } |
| 516 | 516 | $adb = PearDatabase::getInstance(); |
| 517 | 517 | $tag_id = $this->get_raw_tag_id($tag); |
| 518 | 518 | $prefix = $this->_table_prefix; |
| 519 | - if($tag_id > 0) { |
|
| 519 | + if ($tag_id > 0) { |
|
| 520 | 520 | |
| 521 | 521 | $sql = "DELETE FROM ${prefix}freetagged_objects |
| 522 | 522 | WHERE tagger_id = ? && object_id = ? && tag_id = ? LIMIT 1"; |
@@ -543,7 +543,7 @@ discard block |
||
| 543 | 543 | public function delete_all_object_tags($object_id) { |
| 544 | 544 | $adb = PearDatabase::getInstance(); |
| 545 | 545 | $prefix = $this->_table_prefix; |
| 546 | - if($object_id > 0) { |
|
| 546 | + if ($object_id > 0) { |
|
| 547 | 547 | $sql = "DELETE FROM ${prefix}freetagged_objects |
| 548 | 548 | WHERE object_id = ? "; |
| 549 | 549 | $rs = $adb->pquery($sql, array($object_id)); |
@@ -570,13 +570,13 @@ discard block |
||
| 570 | 570 | */ |
| 571 | 571 | |
| 572 | 572 | public function delete_all_object_tags_for_user($tagger_id, $object_id) { |
| 573 | - if(!isset($tagger_id)||!isset($object_id)) { |
|
| 573 | + if (!isset($tagger_id) || !isset($object_id)) { |
|
| 574 | 574 | die("delete_all_object_tags_for_user argument missing"); |
| 575 | 575 | return false; |
| 576 | 576 | } |
| 577 | 577 | $adb = PearDatabase::getInstance(); |
| 578 | 578 | $prefix = $this->_table_prefix; |
| 579 | - if($object_id > 0) { |
|
| 579 | + if ($object_id > 0) { |
|
| 580 | 580 | |
| 581 | 581 | $sql = "DELETE FROM ${prefix}freetagged_objects |
| 582 | 582 | WHERE tagger_id = ? && object_id = ?"; |
@@ -600,7 +600,7 @@ discard block |
||
| 600 | 600 | * @return string Returns the tag in normalized form. |
| 601 | 601 | */ |
| 602 | 602 | public function get_tag_id($tag) { |
| 603 | - if(!isset($tag)) { |
|
| 603 | + if (!isset($tag)) { |
|
| 604 | 604 | die("get_tag_id argument missing"); |
| 605 | 605 | return false; |
| 606 | 606 | } |
@@ -628,7 +628,7 @@ discard block |
||
| 628 | 628 | */ |
| 629 | 629 | |
| 630 | 630 | public function get_raw_tag_id($tag) { |
| 631 | - if(!isset($tag)) { |
|
| 631 | + if (!isset($tag)) { |
|
| 632 | 632 | die("get_tag_id argument missing"); |
| 633 | 633 | return false; |
| 634 | 634 | } |
@@ -661,7 +661,7 @@ discard block |
||
| 661 | 661 | * @return string Returns the tag in normalized form. |
| 662 | 662 | */ |
| 663 | 663 | public function tag_object($tagger_id, $object_id, $tag_string, $module, $skip_updates = 1) { |
| 664 | - if($tag_string == '') { |
|
| 664 | + if ($tag_string == '') { |
|
| 665 | 665 | // If an empty string was passed, just return true, don't die. |
| 666 | 666 | // die("Empty tag string passed"); |
| 667 | 667 | return true; |
@@ -702,10 +702,10 @@ discard block |
||
| 702 | 702 | * @return boolean True if successful, false otherwise. |
| 703 | 703 | */ |
| 704 | 704 | public function _tag_object_array($tagger_id, $object_id, $tagArray, $module) { |
| 705 | - foreach($tagArray as $tag) { |
|
| 705 | + foreach ($tagArray as $tag) { |
|
| 706 | 706 | $tag = trim($tag); |
| 707 | - if(($tag != '') && (strlen($tag) <= $this->_MAX_TAG_LENGTH)) { |
|
| 708 | - if(get_magic_quotes_gpc()) { |
|
| 707 | + if (($tag != '') && (strlen($tag) <= $this->_MAX_TAG_LENGTH)) { |
|
| 708 | + if (get_magic_quotes_gpc()) { |
|
| 709 | 709 | $tag = addslashes($tag); |
| 710 | 710 | } |
| 711 | 711 | $this->safe_tag($tagger_id, $object_id, $tag, $module); |
@@ -731,12 +731,12 @@ discard block |
||
| 731 | 731 | return $newwords; |
| 732 | 732 | } |
| 733 | 733 | # Perform tag parsing |
| 734 | - if(get_magic_quotes_gpc()) { |
|
| 734 | + if (get_magic_quotes_gpc()) { |
|
| 735 | 735 | $query = stripslashes(trim($tag_string)); |
| 736 | 736 | } else { |
| 737 | 737 | $query = trim($tag_string); |
| 738 | 738 | } |
| 739 | - $words = preg_split('/(")/', $query,-1,PREG_SPLIT_NO_EMPTY|PREG_SPLIT_DELIM_CAPTURE); |
|
| 739 | + $words = preg_split('/(")/', $query, -1, PREG_SPLIT_NO_EMPTY | PREG_SPLIT_DELIM_CAPTURE); |
|
| 740 | 740 | $delim = 0; |
| 741 | 741 | foreach ($words as $key => $word) |
| 742 | 742 | { |
@@ -782,7 +782,7 @@ discard block |
||
| 782 | 782 | public function get_most_popular_tags($tagger_id = NULL, $offset = 0, $limit = 25) { |
| 783 | 783 | $adb = PearDatabase::getInstance(); |
| 784 | 784 | $params = array(); |
| 785 | - if(isset($tagger_id) && ($tagger_id > 0)) { |
|
| 785 | + if (isset($tagger_id) && ($tagger_id > 0)) { |
|
| 786 | 786 | $tagger_sql = "AND tagger_id = ?"; |
| 787 | 787 | array_push($params, $tagger_id); |
| 788 | 788 | } else { |
@@ -826,7 +826,7 @@ discard block |
||
| 826 | 826 | public function count_tags($tagger_id = NULL) { |
| 827 | 827 | $adb = PearDatabase::getInstance(); |
| 828 | 828 | $params = array(); |
| 829 | - if(isset($tagger_id) && ($tagger_id > 0)) { |
|
| 829 | + if (isset($tagger_id) && ($tagger_id > 0)) { |
|
| 830 | 830 | $tagger_sql = "AND tagger_id = ?"; |
| 831 | 831 | array_push($params, $tagger_id); |
| 832 | 832 | } else { |
@@ -870,11 +870,11 @@ discard block |
||
| 870 | 870 | * @return string Returns an HTML snippet that can be used directly as a tag cloud. |
| 871 | 871 | */ |
| 872 | 872 | |
| 873 | - public function get_tag_cloud_html($module="",$tagger_id = NULL,$obj_id= NULL,$num_tags = 100, $min_font_size = 10, $max_font_size = 20, $font_units = 'px', $span_class = '', $tag_page_url = '/tag/') { |
|
| 873 | + public function get_tag_cloud_html($module = "", $tagger_id = NULL, $obj_id = NULL, $num_tags = 100, $min_font_size = 10, $max_font_size = 20, $font_units = 'px', $span_class = '', $tag_page_url = '/tag/') { |
|
| 874 | 874 | global $theme; |
| 875 | - $theme_path="themes/".$theme."/"; |
|
| 876 | - $image_path=$theme_path."images/"; |
|
| 877 | - $tag_list = $this->get_tag_cloud_tags($num_tags, $tagger_id,$module,$obj_id); |
|
| 875 | + $theme_path = "themes/" . $theme . "/"; |
|
| 876 | + $image_path = $theme_path . "images/"; |
|
| 877 | + $tag_list = $this->get_tag_cloud_tags($num_tags, $tagger_id, $module, $obj_id); |
|
| 878 | 878 | if (count($tag_list[0])) { |
| 879 | 879 | // Get the maximum qty of tagged objects in the set |
| 880 | 880 | $max_qty = max(array_values($tag_list[0])); |
@@ -890,7 +890,7 @@ discard block |
||
| 890 | 890 | if (0 == $spread) { // Divide by zero |
| 891 | 891 | $spread = 1; |
| 892 | 892 | } |
| 893 | - $step = ($max_font_size - $min_font_size)/($spread); |
|
| 893 | + $step = ($max_font_size - $min_font_size) / ($spread); |
|
| 894 | 894 | |
| 895 | 895 | // Since the original tag_list is alphabetically ordered, |
| 896 | 896 | // we can now create the tag cloud by just putting a span |
@@ -898,18 +898,18 @@ discard block |
||
| 898 | 898 | // by $step. |
| 899 | 899 | $cloud_html = ''; |
| 900 | 900 | $cloud_spans = array(); |
| 901 | - if($module =='') |
|
| 901 | + if ($module == '') |
|
| 902 | 902 | $module = 'All'; |
| 903 | - if($module != 'All') { |
|
| 903 | + if ($module != 'All') { |
|
| 904 | 904 | foreach ($tag_list[0] as $tag => $qty) { |
| 905 | 905 | $size = $min_font_size + ($qty - $min_qty) * $step; |
| 906 | - $cloud_span[] = '<span id="tag_'.$tag_list[1][$tag].'" class="' . $span_class . '" onMouseOver=$("tagspan_'.$tag_list[1][$tag].'").style.display="inline"; onMouseOut=$("tagspan_'.$tag_list[1][$tag].'").style.display="none";><a class="tagit" href="index.php?module=Home&action=UnifiedSearch&search_module='.$module.'&search_tag=tag_search&query_string='. urlencode($tag) . '" style="font-size: '. $size . $font_units . '">' . htmlspecialchars(stripslashes($tag)) . '</a><span class="'. $span_class .'" id="tagspan_'.$tag_list[1][$tag].'" style="display:none;cursor:pointer;" onClick="DeleteTag('.$tag_list[1][$tag].','.$obj_id.');"><img src="' . vtiger_imageurl('del_tag.gif', $theme) . '"></span></span>'; |
|
| 906 | + $cloud_span[] = '<span id="tag_' . $tag_list[1][$tag] . '" class="' . $span_class . '" onMouseOver=$("tagspan_' . $tag_list[1][$tag] . '").style.display="inline"; onMouseOut=$("tagspan_' . $tag_list[1][$tag] . '").style.display="none";><a class="tagit" href="index.php?module=Home&action=UnifiedSearch&search_module=' . $module . '&search_tag=tag_search&query_string=' . urlencode($tag) . '" style="font-size: ' . $size . $font_units . '">' . htmlspecialchars(stripslashes($tag)) . '</a><span class="' . $span_class . '" id="tagspan_' . $tag_list[1][$tag] . '" style="display:none;cursor:pointer;" onClick="DeleteTag(' . $tag_list[1][$tag] . ',' . $obj_id . ');"><img src="' . vtiger_imageurl('del_tag.gif', $theme) . '"></span></span>'; |
|
| 907 | 907 | |
| 908 | 908 | } |
| 909 | 909 | } else { |
| 910 | - foreach($tag_list[0] as $tag => $qty) { |
|
| 910 | + foreach ($tag_list[0] as $tag => $qty) { |
|
| 911 | 911 | $size = $min_font_size + ($qty - $min_qty) * $step; |
| 912 | - $cloud_span[] = '<span class="' . $span_class . '"><a class="tagit" href="index.php?module=Home&action=UnifiedSearch&search_module='.$module.'&search_tag=tag_search&query_string='. urlencode($tag) . '" style="font-size: '. $size . $font_units . '">' . htmlspecialchars(stripslashes($tag)) . '</a></span>'; |
|
| 912 | + $cloud_span[] = '<span class="' . $span_class . '"><a class="tagit" href="index.php?module=Home&action=UnifiedSearch&search_module=' . $module . '&search_tag=tag_search&query_string=' . urlencode($tag) . '" style="font-size: ' . $size . $font_units . '">' . htmlspecialchars(stripslashes($tag)) . '</a></span>'; |
|
| 913 | 913 | } |
| 914 | 914 | } |
| 915 | 915 | $cloud_html = join("\n ", $cloud_span); |
@@ -934,24 +934,24 @@ discard block |
||
| 934 | 934 | * values are numeric quantity of objects tagged with that tag. |
| 935 | 935 | */ |
| 936 | 936 | |
| 937 | - public function get_tag_cloud_tags($max = 100, $tagger_id = NULL,$module = "",$obj_id = NULL) { |
|
| 937 | + public function get_tag_cloud_tags($max = 100, $tagger_id = NULL, $module = "", $obj_id = NULL) { |
|
| 938 | 938 | $adb = PearDatabase::getInstance(); |
| 939 | 939 | $params = array(); |
| 940 | - if(isset($tagger_id) && ($tagger_id > 0)) { |
|
| 940 | + if (isset($tagger_id) && ($tagger_id > 0)) { |
|
| 941 | 941 | $tagger_sql = " && tagger_id = ?"; |
| 942 | 942 | array_push($params, $tagger_id); |
| 943 | 943 | } else { |
| 944 | 944 | $tagger_sql = ""; |
| 945 | 945 | } |
| 946 | 946 | |
| 947 | - if($module != "") { |
|
| 947 | + if ($module != "") { |
|
| 948 | 948 | $tagger_sql .= " && module = ?"; |
| 949 | 949 | array_push($params, $module); |
| 950 | 950 | } else { |
| 951 | 951 | $tagger_sql .= ""; |
| 952 | 952 | } |
| 953 | 953 | |
| 954 | - if(isset($obj_id) && $obj_id > 0) { |
|
| 954 | + if (isset($obj_id) && $obj_id > 0) { |
|
| 955 | 955 | $tagger_sql .= " && object_id = ?"; |
| 956 | 956 | array_push($params, $obj_id); |
| 957 | 957 | } else { |
@@ -974,10 +974,10 @@ discard block |
||
| 974 | 974 | $retarr[$row['tag']] = $row['quantity']; |
| 975 | 975 | $retarr1[$row['tag']] = $row['tag_id']; |
| 976 | 976 | } |
| 977 | - if($retarr) ksort($retarr); |
|
| 978 | - if($retarr1) ksort($retarr1); |
|
| 979 | - $return_value[]=$retarr; |
|
| 980 | - $return_value[]=$retarr1; |
|
| 977 | + if ($retarr) ksort($retarr); |
|
| 978 | + if ($retarr1) ksort($retarr1); |
|
| 979 | + $return_value[] = $retarr; |
|
| 980 | + $return_value[] = $retarr1; |
|
| 981 | 981 | return $return_value; |
| 982 | 982 | |
| 983 | 983 | } |
@@ -1010,7 +1010,7 @@ discard block |
||
| 1010 | 1010 | |
| 1011 | 1011 | public function similar_tags($tag, $max = 100) { |
| 1012 | 1012 | $retarr = array(); |
| 1013 | - if(!isset($tag)) { |
|
| 1013 | + if (!isset($tag)) { |
|
| 1014 | 1014 | return $retarr; |
| 1015 | 1015 | } |
| 1016 | 1016 | $adb = PearDatabase::getInstance(); |
@@ -1099,7 +1099,7 @@ discard block |
||
| 1099 | 1099 | $sql = "SELECT matches.object_id, COUNT( matches.object_id ) AS num_common_tags |
| 1100 | 1100 | FROM ${prefix}freetagged_objects as matches |
| 1101 | 1101 | INNER JOIN ${prefix}freetags as tags ON ( tags.id = matches.tag_id ) |
| 1102 | - WHERE tags.tag IN (". generateQuestionMarks($tagArray) .") |
|
| 1102 | + WHERE tags.tag IN (" . generateQuestionMarks($tagArray) . ") |
|
| 1103 | 1103 | GROUP BY matches.object_id |
| 1104 | 1104 | HAVING num_common_tags >= ? |
| 1105 | 1105 | ORDER BY num_common_tags DESC |
@@ -1107,7 +1107,7 @@ discard block |
||
| 1107 | 1107 | |
| 1108 | 1108 | $rs = $adb->pquery($sql, array($tagArray, $threshold, $max_objects)); |
| 1109 | 1109 | while ($row = $adb->fetch_array($rs)) { |
| 1110 | - $retarr[] = array ( |
|
| 1110 | + $retarr[] = array( |
|
| 1111 | 1111 | 'object_id' => $row['object_id'], |
| 1112 | 1112 | 'strength' => ($row['num_common_tags'] / $numTags) |
| 1113 | 1113 | ); |
@@ -306,7 +306,7 @@ discard block |
||
| 306 | 306 | /** |
| 307 | 307 | * gets the current debug data for this instance |
| 308 | 308 | * |
| 309 | - * @return debug data |
|
| 309 | + * @return string data |
|
| 310 | 310 | * @access public |
| 311 | 311 | */ |
| 312 | 312 | public function &getDebug() { |
@@ -319,7 +319,7 @@ discard block |
||
| 319 | 319 | * gets the current debug data for this instance as an XML comment |
| 320 | 320 | * this may change the contents of the debug data |
| 321 | 321 | * |
| 322 | - * @return debug data as an XML comment |
|
| 322 | + * @return string data as an XML comment |
|
| 323 | 323 | * @access public |
| 324 | 324 | */ |
| 325 | 325 | public function &getDebugAsXMLComment() { |
@@ -352,7 +352,7 @@ discard block |
||
| 352 | 352 | /** |
| 353 | 353 | * returns error string if present |
| 354 | 354 | * |
| 355 | - * @return mixed error string or false |
|
| 355 | + * @return string|false error string or false |
|
| 356 | 356 | * @access public |
| 357 | 357 | */ |
| 358 | 358 | public function getError(){ |
@@ -365,7 +365,7 @@ discard block |
||
| 365 | 365 | /** |
| 366 | 366 | * sets error string |
| 367 | 367 | * |
| 368 | - * @return boolean $string error string |
|
| 368 | + * @return boolean|null $string error string |
|
| 369 | 369 | * @access private |
| 370 | 370 | */ |
| 371 | 371 | public function setError($str){ |
@@ -800,7 +800,7 @@ discard block |
||
| 800 | 800 | * returns false, if not prefixed |
| 801 | 801 | * |
| 802 | 802 | * @param string $str The prefixed string |
| 803 | - * @return mixed The prefix or false if there is no prefix |
|
| 803 | + * @return string|false The prefix or false if there is no prefix |
|
| 804 | 804 | * @access public |
| 805 | 805 | */ |
| 806 | 806 | public function getPrefix($str){ |
@@ -830,7 +830,7 @@ discard block |
||
| 830 | 830 | * or false if no prefixes registered for the given namespace |
| 831 | 831 | * |
| 832 | 832 | * @param string $ns The namespace |
| 833 | - * @return mixed The prefix, false if the namespace has no prefixes |
|
| 833 | + * @return string The prefix, false if the namespace has no prefixes |
|
| 834 | 834 | * @access public |
| 835 | 835 | */ |
| 836 | 836 | public function getPrefixFromNamespace($ns) { |
@@ -896,7 +896,7 @@ discard block |
||
| 896 | 896 | * |
| 897 | 897 | * @param int $timestamp Unix time stamp |
| 898 | 898 | * @param boolean $utc Whether the time stamp is UTC or local |
| 899 | -* @return mixed ISO 8601 date string or false |
|
| 899 | +* @return string|false ISO 8601 date string or false |
|
| 900 | 900 | * @access public |
| 901 | 901 | */ |
| 902 | 902 | function timestamp_to_iso8601($timestamp,$utc=true){ |
@@ -104,21 +104,21 @@ discard block |
||
| 104 | 104 | * @access private |
| 105 | 105 | */ |
| 106 | 106 | public $revision = '$Revision: 1.57 $'; |
| 107 | - /** |
|
| 108 | - * Current error string (manipulated by getError/setError) |
|
| 107 | + /** |
|
| 108 | + * Current error string (manipulated by getError/setError) |
|
| 109 | 109 | * |
| 110 | 110 | * @var string |
| 111 | 111 | * @access private |
| 112 | 112 | */ |
| 113 | 113 | public $error_str = ''; |
| 114 | - /** |
|
| 115 | - * Current debug string (manipulated by debug/appendDebug/clearDebug/getDebug/getDebugAsXMLComment) |
|
| 114 | + /** |
|
| 115 | + * Current debug string (manipulated by debug/appendDebug/clearDebug/getDebug/getDebugAsXMLComment) |
|
| 116 | 116 | * |
| 117 | 117 | * @var string |
| 118 | 118 | * @access private |
| 119 | 119 | */ |
| 120 | - public $debug_str = ''; |
|
| 121 | - /** |
|
| 120 | + public $debug_str = ''; |
|
| 121 | + /** |
|
| 122 | 122 | * toggles automatic encoding of special characters as entities |
| 123 | 123 | * (should always be true, I think) |
| 124 | 124 | * |
@@ -134,31 +134,31 @@ discard block |
||
| 134 | 134 | */ |
| 135 | 135 | public $debugLevel; |
| 136 | 136 | |
| 137 | - /** |
|
| 138 | - * set schema version |
|
| 139 | - * |
|
| 140 | - * @var string |
|
| 141 | - * @access public |
|
| 142 | - */ |
|
| 137 | + /** |
|
| 138 | + * set schema version |
|
| 139 | + * |
|
| 140 | + * @var string |
|
| 141 | + * @access public |
|
| 142 | + */ |
|
| 143 | 143 | public $XMLSchemaVersion = 'http://www.w3.org/2001/XMLSchema'; |
| 144 | 144 | |
| 145 | - /** |
|
| 146 | - * charset encoding for outgoing messages |
|
| 147 | - * |
|
| 148 | - * @var string |
|
| 149 | - * @access public |
|
| 150 | - */ |
|
| 151 | - public $soap_defencoding = 'UTF-8'; |
|
| 145 | + /** |
|
| 146 | + * charset encoding for outgoing messages |
|
| 147 | + * |
|
| 148 | + * @var string |
|
| 149 | + * @access public |
|
| 150 | + */ |
|
| 151 | + public $soap_defencoding = 'UTF-8'; |
|
| 152 | 152 | //var $soap_defencoding = 'UTF-8'; |
| 153 | 153 | |
| 154 | 154 | /** |
| 155 | - * namespaces in an array of prefix => uri |
|
| 156 | - * |
|
| 157 | - * this is "seeded" by a set of constants, but it may be altered by code |
|
| 158 | - * |
|
| 159 | - * @var array |
|
| 160 | - * @access public |
|
| 161 | - */ |
|
| 155 | + * namespaces in an array of prefix => uri |
|
| 156 | + * |
|
| 157 | + * this is "seeded" by a set of constants, but it may be altered by code |
|
| 158 | + * |
|
| 159 | + * @var array |
|
| 160 | + * @access public |
|
| 161 | + */ |
|
| 162 | 162 | public $namespaces = array( |
| 163 | 163 | 'SOAP-ENV' => 'http://schemas.xmlsoap.org/soap/envelope/', |
| 164 | 164 | 'xsd' => 'http://www.w3.org/2001/XMLSchema', |
@@ -167,20 +167,20 @@ discard block |
||
| 167 | 167 | ); |
| 168 | 168 | |
| 169 | 169 | /** |
| 170 | - * namespaces used in the current context, e.g. during serialization |
|
| 171 | - * |
|
| 172 | - * @var array |
|
| 173 | - * @access private |
|
| 174 | - */ |
|
| 170 | + * namespaces used in the current context, e.g. during serialization |
|
| 171 | + * |
|
| 172 | + * @var array |
|
| 173 | + * @access private |
|
| 174 | + */ |
|
| 175 | 175 | public $usedNamespaces = array(); |
| 176 | 176 | |
| 177 | 177 | /** |
| 178 | - * XML Schema types in an array of uri => (array of xml type => php type) |
|
| 179 | - * is this legacy yet? |
|
| 180 | - * no, this is used by the nusoap_xmlschema class to verify type => namespace mappings. |
|
| 181 | - * @var array |
|
| 182 | - * @access public |
|
| 183 | - */ |
|
| 178 | + * XML Schema types in an array of uri => (array of xml type => php type) |
|
| 179 | + * is this legacy yet? |
|
| 180 | + * no, this is used by the nusoap_xmlschema class to verify type => namespace mappings. |
|
| 181 | + * @var array |
|
| 182 | + * @access public |
|
| 183 | + */ |
|
| 184 | 184 | public $typemap = array( |
| 185 | 185 | 'http://www.w3.org/2001/XMLSchema' => array( |
| 186 | 186 | 'string'=>'string','boolean'=>'boolean','float'=>'double','double'=>'double','decimal'=>'double', |
@@ -203,75 +203,75 @@ discard block |
||
| 203 | 203 | 'timeInstant'=>'string','base64Binary'=>'string','base64'=>'string','ur-type'=>'array'), |
| 204 | 204 | 'http://soapinterop.org/xsd' => array('SOAPStruct'=>'struct'), |
| 205 | 205 | 'http://schemas.xmlsoap.org/soap/encoding/' => array('base64'=>'string','array'=>'array','Array'=>'array'), |
| 206 | - 'http://xml.apache.org/xml-soap' => array('Map') |
|
| 206 | + 'http://xml.apache.org/xml-soap' => array('Map') |
|
| 207 | 207 | ); |
| 208 | 208 | |
| 209 | 209 | /** |
| 210 | - * XML entities to convert |
|
| 211 | - * |
|
| 212 | - * @var array |
|
| 213 | - * @access public |
|
| 214 | - * @deprecated |
|
| 215 | - * @see expandEntities |
|
| 216 | - */ |
|
| 210 | + * XML entities to convert |
|
| 211 | + * |
|
| 212 | + * @var array |
|
| 213 | + * @access public |
|
| 214 | + * @deprecated |
|
| 215 | + * @see expandEntities |
|
| 216 | + */ |
|
| 217 | 217 | public $xmlEntities = array('quot' => '"','amp' => '&', |
| 218 | 218 | 'lt' => '<','gt' => '>','apos' => "'"); |
| 219 | 219 | |
| 220 | 220 | /** |
| 221 | - * constructor |
|
| 222 | - * |
|
| 223 | - * @access public |
|
| 224 | - */ |
|
| 221 | + * constructor |
|
| 222 | + * |
|
| 223 | + * @access public |
|
| 224 | + */ |
|
| 225 | 225 | public function nusoap_base() { |
| 226 | 226 | $this->debugLevel = $GLOBALS['_transient']['static']['nusoap_base']['globalDebugLevel']; |
| 227 | 227 | } |
| 228 | 228 | |
| 229 | 229 | /** |
| 230 | - * gets the global debug level, which applies to future instances |
|
| 231 | - * |
|
| 232 | - * @return integer Debug level 0-9, where 0 turns off |
|
| 233 | - * @access public |
|
| 234 | - */ |
|
| 230 | + * gets the global debug level, which applies to future instances |
|
| 231 | + * |
|
| 232 | + * @return integer Debug level 0-9, where 0 turns off |
|
| 233 | + * @access public |
|
| 234 | + */ |
|
| 235 | 235 | public function getGlobalDebugLevel() { |
| 236 | 236 | return $GLOBALS['_transient']['static']['nusoap_base']['globalDebugLevel']; |
| 237 | 237 | } |
| 238 | 238 | |
| 239 | 239 | /** |
| 240 | - * sets the global debug level, which applies to future instances |
|
| 241 | - * |
|
| 242 | - * @param int $level Debug level 0-9, where 0 turns off |
|
| 243 | - * @access public |
|
| 244 | - */ |
|
| 240 | + * sets the global debug level, which applies to future instances |
|
| 241 | + * |
|
| 242 | + * @param int $level Debug level 0-9, where 0 turns off |
|
| 243 | + * @access public |
|
| 244 | + */ |
|
| 245 | 245 | public function setGlobalDebugLevel($level) { |
| 246 | 246 | $GLOBALS['_transient']['static']['nusoap_base']['globalDebugLevel'] = $level; |
| 247 | 247 | } |
| 248 | 248 | |
| 249 | 249 | /** |
| 250 | - * gets the debug level for this instance |
|
| 251 | - * |
|
| 252 | - * @return int Debug level 0-9, where 0 turns off |
|
| 253 | - * @access public |
|
| 254 | - */ |
|
| 250 | + * gets the debug level for this instance |
|
| 251 | + * |
|
| 252 | + * @return int Debug level 0-9, where 0 turns off |
|
| 253 | + * @access public |
|
| 254 | + */ |
|
| 255 | 255 | public function getDebugLevel() { |
| 256 | 256 | return $this->debugLevel; |
| 257 | 257 | } |
| 258 | 258 | |
| 259 | 259 | /** |
| 260 | - * sets the debug level for this instance |
|
| 261 | - * |
|
| 262 | - * @param int $level Debug level 0-9, where 0 turns off |
|
| 263 | - * @access public |
|
| 264 | - */ |
|
| 260 | + * sets the debug level for this instance |
|
| 261 | + * |
|
| 262 | + * @param int $level Debug level 0-9, where 0 turns off |
|
| 263 | + * @access public |
|
| 264 | + */ |
|
| 265 | 265 | public function setDebugLevel($level) { |
| 266 | 266 | $this->debugLevel = $level; |
| 267 | 267 | } |
| 268 | 268 | |
| 269 | 269 | /** |
| 270 | - * adds debug data to the instance debug string with formatting |
|
| 271 | - * |
|
| 272 | - * @param string $string debug data |
|
| 273 | - * @access private |
|
| 274 | - */ |
|
| 270 | + * adds debug data to the instance debug string with formatting |
|
| 271 | + * |
|
| 272 | + * @param string $string debug data |
|
| 273 | + * @access private |
|
| 274 | + */ |
|
| 275 | 275 | public function debug($string){ |
| 276 | 276 | if ($this->debugLevel > 0) { |
| 277 | 277 | $this->appendDebug($this->getmicrotime().' '.get_class($this).": $string\n"); |
@@ -279,11 +279,11 @@ discard block |
||
| 279 | 279 | } |
| 280 | 280 | |
| 281 | 281 | /** |
| 282 | - * adds debug data to the instance debug string without formatting |
|
| 283 | - * |
|
| 284 | - * @param string $string debug data |
|
| 285 | - * @access public |
|
| 286 | - */ |
|
| 282 | + * adds debug data to the instance debug string without formatting |
|
| 283 | + * |
|
| 284 | + * @param string $string debug data |
|
| 285 | + * @access public |
|
| 286 | + */ |
|
| 287 | 287 | public function appendDebug($string){ |
| 288 | 288 | if ($this->debugLevel > 0) { |
| 289 | 289 | // it would be nice to use a memory stream here to use |
@@ -293,10 +293,10 @@ discard block |
||
| 293 | 293 | } |
| 294 | 294 | |
| 295 | 295 | /** |
| 296 | - * clears the current debug data for this instance |
|
| 297 | - * |
|
| 298 | - * @access public |
|
| 299 | - */ |
|
| 296 | + * clears the current debug data for this instance |
|
| 297 | + * |
|
| 298 | + * @access public |
|
| 299 | + */ |
|
| 300 | 300 | public function clearDebug() { |
| 301 | 301 | // it would be nice to use a memory stream here to use |
| 302 | 302 | // memory more efficiently |
@@ -304,11 +304,11 @@ discard block |
||
| 304 | 304 | } |
| 305 | 305 | |
| 306 | 306 | /** |
| 307 | - * gets the current debug data for this instance |
|
| 308 | - * |
|
| 309 | - * @return debug data |
|
| 310 | - * @access public |
|
| 311 | - */ |
|
| 307 | + * gets the current debug data for this instance |
|
| 308 | + * |
|
| 309 | + * @return debug data |
|
| 310 | + * @access public |
|
| 311 | + */ |
|
| 312 | 312 | public function &getDebug() { |
| 313 | 313 | // it would be nice to use a memory stream here to use |
| 314 | 314 | // memory more efficiently |
@@ -316,12 +316,12 @@ discard block |
||
| 316 | 316 | } |
| 317 | 317 | |
| 318 | 318 | /** |
| 319 | - * gets the current debug data for this instance as an XML comment |
|
| 320 | - * this may change the contents of the debug data |
|
| 321 | - * |
|
| 322 | - * @return debug data as an XML comment |
|
| 323 | - * @access public |
|
| 324 | - */ |
|
| 319 | + * gets the current debug data for this instance as an XML comment |
|
| 320 | + * this may change the contents of the debug data |
|
| 321 | + * |
|
| 322 | + * @return debug data as an XML comment |
|
| 323 | + * @access public |
|
| 324 | + */ |
|
| 325 | 325 | public function &getDebugAsXMLComment() { |
| 326 | 326 | // it would be nice to use a memory stream here to use |
| 327 | 327 | // memory more efficiently |
@@ -329,32 +329,32 @@ discard block |
||
| 329 | 329 | $this->debug_str = str_replace('--', '- -', $this->debug_str); |
| 330 | 330 | } |
| 331 | 331 | $ret = "<!--\n" . $this->debug_str . "\n-->"; |
| 332 | - return $ret; |
|
| 332 | + return $ret; |
|
| 333 | 333 | } |
| 334 | 334 | |
| 335 | 335 | /** |
| 336 | - * expands entities, e.g. changes '<' to '<'. |
|
| 337 | - * |
|
| 338 | - * @param string $val The string in which to expand entities. |
|
| 339 | - * @access private |
|
| 340 | - */ |
|
| 336 | + * expands entities, e.g. changes '<' to '<'. |
|
| 337 | + * |
|
| 338 | + * @param string $val The string in which to expand entities. |
|
| 339 | + * @access private |
|
| 340 | + */ |
|
| 341 | 341 | public function expandEntities($val) { |
| 342 | 342 | if ($this->charencoding) { |
| 343 | - $val = str_replace('&', '&', $val); |
|
| 344 | - $val = str_replace("'", ''', $val); |
|
| 345 | - $val = str_replace('"', '"', $val); |
|
| 346 | - $val = str_replace('<', '<', $val); |
|
| 347 | - $val = str_replace('>', '>', $val); |
|
| 348 | - } |
|
| 349 | - return $val; |
|
| 343 | + $val = str_replace('&', '&', $val); |
|
| 344 | + $val = str_replace("'", ''', $val); |
|
| 345 | + $val = str_replace('"', '"', $val); |
|
| 346 | + $val = str_replace('<', '<', $val); |
|
| 347 | + $val = str_replace('>', '>', $val); |
|
| 348 | + } |
|
| 349 | + return $val; |
|
| 350 | 350 | } |
| 351 | 351 | |
| 352 | 352 | /** |
| 353 | - * returns error string if present |
|
| 354 | - * |
|
| 355 | - * @return mixed error string or false |
|
| 356 | - * @access public |
|
| 357 | - */ |
|
| 353 | + * returns error string if present |
|
| 354 | + * |
|
| 355 | + * @return mixed error string or false |
|
| 356 | + * @access public |
|
| 357 | + */ |
|
| 358 | 358 | public function getError(){ |
| 359 | 359 | if($this->error_str != ''){ |
| 360 | 360 | return $this->error_str; |
@@ -363,24 +363,24 @@ discard block |
||
| 363 | 363 | } |
| 364 | 364 | |
| 365 | 365 | /** |
| 366 | - * sets error string |
|
| 367 | - * |
|
| 368 | - * @return boolean $string error string |
|
| 369 | - * @access private |
|
| 370 | - */ |
|
| 366 | + * sets error string |
|
| 367 | + * |
|
| 368 | + * @return boolean $string error string |
|
| 369 | + * @access private |
|
| 370 | + */ |
|
| 371 | 371 | public function setError($str){ |
| 372 | 372 | $this->error_str = $str; |
| 373 | 373 | } |
| 374 | 374 | |
| 375 | 375 | /** |
| 376 | - * detect if array is a simple array or a struct (associative array) |
|
| 377 | - * |
|
| 378 | - * @param mixed $val The PHP array |
|
| 379 | - * @return string (arraySimple|arrayStruct) |
|
| 380 | - * @access private |
|
| 381 | - */ |
|
| 376 | + * detect if array is a simple array or a struct (associative array) |
|
| 377 | + * |
|
| 378 | + * @param mixed $val The PHP array |
|
| 379 | + * @return string (arraySimple|arrayStruct) |
|
| 380 | + * @access private |
|
| 381 | + */ |
|
| 382 | 382 | public function isArraySimpleOrStruct($val) { |
| 383 | - $keyList = array_keys($val); |
|
| 383 | + $keyList = array_keys($val); |
|
| 384 | 384 | foreach ($keyList as $keyListValue) { |
| 385 | 385 | if (!is_int($keyListValue)) { |
| 386 | 386 | return 'arrayStruct'; |
@@ -390,33 +390,33 @@ discard block |
||
| 390 | 390 | } |
| 391 | 391 | |
| 392 | 392 | /** |
| 393 | - * serializes PHP values in accordance w/ section 5. Type information is |
|
| 394 | - * not serialized if $use == 'literal'. |
|
| 395 | - * |
|
| 396 | - * @param mixed $val The value to serialize |
|
| 397 | - * @param string $name The name (local part) of the XML element |
|
| 398 | - * @param string $type The XML schema type (local part) for the element |
|
| 399 | - * @param string $name_ns The namespace for the name of the XML element |
|
| 400 | - * @param string $type_ns The namespace for the type of the element |
|
| 401 | - * @param array $attributes The attributes to serialize as name=>value pairs |
|
| 402 | - * @param string $use The WSDL "use" (encoded|literal) |
|
| 403 | - * @param boolean $soapval Whether this is called from soapval. |
|
| 404 | - * @return string The serialized element, possibly with child elements |
|
| 405 | - * @access public |
|
| 406 | - */ |
|
| 393 | + * serializes PHP values in accordance w/ section 5. Type information is |
|
| 394 | + * not serialized if $use == 'literal'. |
|
| 395 | + * |
|
| 396 | + * @param mixed $val The value to serialize |
|
| 397 | + * @param string $name The name (local part) of the XML element |
|
| 398 | + * @param string $type The XML schema type (local part) for the element |
|
| 399 | + * @param string $name_ns The namespace for the name of the XML element |
|
| 400 | + * @param string $type_ns The namespace for the type of the element |
|
| 401 | + * @param array $attributes The attributes to serialize as name=>value pairs |
|
| 402 | + * @param string $use The WSDL "use" (encoded|literal) |
|
| 403 | + * @param boolean $soapval Whether this is called from soapval. |
|
| 404 | + * @return string The serialized element, possibly with child elements |
|
| 405 | + * @access public |
|
| 406 | + */ |
|
| 407 | 407 | public function serialize_val($val,$name=false,$type=false,$name_ns=false,$type_ns=false,$attributes=false,$use='encoded',$soapval=false) { |
| 408 | 408 | $this->debug("in serialize_val: name=$name, type=$type, name_ns=$name_ns, type_ns=$type_ns, use=$use, soapval=$soapval"); |
| 409 | 409 | $this->appendDebug('value=' . $this->varDump($val)); |
| 410 | 410 | $this->appendDebug('attributes=' . $this->varDump($attributes)); |
| 411 | 411 | |
| 412 | - if (is_object($val) && get_class($val) == 'soapval' && (! $soapval)) { |
|
| 413 | - $this->debug("serialize_val: serialize soapval"); |
|
| 414 | - $xml = $val->serialize($use); |
|
| 412 | + if (is_object($val) && get_class($val) == 'soapval' && (! $soapval)) { |
|
| 413 | + $this->debug("serialize_val: serialize soapval"); |
|
| 414 | + $xml = $val->serialize($use); |
|
| 415 | 415 | $this->appendDebug($val->getDebug()); |
| 416 | 416 | $val->clearDebug(); |
| 417 | 417 | $this->debug("serialize_val of soapval returning $xml"); |
| 418 | 418 | return $xml; |
| 419 | - } |
|
| 419 | + } |
|
| 420 | 420 | // force valid name if necessary |
| 421 | 421 | if (is_numeric($name)) { |
| 422 | 422 | $name = '__numeric_' . $name; |
@@ -425,7 +425,7 @@ discard block |
||
| 425 | 425 | } |
| 426 | 426 | // if name has ns, add ns prefix to name |
| 427 | 427 | $xmlns = ''; |
| 428 | - if($name_ns){ |
|
| 428 | + if($name_ns){ |
|
| 429 | 429 | $prefix = 'nu'.rand(1000,9999); |
| 430 | 430 | $name = $prefix.':'.$name; |
| 431 | 431 | $xmlns .= " xmlns:$prefix=\"$name_ns\""; |
@@ -433,7 +433,7 @@ discard block |
||
| 433 | 433 | // if type is prefixed, create type prefix |
| 434 | 434 | if($type_ns != '' && $type_ns == $this->namespaces['xsd']){ |
| 435 | 435 | // need to fix this. shouldn't default to xsd if no ns specified |
| 436 | - // w/o checking against typemap |
|
| 436 | + // w/o checking against typemap |
|
| 437 | 437 | $type_prefix = 'xsd'; |
| 438 | 438 | } elseif($type_ns){ |
| 439 | 439 | $type_prefix = 'ns'.rand(1000,9999); |
@@ -448,12 +448,12 @@ discard block |
||
| 448 | 448 | } |
| 449 | 449 | // serialize null value |
| 450 | 450 | if (is_null($val)) { |
| 451 | - $this->debug("serialize_val: serialize null"); |
|
| 451 | + $this->debug("serialize_val: serialize null"); |
|
| 452 | 452 | if ($use == 'literal') { |
| 453 | 453 | $xml = "<$name$xmlns$atts/>"; |
| 454 | 454 | $this->debug("serialize_val returning $xml"); |
| 455 | - return $xml; |
|
| 456 | - } else { |
|
| 455 | + return $xml; |
|
| 456 | + } else { |
|
| 457 | 457 | if (isset($type) && isset($type_prefix)) { |
| 458 | 458 | $type_str = " xsi:type=\"$type_prefix:$type\""; |
| 459 | 459 | } else { |
@@ -461,41 +461,41 @@ discard block |
||
| 461 | 461 | } |
| 462 | 462 | $xml = "<$name$xmlns$type_str$atts xsi:nil=\"true\"/>"; |
| 463 | 463 | $this->debug("serialize_val returning $xml"); |
| 464 | - return $xml; |
|
| 465 | - } |
|
| 464 | + return $xml; |
|
| 465 | + } |
|
| 466 | 466 | } |
| 467 | - // serialize if an xsd built-in primitive type |
|
| 468 | - if($type != '' && isset($this->typemap[$this->XMLSchemaVersion][$type])){ |
|
| 469 | - $this->debug("serialize_val: serialize xsd built-in primitive type"); |
|
| 470 | - if (is_bool($val)) { |
|
| 471 | - if ($type == 'boolean') { |
|
| 472 | - $val = $val ? 'true' : 'false'; |
|
| 473 | - } elseif (! $val) { |
|
| 474 | - $val = 0; |
|
| 475 | - } |
|
| 467 | + // serialize if an xsd built-in primitive type |
|
| 468 | + if($type != '' && isset($this->typemap[$this->XMLSchemaVersion][$type])){ |
|
| 469 | + $this->debug("serialize_val: serialize xsd built-in primitive type"); |
|
| 470 | + if (is_bool($val)) { |
|
| 471 | + if ($type == 'boolean') { |
|
| 472 | + $val = $val ? 'true' : 'false'; |
|
| 473 | + } elseif (! $val) { |
|
| 474 | + $val = 0; |
|
| 475 | + } |
|
| 476 | 476 | } else if (is_string($val)) { |
| 477 | 477 | $val = $this->expandEntities($val); |
| 478 | 478 | } |
| 479 | 479 | if ($use == 'literal') { |
| 480 | 480 | $xml = "<$name$xmlns$atts>$val</$name>"; |
| 481 | 481 | $this->debug("serialize_val returning $xml"); |
| 482 | - return $xml; |
|
| 483 | - } else { |
|
| 482 | + return $xml; |
|
| 483 | + } else { |
|
| 484 | 484 | $xml = "<$name$xmlns xsi:type=\"xsd:$type\"$atts>$val</$name>"; |
| 485 | 485 | $this->debug("serialize_val returning $xml"); |
| 486 | - return $xml; |
|
| 487 | - } |
|
| 488 | - } |
|
| 486 | + return $xml; |
|
| 487 | + } |
|
| 488 | + } |
|
| 489 | 489 | // detect type and serialize |
| 490 | 490 | $xml = ''; |
| 491 | 491 | switch(true) { |
| 492 | 492 | case (is_bool($val) || $type == 'boolean'): |
| 493 | 493 | $this->debug("serialize_val: serialize boolean"); |
| 494 | - if ($type == 'boolean') { |
|
| 495 | - $val = $val ? 'true' : 'false'; |
|
| 496 | - } elseif (! $val) { |
|
| 497 | - $val = 0; |
|
| 498 | - } |
|
| 494 | + if ($type == 'boolean') { |
|
| 495 | + $val = $val ? 'true' : 'false'; |
|
| 496 | + } elseif (! $val) { |
|
| 497 | + $val = 0; |
|
| 498 | + } |
|
| 499 | 499 | if ($use == 'literal') { |
| 500 | 500 | $xml .= "<$name$xmlns$atts>$val</$name>"; |
| 501 | 501 | } else { |
@@ -529,12 +529,12 @@ discard block |
||
| 529 | 529 | break; |
| 530 | 530 | case is_object($val): |
| 531 | 531 | $this->debug("serialize_val: serialize object"); |
| 532 | - if (get_class($val) == 'soapval') { |
|
| 533 | - $this->debug("serialize_val: serialize soapval object"); |
|
| 534 | - $pXml = $val->serialize($use); |
|
| 532 | + if (get_class($val) == 'soapval') { |
|
| 533 | + $this->debug("serialize_val: serialize soapval object"); |
|
| 534 | + $pXml = $val->serialize($use); |
|
| 535 | 535 | $this->appendDebug($val->getDebug()); |
| 536 | 536 | $val->clearDebug(); |
| 537 | - } else { |
|
| 537 | + } else { |
|
| 538 | 538 | if (! $name) { |
| 539 | 539 | $name = get_class($val); |
| 540 | 540 | $this->debug("In serialize_val, used class name $name as element name"); |
@@ -560,19 +560,19 @@ discard block |
||
| 560 | 560 | case (is_array($val) || $type): |
| 561 | 561 | // detect if struct or array |
| 562 | 562 | $valueType = $this->isArraySimpleOrStruct($val); |
| 563 | - if($valueType=='arraySimple' || preg_match('/^ArrayOf/',$type)){ |
|
| 563 | + if($valueType=='arraySimple' || preg_match('/^ArrayOf/',$type)){ |
|
| 564 | 564 | $this->debug("serialize_val: serialize array"); |
| 565 | 565 | $i = 0; |
| 566 | 566 | if(is_array($val) && count($val)> 0){ |
| 567 | 567 | foreach($val as $v){ |
| 568 | - if(is_object($v) && get_class($v) == 'soapval'){ |
|
| 568 | + if(is_object($v) && get_class($v) == 'soapval'){ |
|
| 569 | 569 | $tt_ns = $v->type_ns; |
| 570 | 570 | $tt = $v->type; |
| 571 | 571 | } elseif (is_array($v)) { |
| 572 | 572 | $tt = $this->isArraySimpleOrStruct($v); |
| 573 | 573 | } else { |
| 574 | 574 | $tt = gettype($v); |
| 575 | - } |
|
| 575 | + } |
|
| 576 | 576 | $array_types[$tt] = 1; |
| 577 | 577 | $xml .= $this->serialize_val($v,'item',false,false,false,false,$use); |
| 578 | 578 | ++$i; |
@@ -655,19 +655,19 @@ discard block |
||
| 655 | 655 | return $xml; |
| 656 | 656 | } |
| 657 | 657 | |
| 658 | - /** |
|
| 659 | - * serializes a message |
|
| 660 | - * |
|
| 661 | - * @param string $body the XML of the SOAP body |
|
| 662 | - * @param mixed $headers optional string of XML with SOAP header content, or array of soapval objects for SOAP headers, or associative array |
|
| 663 | - * @param array $namespaces optional the namespaces used in generating the body and headers |
|
| 664 | - * @param string $style optional (rpc|document) |
|
| 665 | - * @param string $use optional (encoded|literal) |
|
| 666 | - * @param string $encodingStyle optional (usually 'http://schemas.xmlsoap.org/soap/encoding/' for encoded) |
|
| 667 | - * @return string the message |
|
| 668 | - * @access public |
|
| 669 | - */ |
|
| 670 | - public function serializeEnvelope($body,$headers=false,$namespaces=array(),$style='rpc',$use='encoded',$encodingStyle='http://schemas.xmlsoap.org/soap/encoding/'){ |
|
| 658 | + /** |
|
| 659 | + * serializes a message |
|
| 660 | + * |
|
| 661 | + * @param string $body the XML of the SOAP body |
|
| 662 | + * @param mixed $headers optional string of XML with SOAP header content, or array of soapval objects for SOAP headers, or associative array |
|
| 663 | + * @param array $namespaces optional the namespaces used in generating the body and headers |
|
| 664 | + * @param string $style optional (rpc|document) |
|
| 665 | + * @param string $use optional (encoded|literal) |
|
| 666 | + * @param string $encodingStyle optional (usually 'http://schemas.xmlsoap.org/soap/encoding/' for encoded) |
|
| 667 | + * @return string the message |
|
| 668 | + * @access public |
|
| 669 | + */ |
|
| 670 | + public function serializeEnvelope($body,$headers=false,$namespaces=array(),$style='rpc',$use='encoded',$encodingStyle='http://schemas.xmlsoap.org/soap/encoding/'){ |
|
| 671 | 671 | |
| 672 | 672 | $this->debug("In serializeEnvelope length=" . strlen($body) . " body (max 1000 characters)=" . substr($body, 0, 1000) . " style=$style use=$use encodingStyle=$encodingStyle"); |
| 673 | 673 | $this->debug("headers:"); |
@@ -676,7 +676,7 @@ discard block |
||
| 676 | 676 | $this->appendDebug($this->varDump($namespaces)); |
| 677 | 677 | |
| 678 | 678 | // serialize namespaces |
| 679 | - $ns_string = ''; |
|
| 679 | + $ns_string = ''; |
|
| 680 | 680 | foreach(array_merge($this->namespaces,$namespaces) as $k => $v){ |
| 681 | 681 | $ns_string .= " xmlns:$k=\"$v\""; |
| 682 | 682 | } |
@@ -709,7 +709,7 @@ discard block |
||
| 709 | 709 | $body. |
| 710 | 710 | "</SOAP-ENV:Body>". |
| 711 | 711 | "</SOAP-ENV:Envelope>"; |
| 712 | - } |
|
| 712 | + } |
|
| 713 | 713 | |
| 714 | 714 | /** |
| 715 | 715 | * formats a string to be inserted into an HTML stream |
@@ -719,18 +719,18 @@ discard block |
||
| 719 | 719 | * @access public |
| 720 | 720 | * @deprecated |
| 721 | 721 | */ |
| 722 | - public function formatDump($str){ |
|
| 722 | + public function formatDump($str){ |
|
| 723 | 723 | $str = htmlspecialchars($str); |
| 724 | 724 | return nl2br($str); |
| 725 | - } |
|
| 725 | + } |
|
| 726 | 726 | |
| 727 | 727 | /** |
| 728 | - * contracts (changes namespace to prefix) a qualified name |
|
| 729 | - * |
|
| 730 | - * @param string $qname qname |
|
| 731 | - * @return string contracted qname |
|
| 732 | - * @access private |
|
| 733 | - */ |
|
| 728 | + * contracts (changes namespace to prefix) a qualified name |
|
| 729 | + * |
|
| 730 | + * @param string $qname qname |
|
| 731 | + * @return string contracted qname |
|
| 732 | + * @access private |
|
| 733 | + */ |
|
| 734 | 734 | public function contractQname($qname){ |
| 735 | 735 | // get element namespace |
| 736 | 736 | if (strrpos($qname, ':')) { |
@@ -749,12 +749,12 @@ discard block |
||
| 749 | 749 | } |
| 750 | 750 | |
| 751 | 751 | /** |
| 752 | - * expands (changes prefix to namespace) a qualified name |
|
| 753 | - * |
|
| 754 | - * @param string $qname qname |
|
| 755 | - * @return string expanded qname |
|
| 756 | - * @access private |
|
| 757 | - */ |
|
| 752 | + * expands (changes prefix to namespace) a qualified name |
|
| 753 | + * |
|
| 754 | + * @param string $qname qname |
|
| 755 | + * @return string expanded qname |
|
| 756 | + * @access private |
|
| 757 | + */ |
|
| 758 | 758 | public function expandQname($qname){ |
| 759 | 759 | // get element prefix |
| 760 | 760 | if(strpos($qname,':') && !preg_match('/^http:\/\//',$qname)){ |
@@ -772,14 +772,14 @@ discard block |
||
| 772 | 772 | } |
| 773 | 773 | } |
| 774 | 774 | |
| 775 | - /** |
|
| 776 | - * returns the local part of a prefixed string |
|
| 777 | - * returns the original string, if not prefixed |
|
| 778 | - * |
|
| 779 | - * @param string $str The prefixed string |
|
| 780 | - * @return string The local part |
|
| 781 | - * @access public |
|
| 782 | - */ |
|
| 775 | + /** |
|
| 776 | + * returns the local part of a prefixed string |
|
| 777 | + * returns the original string, if not prefixed |
|
| 778 | + * |
|
| 779 | + * @param string $str The prefixed string |
|
| 780 | + * @return string The local part |
|
| 781 | + * @access public |
|
| 782 | + */ |
|
| 783 | 783 | public function getLocalPart($str){ |
| 784 | 784 | if($sstr = strrchr($str,':')){ |
| 785 | 785 | // get unqualified name |
@@ -790,13 +790,13 @@ discard block |
||
| 790 | 790 | } |
| 791 | 791 | |
| 792 | 792 | /** |
| 793 | - * returns the prefix part of a prefixed string |
|
| 794 | - * returns false, if not prefixed |
|
| 795 | - * |
|
| 796 | - * @param string $str The prefixed string |
|
| 797 | - * @return mixed The prefix or false if there is no prefix |
|
| 798 | - * @access public |
|
| 799 | - */ |
|
| 793 | + * returns the prefix part of a prefixed string |
|
| 794 | + * returns false, if not prefixed |
|
| 795 | + * |
|
| 796 | + * @param string $str The prefixed string |
|
| 797 | + * @return mixed The prefix or false if there is no prefix |
|
| 798 | + * @access public |
|
| 799 | + */ |
|
| 800 | 800 | public function getPrefix($str){ |
| 801 | 801 | if($pos = strrpos($str,':')){ |
| 802 | 802 | // get prefix |
@@ -806,12 +806,12 @@ discard block |
||
| 806 | 806 | } |
| 807 | 807 | |
| 808 | 808 | /** |
| 809 | - * pass it a prefix, it returns a namespace |
|
| 810 | - * |
|
| 811 | - * @param string $prefix The prefix |
|
| 812 | - * @return mixed The namespace, false if no namespace has the specified prefix |
|
| 813 | - * @access public |
|
| 814 | - */ |
|
| 809 | + * pass it a prefix, it returns a namespace |
|
| 810 | + * |
|
| 811 | + * @param string $prefix The prefix |
|
| 812 | + * @return mixed The namespace, false if no namespace has the specified prefix |
|
| 813 | + * @access public |
|
| 814 | + */ |
|
| 815 | 815 | public function getNamespaceFromPrefix($prefix){ |
| 816 | 816 | if (isset($this->namespaces[$prefix])) { |
| 817 | 817 | return $this->namespaces[$prefix]; |
@@ -820,17 +820,17 @@ discard block |
||
| 820 | 820 | } |
| 821 | 821 | |
| 822 | 822 | /** |
| 823 | - * returns the prefix for a given namespace (or prefix) |
|
| 824 | - * or false if no prefixes registered for the given namespace |
|
| 825 | - * |
|
| 826 | - * @param string $ns The namespace |
|
| 827 | - * @return mixed The prefix, false if the namespace has no prefixes |
|
| 828 | - * @access public |
|
| 829 | - */ |
|
| 823 | + * returns the prefix for a given namespace (or prefix) |
|
| 824 | + * or false if no prefixes registered for the given namespace |
|
| 825 | + * |
|
| 826 | + * @param string $ns The namespace |
|
| 827 | + * @return mixed The prefix, false if the namespace has no prefixes |
|
| 828 | + * @access public |
|
| 829 | + */ |
|
| 830 | 830 | public function getPrefixFromNamespace($ns) { |
| 831 | 831 | foreach ($this->namespaces as $p => $n) { |
| 832 | 832 | if ($ns == $n || $ns == $p) { |
| 833 | - $this->usedNamespaces[$p] = $n; |
|
| 833 | + $this->usedNamespaces[$p] = $n; |
|
| 834 | 834 | return $p; |
| 835 | 835 | } |
| 836 | 836 | } |
@@ -838,11 +838,11 @@ discard block |
||
| 838 | 838 | } |
| 839 | 839 | |
| 840 | 840 | /** |
| 841 | - * returns the time in ODBC canonical form with microseconds |
|
| 842 | - * |
|
| 843 | - * @return string The time in ODBC canonical form with microseconds |
|
| 844 | - * @access public |
|
| 845 | - */ |
|
| 841 | + * returns the time in ODBC canonical form with microseconds |
|
| 842 | + * |
|
| 843 | + * @return string The time in ODBC canonical form with microseconds |
|
| 844 | + * @access public |
|
| 845 | + */ |
|
| 846 | 846 | public function getmicrotime() { |
| 847 | 847 | if (function_exists('gettimeofday')) { |
| 848 | 848 | $tod = gettimeofday(); |
@@ -862,17 +862,17 @@ discard block |
||
| 862 | 862 | * @return string The output of var_dump |
| 863 | 863 | * @access public |
| 864 | 864 | */ |
| 865 | - public function varDump($data) { |
|
| 865 | + public function varDump($data) { |
|
| 866 | 866 | $ret_val = var_export($data, true); |
| 867 | 867 | return $ret_val; |
| 868 | 868 | } |
| 869 | 869 | |
| 870 | 870 | /** |
| 871 | - * represents the object as a string |
|
| 872 | - * |
|
| 873 | - * @return string |
|
| 874 | - * @access public |
|
| 875 | - */ |
|
| 871 | + * represents the object as a string |
|
| 872 | + * |
|
| 873 | + * @return string |
|
| 874 | + * @access public |
|
| 875 | + */ |
|
| 876 | 876 | public function __toString() { |
| 877 | 877 | return $this->varDump($this); |
| 878 | 878 | } |
@@ -183,26 +183,26 @@ discard block |
||
| 183 | 183 | */ |
| 184 | 184 | public $typemap = array( |
| 185 | 185 | 'http://www.w3.org/2001/XMLSchema' => array( |
| 186 | - 'string'=>'string','boolean'=>'boolean','float'=>'double','double'=>'double','decimal'=>'double', |
|
| 187 | - 'duration'=>'','dateTime'=>'string','time'=>'string','date'=>'string','gYearMonth'=>'', |
|
| 188 | - 'gYear'=>'','gMonthDay'=>'','gDay'=>'','gMonth'=>'','hexBinary'=>'string','base64Binary'=>'string', |
|
| 186 | + 'string'=>'string', 'boolean'=>'boolean', 'float'=>'double', 'double'=>'double', 'decimal'=>'double', |
|
| 187 | + 'duration'=>'', 'dateTime'=>'string', 'time'=>'string', 'date'=>'string', 'gYearMonth'=>'', |
|
| 188 | + 'gYear'=>'', 'gMonthDay'=>'', 'gDay'=>'', 'gMonth'=>'', 'hexBinary'=>'string', 'base64Binary'=>'string', |
|
| 189 | 189 | // abstract "any" types |
| 190 | - 'anyType'=>'string','anySimpleType'=>'string', |
|
| 190 | + 'anyType'=>'string', 'anySimpleType'=>'string', |
|
| 191 | 191 | // derived datatypes |
| 192 | - 'normalizedString'=>'string','token'=>'string','language'=>'','NMTOKEN'=>'','NMTOKENS'=>'','Name'=>'','NCName'=>'','ID'=>'', |
|
| 193 | - 'IDREF'=>'','IDREFS'=>'','ENTITY'=>'','ENTITIES'=>'','integer'=>'integer','nonPositiveInteger'=>'integer', |
|
| 194 | - 'negativeInteger'=>'integer','long'=>'integer','int'=>'integer','short'=>'integer','byte'=>'integer','nonNegativeInteger'=>'integer', |
|
| 195 | - 'unsignedLong'=>'','unsignedInt'=>'','unsignedShort'=>'','unsignedByte'=>'','positiveInteger'=>''), |
|
| 192 | + 'normalizedString'=>'string', 'token'=>'string', 'language'=>'', 'NMTOKEN'=>'', 'NMTOKENS'=>'', 'Name'=>'', 'NCName'=>'', 'ID'=>'', |
|
| 193 | + 'IDREF'=>'', 'IDREFS'=>'', 'ENTITY'=>'', 'ENTITIES'=>'', 'integer'=>'integer', 'nonPositiveInteger'=>'integer', |
|
| 194 | + 'negativeInteger'=>'integer', 'long'=>'integer', 'int'=>'integer', 'short'=>'integer', 'byte'=>'integer', 'nonNegativeInteger'=>'integer', |
|
| 195 | + 'unsignedLong'=>'', 'unsignedInt'=>'', 'unsignedShort'=>'', 'unsignedByte'=>'', 'positiveInteger'=>''), |
|
| 196 | 196 | 'http://www.w3.org/2000/10/XMLSchema' => array( |
| 197 | - 'i4'=>'','int'=>'integer','boolean'=>'boolean','string'=>'string','double'=>'double', |
|
| 198 | - 'float'=>'double','dateTime'=>'string', |
|
| 199 | - 'timeInstant'=>'string','base64Binary'=>'string','base64'=>'string','ur-type'=>'array'), |
|
| 197 | + 'i4'=>'', 'int'=>'integer', 'boolean'=>'boolean', 'string'=>'string', 'double'=>'double', |
|
| 198 | + 'float'=>'double', 'dateTime'=>'string', |
|
| 199 | + 'timeInstant'=>'string', 'base64Binary'=>'string', 'base64'=>'string', 'ur-type'=>'array'), |
|
| 200 | 200 | 'http://www.w3.org/1999/XMLSchema' => array( |
| 201 | - 'i4'=>'','int'=>'integer','boolean'=>'boolean','string'=>'string','double'=>'double', |
|
| 202 | - 'float'=>'double','dateTime'=>'string', |
|
| 203 | - 'timeInstant'=>'string','base64Binary'=>'string','base64'=>'string','ur-type'=>'array'), |
|
| 201 | + 'i4'=>'', 'int'=>'integer', 'boolean'=>'boolean', 'string'=>'string', 'double'=>'double', |
|
| 202 | + 'float'=>'double', 'dateTime'=>'string', |
|
| 203 | + 'timeInstant'=>'string', 'base64Binary'=>'string', 'base64'=>'string', 'ur-type'=>'array'), |
|
| 204 | 204 | 'http://soapinterop.org/xsd' => array('SOAPStruct'=>'struct'), |
| 205 | - 'http://schemas.xmlsoap.org/soap/encoding/' => array('base64'=>'string','array'=>'array','Array'=>'array'), |
|
| 205 | + 'http://schemas.xmlsoap.org/soap/encoding/' => array('base64'=>'string', 'array'=>'array', 'Array'=>'array'), |
|
| 206 | 206 | 'http://xml.apache.org/xml-soap' => array('Map') |
| 207 | 207 | ); |
| 208 | 208 | |
@@ -214,8 +214,8 @@ discard block |
||
| 214 | 214 | * @deprecated |
| 215 | 215 | * @see expandEntities |
| 216 | 216 | */ |
| 217 | - public $xmlEntities = array('quot' => '"','amp' => '&', |
|
| 218 | - 'lt' => '<','gt' => '>','apos' => "'"); |
|
| 217 | + public $xmlEntities = array('quot' => '"', 'amp' => '&', |
|
| 218 | + 'lt' => '<', 'gt' => '>', 'apos' => "'"); |
|
| 219 | 219 | |
| 220 | 220 | /** |
| 221 | 221 | * constructor |
@@ -272,9 +272,9 @@ discard block |
||
| 272 | 272 | * @param string $string debug data |
| 273 | 273 | * @access private |
| 274 | 274 | */ |
| 275 | - public function debug($string){ |
|
| 275 | + public function debug($string) { |
|
| 276 | 276 | if ($this->debugLevel > 0) { |
| 277 | - $this->appendDebug($this->getmicrotime().' '.get_class($this).": $string\n"); |
|
| 277 | + $this->appendDebug($this->getmicrotime() . ' ' . get_class($this) . ": $string\n"); |
|
| 278 | 278 | } |
| 279 | 279 | } |
| 280 | 280 | |
@@ -284,7 +284,7 @@ discard block |
||
| 284 | 284 | * @param string $string debug data |
| 285 | 285 | * @access public |
| 286 | 286 | */ |
| 287 | - public function appendDebug($string){ |
|
| 287 | + public function appendDebug($string) { |
|
| 288 | 288 | if ($this->debugLevel > 0) { |
| 289 | 289 | // it would be nice to use a memory stream here to use |
| 290 | 290 | // memory more efficiently |
@@ -355,8 +355,8 @@ discard block |
||
| 355 | 355 | * @return mixed error string or false |
| 356 | 356 | * @access public |
| 357 | 357 | */ |
| 358 | - public function getError(){ |
|
| 359 | - if($this->error_str != ''){ |
|
| 358 | + public function getError() { |
|
| 359 | + if ($this->error_str != '') { |
|
| 360 | 360 | return $this->error_str; |
| 361 | 361 | } |
| 362 | 362 | return false; |
@@ -368,7 +368,7 @@ discard block |
||
| 368 | 368 | * @return boolean $string error string |
| 369 | 369 | * @access private |
| 370 | 370 | */ |
| 371 | - public function setError($str){ |
|
| 371 | + public function setError($str) { |
|
| 372 | 372 | $this->error_str = $str; |
| 373 | 373 | } |
| 374 | 374 | |
@@ -404,12 +404,12 @@ discard block |
||
| 404 | 404 | * @return string The serialized element, possibly with child elements |
| 405 | 405 | * @access public |
| 406 | 406 | */ |
| 407 | - public function serialize_val($val,$name=false,$type=false,$name_ns=false,$type_ns=false,$attributes=false,$use='encoded',$soapval=false) { |
|
| 407 | + public function serialize_val($val, $name = false, $type = false, $name_ns = false, $type_ns = false, $attributes = false, $use = 'encoded', $soapval = false) { |
|
| 408 | 408 | $this->debug("in serialize_val: name=$name, type=$type, name_ns=$name_ns, type_ns=$type_ns, use=$use, soapval=$soapval"); |
| 409 | 409 | $this->appendDebug('value=' . $this->varDump($val)); |
| 410 | 410 | $this->appendDebug('attributes=' . $this->varDump($attributes)); |
| 411 | 411 | |
| 412 | - if (is_object($val) && get_class($val) == 'soapval' && (! $soapval)) { |
|
| 412 | + if (is_object($val) && get_class($val) == 'soapval' && (!$soapval)) { |
|
| 413 | 413 | $this->debug("serialize_val: serialize soapval"); |
| 414 | 414 | $xml = $val->serialize($use); |
| 415 | 415 | $this->appendDebug($val->getDebug()); |
@@ -420,30 +420,30 @@ discard block |
||
| 420 | 420 | // force valid name if necessary |
| 421 | 421 | if (is_numeric($name)) { |
| 422 | 422 | $name = '__numeric_' . $name; |
| 423 | - } elseif (! $name) { |
|
| 423 | + } elseif (!$name) { |
|
| 424 | 424 | $name = 'noname'; |
| 425 | 425 | } |
| 426 | 426 | // if name has ns, add ns prefix to name |
| 427 | 427 | $xmlns = ''; |
| 428 | - if($name_ns){ |
|
| 429 | - $prefix = 'nu'.rand(1000,9999); |
|
| 430 | - $name = $prefix.':'.$name; |
|
| 428 | + if ($name_ns) { |
|
| 429 | + $prefix = 'nu' . rand(1000, 9999); |
|
| 430 | + $name = $prefix . ':' . $name; |
|
| 431 | 431 | $xmlns .= " xmlns:$prefix=\"$name_ns\""; |
| 432 | 432 | } |
| 433 | 433 | // if type is prefixed, create type prefix |
| 434 | - if($type_ns != '' && $type_ns == $this->namespaces['xsd']){ |
|
| 434 | + if ($type_ns != '' && $type_ns == $this->namespaces['xsd']) { |
|
| 435 | 435 | // need to fix this. shouldn't default to xsd if no ns specified |
| 436 | 436 | // w/o checking against typemap |
| 437 | 437 | $type_prefix = 'xsd'; |
| 438 | - } elseif($type_ns){ |
|
| 439 | - $type_prefix = 'ns'.rand(1000,9999); |
|
| 438 | + } elseif ($type_ns) { |
|
| 439 | + $type_prefix = 'ns' . rand(1000, 9999); |
|
| 440 | 440 | $xmlns .= " xmlns:$type_prefix=\"$type_ns\""; |
| 441 | 441 | } |
| 442 | 442 | // serialize attributes if present |
| 443 | 443 | $atts = ''; |
| 444 | - if($attributes){ |
|
| 445 | - foreach($attributes as $k => $v){ |
|
| 446 | - $atts .= " $k=\"".$this->expandEntities($v).'"'; |
|
| 444 | + if ($attributes) { |
|
| 445 | + foreach ($attributes as $k => $v) { |
|
| 446 | + $atts .= " $k=\"" . $this->expandEntities($v) . '"'; |
|
| 447 | 447 | } |
| 448 | 448 | } |
| 449 | 449 | // serialize null value |
@@ -465,12 +465,12 @@ discard block |
||
| 465 | 465 | } |
| 466 | 466 | } |
| 467 | 467 | // serialize if an xsd built-in primitive type |
| 468 | - if($type != '' && isset($this->typemap[$this->XMLSchemaVersion][$type])){ |
|
| 468 | + if ($type != '' && isset($this->typemap[$this->XMLSchemaVersion][$type])) { |
|
| 469 | 469 | $this->debug("serialize_val: serialize xsd built-in primitive type"); |
| 470 | 470 | if (is_bool($val)) { |
| 471 | 471 | if ($type == 'boolean') { |
| 472 | 472 | $val = $val ? 'true' : 'false'; |
| 473 | - } elseif (! $val) { |
|
| 473 | + } elseif (!$val) { |
|
| 474 | 474 | $val = 0; |
| 475 | 475 | } |
| 476 | 476 | } else if (is_string($val)) { |
@@ -488,12 +488,12 @@ discard block |
||
| 488 | 488 | } |
| 489 | 489 | // detect type and serialize |
| 490 | 490 | $xml = ''; |
| 491 | - switch(true) { |
|
| 491 | + switch (true) { |
|
| 492 | 492 | case (is_bool($val) || $type == 'boolean'): |
| 493 | 493 | $this->debug("serialize_val: serialize boolean"); |
| 494 | 494 | if ($type == 'boolean') { |
| 495 | 495 | $val = $val ? 'true' : 'false'; |
| 496 | - } elseif (! $val) { |
|
| 496 | + } elseif (!$val) { |
|
| 497 | 497 | $val = 0; |
| 498 | 498 | } |
| 499 | 499 | if ($use == 'literal') { |
@@ -510,7 +510,7 @@ discard block |
||
| 510 | 510 | $xml .= "<$name$xmlns xsi:type=\"xsd:int\"$atts>$val</$name>"; |
| 511 | 511 | } |
| 512 | 512 | break; |
| 513 | - case (is_float($val)|| is_double($val) || $type == 'float'): |
|
| 513 | + case (is_float($val) || is_double($val) || $type == 'float'): |
|
| 514 | 514 | $this->debug("serialize_val: serialize float"); |
| 515 | 515 | if ($use == 'literal') { |
| 516 | 516 | $xml .= "<$name$xmlns$atts>$val</$name>"; |
@@ -535,17 +535,17 @@ discard block |
||
| 535 | 535 | $this->appendDebug($val->getDebug()); |
| 536 | 536 | $val->clearDebug(); |
| 537 | 537 | } else { |
| 538 | - if (! $name) { |
|
| 538 | + if (!$name) { |
|
| 539 | 539 | $name = get_class($val); |
| 540 | 540 | $this->debug("In serialize_val, used class name $name as element name"); |
| 541 | 541 | } else { |
| 542 | 542 | $this->debug("In serialize_val, do not override name $name for element name for class " . get_class($val)); |
| 543 | 543 | } |
| 544 | - foreach(get_object_vars($val) as $k => $v){ |
|
| 545 | - $pXml = isset($pXml) ? $pXml.$this->serialize_val($v,$k,false,false,false,false,$use) : $this->serialize_val($v,$k,false,false,false,false,$use); |
|
| 544 | + foreach (get_object_vars($val) as $k => $v) { |
|
| 545 | + $pXml = isset($pXml) ? $pXml . $this->serialize_val($v, $k, false, false, false, false, $use) : $this->serialize_val($v, $k, false, false, false, false, $use); |
|
| 546 | 546 | } |
| 547 | 547 | } |
| 548 | - if(isset($type) && isset($type_prefix)){ |
|
| 548 | + if (isset($type) && isset($type_prefix)) { |
|
| 549 | 549 | $type_str = " xsi:type=\"$type_prefix:$type\""; |
| 550 | 550 | } else { |
| 551 | 551 | $type_str = ''; |
@@ -560,12 +560,12 @@ discard block |
||
| 560 | 560 | case (is_array($val) || $type): |
| 561 | 561 | // detect if struct or array |
| 562 | 562 | $valueType = $this->isArraySimpleOrStruct($val); |
| 563 | - if($valueType=='arraySimple' || preg_match('/^ArrayOf/',$type)){ |
|
| 563 | + if ($valueType == 'arraySimple' || preg_match('/^ArrayOf/', $type)) { |
|
| 564 | 564 | $this->debug("serialize_val: serialize array"); |
| 565 | 565 | $i = 0; |
| 566 | - if(is_array($val) && count($val)> 0){ |
|
| 567 | - foreach($val as $v){ |
|
| 568 | - if(is_object($v) && get_class($v) == 'soapval'){ |
|
| 566 | + if (is_array($val) && count($val) > 0) { |
|
| 567 | + foreach ($val as $v) { |
|
| 568 | + if (is_object($v) && get_class($v) == 'soapval') { |
|
| 569 | 569 | $tt_ns = $v->type_ns; |
| 570 | 570 | $tt = $v->type; |
| 571 | 571 | } elseif (is_array($v)) { |
@@ -574,23 +574,23 @@ discard block |
||
| 574 | 574 | $tt = gettype($v); |
| 575 | 575 | } |
| 576 | 576 | $array_types[$tt] = 1; |
| 577 | - $xml .= $this->serialize_val($v,'item',false,false,false,false,$use); |
|
| 577 | + $xml .= $this->serialize_val($v, 'item', false, false, false, false, $use); |
|
| 578 | 578 | ++$i; |
| 579 | 579 | } |
| 580 | - if(count($array_types) > 1){ |
|
| 580 | + if (count($array_types) > 1) { |
|
| 581 | 581 | $array_typename = 'xsd:anyType'; |
| 582 | - } elseif(isset($tt) && isset($this->typemap[$this->XMLSchemaVersion][$tt])) { |
|
| 582 | + } elseif (isset($tt) && isset($this->typemap[$this->XMLSchemaVersion][$tt])) { |
|
| 583 | 583 | if ($tt == 'integer') { |
| 584 | 584 | $tt = 'int'; |
| 585 | 585 | } |
| 586 | - $array_typename = 'xsd:'.$tt; |
|
| 587 | - } elseif(isset($tt) && $tt == 'arraySimple'){ |
|
| 586 | + $array_typename = 'xsd:' . $tt; |
|
| 587 | + } elseif (isset($tt) && $tt == 'arraySimple') { |
|
| 588 | 588 | $array_typename = 'SOAP-ENC:Array'; |
| 589 | - } elseif(isset($tt) && $tt == 'arrayStruct'){ |
|
| 589 | + } elseif (isset($tt) && $tt == 'arrayStruct') { |
|
| 590 | 590 | $array_typename = 'unnamed_struct_use_soapval'; |
| 591 | 591 | } else { |
| 592 | 592 | // if type is prefixed, create type prefix |
| 593 | - if ($tt_ns != '' && $tt_ns == $this->namespaces['xsd']){ |
|
| 593 | + if ($tt_ns != '' && $tt_ns == $this->namespaces['xsd']) { |
|
| 594 | 594 | $array_typename = 'xsd:' . $tt; |
| 595 | 595 | } elseif ($tt_ns) { |
| 596 | 596 | $tt_prefix = 'ns' . rand(1000, 9999); |
@@ -606,7 +606,7 @@ discard block |
||
| 606 | 606 | } else if (isset($type) && isset($type_prefix)) { |
| 607 | 607 | $type_str = " xsi:type=\"$type_prefix:$type\""; |
| 608 | 608 | } else { |
| 609 | - $type_str = " xsi:type=\"SOAP-ENC:Array\" SOAP-ENC:arrayType=\"".$array_typename."[$array_type]\""; |
|
| 609 | + $type_str = " xsi:type=\"SOAP-ENC:Array\" SOAP-ENC:arrayType=\"" . $array_typename . "[$array_type]\""; |
|
| 610 | 610 | } |
| 611 | 611 | // empty array |
| 612 | 612 | } else { |
@@ -618,11 +618,11 @@ discard block |
||
| 618 | 618 | $type_str = " xsi:type=\"SOAP-ENC:Array\" SOAP-ENC:arrayType=\"xsd:anyType[0]\""; |
| 619 | 619 | } |
| 620 | 620 | } |
| 621 | - $xml = "<$name$xmlns$type_str$atts>".$xml."</$name>"; |
|
| 621 | + $xml = "<$name$xmlns$type_str$atts>" . $xml . "</$name>"; |
|
| 622 | 622 | } else { |
| 623 | 623 | // got a struct |
| 624 | 624 | $this->debug("serialize_val: serialize struct"); |
| 625 | - if(isset($type) && isset($type_prefix)){ |
|
| 625 | + if (isset($type) && isset($type_prefix)) { |
|
| 626 | 626 | $type_str = " xsi:type=\"$type_prefix:$type\""; |
| 627 | 627 | } else { |
| 628 | 628 | $type_str = ''; |
@@ -632,15 +632,15 @@ discard block |
||
| 632 | 632 | } else { |
| 633 | 633 | $xml .= "<$name$xmlns$type_str$atts>"; |
| 634 | 634 | } |
| 635 | - foreach($val as $k => $v){ |
|
| 635 | + foreach ($val as $k => $v) { |
|
| 636 | 636 | // Apache Map |
| 637 | 637 | if ($type == 'Map' && $type_ns == 'http://xml.apache.org/xml-soap') { |
| 638 | 638 | $xml .= '<item>'; |
| 639 | - $xml .= $this->serialize_val($k,'key',false,false,false,false,$use); |
|
| 640 | - $xml .= $this->serialize_val($v,'value',false,false,false,false,$use); |
|
| 639 | + $xml .= $this->serialize_val($k, 'key', false, false, false, false, $use); |
|
| 640 | + $xml .= $this->serialize_val($v, 'value', false, false, false, false, $use); |
|
| 641 | 641 | $xml .= '</item>'; |
| 642 | 642 | } else { |
| 643 | - $xml .= $this->serialize_val($v,$k,false,false,false,false,$use); |
|
| 643 | + $xml .= $this->serialize_val($v, $k, false, false, false, false, $use); |
|
| 644 | 644 | } |
| 645 | 645 | } |
| 646 | 646 | $xml .= "</$name>"; |
@@ -648,7 +648,7 @@ discard block |
||
| 648 | 648 | break; |
| 649 | 649 | default: |
| 650 | 650 | $this->debug("serialize_val: serialize unknown"); |
| 651 | - $xml .= 'not detected, got '.gettype($val).' for '.$val; |
|
| 651 | + $xml .= 'not detected, got ' . gettype($val) . ' for ' . $val; |
|
| 652 | 652 | break; |
| 653 | 653 | } |
| 654 | 654 | $this->debug("serialize_val returning $xml"); |
@@ -667,7 +667,7 @@ discard block |
||
| 667 | 667 | * @return string the message |
| 668 | 668 | * @access public |
| 669 | 669 | */ |
| 670 | - public function serializeEnvelope($body,$headers=false,$namespaces=array(),$style='rpc',$use='encoded',$encodingStyle='http://schemas.xmlsoap.org/soap/encoding/'){ |
|
| 670 | + public function serializeEnvelope($body, $headers = false, $namespaces = array(), $style = 'rpc', $use = 'encoded', $encodingStyle = 'http://schemas.xmlsoap.org/soap/encoding/') { |
|
| 671 | 671 | |
| 672 | 672 | $this->debug("In serializeEnvelope length=" . strlen($body) . " body (max 1000 characters)=" . substr($body, 0, 1000) . " style=$style use=$use encodingStyle=$encodingStyle"); |
| 673 | 673 | $this->debug("headers:"); |
@@ -677,15 +677,15 @@ discard block |
||
| 677 | 677 | |
| 678 | 678 | // serialize namespaces |
| 679 | 679 | $ns_string = ''; |
| 680 | - foreach(array_merge($this->namespaces,$namespaces) as $k => $v){ |
|
| 680 | + foreach (array_merge($this->namespaces, $namespaces) as $k => $v) { |
|
| 681 | 681 | $ns_string .= " xmlns:$k=\"$v\""; |
| 682 | 682 | } |
| 683 | - if($encodingStyle) { |
|
| 683 | + if ($encodingStyle) { |
|
| 684 | 684 | $ns_string = " SOAP-ENV:encodingStyle=\"$encodingStyle\"$ns_string"; |
| 685 | 685 | } |
| 686 | 686 | |
| 687 | 687 | // serialize headers |
| 688 | - if($headers){ |
|
| 688 | + if ($headers) { |
|
| 689 | 689 | if (is_array($headers)) { |
| 690 | 690 | $xml = ''; |
| 691 | 691 | foreach ($headers as $k => $v) { |
@@ -698,16 +698,16 @@ discard block |
||
| 698 | 698 | $headers = $xml; |
| 699 | 699 | $this->debug("In serializeEnvelope, serialized array of headers to $headers"); |
| 700 | 700 | } |
| 701 | - $headers = "<SOAP-ENV:Header>".$headers."</SOAP-ENV:Header>"; |
|
| 701 | + $headers = "<SOAP-ENV:Header>" . $headers . "</SOAP-ENV:Header>"; |
|
| 702 | 702 | } |
| 703 | 703 | // serialize envelope |
| 704 | 704 | return |
| 705 | - '<?xml version="1.0" encoding="'.$this->soap_defencoding .'"?'.">". |
|
| 706 | - '<SOAP-ENV:Envelope'.$ns_string.">". |
|
| 707 | - $headers. |
|
| 708 | - "<SOAP-ENV:Body>". |
|
| 709 | - $body. |
|
| 710 | - "</SOAP-ENV:Body>". |
|
| 705 | + '<?xml version="1.0" encoding="' . $this->soap_defencoding . '"?' . ">" . |
|
| 706 | + '<SOAP-ENV:Envelope' . $ns_string . ">" . |
|
| 707 | + $headers . |
|
| 708 | + "<SOAP-ENV:Body>" . |
|
| 709 | + $body . |
|
| 710 | + "</SOAP-ENV:Body>" . |
|
| 711 | 711 | "</SOAP-ENV:Envelope>"; |
| 712 | 712 | } |
| 713 | 713 | |
@@ -719,7 +719,7 @@ discard block |
||
| 719 | 719 | * @access public |
| 720 | 720 | * @deprecated |
| 721 | 721 | */ |
| 722 | - public function formatDump($str){ |
|
| 722 | + public function formatDump($str) { |
|
| 723 | 723 | $str = htmlspecialchars($str); |
| 724 | 724 | return nl2br($str); |
| 725 | 725 | } |
@@ -731,7 +731,7 @@ discard block |
||
| 731 | 731 | * @return string contracted qname |
| 732 | 732 | * @access private |
| 733 | 733 | */ |
| 734 | - public function contractQname($qname){ |
|
| 734 | + public function contractQname($qname) { |
|
| 735 | 735 | // get element namespace |
| 736 | 736 | if (strrpos($qname, ':')) { |
| 737 | 737 | // get unqualified name |
@@ -755,15 +755,15 @@ discard block |
||
| 755 | 755 | * @return string expanded qname |
| 756 | 756 | * @access private |
| 757 | 757 | */ |
| 758 | - public function expandQname($qname){ |
|
| 758 | + public function expandQname($qname) { |
|
| 759 | 759 | // get element prefix |
| 760 | - if(strpos($qname,':') && !preg_match('/^http:\/\//',$qname)){ |
|
| 760 | + if (strpos($qname, ':') && !preg_match('/^http:\/\//', $qname)) { |
|
| 761 | 761 | // get unqualified name |
| 762 | - $name = substr(strstr($qname,':'),1); |
|
| 762 | + $name = substr(strstr($qname, ':'), 1); |
|
| 763 | 763 | // get ns prefix |
| 764 | - $prefix = substr($qname,0,strpos($qname,':')); |
|
| 765 | - if(isset($this->namespaces[$prefix])){ |
|
| 766 | - return $this->namespaces[$prefix].':'.$name; |
|
| 764 | + $prefix = substr($qname, 0, strpos($qname, ':')); |
|
| 765 | + if (isset($this->namespaces[$prefix])) { |
|
| 766 | + return $this->namespaces[$prefix] . ':' . $name; |
|
| 767 | 767 | } else { |
| 768 | 768 | return $qname; |
| 769 | 769 | } |
@@ -780,10 +780,10 @@ discard block |
||
| 780 | 780 | * @return string The local part |
| 781 | 781 | * @access public |
| 782 | 782 | */ |
| 783 | - public function getLocalPart($str){ |
|
| 784 | - if($sstr = strrchr($str,':')){ |
|
| 783 | + public function getLocalPart($str) { |
|
| 784 | + if ($sstr = strrchr($str, ':')) { |
|
| 785 | 785 | // get unqualified name |
| 786 | - return substr( $sstr, 1 ); |
|
| 786 | + return substr($sstr, 1); |
|
| 787 | 787 | } else { |
| 788 | 788 | return $str; |
| 789 | 789 | } |
@@ -797,10 +797,10 @@ discard block |
||
| 797 | 797 | * @return mixed The prefix or false if there is no prefix |
| 798 | 798 | * @access public |
| 799 | 799 | */ |
| 800 | - public function getPrefix($str){ |
|
| 801 | - if($pos = strrpos($str,':')){ |
|
| 800 | + public function getPrefix($str) { |
|
| 801 | + if ($pos = strrpos($str, ':')) { |
|
| 802 | 802 | // get prefix |
| 803 | - return substr($str,0,$pos); |
|
| 803 | + return substr($str, 0, $pos); |
|
| 804 | 804 | } |
| 805 | 805 | return false; |
| 806 | 806 | } |
@@ -812,7 +812,7 @@ discard block |
||
| 812 | 812 | * @return mixed The namespace, false if no namespace has the specified prefix |
| 813 | 813 | * @access public |
| 814 | 814 | */ |
| 815 | - public function getNamespaceFromPrefix($prefix){ |
|
| 815 | + public function getNamespaceFromPrefix($prefix) { |
|
| 816 | 816 | if (isset($this->namespaces[$prefix])) { |
| 817 | 817 | return $this->namespaces[$prefix]; |
| 818 | 818 | } |
@@ -890,8 +890,8 @@ discard block |
||
| 890 | 890 | * @return mixed ISO 8601 date string or false |
| 891 | 891 | * @access public |
| 892 | 892 | */ |
| 893 | -function timestamp_to_iso8601($timestamp,$utc=true){ |
|
| 894 | - $datestr = date('Y-m-d\TH:i:sO',$timestamp); |
|
| 893 | +function timestamp_to_iso8601($timestamp, $utc = true) { |
|
| 894 | + $datestr = date('Y-m-d\TH:i:sO', $timestamp); |
|
| 895 | 895 | $pos = strrpos($datestr, "+"); |
| 896 | 896 | if ($pos === false) { |
| 897 | 897 | $pos = strrpos($datestr, "-"); |
@@ -901,20 +901,20 @@ discard block |
||
| 901 | 901 | $datestr = substr($datestr, 0, $pos + 3) . ':' . substr($datestr, -2); |
| 902 | 902 | } |
| 903 | 903 | } |
| 904 | - if($utc){ |
|
| 905 | - $pattern = '/'. |
|
| 906 | - '([0-9]{4})-'. // centuries & years CCYY- |
|
| 907 | - '([0-9]{2})-'. // months MM- |
|
| 908 | - '([0-9]{2})'. // days DD |
|
| 909 | - 'T'. // separator T |
|
| 910 | - '([0-9]{2}):'. // hours hh: |
|
| 911 | - '([0-9]{2}):'. // minutes mm: |
|
| 912 | - '([0-9]{2})(\.[0-9]*)?'. // seconds ss.ss... |
|
| 913 | - '(Z|[+\-][0-9]{2}:?[0-9]{2})?'. // Z to indicate UTC, -/+HH:MM:SS.SS... for local tz's |
|
| 904 | + if ($utc) { |
|
| 905 | + $pattern = '/' . |
|
| 906 | + '([0-9]{4})-' . // centuries & years CCYY- |
|
| 907 | + '([0-9]{2})-' . // months MM- |
|
| 908 | + '([0-9]{2})' . // days DD |
|
| 909 | + 'T' . // separator T |
|
| 910 | + '([0-9]{2}):' . // hours hh: |
|
| 911 | + '([0-9]{2}):' . // minutes mm: |
|
| 912 | + '([0-9]{2})(\.[0-9]*)?' . // seconds ss.ss... |
|
| 913 | + '(Z|[+\-][0-9]{2}:?[0-9]{2})?' . // Z to indicate UTC, -/+HH:MM:SS.SS... for local tz's |
|
| 914 | 914 | '/'; |
| 915 | 915 | |
| 916 | - if(preg_match($pattern,$datestr,$regs)){ |
|
| 917 | - return sprintf('%04d-%02d-%02dT%02d:%02d:%02dZ',$regs[1],$regs[2],$regs[3],$regs[4],$regs[5],$regs[6]); |
|
| 916 | + if (preg_match($pattern, $datestr, $regs)) { |
|
| 917 | + return sprintf('%04d-%02d-%02dT%02d:%02d:%02dZ', $regs[1], $regs[2], $regs[3], $regs[4], $regs[5], $regs[6]); |
|
| 918 | 918 | } |
| 919 | 919 | return false; |
| 920 | 920 | } else { |
@@ -929,27 +929,27 @@ discard block |
||
| 929 | 929 | * @return mixed Unix timestamp (int) or false |
| 930 | 930 | * @access public |
| 931 | 931 | */ |
| 932 | -function iso8601_to_timestamp($datestr){ |
|
| 933 | - $pattern = '/'. |
|
| 934 | - '([0-9]{4})-'. // centuries & years CCYY- |
|
| 935 | - '([0-9]{2})-'. // months MM- |
|
| 936 | - '([0-9]{2})'. // days DD |
|
| 937 | - 'T'. // separator T |
|
| 938 | - '([0-9]{2}):'. // hours hh: |
|
| 939 | - '([0-9]{2}):'. // minutes mm: |
|
| 940 | - '([0-9]{2})(\.[0-9]+)?'. // seconds ss.ss... |
|
| 941 | - '(Z|[+\-][0-9]{2}:?[0-9]{2})?'. // Z to indicate UTC, -/+HH:MM:SS.SS... for local tz's |
|
| 932 | +function iso8601_to_timestamp($datestr) { |
|
| 933 | + $pattern = '/' . |
|
| 934 | + '([0-9]{4})-' . // centuries & years CCYY- |
|
| 935 | + '([0-9]{2})-' . // months MM- |
|
| 936 | + '([0-9]{2})' . // days DD |
|
| 937 | + 'T' . // separator T |
|
| 938 | + '([0-9]{2}):' . // hours hh: |
|
| 939 | + '([0-9]{2}):' . // minutes mm: |
|
| 940 | + '([0-9]{2})(\.[0-9]+)?' . // seconds ss.ss... |
|
| 941 | + '(Z|[+\-][0-9]{2}:?[0-9]{2})?' . // Z to indicate UTC, -/+HH:MM:SS.SS... for local tz's |
|
| 942 | 942 | '/'; |
| 943 | - if(preg_match($pattern,$datestr,$regs)){ |
|
| 943 | + if (preg_match($pattern, $datestr, $regs)) { |
|
| 944 | 944 | // not utc |
| 945 | - if($regs[8] != 'Z'){ |
|
| 946 | - $op = substr($regs[8],0,1); |
|
| 947 | - $h = substr($regs[8],1,2); |
|
| 948 | - $m = substr($regs[8],strlen($regs[8])-2,2); |
|
| 949 | - if($op == '-'){ |
|
| 945 | + if ($regs[8] != 'Z') { |
|
| 946 | + $op = substr($regs[8], 0, 1); |
|
| 947 | + $h = substr($regs[8], 1, 2); |
|
| 948 | + $m = substr($regs[8], strlen($regs[8]) - 2, 2); |
|
| 949 | + if ($op == '-') { |
|
| 950 | 950 | $regs[4] = $regs[4] + $h; |
| 951 | 951 | $regs[5] = $regs[5] + $m; |
| 952 | - } elseif($op == '+'){ |
|
| 952 | + } elseif ($op == '+') { |
|
| 953 | 953 | $regs[4] = $regs[4] - $h; |
| 954 | 954 | $regs[5] = $regs[5] - $m; |
| 955 | 955 | } |
@@ -43,7 +43,7 @@ |
||
| 43 | 43 | * @param string $faultcode (SOAP-ENV:Client | SOAP-ENV:Server) |
| 44 | 44 | * @param string $faultactor only used when msg routed between multiple actors |
| 45 | 45 | * @param string $faultstring human readable error message |
| 46 | - * @param mixed $faultdetail detail, typically a string or array of string |
|
| 46 | + * @param string $faultdetail detail, typically a string or array of string |
|
| 47 | 47 | */ |
| 48 | 48 | public function nusoap_fault($faultcode,$faultactor='',$faultstring='',$faultdetail=''){ |
| 49 | 49 | parent::nusoap_base(); |
@@ -38,13 +38,13 @@ discard block |
||
| 38 | 38 | var $faultdetail; |
| 39 | 39 | |
| 40 | 40 | /** |
| 41 | - * constructor |
|
| 42 | - * |
|
| 43 | - * @param string $faultcode (SOAP-ENV:Client | SOAP-ENV:Server) |
|
| 44 | - * @param string $faultactor only used when msg routed between multiple actors |
|
| 45 | - * @param string $faultstring human readable error message |
|
| 46 | - * @param mixed $faultdetail detail, typically a string or array of string |
|
| 47 | - */ |
|
| 41 | + * constructor |
|
| 42 | + * |
|
| 43 | + * @param string $faultcode (SOAP-ENV:Client | SOAP-ENV:Server) |
|
| 44 | + * @param string $faultactor only used when msg routed between multiple actors |
|
| 45 | + * @param string $faultstring human readable error message |
|
| 46 | + * @param mixed $faultdetail detail, typically a string or array of string |
|
| 47 | + */ |
|
| 48 | 48 | public function nusoap_fault($faultcode,$faultactor='',$faultstring='',$faultdetail=''){ |
| 49 | 49 | parent::nusoap_base(); |
| 50 | 50 | $this->faultcode = $faultcode; |
@@ -54,11 +54,11 @@ discard block |
||
| 54 | 54 | } |
| 55 | 55 | |
| 56 | 56 | /** |
| 57 | - * serialize a fault |
|
| 58 | - * |
|
| 59 | - * @return string The serialization of the fault instance. |
|
| 60 | - * @access public |
|
| 61 | - */ |
|
| 57 | + * serialize a fault |
|
| 58 | + * |
|
| 59 | + * @return string The serialization of the fault instance. |
|
| 60 | + * @access public |
|
| 61 | + */ |
|
| 62 | 62 | public function serialize(){ |
| 63 | 63 | $ns_string = ''; |
| 64 | 64 | foreach($this->namespaces as $k => $v){ |
@@ -45,7 +45,7 @@ discard block |
||
| 45 | 45 | * @param string $faultstring human readable error message |
| 46 | 46 | * @param mixed $faultdetail detail, typically a string or array of string |
| 47 | 47 | */ |
| 48 | - public function nusoap_fault($faultcode,$faultactor='',$faultstring='',$faultdetail=''){ |
|
| 48 | + public function nusoap_fault($faultcode, $faultactor = '', $faultstring = '', $faultdetail = '') { |
|
| 49 | 49 | parent::nusoap_base(); |
| 50 | 50 | $this->faultcode = $faultcode; |
| 51 | 51 | $this->faultactor = $faultactor; |
@@ -59,22 +59,22 @@ discard block |
||
| 59 | 59 | * @return string The serialization of the fault instance. |
| 60 | 60 | * @access public |
| 61 | 61 | */ |
| 62 | - public function serialize(){ |
|
| 62 | + public function serialize() { |
|
| 63 | 63 | $ns_string = ''; |
| 64 | - foreach($this->namespaces as $k => $v){ |
|
| 64 | + foreach ($this->namespaces as $k => $v) { |
|
| 65 | 65 | $ns_string .= "\n xmlns:$k=\"$v\""; |
| 66 | 66 | } |
| 67 | 67 | $return_msg = |
| 68 | - '<?xml version="1.0" encoding="'.$this->soap_defencoding.'"?>'. |
|
| 69 | - '<SOAP-ENV:Envelope SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"'.$ns_string.">\n". |
|
| 70 | - '<SOAP-ENV:Body>'. |
|
| 71 | - '<SOAP-ENV:Fault>'. |
|
| 72 | - $this->serialize_val($this->faultcode, 'faultcode'). |
|
| 73 | - $this->serialize_val($this->faultactor, 'faultactor'). |
|
| 74 | - $this->serialize_val($this->faultstring, 'faultstring'). |
|
| 75 | - $this->serialize_val($this->faultdetail, 'detail'). |
|
| 76 | - '</SOAP-ENV:Fault>'. |
|
| 77 | - '</SOAP-ENV:Body>'. |
|
| 68 | + '<?xml version="1.0" encoding="' . $this->soap_defencoding . '"?>' . |
|
| 69 | + '<SOAP-ENV:Envelope SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"' . $ns_string . ">\n" . |
|
| 70 | + '<SOAP-ENV:Body>' . |
|
| 71 | + '<SOAP-ENV:Fault>' . |
|
| 72 | + $this->serialize_val($this->faultcode, 'faultcode') . |
|
| 73 | + $this->serialize_val($this->faultactor, 'faultactor') . |
|
| 74 | + $this->serialize_val($this->faultstring, 'faultstring') . |
|
| 75 | + $this->serialize_val($this->faultdetail, 'detail') . |
|
| 76 | + '</SOAP-ENV:Fault>' . |
|
| 77 | + '</SOAP-ENV:Body>' . |
|
| 78 | 78 | '</SOAP-ENV:Envelope>'; |
| 79 | 79 | return $return_msg; |
| 80 | 80 | } |
@@ -839,7 +839,7 @@ |
||
| 839 | 839 | * |
| 840 | 840 | * @param array $headers The HTTP headers |
| 841 | 841 | * @param string $data unprocessed request data from client |
| 842 | - * @return mixed value of the message, decoded into a PHP type |
|
| 842 | + * @return false|null value of the message, decoded into a PHP type |
|
| 843 | 843 | * @access private |
| 844 | 844 | */ |
| 845 | 845 | public function parseRequest($headers, $data) |
@@ -619,7 +619,7 @@ |
||
| 619 | 619 | $call_arg = array($class, $method); |
| 620 | 620 | } else { |
| 621 | 621 | $this->debug('in invoke_method, calling instance method using call_user_func_array()'); |
| 622 | - $instance = new $class (); |
|
| 622 | + $instance = new $class(); |
|
| 623 | 623 | $call_arg = array(&$instance, $method); |
| 624 | 624 | } |
| 625 | 625 | if (is_array($this->methodparams)) { |