@@ -162,6 +162,9 @@ discard block |
||
162 | 162 | return $param; |
163 | 163 | } |
164 | 164 | |
165 | +/** |
|
166 | + * @param boolean $moduleName |
|
167 | + */ |
|
165 | 168 | function vtws_getEntityNameFields($moduleName) |
166 | 169 | { |
167 | 170 | |
@@ -285,6 +288,10 @@ discard block |
||
285 | 288 | return vtws_addModuleTypeWebserviceEntity($moduleName, $moduleHandler['file'], $moduleHandler['class'], $isModule); |
286 | 289 | } |
287 | 290 | |
291 | +/** |
|
292 | + * @param string $filePath |
|
293 | + * @param string $className |
|
294 | + */ |
|
288 | 295 | function vtws_addModuleTypeWebserviceEntity($moduleName, $filePath, $className) |
289 | 296 | { |
290 | 297 | $adb = PearDatabase::getInstance(); |
@@ -313,6 +320,10 @@ discard block |
||
313 | 320 | } |
314 | 321 | } |
315 | 322 | |
323 | +/** |
|
324 | + * @param string $filePath |
|
325 | + * @param string $className |
|
326 | + */ |
|
316 | 327 | function vtws_addActorTypeWebserviceEntityWithName($moduleName, $filePath, $className, $actorNameDetails) |
317 | 328 | { |
318 | 329 | $adb = PearDatabase::getInstance(); |
@@ -322,6 +333,10 @@ discard block |
||
322 | 333 | vtws_addActorTypeName($entityId, $actorNameDetails['fieldNames'], $actorNameDetails['indexField'], $actorNameDetails['tableName']); |
323 | 334 | } |
324 | 335 | |
336 | +/** |
|
337 | + * @param string $filePath |
|
338 | + * @param string $className |
|
339 | + */ |
|
325 | 340 | function vtws_addActorTypeWebserviceEntityWithoutName($moduleName, $filePath, $className, $actorNameDetails) |
326 | 341 | { |
327 | 342 | $adb = PearDatabase::getInstance(); |
@@ -352,6 +367,9 @@ discard block |
||
352 | 367 | return $meta->getName($id); |
353 | 368 | } |
354 | 369 | |
370 | +/** |
|
371 | + * @param string $name |
|
372 | + */ |
|
355 | 373 | function vtws_preserveGlobal($name, $value) |
356 | 374 | { |
357 | 375 | return VTWS_PreserveGlobal::preserveGlobal($name, $value); |
@@ -953,6 +971,11 @@ discard block |
||
953 | 971 | return null; |
954 | 972 | } |
955 | 973 | |
974 | +/** |
|
975 | + * @param string $label |
|
976 | + * |
|
977 | + * @return integer|null |
|
978 | + */ |
|
956 | 979 | function vtws_getWebserviceTranslatedString($label) |
957 | 980 | { |
958 | 981 | $currentLanguage = vtws_getWebserviceCurrentLanguage(); |
@@ -5,6 +5,9 @@ discard block |
||
5 | 5 | $in_started = false; |
6 | 6 | $count = false; |
7 | 7 | |
8 | +/** |
|
9 | + * @param integer $count |
|
10 | + */ |
|
8 | 11 | function incrementN($lexer, $count) |
9 | 12 | { |
10 | 13 | $i = 0; |
@@ -160,6 +163,9 @@ discard block |
||
160 | 163 | } |
161 | 164 | } |
162 | 165 | |
166 | +/** |
|
167 | + * @param VTQL_Lexer $lexer |
|
168 | + */ |
|
163 | 169 | function handleend($lexer, $val) |
164 | 170 | { |
165 | 171 | return VTQL_Parser::SEMICOLON; |
@@ -179,6 +185,9 @@ discard block |
||
179 | 185 | public $mandatory; |
180 | 186 | public $current_state; |
181 | 187 | |
188 | + /** |
|
189 | + * @param string $data |
|
190 | + */ |
|
182 | 191 | public function __construct($data) |
183 | 192 | { |
184 | 193 | $this->index = 0; |
@@ -159,6 +159,9 @@ |
||
159 | 159 | private $syntax_error; |
160 | 160 | private $user; |
161 | 161 | |
162 | + /** |
|
163 | + * @param VTQL_Lexer $lex |
|
164 | + */ |
|
162 | 165 | public function __construct($user, $lex, $out) |
163 | 166 | { |
164 | 167 | if (!is_array($out)) { |
@@ -89,7 +89,7 @@ discard block |
||
89 | 89 | { |
90 | 90 | |
91 | 91 | public $stateno; /* The state-number */ |
92 | - public $major; /* The major token value. This is the code |
|
92 | + public $major; /* The major token value. This is the code |
|
93 | 93 | * * number for the token at this stack level */ |
94 | 94 | public $minor; /* The user-supplied minor token value. This |
95 | 95 | * * is the value of the token */ |
@@ -663,17 +663,17 @@ discard block |
||
663 | 663 | /** |
664 | 664 | * @var int |
665 | 665 | */ |
666 | - public $yyidx; /* Index of top element in stack */ |
|
666 | + public $yyidx; /* Index of top element in stack */ |
|
667 | 667 | |
668 | 668 | /** |
669 | 669 | * @var int |
670 | 670 | */ |
671 | - public $yyerrcnt; /* Shifts left before out of the error */ |
|
671 | + public $yyerrcnt; /* Shifts left before out of the error */ |
|
672 | 672 | |
673 | 673 | /** |
674 | 674 | * @var array |
675 | 675 | */ |
676 | - public $yystack = []; /* The parser's stack */ |
|
676 | + public $yystack = []; /* The parser's stack */ |
|
677 | 677 | |
678 | 678 | /** |
679 | 679 | * For tracing shifts, the names of all terminals and nonterminals |
@@ -782,7 +782,7 @@ discard block |
||
782 | 782 | * * which appear on the RHS of the rule, but which are not used |
783 | 783 | * * inside the C code. |
784 | 784 | */ |
785 | - default: break; /* If no destructor action specified: do nothing */ |
|
785 | + default: break; /* If no destructor action specified: do nothing */ |
|
786 | 786 | } |
787 | 787 | } |
788 | 788 | |
@@ -1608,7 +1608,7 @@ discard block |
||
1608 | 1608 | { |
1609 | 1609 | // $yyact; /* The parser action. */ |
1610 | 1610 | // $yyendofinput; /* True if we are at the end of input */ |
1611 | - $yyerrorhit = 0; /* True if yymajor has invoked an error */ |
|
1611 | + $yyerrorhit = 0; /* True if yymajor has invoked an error */ |
|
1612 | 1612 | |
1613 | 1613 | /* (re)initialize the parser, if necessary */ |
1614 | 1614 | if ($this->yyidx === null || $this->yyidx < 0) { |
@@ -84,6 +84,9 @@ discard block |
||
84 | 84 | } |
85 | 85 | } |
86 | 86 | |
87 | + /** |
|
88 | + * @param integer $rowNumber |
|
89 | + */ |
|
87 | 90 | public static function fromQueryResult($adb, $result, $rowNumber) |
88 | 91 | { |
89 | 92 | return new WebserviceField($adb, $adb->query_result_rowdata($result, $rowNumber)); |
@@ -147,6 +150,9 @@ discard block |
||
147 | 150 | return $this->default; |
148 | 151 | } |
149 | 152 | |
153 | + /** |
|
154 | + * @return string |
|
155 | + */ |
|
150 | 156 | public function getColumnName() |
151 | 157 | { |
152 | 158 | return $this->columnName; |
@@ -203,6 +209,9 @@ discard block |
||
203 | 209 | return false; |
204 | 210 | } |
205 | 211 | |
212 | + /** |
|
213 | + * @param boolean $nullable |
|
214 | + */ |
|
206 | 215 | private function setNullable($nullable) |
207 | 216 | { |
208 | 217 | $this->nullable = $nullable; |
@@ -198,8 +198,9 @@ discard block |
||
198 | 198 | |
199 | 199 | public function isReadOnly() |
200 | 200 | { |
201 | - if ($this->readOnly == 1) |
|
202 | - return true; |
|
201 | + if ($this->readOnly == 1) { |
|
202 | + return true; |
|
203 | + } |
|
203 | 204 | return false; |
204 | 205 | } |
205 | 206 | |
@@ -307,8 +308,9 @@ discard block |
||
307 | 308 | $numRows = $this->pearDB->num_rows($result); |
308 | 309 | for ($i = 0; $i < $numRows; ++$i) { |
309 | 310 | $referenceType = $this->pearDB->query_result($result, $i, "type"); |
310 | - if (in_array($referenceType, $accessibleTypes)) |
|
311 | - array_push($referenceTypes, $referenceType); |
|
311 | + if (in_array($referenceType, $accessibleTypes)) { |
|
312 | + array_push($referenceTypes, $referenceType); |
|
313 | + } |
|
312 | 314 | } |
313 | 315 | } else { |
314 | 316 | $fieldModel = Vtiger_Field_Model::getInstanceFromFieldId($this->getFieldId()); |
@@ -425,21 +427,23 @@ discard block |
||
425 | 427 | $picklistValue = $this->pearDB->query_result($result, $i, $fieldName); |
426 | 428 | $picklistValue = decode_html($picklistValue); |
427 | 429 | $moduleName = getTabModuleName($this->getTabId()); |
428 | - if ($moduleName == 'Events') |
|
429 | - $moduleName = 'Calendar'; |
|
430 | + if ($moduleName == 'Events') { |
|
431 | + $moduleName = 'Calendar'; |
|
432 | + } |
|
430 | 433 | $elem["label"] = \includes\Language::translate($picklistValue, $moduleName); |
431 | 434 | $elem["value"] = $picklistValue; |
432 | 435 | array_push($options, $elem); |
433 | 436 | } |
434 | - }else { |
|
437 | + } else { |
|
435 | 438 | $user = VTWS_PreserveGlobal::getGlobal('current_user'); |
436 | 439 | $details = \includes\fields\Picklist::getRoleBasedPicklistValues($fieldName, $user->roleid); |
437 | 440 | for ($i = 0; $i < sizeof($details); ++$i) { |
438 | 441 | $elem = []; |
439 | 442 | $picklistValue = decode_html($details[$i]); |
440 | 443 | $moduleName = getTabModuleName($this->getTabId()); |
441 | - if ($moduleName == 'Events') |
|
442 | - $moduleName = 'Calendar'; |
|
444 | + if ($moduleName == 'Events') { |
|
445 | + $moduleName = 'Calendar'; |
|
446 | + } |
|
443 | 447 | $elem["label"] = \includes\Language::translate($picklistValue, $moduleName); |
444 | 448 | $elem["value"] = $picklistValue; |
445 | 449 | array_push($options, $elem); |
@@ -41,7 +41,7 @@ |
||
41 | 41 | module_name=?, summary=?, test=?, execution_condition=?, defaultworkflow=?, filtersavedinnew=?, |
42 | 42 | schtypeid=?, schtime=?, schdayofmonth=?, schdayofweek=?, schannualdates=?, nexttrigger_time=? where workflow_id=?", array($wf->moduleName, $wf->description, $wf->test, $wf->executionCondition, $wf->defaultworkflow, $wf->filtersavedinnew, |
43 | 43 | $wf->schtypeid, $wf->schtime, $wf->schdayofmonth, $wf->schdayofweek, $wf->schannualdates, $wf->nexttrigger_time, $wf->id)); |
44 | - }else { |
|
44 | + } else { |
|
45 | 45 | $workflowId = $adb->getUniqueID("com_vtiger_workflows"); |
46 | 46 | $workflow->id = $workflowId; |
47 | 47 | $wf = $workflow; |
@@ -19,6 +19,11 @@ |
||
19 | 19 | return false; |
20 | 20 | } |
21 | 21 | |
22 | + /** |
|
23 | + * @param Vtiger_Request $request |
|
24 | + * |
|
25 | + * @return Vtiger_Request |
|
26 | + */ |
|
22 | 27 | public function setLanguage($request) |
23 | 28 | { |
24 | 29 | if (!$request->get('lang')) { |
@@ -87,8 +87,9 @@ |
||
87 | 87 | public function process(Vtiger_Request $request) |
88 | 88 | { |
89 | 89 | $default_charset = AppConfig::main('default_charset'); |
90 | - if (empty($default_charset)) |
|
91 | - $default_charset = 'UTF-8'; |
|
90 | + if (empty($default_charset)) { |
|
91 | + $default_charset = 'UTF-8'; |
|
92 | + } |
|
92 | 93 | $mode = $request->getMode(); |
93 | 94 | if (!empty($mode) && $this->isMethodExposed($mode)) { |
94 | 95 | return $this->$mode($request); |
@@ -211,7 +211,7 @@ discard block |
||
211 | 211 | /** |
212 | 212 | * Checks if this is a post request, and if it is, checks if the nonce is valid. |
213 | 213 | * @param bool $fatal Whether or not to fatally error out if there is a problem. |
214 | - * @return True if check passes or is not necessary, false if failure. |
|
214 | + * @return boolean|null if check passes or is not necessary, false if failure. |
|
215 | 215 | */ |
216 | 216 | function csrf_check($fatal = true) { |
217 | 217 | if ($_SERVER['REQUEST_METHOD'] !== 'POST') return true; |
@@ -281,6 +281,9 @@ discard block |
||
281 | 281 | } |
282 | 282 | return $ret; |
283 | 283 | } |
284 | +/** |
|
285 | + * @param integer $level |
|
286 | + */ |
|
284 | 287 | function csrf_flattenpost2($level, $key, $data) { |
285 | 288 | if(!is_array($data)) return array($key => $data); |
286 | 289 | $ret = array(); |
@@ -166,35 +166,35 @@ discard block |
||
166 | 166 | if (!$is_html) return $buffer; |
167 | 167 | } |
168 | 168 | } |
169 | - $count=1; |
|
169 | + $count = 1; |
|
170 | 170 | $tokens = csrf_get_tokens(); |
171 | 171 | $name = $GLOBALS['csrf']['input-name']; |
172 | 172 | $endslash = $GLOBALS['csrf']['xhtml'] ? ' /' : ''; |
173 | 173 | $input = "<input type='hidden' name='$name' value=\"$tokens\"$endslash>"; |
174 | 174 | $buffer = preg_replace('#(<form[^>]*method\s*=\s*["\']post["\'][^>]*>)#i', '$1' . $input, $buffer); |
175 | 175 | if ($GLOBALS['csrf']['frame-breaker'] && !$is_partial) { |
176 | - $buffer = preg_replace('/<\/head>/', '<script type="text/javascript">if (top != self) {top.location.href = self.location.href;}</script></head>', $buffer,$count); |
|
176 | + $buffer = preg_replace('/<\/head>/', '<script type="text/javascript">if (top != self) {top.location.href = self.location.href;}</script></head>', $buffer, $count); |
|
177 | 177 | } |
178 | 178 | if (($js = $GLOBALS['csrf']['rewrite-js']) && !$is_partial) { |
179 | 179 | global $dbconfig; |
180 | 180 | if (empty($dbconfig) || empty($dbconfig['db_name']) || $dbconfig['db_name'] == '_DBC_TYPE_') { |
181 | 181 | $buffer = preg_replace( |
182 | 182 | '/<\/head>/', |
183 | - '<script type="text/javascript">'. |
|
184 | - 'var csrfMagicToken = "'.$tokens.'";'. |
|
185 | - 'var csrfMagicName = "'.$name.'";</script>'. |
|
186 | - '<script src="../'.$js.'" type="text/javascript"></script></head>', |
|
187 | - $buffer,$count |
|
183 | + '<script type="text/javascript">' . |
|
184 | + 'var csrfMagicToken = "' . $tokens . '";' . |
|
185 | + 'var csrfMagicName = "' . $name . '";</script>' . |
|
186 | + '<script src="../' . $js . '" type="text/javascript"></script></head>', |
|
187 | + $buffer, $count |
|
188 | 188 | ); |
189 | 189 | |
190 | 190 | } else { |
191 | 191 | $buffer = preg_replace( |
192 | 192 | '/<\/head>/', |
193 | - '<script type="text/javascript">'. |
|
194 | - 'var csrfMagicToken = "'.$tokens.'";'. |
|
195 | - 'var csrfMagicName = "'.$name.'";</script>'. |
|
196 | - '<script src="'.$js.'" type="text/javascript"></script></head>', |
|
197 | - $buffer,$count |
|
193 | + '<script type="text/javascript">' . |
|
194 | + 'var csrfMagicToken = "' . $tokens . '";' . |
|
195 | + 'var csrfMagicName = "' . $name . '";</script>' . |
|
196 | + '<script src="' . $js . '" type="text/javascript"></script></head>', |
|
197 | + $buffer, $count |
|
198 | 198 | ); |
199 | 199 | } |
200 | 200 | |
@@ -276,17 +276,17 @@ discard block |
||
276 | 276 | |
277 | 277 | function csrf_flattenpost($data) { |
278 | 278 | $ret = array(); |
279 | - foreach($data as $n => $v) { |
|
279 | + foreach ($data as $n => $v) { |
|
280 | 280 | $ret = array_merge($ret, csrf_flattenpost2(1, $n, $v)); |
281 | 281 | } |
282 | 282 | return $ret; |
283 | 283 | } |
284 | 284 | function csrf_flattenpost2($level, $key, $data) { |
285 | - if(!is_array($data)) return array($key => $data); |
|
285 | + if (!is_array($data)) return array($key => $data); |
|
286 | 286 | $ret = array(); |
287 | - foreach($data as $n => $v) { |
|
288 | - $nk = $level >= 1 ? $key."[$n]" : "[$n]"; |
|
289 | - $ret = array_merge($ret, csrf_flattenpost2($level+1, $nk, $v)); |
|
287 | + foreach ($data as $n => $v) { |
|
288 | + $nk = $level >= 1 ? $key . "[$n]" : "[$n]"; |
|
289 | + $ret = array_merge($ret, csrf_flattenpost2($level + 1, $nk, $v)); |
|
290 | 290 | } |
291 | 291 | return $ret; |
292 | 292 | } |
@@ -300,7 +300,7 @@ discard block |
||
300 | 300 | $data = ''; |
301 | 301 | foreach (csrf_flattenpost($_POST) as $key => $value) { |
302 | 302 | if ($key == $GLOBALS['csrf']['input-name']) continue; |
303 | - $data .= '<input type="hidden" name="'.htmlspecialchars($key).'" value="'.htmlspecialchars($value).'" />'; |
|
303 | + $data .= '<input type="hidden" name="' . htmlspecialchars($key) . '" value="' . htmlspecialchars($value) . '" />'; |
|
304 | 304 | } |
305 | 305 | echo "<html><head><title>CSRF check failed</title></head> |
306 | 306 | <body> |
@@ -408,7 +408,7 @@ discard block |
||
408 | 408 | if (is_writable($dir)) { |
409 | 409 | $secret = csrf_generate_secret(); |
410 | 410 | $fh = fopen($file, 'w'); |
411 | - fwrite($fh, '<?php $secret = "'.$secret.'";' . PHP_EOL); |
|
411 | + fwrite($fh, '<?php $secret = "' . $secret . '";' . PHP_EOL); |
|
412 | 412 | fclose($fh); |
413 | 413 | return $secret; |
414 | 414 | } |
@@ -157,13 +157,16 @@ discard block |
||
157 | 157 | // Determine based on content type. |
158 | 158 | $headers = headers_list(); |
159 | 159 | foreach ($headers as $header) { |
160 | - if ($is_html) break; |
|
161 | - else if (stripos('Content-type', $header) !== false && stripos('/html', $header) === false) { |
|
160 | + if ($is_html) { |
|
161 | + break; |
|
162 | + } else if (stripos('Content-type', $header) !== false && stripos('/html', $header) === false) { |
|
162 | 163 | $is_html = false; |
163 | 164 | } |
164 | 165 | } |
165 | 166 | |
166 | - if (!$is_html) return $buffer; |
|
167 | + if (!$is_html) { |
|
168 | + return $buffer; |
|
169 | + } |
|
167 | 170 | } |
168 | 171 | } |
169 | 172 | $count=1; |
@@ -214,22 +217,30 @@ discard block |
||
214 | 217 | * @return True if check passes or is not necessary, false if failure. |
215 | 218 | */ |
216 | 219 | function csrf_check($fatal = true) { |
217 | - if ($_SERVER['REQUEST_METHOD'] !== 'POST') return true; |
|
220 | + if ($_SERVER['REQUEST_METHOD'] !== 'POST') { |
|
221 | + return true; |
|
222 | + } |
|
218 | 223 | csrf_start(); |
219 | 224 | $name = $GLOBALS['csrf']['input-name']; |
220 | 225 | $ok = false; |
221 | 226 | $tokens = ''; |
222 | 227 | do { |
223 | - if (!isset($_POST[$name])) break; |
|
228 | + if (!isset($_POST[$name])) { |
|
229 | + break; |
|
230 | + } |
|
224 | 231 | // we don't regenerate a token and check it because some token creation |
225 | 232 | // schemes are volatile. |
226 | 233 | $tokens = $_POST[$name]; |
227 | - if (!csrf_check_tokens($tokens)) break; |
|
234 | + if (!csrf_check_tokens($tokens)) { |
|
235 | + break; |
|
236 | + } |
|
228 | 237 | $ok = true; |
229 | 238 | } while (false); |
230 | 239 | if ($fatal && !$ok) { |
231 | 240 | $callback = $GLOBALS['csrf']['callback']; |
232 | - if (trim($tokens, 'A..Za..z0..9:;,') !== '') $tokens = 'hidden'; |
|
241 | + if (trim($tokens, 'A..Za..z0..9:;,') !== '') { |
|
242 | + $tokens = 'hidden'; |
|
243 | + } |
|
233 | 244 | $callback($tokens); |
234 | 245 | exit; |
235 | 246 | } |
@@ -256,15 +267,21 @@ discard block |
||
256 | 267 | csrf_start(); |
257 | 268 | |
258 | 269 | // These are "strong" algorithms that don't require per se a secret |
259 | - if (session_id()) return 'sid:' . csrf_hash(session_id()) . $ip; |
|
270 | + if (session_id()) { |
|
271 | + return 'sid:' . csrf_hash(session_id()) . $ip; |
|
272 | + } |
|
260 | 273 | if ($GLOBALS['csrf']['cookie']) { |
261 | 274 | $val = csrf_generate_secret(); |
262 | 275 | setcookie($GLOBALS['csrf']['cookie'], $val); |
263 | 276 | return 'cookie:' . csrf_hash($val) . $ip; |
264 | 277 | } |
265 | - if ($GLOBALS['csrf']['key']) return 'key:' . csrf_hash($GLOBALS['csrf']['key']) . $ip; |
|
278 | + if ($GLOBALS['csrf']['key']) { |
|
279 | + return 'key:' . csrf_hash($GLOBALS['csrf']['key']) . $ip; |
|
280 | + } |
|
266 | 281 | // These further algorithms require a server-side secret |
267 | - if (!$secret) return 'invalid'; |
|
282 | + if (!$secret) { |
|
283 | + return 'invalid'; |
|
284 | + } |
|
268 | 285 | if ($GLOBALS['csrf']['user'] !== false) { |
269 | 286 | return 'user:' . csrf_hash($GLOBALS['csrf']['user']); |
270 | 287 | } |
@@ -282,7 +299,9 @@ discard block |
||
282 | 299 | return $ret; |
283 | 300 | } |
284 | 301 | function csrf_flattenpost2($level, $key, $data) { |
285 | - if(!is_array($data)) return array($key => $data); |
|
302 | + if(!is_array($data)) { |
|
303 | + return array($key => $data); |
|
304 | + } |
|
286 | 305 | $ret = array(); |
287 | 306 | foreach($data as $n => $v) { |
288 | 307 | $nk = $level >= 1 ? $key."[$n]" : "[$n]"; |
@@ -299,7 +318,9 @@ discard block |
||
299 | 318 | header($_SERVER['SERVER_PROTOCOL'] . ' 403 Forbidden'); |
300 | 319 | $data = ''; |
301 | 320 | foreach (csrf_flattenpost($_POST) as $key => $value) { |
302 | - if ($key == $GLOBALS['csrf']['input-name']) continue; |
|
321 | + if ($key == $GLOBALS['csrf']['input-name']) { |
|
322 | + continue; |
|
323 | + } |
|
303 | 324 | $data .= '<input type="hidden" name="'.htmlspecialchars($key).'" value="'.htmlspecialchars($value).'" />'; |
304 | 325 | } |
305 | 326 | echo "<html><head><title>CSRF check failed</title></head> |
@@ -325,9 +346,13 @@ discard block |
||
325 | 346 | * instead of csrf_check_token() |
326 | 347 | */ |
327 | 348 | function csrf_check_tokens($tokens) { |
328 | - if (is_string($tokens)) $tokens = explode(';', $tokens); |
|
349 | + if (is_string($tokens)) { |
|
350 | + $tokens = explode(';', $tokens); |
|
351 | + } |
|
329 | 352 | foreach ($tokens as $token) { |
330 | - if (csrf_check_token($token)) return true; |
|
353 | + if (csrf_check_token($token)) { |
|
354 | + return true; |
|
355 | + } |
|
331 | 356 | } |
332 | 357 | return false; |
333 | 358 | } |
@@ -336,38 +361,62 @@ discard block |
||
336 | 361 | * Checks if a token is valid. |
337 | 362 | */ |
338 | 363 | function csrf_check_token($token) { |
339 | - if (strpos($token, ':') === false) return false; |
|
364 | + if (strpos($token, ':') === false) { |
|
365 | + return false; |
|
366 | + } |
|
340 | 367 | list($type, $value) = explode(':', $token, 2); |
341 | - if (strpos($value, ',') === false) return false; |
|
368 | + if (strpos($value, ',') === false) { |
|
369 | + return false; |
|
370 | + } |
|
342 | 371 | list($x, $time) = explode(',', $token, 2); |
343 | 372 | if ($GLOBALS['csrf']['expires']) { |
344 | - if (time() > $time + $GLOBALS['csrf']['expires']) return false; |
|
373 | + if (time() > $time + $GLOBALS['csrf']['expires']) { |
|
374 | + return false; |
|
375 | + } |
|
345 | 376 | } |
346 | 377 | switch ($type) { |
347 | 378 | case 'sid': |
348 | 379 | return $value === csrf_hash(session_id(), $time); |
349 | 380 | case 'cookie': |
350 | 381 | $n = $GLOBALS['csrf']['cookie']; |
351 | - if (!$n) return false; |
|
352 | - if (!isset($_COOKIE[$n])) return false; |
|
382 | + if (!$n) { |
|
383 | + return false; |
|
384 | + } |
|
385 | + if (!isset($_COOKIE[$n])) { |
|
386 | + return false; |
|
387 | + } |
|
353 | 388 | return $value === csrf_hash($_COOKIE[$n], $time); |
354 | 389 | case 'key': |
355 | - if (!$GLOBALS['csrf']['key']) return false; |
|
390 | + if (!$GLOBALS['csrf']['key']) { |
|
391 | + return false; |
|
392 | + } |
|
356 | 393 | return $value === csrf_hash($GLOBALS['csrf']['key'], $time); |
357 | 394 | // We could disable these 'weaker' checks if 'key' was set, but |
358 | 395 | // that doesn't make me feel good then about the cookie-based |
359 | 396 | // implementation. |
360 | 397 | case 'user': |
361 | - if (!csrf_get_secret()) return false; |
|
362 | - if ($GLOBALS['csrf']['user'] === false) return false; |
|
398 | + if (!csrf_get_secret()) { |
|
399 | + return false; |
|
400 | + } |
|
401 | + if ($GLOBALS['csrf']['user'] === false) { |
|
402 | + return false; |
|
403 | + } |
|
363 | 404 | return $value === csrf_hash($GLOBALS['csrf']['user'], $time); |
364 | 405 | case 'ip': |
365 | - if (!csrf_get_secret()) return false; |
|
406 | + if (!csrf_get_secret()) { |
|
407 | + return false; |
|
408 | + } |
|
366 | 409 | // do not allow IP-based checks if the username is set, or if |
367 | 410 | // the browser sent cookies |
368 | - if ($GLOBALS['csrf']['user'] !== false) return false; |
|
369 | - if (!empty($_COOKIE)) return false; |
|
370 | - if (!$GLOBALS['csrf']['allow-ip']) return false; |
|
411 | + if ($GLOBALS['csrf']['user'] !== false) { |
|
412 | + return false; |
|
413 | + } |
|
414 | + if (!empty($_COOKIE)) { |
|
415 | + return false; |
|
416 | + } |
|
417 | + if (!$GLOBALS['csrf']['allow-ip']) { |
|
418 | + return false; |
|
419 | + } |
|
371 | 420 | return $value === csrf_hash($_SERVER['IP_ADDRESS'], $time); |
372 | 421 | } |
373 | 422 | return false; |
@@ -397,7 +446,9 @@ discard block |
||
397 | 446 | * Retrieves the secret, and generates one if necessary. |
398 | 447 | */ |
399 | 448 | function csrf_get_secret() { |
400 | - if ($GLOBALS['csrf']['secret']) return $GLOBALS['csrf']['secret']; |
|
449 | + if ($GLOBALS['csrf']['secret']) { |
|
450 | + return $GLOBALS['csrf']['secret']; |
|
451 | + } |
|
401 | 452 | $dir = dirname(__FILE__); |
402 | 453 | $file = $dir . '/../../config/csrf_secret.php'; |
403 | 454 | $secret = ''; |
@@ -432,13 +483,21 @@ discard block |
||
432 | 483 | * from the current time. |
433 | 484 | */ |
434 | 485 | function csrf_hash($value, $time = null) { |
435 | - if (!$time) $time = time(); |
|
486 | + if (!$time) { |
|
487 | + $time = time(); |
|
488 | + } |
|
436 | 489 | return sha1(csrf_get_secret() . $value . $time) . ',' . $time; |
437 | 490 | } |
438 | 491 | |
439 | 492 | // Load user configuration |
440 | -if (function_exists('csrf_startup')) csrf_startup(); |
|
493 | +if (function_exists('csrf_startup')) { |
|
494 | + csrf_startup(); |
|
495 | +} |
|
441 | 496 | // Initialize our handler |
442 | -if ($GLOBALS['csrf']['rewrite']) ob_start('csrf_ob_handler'); |
|
497 | +if ($GLOBALS['csrf']['rewrite']) { |
|
498 | + ob_start('csrf_ob_handler'); |
|
499 | +} |
|
443 | 500 | // Perform check |
444 | -if (!$GLOBALS['csrf']['defer']) csrf_check(); |
|
501 | +if (!$GLOBALS['csrf']['defer']) { |
|
502 | + csrf_check(); |
|
503 | +} |
@@ -138,17 +138,17 @@ discard block |
||
138 | 138 | * inject our JavaScript library. |
139 | 139 | */ |
140 | 140 | function csrf_ob_handler($buffer, $flags) { |
141 | - // Even though the user told us to rewrite, we should do a quick heuristic |
|
142 | - // to check if the page is *actually* HTML. We don't begin rewriting until |
|
143 | - // we hit the first <html tag. |
|
144 | - static $is_html = false; |
|
145 | - static $is_partial = false; |
|
141 | + // Even though the user told us to rewrite, we should do a quick heuristic |
|
142 | + // to check if the page is *actually* HTML. We don't begin rewriting until |
|
143 | + // we hit the first <html tag. |
|
144 | + static $is_html = false; |
|
145 | + static $is_partial = false; |
|
146 | 146 | |
147 | - if (!$is_html) { |
|
148 | - // not HTML until proven otherwise |
|
149 | - if (stripos($buffer, '<html') !== false) { |
|
150 | - $is_html = true; |
|
151 | - } else { |
|
147 | + if (!$is_html) { |
|
148 | + // not HTML until proven otherwise |
|
149 | + if (stripos($buffer, '<html') !== false) { |
|
150 | + $is_html = true; |
|
151 | + } else { |
|
152 | 152 | |
153 | 153 | // Customized to take the partial HTML with form |
154 | 154 | $is_html = true; |
@@ -164,48 +164,48 @@ discard block |
||
164 | 164 | } |
165 | 165 | |
166 | 166 | if (!$is_html) return $buffer; |
167 | - } |
|
168 | - } |
|
169 | - $count=1; |
|
170 | - $tokens = csrf_get_tokens(); |
|
171 | - $name = $GLOBALS['csrf']['input-name']; |
|
172 | - $endslash = $GLOBALS['csrf']['xhtml'] ? ' /' : ''; |
|
173 | - $input = "<input type='hidden' name='$name' value=\"$tokens\"$endslash>"; |
|
174 | - $buffer = preg_replace('#(<form[^>]*method\s*=\s*["\']post["\'][^>]*>)#i', '$1' . $input, $buffer); |
|
175 | - if ($GLOBALS['csrf']['frame-breaker'] && !$is_partial) { |
|
176 | - $buffer = preg_replace('/<\/head>/', '<script type="text/javascript">if (top != self) {top.location.href = self.location.href;}</script></head>', $buffer,$count); |
|
177 | - } |
|
178 | - if (($js = $GLOBALS['csrf']['rewrite-js']) && !$is_partial) { |
|
167 | + } |
|
168 | + } |
|
169 | + $count=1; |
|
170 | + $tokens = csrf_get_tokens(); |
|
171 | + $name = $GLOBALS['csrf']['input-name']; |
|
172 | + $endslash = $GLOBALS['csrf']['xhtml'] ? ' /' : ''; |
|
173 | + $input = "<input type='hidden' name='$name' value=\"$tokens\"$endslash>"; |
|
174 | + $buffer = preg_replace('#(<form[^>]*method\s*=\s*["\']post["\'][^>]*>)#i', '$1' . $input, $buffer); |
|
175 | + if ($GLOBALS['csrf']['frame-breaker'] && !$is_partial) { |
|
176 | + $buffer = preg_replace('/<\/head>/', '<script type="text/javascript">if (top != self) {top.location.href = self.location.href;}</script></head>', $buffer,$count); |
|
177 | + } |
|
178 | + if (($js = $GLOBALS['csrf']['rewrite-js']) && !$is_partial) { |
|
179 | 179 | global $dbconfig; |
180 | - if (empty($dbconfig) || empty($dbconfig['db_name']) || $dbconfig['db_name'] == '_DBC_TYPE_') { |
|
180 | + if (empty($dbconfig) || empty($dbconfig['db_name']) || $dbconfig['db_name'] == '_DBC_TYPE_') { |
|
181 | 181 | $buffer = preg_replace( |
182 | - '/<\/head>/', |
|
183 | - '<script type="text/javascript">'. |
|
184 | - 'var csrfMagicToken = "'.$tokens.'";'. |
|
185 | - 'var csrfMagicName = "'.$name.'";</script>'. |
|
186 | - '<script src="../'.$js.'" type="text/javascript"></script></head>', |
|
187 | - $buffer,$count |
|
182 | + '/<\/head>/', |
|
183 | + '<script type="text/javascript">'. |
|
184 | + 'var csrfMagicToken = "'.$tokens.'";'. |
|
185 | + 'var csrfMagicName = "'.$name.'";</script>'. |
|
186 | + '<script src="../'.$js.'" type="text/javascript"></script></head>', |
|
187 | + $buffer,$count |
|
188 | 188 | ); |
189 | 189 | |
190 | 190 | } else { |
191 | 191 | $buffer = preg_replace( |
192 | - '/<\/head>/', |
|
193 | - '<script type="text/javascript">'. |
|
194 | - 'var csrfMagicToken = "'.$tokens.'";'. |
|
195 | - 'var csrfMagicName = "'.$name.'";</script>'. |
|
196 | - '<script src="'.$js.'" type="text/javascript"></script></head>', |
|
197 | - $buffer,$count |
|
192 | + '/<\/head>/', |
|
193 | + '<script type="text/javascript">'. |
|
194 | + 'var csrfMagicToken = "'.$tokens.'";'. |
|
195 | + 'var csrfMagicName = "'.$name.'";</script>'. |
|
196 | + '<script src="'.$js.'" type="text/javascript"></script></head>', |
|
197 | + $buffer,$count |
|
198 | 198 | ); |
199 | 199 | } |
200 | 200 | |
201 | - $script = '<script type="text/javascript">CsrfMagic.end();</script>'; |
|
201 | + $script = '<script type="text/javascript">CsrfMagic.end();</script>'; |
|
202 | 202 | |
203 | - $buffer = preg_replace('/<\/body>/', $script . '</body>', $buffer, $count); |
|
204 | - if (!$count) { |
|
205 | - $buffer .= $script; |
|
206 | - } |
|
207 | - } |
|
208 | - return $buffer; |
|
203 | + $buffer = preg_replace('/<\/body>/', $script . '</body>', $buffer, $count); |
|
204 | + if (!$count) { |
|
205 | + $buffer .= $script; |
|
206 | + } |
|
207 | + } |
|
208 | + return $buffer; |
|
209 | 209 | } |
210 | 210 | |
211 | 211 | /** |
@@ -214,26 +214,26 @@ discard block |
||
214 | 214 | * @return True if check passes or is not necessary, false if failure. |
215 | 215 | */ |
216 | 216 | function csrf_check($fatal = true) { |
217 | - if ($_SERVER['REQUEST_METHOD'] !== 'POST') return true; |
|
218 | - csrf_start(); |
|
219 | - $name = $GLOBALS['csrf']['input-name']; |
|
220 | - $ok = false; |
|
221 | - $tokens = ''; |
|
222 | - do { |
|
223 | - if (!isset($_POST[$name])) break; |
|
224 | - // we don't regenerate a token and check it because some token creation |
|
225 | - // schemes are volatile. |
|
226 | - $tokens = $_POST[$name]; |
|
227 | - if (!csrf_check_tokens($tokens)) break; |
|
228 | - $ok = true; |
|
229 | - } while (false); |
|
230 | - if ($fatal && !$ok) { |
|
231 | - $callback = $GLOBALS['csrf']['callback']; |
|
232 | - if (trim($tokens, 'A..Za..z0..9:;,') !== '') $tokens = 'hidden'; |
|
233 | - $callback($tokens); |
|
234 | - exit; |
|
235 | - } |
|
236 | - return $ok; |
|
217 | + if ($_SERVER['REQUEST_METHOD'] !== 'POST') return true; |
|
218 | + csrf_start(); |
|
219 | + $name = $GLOBALS['csrf']['input-name']; |
|
220 | + $ok = false; |
|
221 | + $tokens = ''; |
|
222 | + do { |
|
223 | + if (!isset($_POST[$name])) break; |
|
224 | + // we don't regenerate a token and check it because some token creation |
|
225 | + // schemes are volatile. |
|
226 | + $tokens = $_POST[$name]; |
|
227 | + if (!csrf_check_tokens($tokens)) break; |
|
228 | + $ok = true; |
|
229 | + } while (false); |
|
230 | + if ($fatal && !$ok) { |
|
231 | + $callback = $GLOBALS['csrf']['callback']; |
|
232 | + if (trim($tokens, 'A..Za..z0..9:;,') !== '') $tokens = 'hidden'; |
|
233 | + $callback($tokens); |
|
234 | + exit; |
|
235 | + } |
|
236 | + return $ok; |
|
237 | 237 | } |
238 | 238 | |
239 | 239 | /** |
@@ -241,67 +241,67 @@ discard block |
||
241 | 241 | * by semicolons. |
242 | 242 | */ |
243 | 243 | function csrf_get_tokens() { |
244 | - $has_cookies = !empty($_COOKIE); |
|
245 | - |
|
246 | - // $ip implements a composite key, which is sent if the user hasn't sent |
|
247 | - // any cookies. It may or may not be used, depending on whether or not |
|
248 | - // the cookies "stick" |
|
249 | - $secret = csrf_get_secret(); |
|
250 | - if (!$has_cookies && $secret) { |
|
251 | - $ip = ';ip:' . csrf_hash($_SERVER['IP_ADDRESS']); |
|
252 | - } else { |
|
253 | - $ip = ''; |
|
254 | - } |
|
255 | - csrf_start(); |
|
256 | - |
|
257 | - // These are "strong" algorithms that don't require per se a secret |
|
258 | - if (session_id()) return 'sid:' . csrf_hash(session_id()) . $ip; |
|
259 | - if ($GLOBALS['csrf']['cookie']) { |
|
260 | - $val = csrf_generate_secret(); |
|
261 | - setcookie($GLOBALS['csrf']['cookie'], $val); |
|
262 | - return 'cookie:' . csrf_hash($val) . $ip; |
|
263 | - } |
|
264 | - if ($GLOBALS['csrf']['key']) return 'key:' . csrf_hash($GLOBALS['csrf']['key']) . $ip; |
|
265 | - // These further algorithms require a server-side secret |
|
266 | - if (!$secret) return 'invalid'; |
|
267 | - if ($GLOBALS['csrf']['user'] !== false) { |
|
268 | - return 'user:' . csrf_hash($GLOBALS['csrf']['user']); |
|
269 | - } |
|
270 | - if ($GLOBALS['csrf']['allow-ip']) { |
|
271 | - return ltrim($ip, ';'); |
|
272 | - } |
|
273 | - return 'invalid'; |
|
244 | + $has_cookies = !empty($_COOKIE); |
|
245 | + |
|
246 | + // $ip implements a composite key, which is sent if the user hasn't sent |
|
247 | + // any cookies. It may or may not be used, depending on whether or not |
|
248 | + // the cookies "stick" |
|
249 | + $secret = csrf_get_secret(); |
|
250 | + if (!$has_cookies && $secret) { |
|
251 | + $ip = ';ip:' . csrf_hash($_SERVER['IP_ADDRESS']); |
|
252 | + } else { |
|
253 | + $ip = ''; |
|
254 | + } |
|
255 | + csrf_start(); |
|
256 | + |
|
257 | + // These are "strong" algorithms that don't require per se a secret |
|
258 | + if (session_id()) return 'sid:' . csrf_hash(session_id()) . $ip; |
|
259 | + if ($GLOBALS['csrf']['cookie']) { |
|
260 | + $val = csrf_generate_secret(); |
|
261 | + setcookie($GLOBALS['csrf']['cookie'], $val); |
|
262 | + return 'cookie:' . csrf_hash($val) . $ip; |
|
263 | + } |
|
264 | + if ($GLOBALS['csrf']['key']) return 'key:' . csrf_hash($GLOBALS['csrf']['key']) . $ip; |
|
265 | + // These further algorithms require a server-side secret |
|
266 | + if (!$secret) return 'invalid'; |
|
267 | + if ($GLOBALS['csrf']['user'] !== false) { |
|
268 | + return 'user:' . csrf_hash($GLOBALS['csrf']['user']); |
|
269 | + } |
|
270 | + if ($GLOBALS['csrf']['allow-ip']) { |
|
271 | + return ltrim($ip, ';'); |
|
272 | + } |
|
273 | + return 'invalid'; |
|
274 | 274 | } |
275 | 275 | |
276 | 276 | function csrf_flattenpost($data) { |
277 | - $ret = array(); |
|
278 | - foreach($data as $n => $v) { |
|
279 | - $ret = array_merge($ret, csrf_flattenpost2(1, $n, $v)); |
|
280 | - } |
|
281 | - return $ret; |
|
277 | + $ret = array(); |
|
278 | + foreach($data as $n => $v) { |
|
279 | + $ret = array_merge($ret, csrf_flattenpost2(1, $n, $v)); |
|
280 | + } |
|
281 | + return $ret; |
|
282 | 282 | } |
283 | 283 | function csrf_flattenpost2($level, $key, $data) { |
284 | - if(!is_array($data)) return array($key => $data); |
|
285 | - $ret = array(); |
|
286 | - foreach($data as $n => $v) { |
|
287 | - $nk = $level >= 1 ? $key."[$n]" : "[$n]"; |
|
288 | - $ret = array_merge($ret, csrf_flattenpost2($level+1, $nk, $v)); |
|
289 | - } |
|
290 | - return $ret; |
|
284 | + if(!is_array($data)) return array($key => $data); |
|
285 | + $ret = array(); |
|
286 | + foreach($data as $n => $v) { |
|
287 | + $nk = $level >= 1 ? $key."[$n]" : "[$n]"; |
|
288 | + $ret = array_merge($ret, csrf_flattenpost2($level+1, $nk, $v)); |
|
289 | + } |
|
290 | + return $ret; |
|
291 | 291 | } |
292 | 292 | |
293 | 293 | /** |
294 | 294 | * @param $tokens is safe for HTML consumption |
295 | 295 | */ |
296 | 296 | function csrf_callback($tokens) { |
297 | - // (yes, $tokens is safe to echo without escaping) |
|
298 | - header($_SERVER['SERVER_PROTOCOL'] . ' 403 Forbidden'); |
|
299 | - $data = ''; |
|
300 | - foreach (csrf_flattenpost($_POST) as $key => $value) { |
|
301 | - if ($key == $GLOBALS['csrf']['input-name']) continue; |
|
302 | - $data .= '<input type="hidden" name="'.htmlspecialchars($key).'" value="'.htmlspecialchars($value).'" />'; |
|
303 | - } |
|
304 | - echo "<html><head><title>CSRF check failed</title></head> |
|
297 | + // (yes, $tokens is safe to echo without escaping) |
|
298 | + header($_SERVER['SERVER_PROTOCOL'] . ' 403 Forbidden'); |
|
299 | + $data = ''; |
|
300 | + foreach (csrf_flattenpost($_POST) as $key => $value) { |
|
301 | + if ($key == $GLOBALS['csrf']['input-name']) continue; |
|
302 | + $data .= '<input type="hidden" name="'.htmlspecialchars($key).'" value="'.htmlspecialchars($value).'" />'; |
|
303 | + } |
|
304 | + echo "<html><head><title>CSRF check failed</title></head> |
|
305 | 305 | <body> |
306 | 306 | <p>CSRF check failed. Your form session may have expired, or you may not have |
307 | 307 | cookies enabled.</p> |
@@ -316,7 +316,7 @@ discard block |
||
316 | 316 | * It is configurable by setting $GLOBALS['csrf']['callback'] in this file |
317 | 317 | */ |
318 | 318 | function vtResponseForIllegalAccess() { |
319 | - echo 'Invalid request - Response For Illegal Access'; |
|
319 | + echo 'Invalid request - Response For Illegal Access'; |
|
320 | 320 | } |
321 | 321 | |
322 | 322 | /** |
@@ -324,106 +324,106 @@ discard block |
||
324 | 324 | * instead of csrf_check_token() |
325 | 325 | */ |
326 | 326 | function csrf_check_tokens($tokens) { |
327 | - if (is_string($tokens)) $tokens = explode(';', $tokens); |
|
328 | - foreach ($tokens as $token) { |
|
329 | - if (csrf_check_token($token)) return true; |
|
330 | - } |
|
331 | - return false; |
|
327 | + if (is_string($tokens)) $tokens = explode(';', $tokens); |
|
328 | + foreach ($tokens as $token) { |
|
329 | + if (csrf_check_token($token)) return true; |
|
330 | + } |
|
331 | + return false; |
|
332 | 332 | } |
333 | 333 | |
334 | 334 | /** |
335 | 335 | * Checks if a token is valid. |
336 | 336 | */ |
337 | 337 | function csrf_check_token($token) { |
338 | - if (strpos($token, ':') === false) return false; |
|
339 | - list($type, $value) = explode(':', $token, 2); |
|
340 | - if (strpos($value, ',') === false) return false; |
|
341 | - list($x, $time) = explode(',', $token, 2); |
|
342 | - if ($GLOBALS['csrf']['expires']) { |
|
343 | - if (time() > $time + $GLOBALS['csrf']['expires']) return false; |
|
344 | - } |
|
345 | - switch ($type) { |
|
346 | - case 'sid': |
|
347 | - return $value === csrf_hash(session_id(), $time); |
|
348 | - case 'cookie': |
|
349 | - $n = $GLOBALS['csrf']['cookie']; |
|
350 | - if (!$n) return false; |
|
351 | - if (!isset($_COOKIE[$n])) return false; |
|
352 | - return $value === csrf_hash($_COOKIE[$n], $time); |
|
353 | - case 'key': |
|
354 | - if (!$GLOBALS['csrf']['key']) return false; |
|
355 | - return $value === csrf_hash($GLOBALS['csrf']['key'], $time); |
|
356 | - // We could disable these 'weaker' checks if 'key' was set, but |
|
357 | - // that doesn't make me feel good then about the cookie-based |
|
358 | - // implementation. |
|
359 | - case 'user': |
|
360 | - if (!csrf_get_secret()) return false; |
|
361 | - if ($GLOBALS['csrf']['user'] === false) return false; |
|
362 | - return $value === csrf_hash($GLOBALS['csrf']['user'], $time); |
|
363 | - case 'ip': |
|
364 | - if (!csrf_get_secret()) return false; |
|
365 | - // do not allow IP-based checks if the username is set, or if |
|
366 | - // the browser sent cookies |
|
367 | - if ($GLOBALS['csrf']['user'] !== false) return false; |
|
368 | - if (!empty($_COOKIE)) return false; |
|
369 | - if (!$GLOBALS['csrf']['allow-ip']) return false; |
|
370 | - return $value === csrf_hash($_SERVER['IP_ADDRESS'], $time); |
|
371 | - } |
|
372 | - return false; |
|
338 | + if (strpos($token, ':') === false) return false; |
|
339 | + list($type, $value) = explode(':', $token, 2); |
|
340 | + if (strpos($value, ',') === false) return false; |
|
341 | + list($x, $time) = explode(',', $token, 2); |
|
342 | + if ($GLOBALS['csrf']['expires']) { |
|
343 | + if (time() > $time + $GLOBALS['csrf']['expires']) return false; |
|
344 | + } |
|
345 | + switch ($type) { |
|
346 | + case 'sid': |
|
347 | + return $value === csrf_hash(session_id(), $time); |
|
348 | + case 'cookie': |
|
349 | + $n = $GLOBALS['csrf']['cookie']; |
|
350 | + if (!$n) return false; |
|
351 | + if (!isset($_COOKIE[$n])) return false; |
|
352 | + return $value === csrf_hash($_COOKIE[$n], $time); |
|
353 | + case 'key': |
|
354 | + if (!$GLOBALS['csrf']['key']) return false; |
|
355 | + return $value === csrf_hash($GLOBALS['csrf']['key'], $time); |
|
356 | + // We could disable these 'weaker' checks if 'key' was set, but |
|
357 | + // that doesn't make me feel good then about the cookie-based |
|
358 | + // implementation. |
|
359 | + case 'user': |
|
360 | + if (!csrf_get_secret()) return false; |
|
361 | + if ($GLOBALS['csrf']['user'] === false) return false; |
|
362 | + return $value === csrf_hash($GLOBALS['csrf']['user'], $time); |
|
363 | + case 'ip': |
|
364 | + if (!csrf_get_secret()) return false; |
|
365 | + // do not allow IP-based checks if the username is set, or if |
|
366 | + // the browser sent cookies |
|
367 | + if ($GLOBALS['csrf']['user'] !== false) return false; |
|
368 | + if (!empty($_COOKIE)) return false; |
|
369 | + if (!$GLOBALS['csrf']['allow-ip']) return false; |
|
370 | + return $value === csrf_hash($_SERVER['IP_ADDRESS'], $time); |
|
371 | + } |
|
372 | + return false; |
|
373 | 373 | } |
374 | 374 | |
375 | 375 | /** |
376 | 376 | * Sets a configuration value. |
377 | 377 | */ |
378 | 378 | function csrf_conf($key, $val) { |
379 | - if (!isset($GLOBALS['csrf'][$key])) { |
|
380 | - trigger_error('No such configuration ' . $key, E_USER_WARNING); |
|
381 | - return; |
|
382 | - } |
|
383 | - $GLOBALS['csrf'][$key] = $val; |
|
379 | + if (!isset($GLOBALS['csrf'][$key])) { |
|
380 | + trigger_error('No such configuration ' . $key, E_USER_WARNING); |
|
381 | + return; |
|
382 | + } |
|
383 | + $GLOBALS['csrf'][$key] = $val; |
|
384 | 384 | } |
385 | 385 | |
386 | 386 | /** |
387 | 387 | * Starts a session if we're allowed to. |
388 | 388 | */ |
389 | 389 | function csrf_start() { |
390 | - if ($GLOBALS['csrf']['auto-session'] && !session_id()) { |
|
391 | - session_start(); |
|
392 | - } |
|
390 | + if ($GLOBALS['csrf']['auto-session'] && !session_id()) { |
|
391 | + session_start(); |
|
392 | + } |
|
393 | 393 | } |
394 | 394 | |
395 | 395 | /** |
396 | 396 | * Retrieves the secret, and generates one if necessary. |
397 | 397 | */ |
398 | 398 | function csrf_get_secret() { |
399 | - if ($GLOBALS['csrf']['secret']) return $GLOBALS['csrf']['secret']; |
|
400 | - $dir = dirname(__FILE__); |
|
401 | - $file = $dir . '/../../config/csrf_secret.php'; |
|
402 | - $secret = ''; |
|
403 | - if (file_exists($file)) { |
|
404 | - include $file; |
|
405 | - return $secret; |
|
406 | - } |
|
407 | - if (is_writable($dir)) { |
|
408 | - $secret = csrf_generate_secret(); |
|
409 | - $fh = fopen($file, 'w'); |
|
410 | - fwrite($fh, '<?php $secret = "'.$secret.'";' . PHP_EOL); |
|
411 | - fclose($fh); |
|
412 | - return $secret; |
|
413 | - } |
|
414 | - return ''; |
|
399 | + if ($GLOBALS['csrf']['secret']) return $GLOBALS['csrf']['secret']; |
|
400 | + $dir = dirname(__FILE__); |
|
401 | + $file = $dir . '/../../config/csrf_secret.php'; |
|
402 | + $secret = ''; |
|
403 | + if (file_exists($file)) { |
|
404 | + include $file; |
|
405 | + return $secret; |
|
406 | + } |
|
407 | + if (is_writable($dir)) { |
|
408 | + $secret = csrf_generate_secret(); |
|
409 | + $fh = fopen($file, 'w'); |
|
410 | + fwrite($fh, '<?php $secret = "'.$secret.'";' . PHP_EOL); |
|
411 | + fclose($fh); |
|
412 | + return $secret; |
|
413 | + } |
|
414 | + return ''; |
|
415 | 415 | } |
416 | 416 | |
417 | 417 | /** |
418 | 418 | * Generates a random string as the hash of time, microtime, and mt_rand. |
419 | 419 | */ |
420 | 420 | function csrf_generate_secret($len = 32) { |
421 | - $r = ''; |
|
422 | - for ($i = 0; $i < 32; $i++) { |
|
423 | - $r .= chr(mt_rand(0, 255)); |
|
424 | - } |
|
425 | - $r .= time() . microtime(); |
|
426 | - return sha1($r); |
|
421 | + $r = ''; |
|
422 | + for ($i = 0; $i < 32; $i++) { |
|
423 | + $r .= chr(mt_rand(0, 255)); |
|
424 | + } |
|
425 | + $r .= time() . microtime(); |
|
426 | + return sha1($r); |
|
427 | 427 | } |
428 | 428 | |
429 | 429 | /** |
@@ -431,8 +431,8 @@ discard block |
||
431 | 431 | * from the current time. |
432 | 432 | */ |
433 | 433 | function csrf_hash($value, $time = null) { |
434 | - if (!$time) $time = time(); |
|
435 | - return sha1(csrf_get_secret() . $value . $time) . ',' . $time; |
|
434 | + if (!$time) $time = time(); |
|
435 | + return sha1(csrf_get_secret() . $value . $time) . ',' . $time; |
|
436 | 436 | } |
437 | 437 | |
438 | 438 | // Load user configuration |
@@ -405,6 +405,7 @@ discard block |
||
405 | 405 | * @param int The unique ID of the person who tagged the object with this tag. |
406 | 406 | * @param int The unique ID of the object in question. |
407 | 407 | * @param string A raw string from a web form containing tags. |
408 | + * @param string $tag |
|
408 | 409 | * |
409 | 410 | * @return boolean Returns true if successful, false otherwise. Does not operate as a transaction. |
410 | 411 | */ |
@@ -662,7 +663,7 @@ discard block |
||
662 | 663 | * @param string The raw string form of the tag to delete. See above for vtiger_notes. |
663 | 664 | * @param int Whether to skip the update portion for objects that haven't been tagged. (Default: 1) |
664 | 665 | * |
665 | - * @return string Returns the tag in normalized form. |
|
666 | + * @return boolean Returns the tag in normalized form. |
|
666 | 667 | */ |
667 | 668 | public function tag_object($tagger_id, $object_id, $tag_string, $module, $skip_updates = 1) { |
668 | 669 | if($tag_string == '') { |
@@ -1127,6 +1128,10 @@ discard block |
||
1127 | 1128 | * @param string The text to output |
1128 | 1129 | * @return boolean Always returns true |
1129 | 1130 | */ |
1131 | + |
|
1132 | + /** |
|
1133 | + * @param string $text |
|
1134 | + */ |
|
1130 | 1135 | public function debug_text($text) { |
1131 | 1136 | if ($this->_debug) { |
1132 | 1137 | echo "$text<br>\n"; |
@@ -175,7 +175,7 @@ discard block |
||
175 | 175 | WHERE $where |
176 | 176 | ORDER BY object_id ASC |
177 | 177 | LIMIT $offset, $limit"; |
178 | - echo $sql; |
|
178 | + echo $sql; |
|
179 | 179 | $rs = $adb->pquery($sql, $params); |
180 | 180 | $retarr = array(); |
181 | 181 | while ($row = $adb->fetch_array($rs)) { |
@@ -220,7 +220,7 @@ discard block |
||
220 | 220 | WHERE $where |
221 | 221 | ORDER BY object_id ASC |
222 | 222 | "; |
223 | - //echo $sql; |
|
223 | + //echo $sql; |
|
224 | 224 | $rs = $adb->pquery($sql, $params); |
225 | 225 | $retarr = array(); |
226 | 226 | while ($row = $adb->fetch_array($rs)) { |
@@ -970,7 +970,7 @@ discard block |
||
970 | 970 | $tagger_sql |
971 | 971 | GROUP BY tag |
972 | 972 | ORDER BY quantity DESC LIMIT 0, $max"; |
973 | - //echo $sql; |
|
973 | + //echo $sql; |
|
974 | 974 | $rs = $adb->pquery($sql, $params); |
975 | 975 | $retarr = array(); |
976 | 976 | while ($row = $adb->fetch_array($rs)) { |
@@ -65,7 +65,7 @@ discard block |
||
65 | 65 | * @access private |
66 | 66 | * @param string Whether to prevent multiple vtiger_users from tagging the same object. By default, set to block (ala Upcoming.org) |
67 | 67 | */ |
68 | - var $_block_multiuser_tag_on_object =0; |
|
68 | + var $_block_multiuser_tag_on_object = 0; |
|
69 | 69 | /** |
70 | 70 | * @access private |
71 | 71 | * @param bool Whether to use persistent ADODB connections. False by default. |
@@ -155,7 +155,7 @@ discard block |
||
155 | 155 | * @return An array of Object ID numbers that reference your original objects. |
156 | 156 | */ |
157 | 157 | public function get_objects_with_tag($tag, $offset = 0, $limit = 100, $tagger_id = NULL) { |
158 | - if(!isset($tag)) { |
|
158 | + if (!isset($tag)) { |
|
159 | 159 | return false; |
160 | 160 | } |
161 | 161 | $adb = PearDatabase::getInstance(); |
@@ -163,7 +163,7 @@ discard block |
||
163 | 163 | $where = "tag = ? "; |
164 | 164 | $params = array($tag); |
165 | 165 | |
166 | - if(isset($tagger_id) && ($tagger_id > 0)) { |
|
166 | + if (isset($tagger_id) && ($tagger_id > 0)) { |
|
167 | 167 | $where .= "AND tagger_id = ? "; |
168 | 168 | array_push($params, $tagger_id); |
169 | 169 | } |
@@ -201,7 +201,7 @@ discard block |
||
201 | 201 | * @return An array of Object ID numbers that reference your original objects. |
202 | 202 | */ |
203 | 203 | public function get_objects_with_tag_all($tag, $tagger_id = NULL) { |
204 | - if(!isset($tag)) { |
|
204 | + if (!isset($tag)) { |
|
205 | 205 | return false; |
206 | 206 | } |
207 | 207 | $adb = PearDatabase::getInstance(); |
@@ -209,7 +209,7 @@ discard block |
||
209 | 209 | $where = "tag = ? "; |
210 | 210 | $params = array($tag); |
211 | 211 | |
212 | - if(isset($tagger_id) && ($tagger_id > 0)) { |
|
212 | + if (isset($tagger_id) && ($tagger_id > 0)) { |
|
213 | 213 | $where .= "AND tagger_id = ? "; |
214 | 214 | array_push($params, $tagger_id); |
215 | 215 | } |
@@ -253,7 +253,7 @@ discard block |
||
253 | 253 | return $retarr; |
254 | 254 | } |
255 | 255 | $params = array($tagArray); |
256 | - if(isset($tagger_id) && ($tagger_id > 0)) { |
|
256 | + if (isset($tagger_id) && ($tagger_id > 0)) { |
|
257 | 257 | $tagger_sql = "AND tagger_id = ?"; |
258 | 258 | array_push($params, $tagger_id); |
259 | 259 | } else { |
@@ -274,7 +274,7 @@ discard block |
||
274 | 274 | $sql = "SELECT ${prefix}freetagged_objects.object_id, tag, COUNT(DISTINCT tag) AS uniques |
275 | 275 | FROM ${prefix}freetagged_objects |
276 | 276 | INNER JOIN ${prefix}freetags ON (${prefix}freetagged_objects.tag_id = ${prefix}freetags.id) |
277 | - WHERE ${prefix}freetags.tag IN (". generateQuestionMarks($tagArray) .") |
|
277 | + WHERE ${prefix}freetags.tag IN (" . generateQuestionMarks($tagArray) . ") |
|
278 | 278 | $tagger_sql |
279 | 279 | GROUP BY ${prefix}freetagged_objects.object_id |
280 | 280 | HAVING uniques = $numTags |
@@ -304,7 +304,7 @@ discard block |
||
304 | 304 | * @return An array of Object ID numbers that reference your original objects. |
305 | 305 | */ |
306 | 306 | public function get_objects_with_tag_id($tag_id, $offset = 0, $limit = 100, $tagger_id = NULL) { |
307 | - if(!isset($tag_id)) { |
|
307 | + if (!isset($tag_id)) { |
|
308 | 308 | return false; |
309 | 309 | } |
310 | 310 | $adb = PearDatabase::getInstance(); |
@@ -312,7 +312,7 @@ discard block |
||
312 | 312 | $where = "id = ? "; |
313 | 313 | $params = array($tag_id); |
314 | 314 | |
315 | - if(isset($tagger_id) && ($tagger_id > 0)) { |
|
315 | + if (isset($tagger_id) && ($tagger_id > 0)) { |
|
316 | 316 | $where .= "AND tagger_id = ?"; |
317 | 317 | array_push($params, $tagger_id); |
318 | 318 | } |
@@ -353,19 +353,19 @@ discard block |
||
353 | 353 | * - 'tagger_id' => The unique ID of the person who tagged the object with this tag. |
354 | 354 | */ |
355 | 355 | public function get_tags_on_object($object_id, $offset = 0, $limit = 10, $tagger_id = NULL) { |
356 | - if(!isset($object_id)) { |
|
356 | + if (!isset($object_id)) { |
|
357 | 357 | return false; |
358 | 358 | } |
359 | 359 | |
360 | 360 | $where = "object_id = ? "; |
361 | 361 | $params = array($object_id); |
362 | 362 | |
363 | - if(isset($tagger_id) && ($tagger_id > 0)) { |
|
363 | + if (isset($tagger_id) && ($tagger_id > 0)) { |
|
364 | 364 | $where .= "AND tagger_id = ? "; |
365 | 365 | array_push($params, $tagger_id); |
366 | 366 | } |
367 | 367 | |
368 | - if($limit <= 0) { |
|
368 | + if ($limit <= 0) { |
|
369 | 369 | $limit_sql = ""; |
370 | 370 | } else { |
371 | 371 | $limit_sql = "LIMIT $offset, $limit"; |
@@ -410,7 +410,7 @@ discard block |
||
410 | 410 | */ |
411 | 411 | |
412 | 412 | public function safe_tag($tagger_id, $object_id, $tag, $module) { |
413 | - if(!isset($tagger_id)||!isset($object_id)||!isset($tag)) { |
|
413 | + if (!isset($tagger_id) || !isset($object_id) || !isset($tag)) { |
|
414 | 414 | die("safe_tag argument missing"); |
415 | 415 | return false; |
416 | 416 | } |
@@ -437,7 +437,7 @@ discard block |
||
437 | 437 | |
438 | 438 | array_push($params, $object_id, $normalized_tag); |
439 | 439 | $rs = $adb->pquery($sql, $params); |
440 | - if($rs->fields['count'] > 0) { |
|
440 | + if ($rs->fields['count'] > 0) { |
|
441 | 441 | return true; |
442 | 442 | } |
443 | 443 | // Then see if a raw tag in this form exists. |
@@ -446,7 +446,7 @@ discard block |
||
446 | 446 | WHERE raw_tag = ? "; |
447 | 447 | $rs = $adb->pquery($sql, array($tag)); |
448 | 448 | $row = $adb->fetch_array($rs); |
449 | - if($row) { |
|
449 | + if ($row) { |
|
450 | 450 | $tag_id = $row['id']; |
451 | 451 | } else { |
452 | 452 | // Add new tag! |
@@ -456,7 +456,7 @@ discard block |
||
456 | 456 | $rs = $adb->pquery($sql, $params); |
457 | 457 | |
458 | 458 | } |
459 | - if(!($tag_id > 0)) { |
|
459 | + if (!($tag_id > 0)) { |
|
460 | 460 | return false; |
461 | 461 | } |
462 | 462 | $sql = "INSERT INTO ${prefix}freetagged_objects |
@@ -513,14 +513,14 @@ discard block |
||
513 | 513 | * @return string Returns the tag in normalized form. |
514 | 514 | */ |
515 | 515 | public function delete_object_tag($tagger_id, $object_id, $tag) { |
516 | - if(!isset($tagger_id)||!isset($object_id)||!isset($tag)) { |
|
516 | + if (!isset($tagger_id) || !isset($object_id) || !isset($tag)) { |
|
517 | 517 | die("delete_object_tag argument missing"); |
518 | 518 | return false; |
519 | 519 | } |
520 | 520 | $adb = PearDatabase::getInstance(); |
521 | 521 | $tag_id = $this->get_raw_tag_id($tag); |
522 | 522 | $prefix = $this->_table_prefix; |
523 | - if($tag_id > 0) { |
|
523 | + if ($tag_id > 0) { |
|
524 | 524 | |
525 | 525 | $sql = "DELETE FROM ${prefix}freetagged_objects |
526 | 526 | WHERE tagger_id = ? && object_id = ? && tag_id = ? LIMIT 1"; |
@@ -547,7 +547,7 @@ discard block |
||
547 | 547 | public function delete_all_object_tags($object_id) { |
548 | 548 | $adb = PearDatabase::getInstance(); |
549 | 549 | $prefix = $this->_table_prefix; |
550 | - if($object_id > 0) { |
|
550 | + if ($object_id > 0) { |
|
551 | 551 | $sql = "DELETE FROM ${prefix}freetagged_objects |
552 | 552 | WHERE object_id = ? "; |
553 | 553 | $rs = $adb->pquery($sql, array($object_id)); |
@@ -574,13 +574,13 @@ discard block |
||
574 | 574 | */ |
575 | 575 | |
576 | 576 | public function delete_all_object_tags_for_user($tagger_id, $object_id) { |
577 | - if(!isset($tagger_id)||!isset($object_id)) { |
|
577 | + if (!isset($tagger_id) || !isset($object_id)) { |
|
578 | 578 | die("delete_all_object_tags_for_user argument missing"); |
579 | 579 | return false; |
580 | 580 | } |
581 | 581 | $adb = PearDatabase::getInstance(); |
582 | 582 | $prefix = $this->_table_prefix; |
583 | - if($object_id > 0) { |
|
583 | + if ($object_id > 0) { |
|
584 | 584 | |
585 | 585 | $sql = "DELETE FROM ${prefix}freetagged_objects |
586 | 586 | WHERE tagger_id = ? && object_id = ?"; |
@@ -604,7 +604,7 @@ discard block |
||
604 | 604 | * @return string Returns the tag in normalized form. |
605 | 605 | */ |
606 | 606 | public function get_tag_id($tag) { |
607 | - if(!isset($tag)) { |
|
607 | + if (!isset($tag)) { |
|
608 | 608 | die("get_tag_id argument missing"); |
609 | 609 | return false; |
610 | 610 | } |
@@ -632,7 +632,7 @@ discard block |
||
632 | 632 | */ |
633 | 633 | |
634 | 634 | public function get_raw_tag_id($tag) { |
635 | - if(!isset($tag)) { |
|
635 | + if (!isset($tag)) { |
|
636 | 636 | die("get_tag_id argument missing"); |
637 | 637 | return false; |
638 | 638 | } |
@@ -665,7 +665,7 @@ discard block |
||
665 | 665 | * @return string Returns the tag in normalized form. |
666 | 666 | */ |
667 | 667 | public function tag_object($tagger_id, $object_id, $tag_string, $module, $skip_updates = 1) { |
668 | - if($tag_string == '') { |
|
668 | + if ($tag_string == '') { |
|
669 | 669 | // If an empty string was passed, just return true, don't die. |
670 | 670 | // die("Empty tag string passed"); |
671 | 671 | return true; |
@@ -706,10 +706,10 @@ discard block |
||
706 | 706 | * @return boolean True if successful, false otherwise. |
707 | 707 | */ |
708 | 708 | public function _tag_object_array($tagger_id, $object_id, $tagArray, $module) { |
709 | - foreach($tagArray as $tag) { |
|
709 | + foreach ($tagArray as $tag) { |
|
710 | 710 | $tag = trim($tag); |
711 | - if(($tag != '') && (strlen($tag) <= $this->_MAX_TAG_LENGTH)) { |
|
712 | - if(get_magic_quotes_gpc()) { |
|
711 | + if (($tag != '') && (strlen($tag) <= $this->_MAX_TAG_LENGTH)) { |
|
712 | + if (get_magic_quotes_gpc()) { |
|
713 | 713 | $tag = addslashes($tag); |
714 | 714 | } |
715 | 715 | $this->safe_tag($tagger_id, $object_id, $tag, $module); |
@@ -735,12 +735,12 @@ discard block |
||
735 | 735 | return $newwords; |
736 | 736 | } |
737 | 737 | # Perform tag parsing |
738 | - if(get_magic_quotes_gpc()) { |
|
738 | + if (get_magic_quotes_gpc()) { |
|
739 | 739 | $query = stripslashes(trim($tag_string)); |
740 | 740 | } else { |
741 | 741 | $query = trim($tag_string); |
742 | 742 | } |
743 | - $words = preg_split('/(")/', $query,-1,PREG_SPLIT_NO_EMPTY|PREG_SPLIT_DELIM_CAPTURE); |
|
743 | + $words = preg_split('/(")/', $query, -1, PREG_SPLIT_NO_EMPTY | PREG_SPLIT_DELIM_CAPTURE); |
|
744 | 744 | $delim = 0; |
745 | 745 | foreach ($words as $key => $word) |
746 | 746 | { |
@@ -786,7 +786,7 @@ discard block |
||
786 | 786 | public function get_most_popular_tags($tagger_id = NULL, $offset = 0, $limit = 25) { |
787 | 787 | $adb = PearDatabase::getInstance(); |
788 | 788 | $params = array(); |
789 | - if(isset($tagger_id) && ($tagger_id > 0)) { |
|
789 | + if (isset($tagger_id) && ($tagger_id > 0)) { |
|
790 | 790 | $tagger_sql = "AND tagger_id = ?"; |
791 | 791 | array_push($params, $tagger_id); |
792 | 792 | } else { |
@@ -830,7 +830,7 @@ discard block |
||
830 | 830 | public function count_tags($tagger_id = NULL) { |
831 | 831 | $adb = PearDatabase::getInstance(); |
832 | 832 | $params = array(); |
833 | - if(isset($tagger_id) && ($tagger_id > 0)) { |
|
833 | + if (isset($tagger_id) && ($tagger_id > 0)) { |
|
834 | 834 | $tagger_sql = "AND tagger_id = ?"; |
835 | 835 | array_push($params, $tagger_id); |
836 | 836 | } else { |
@@ -874,11 +874,11 @@ discard block |
||
874 | 874 | * @return string Returns an HTML snippet that can be used directly as a tag cloud. |
875 | 875 | */ |
876 | 876 | |
877 | - public function get_tag_cloud_html($module="",$tagger_id = NULL,$obj_id= NULL,$num_tags = 100, $min_font_size = 10, $max_font_size = 20, $font_units = 'px', $span_class = '', $tag_page_url = '/tag/') { |
|
877 | + public function get_tag_cloud_html($module = "", $tagger_id = NULL, $obj_id = NULL, $num_tags = 100, $min_font_size = 10, $max_font_size = 20, $font_units = 'px', $span_class = '', $tag_page_url = '/tag/') { |
|
878 | 878 | global $theme; |
879 | - $theme_path="themes/".$theme."/"; |
|
880 | - $image_path=$theme_path."images/"; |
|
881 | - $tag_list = $this->get_tag_cloud_tags($num_tags, $tagger_id,$module,$obj_id); |
|
879 | + $theme_path = "themes/" . $theme . "/"; |
|
880 | + $image_path = $theme_path . "images/"; |
|
881 | + $tag_list = $this->get_tag_cloud_tags($num_tags, $tagger_id, $module, $obj_id); |
|
882 | 882 | if (count($tag_list[0])) { |
883 | 883 | // Get the maximum qty of tagged objects in the set |
884 | 884 | $max_qty = max(array_values($tag_list[0])); |
@@ -894,7 +894,7 @@ discard block |
||
894 | 894 | if (0 == $spread) { // Divide by zero |
895 | 895 | $spread = 1; |
896 | 896 | } |
897 | - $step = ($max_font_size - $min_font_size)/($spread); |
|
897 | + $step = ($max_font_size - $min_font_size) / ($spread); |
|
898 | 898 | |
899 | 899 | // Since the original tag_list is alphabetically ordered, |
900 | 900 | // we can now create the tag cloud by just putting a span |
@@ -902,18 +902,18 @@ discard block |
||
902 | 902 | // by $step. |
903 | 903 | $cloud_html = ''; |
904 | 904 | $cloud_spans = array(); |
905 | - if($module =='') |
|
905 | + if ($module == '') |
|
906 | 906 | $module = 'All'; |
907 | - if($module != 'All') { |
|
907 | + if ($module != 'All') { |
|
908 | 908 | foreach ($tag_list[0] as $tag => $qty) { |
909 | 909 | $size = $min_font_size + ($qty - $min_qty) * $step; |
910 | - $cloud_span[] = '<span id="tag_'.$tag_list[1][$tag].'" class="' . $span_class . '" onMouseOver=$("tagspan_'.$tag_list[1][$tag].'").style.display="inline"; onMouseOut=$("tagspan_'.$tag_list[1][$tag].'").style.display="none";><a class="tagit" href="index.php?module=Home&action=UnifiedSearch&search_module='.$module.'&search_tag=tag_search&query_string='. urlencode($tag) . '" style="font-size: '. $size . $font_units . '">' . htmlspecialchars(stripslashes($tag)) . '</a><span class="'. $span_class .'" id="tagspan_'.$tag_list[1][$tag].'" style="display:none;cursor:pointer;" onClick="DeleteTag('.$tag_list[1][$tag].','.$obj_id.');"><img src="' . vtiger_imageurl('del_tag.gif', $theme) . '"></span></span>'; |
|
910 | + $cloud_span[] = '<span id="tag_' . $tag_list[1][$tag] . '" class="' . $span_class . '" onMouseOver=$("tagspan_' . $tag_list[1][$tag] . '").style.display="inline"; onMouseOut=$("tagspan_' . $tag_list[1][$tag] . '").style.display="none";><a class="tagit" href="index.php?module=Home&action=UnifiedSearch&search_module=' . $module . '&search_tag=tag_search&query_string=' . urlencode($tag) . '" style="font-size: ' . $size . $font_units . '">' . htmlspecialchars(stripslashes($tag)) . '</a><span class="' . $span_class . '" id="tagspan_' . $tag_list[1][$tag] . '" style="display:none;cursor:pointer;" onClick="DeleteTag(' . $tag_list[1][$tag] . ',' . $obj_id . ');"><img src="' . vtiger_imageurl('del_tag.gif', $theme) . '"></span></span>'; |
|
911 | 911 | |
912 | 912 | } |
913 | 913 | } else { |
914 | - foreach($tag_list[0] as $tag => $qty) { |
|
914 | + foreach ($tag_list[0] as $tag => $qty) { |
|
915 | 915 | $size = $min_font_size + ($qty - $min_qty) * $step; |
916 | - $cloud_span[] = '<span class="' . $span_class . '"><a class="tagit" href="index.php?module=Home&action=UnifiedSearch&search_module='.$module.'&search_tag=tag_search&query_string='. urlencode($tag) . '" style="font-size: '. $size . $font_units . '">' . htmlspecialchars(stripslashes($tag)) . '</a></span>'; |
|
916 | + $cloud_span[] = '<span class="' . $span_class . '"><a class="tagit" href="index.php?module=Home&action=UnifiedSearch&search_module=' . $module . '&search_tag=tag_search&query_string=' . urlencode($tag) . '" style="font-size: ' . $size . $font_units . '">' . htmlspecialchars(stripslashes($tag)) . '</a></span>'; |
|
917 | 917 | } |
918 | 918 | } |
919 | 919 | $cloud_html = join("\n ", $cloud_span); |
@@ -938,24 +938,24 @@ discard block |
||
938 | 938 | * values are numeric quantity of objects tagged with that tag. |
939 | 939 | */ |
940 | 940 | |
941 | - public function get_tag_cloud_tags($max = 100, $tagger_id = NULL,$module = "",$obj_id = NULL) { |
|
941 | + public function get_tag_cloud_tags($max = 100, $tagger_id = NULL, $module = "", $obj_id = NULL) { |
|
942 | 942 | $adb = PearDatabase::getInstance(); |
943 | 943 | $params = array(); |
944 | - if(isset($tagger_id) && ($tagger_id > 0)) { |
|
944 | + if (isset($tagger_id) && ($tagger_id > 0)) { |
|
945 | 945 | $tagger_sql = " && tagger_id = ?"; |
946 | 946 | array_push($params, $tagger_id); |
947 | 947 | } else { |
948 | 948 | $tagger_sql = ""; |
949 | 949 | } |
950 | 950 | |
951 | - if($module != "") { |
|
951 | + if ($module != "") { |
|
952 | 952 | $tagger_sql .= " && module = ?"; |
953 | 953 | array_push($params, $module); |
954 | 954 | } else { |
955 | 955 | $tagger_sql .= ""; |
956 | 956 | } |
957 | 957 | |
958 | - if(isset($obj_id) && $obj_id > 0) { |
|
958 | + if (isset($obj_id) && $obj_id > 0) { |
|
959 | 959 | $tagger_sql .= " && object_id = ?"; |
960 | 960 | array_push($params, $obj_id); |
961 | 961 | } else { |
@@ -978,10 +978,10 @@ discard block |
||
978 | 978 | $retarr[$row['tag']] = $row['quantity']; |
979 | 979 | $retarr1[$row['tag']] = $row['tag_id']; |
980 | 980 | } |
981 | - if($retarr) ksort($retarr); |
|
982 | - if($retarr1) ksort($retarr1); |
|
983 | - $return_value[]=$retarr; |
|
984 | - $return_value[]=$retarr1; |
|
981 | + if ($retarr) ksort($retarr); |
|
982 | + if ($retarr1) ksort($retarr1); |
|
983 | + $return_value[] = $retarr; |
|
984 | + $return_value[] = $retarr1; |
|
985 | 985 | return $return_value; |
986 | 986 | |
987 | 987 | } |
@@ -1014,7 +1014,7 @@ discard block |
||
1014 | 1014 | |
1015 | 1015 | public function similar_tags($tag, $max = 100) { |
1016 | 1016 | $retarr = array(); |
1017 | - if(!isset($tag)) { |
|
1017 | + if (!isset($tag)) { |
|
1018 | 1018 | return $retarr; |
1019 | 1019 | } |
1020 | 1020 | $adb = PearDatabase::getInstance(); |
@@ -1103,7 +1103,7 @@ discard block |
||
1103 | 1103 | $sql = "SELECT matches.object_id, COUNT( matches.object_id ) AS num_common_tags |
1104 | 1104 | FROM ${prefix}freetagged_objects as matches |
1105 | 1105 | INNER JOIN ${prefix}freetags as tags ON ( tags.id = matches.tag_id ) |
1106 | - WHERE tags.tag IN (". generateQuestionMarks($tagArray) .") |
|
1106 | + WHERE tags.tag IN (" . generateQuestionMarks($tagArray) . ") |
|
1107 | 1107 | GROUP BY matches.object_id |
1108 | 1108 | HAVING num_common_tags >= ? |
1109 | 1109 | ORDER BY num_common_tags DESC |
@@ -1111,7 +1111,7 @@ discard block |
||
1111 | 1111 | |
1112 | 1112 | $rs = $adb->pquery($sql, array($tagArray, $threshold, $max_objects)); |
1113 | 1113 | while ($row = $adb->fetch_array($rs)) { |
1114 | - $retarr[] = array ( |
|
1114 | + $retarr[] = array( |
|
1115 | 1115 | 'object_id' => $row['object_id'], |
1116 | 1116 | 'strength' => ($row['num_common_tags'] / $numTags) |
1117 | 1117 | ); |
@@ -427,7 +427,9 @@ discard block |
||
427 | 427 | if ($this->_block_multiuser_tag_on_object == 0) { |
428 | 428 | $tagger_sql = " && tagger_id = ? "; |
429 | 429 | array_push($params, $tagger_id); |
430 | - } else $tagger_sql = ""; |
|
430 | + } else { |
|
431 | + $tagger_sql = ""; |
|
432 | + } |
|
431 | 433 | $sql = "SELECT COUNT(*) as count |
432 | 434 | FROM ${prefix}freetagged_objects INNER JOIN ${prefix}freetags ON (tag_id = id) |
433 | 435 | WHERE 1=1 |
@@ -902,8 +904,9 @@ discard block |
||
902 | 904 | // by $step. |
903 | 905 | $cloud_html = ''; |
904 | 906 | $cloud_spans = array(); |
905 | - if($module =='') |
|
906 | - $module = 'All'; |
|
907 | + if($module =='') { |
|
908 | + $module = 'All'; |
|
909 | + } |
|
907 | 910 | if($module != 'All') { |
908 | 911 | foreach ($tag_list[0] as $tag => $qty) { |
909 | 912 | $size = $min_font_size + ($qty - $min_qty) * $step; |
@@ -978,8 +981,12 @@ discard block |
||
978 | 981 | $retarr[$row['tag']] = $row['quantity']; |
979 | 982 | $retarr1[$row['tag']] = $row['tag_id']; |
980 | 983 | } |
981 | - if($retarr) ksort($retarr); |
|
982 | - if($retarr1) ksort($retarr1); |
|
984 | + if($retarr) { |
|
985 | + ksort($retarr); |
|
986 | + } |
|
987 | + if($retarr1) { |
|
988 | + ksort($retarr1); |
|
989 | + } |
|
983 | 990 | $return_value[]=$retarr; |
984 | 991 | $return_value[]=$retarr1; |
985 | 992 | return $return_value; |
@@ -306,7 +306,7 @@ discard block |
||
306 | 306 | /** |
307 | 307 | * gets the current debug data for this instance |
308 | 308 | * |
309 | - * @return debug data |
|
309 | + * @return string data |
|
310 | 310 | * @access public |
311 | 311 | */ |
312 | 312 | public function &getDebug() { |
@@ -319,7 +319,7 @@ discard block |
||
319 | 319 | * gets the current debug data for this instance as an XML comment |
320 | 320 | * this may change the contents of the debug data |
321 | 321 | * |
322 | - * @return debug data as an XML comment |
|
322 | + * @return string data as an XML comment |
|
323 | 323 | * @access public |
324 | 324 | */ |
325 | 325 | public function &getDebugAsXMLComment() { |
@@ -352,7 +352,7 @@ discard block |
||
352 | 352 | /** |
353 | 353 | * returns error string if present |
354 | 354 | * |
355 | - * @return mixed error string or false |
|
355 | + * @return string|false error string or false |
|
356 | 356 | * @access public |
357 | 357 | */ |
358 | 358 | public function getError(){ |
@@ -365,7 +365,7 @@ discard block |
||
365 | 365 | /** |
366 | 366 | * sets error string |
367 | 367 | * |
368 | - * @return boolean $string error string |
|
368 | + * @return boolean|null $string error string |
|
369 | 369 | * @access private |
370 | 370 | */ |
371 | 371 | public function setError($str){ |
@@ -800,7 +800,7 @@ discard block |
||
800 | 800 | * returns false, if not prefixed |
801 | 801 | * |
802 | 802 | * @param string $str The prefixed string |
803 | - * @return mixed The prefix or false if there is no prefix |
|
803 | + * @return string|false The prefix or false if there is no prefix |
|
804 | 804 | * @access public |
805 | 805 | */ |
806 | 806 | public function getPrefix($str){ |
@@ -830,7 +830,7 @@ discard block |
||
830 | 830 | * or false if no prefixes registered for the given namespace |
831 | 831 | * |
832 | 832 | * @param string $ns The namespace |
833 | - * @return mixed The prefix, false if the namespace has no prefixes |
|
833 | + * @return string The prefix, false if the namespace has no prefixes |
|
834 | 834 | * @access public |
835 | 835 | */ |
836 | 836 | public function getPrefixFromNamespace($ns) { |
@@ -896,7 +896,7 @@ discard block |
||
896 | 896 | * |
897 | 897 | * @param int $timestamp Unix time stamp |
898 | 898 | * @param boolean $utc Whether the time stamp is UTC or local |
899 | -* @return mixed ISO 8601 date string or false |
|
899 | +* @return string|false ISO 8601 date string or false |
|
900 | 900 | * @access public |
901 | 901 | */ |
902 | 902 | function timestamp_to_iso8601($timestamp,$utc=true){ |
@@ -104,21 +104,21 @@ discard block |
||
104 | 104 | * @access private |
105 | 105 | */ |
106 | 106 | var $revision = '$Revision: 1.57 $'; |
107 | - /** |
|
108 | - * Current error string (manipulated by getError/setError) |
|
107 | + /** |
|
108 | + * Current error string (manipulated by getError/setError) |
|
109 | 109 | * |
110 | 110 | * @var string |
111 | 111 | * @access private |
112 | 112 | */ |
113 | 113 | var $error_str = ''; |
114 | - /** |
|
115 | - * Current debug string (manipulated by debug/appendDebug/clearDebug/getDebug/getDebugAsXMLComment) |
|
114 | + /** |
|
115 | + * Current debug string (manipulated by debug/appendDebug/clearDebug/getDebug/getDebugAsXMLComment) |
|
116 | 116 | * |
117 | 117 | * @var string |
118 | 118 | * @access private |
119 | 119 | */ |
120 | - var $debug_str = ''; |
|
121 | - /** |
|
120 | + var $debug_str = ''; |
|
121 | + /** |
|
122 | 122 | * toggles automatic encoding of special characters as entities |
123 | 123 | * (should always be true, I think) |
124 | 124 | * |
@@ -134,31 +134,31 @@ discard block |
||
134 | 134 | */ |
135 | 135 | var $debugLevel; |
136 | 136 | |
137 | - /** |
|
138 | - * set schema version |
|
139 | - * |
|
140 | - * @var string |
|
141 | - * @access public |
|
142 | - */ |
|
137 | + /** |
|
138 | + * set schema version |
|
139 | + * |
|
140 | + * @var string |
|
141 | + * @access public |
|
142 | + */ |
|
143 | 143 | var $XMLSchemaVersion = 'http://www.w3.org/2001/XMLSchema'; |
144 | 144 | |
145 | - /** |
|
146 | - * charset encoding for outgoing messages |
|
147 | - * |
|
148 | - * @var string |
|
149 | - * @access public |
|
150 | - */ |
|
151 | - var $soap_defencoding = 'UTF-8'; |
|
145 | + /** |
|
146 | + * charset encoding for outgoing messages |
|
147 | + * |
|
148 | + * @var string |
|
149 | + * @access public |
|
150 | + */ |
|
151 | + var $soap_defencoding = 'UTF-8'; |
|
152 | 152 | //var $soap_defencoding = 'UTF-8'; |
153 | 153 | |
154 | 154 | /** |
155 | - * namespaces in an array of prefix => uri |
|
156 | - * |
|
157 | - * this is "seeded" by a set of constants, but it may be altered by code |
|
158 | - * |
|
159 | - * @var array |
|
160 | - * @access public |
|
161 | - */ |
|
155 | + * namespaces in an array of prefix => uri |
|
156 | + * |
|
157 | + * this is "seeded" by a set of constants, but it may be altered by code |
|
158 | + * |
|
159 | + * @var array |
|
160 | + * @access public |
|
161 | + */ |
|
162 | 162 | var $namespaces = array( |
163 | 163 | 'SOAP-ENV' => 'http://schemas.xmlsoap.org/soap/envelope/', |
164 | 164 | 'xsd' => 'http://www.w3.org/2001/XMLSchema', |
@@ -167,20 +167,20 @@ discard block |
||
167 | 167 | ); |
168 | 168 | |
169 | 169 | /** |
170 | - * namespaces used in the current context, e.g. during serialization |
|
171 | - * |
|
172 | - * @var array |
|
173 | - * @access private |
|
174 | - */ |
|
170 | + * namespaces used in the current context, e.g. during serialization |
|
171 | + * |
|
172 | + * @var array |
|
173 | + * @access private |
|
174 | + */ |
|
175 | 175 | var $usedNamespaces = array(); |
176 | 176 | |
177 | 177 | /** |
178 | - * XML Schema types in an array of uri => (array of xml type => php type) |
|
179 | - * is this legacy yet? |
|
180 | - * no, this is used by the nusoap_xmlschema class to verify type => namespace mappings. |
|
181 | - * @var array |
|
182 | - * @access public |
|
183 | - */ |
|
178 | + * XML Schema types in an array of uri => (array of xml type => php type) |
|
179 | + * is this legacy yet? |
|
180 | + * no, this is used by the nusoap_xmlschema class to verify type => namespace mappings. |
|
181 | + * @var array |
|
182 | + * @access public |
|
183 | + */ |
|
184 | 184 | var $typemap = array( |
185 | 185 | 'http://www.w3.org/2001/XMLSchema' => array( |
186 | 186 | 'string'=>'string','boolean'=>'boolean','float'=>'double','double'=>'double','decimal'=>'double', |
@@ -203,75 +203,75 @@ discard block |
||
203 | 203 | 'timeInstant'=>'string','base64Binary'=>'string','base64'=>'string','ur-type'=>'array'), |
204 | 204 | 'http://soapinterop.org/xsd' => array('SOAPStruct'=>'struct'), |
205 | 205 | 'http://schemas.xmlsoap.org/soap/encoding/' => array('base64'=>'string','array'=>'array','Array'=>'array'), |
206 | - 'http://xml.apache.org/xml-soap' => array('Map') |
|
206 | + 'http://xml.apache.org/xml-soap' => array('Map') |
|
207 | 207 | ); |
208 | 208 | |
209 | 209 | /** |
210 | - * XML entities to convert |
|
211 | - * |
|
212 | - * @var array |
|
213 | - * @access public |
|
214 | - * @deprecated |
|
215 | - * @see expandEntities |
|
216 | - */ |
|
210 | + * XML entities to convert |
|
211 | + * |
|
212 | + * @var array |
|
213 | + * @access public |
|
214 | + * @deprecated |
|
215 | + * @see expandEntities |
|
216 | + */ |
|
217 | 217 | var $xmlEntities = array('quot' => '"','amp' => '&', |
218 | 218 | 'lt' => '<','gt' => '>','apos' => "'"); |
219 | 219 | |
220 | 220 | /** |
221 | - * constructor |
|
222 | - * |
|
223 | - * @access public |
|
224 | - */ |
|
221 | + * constructor |
|
222 | + * |
|
223 | + * @access public |
|
224 | + */ |
|
225 | 225 | public function nusoap_base() { |
226 | 226 | $this->debugLevel = $GLOBALS['_transient']['static']['nusoap_base']['globalDebugLevel']; |
227 | 227 | } |
228 | 228 | |
229 | 229 | /** |
230 | - * gets the global debug level, which applies to future instances |
|
231 | - * |
|
232 | - * @return integer Debug level 0-9, where 0 turns off |
|
233 | - * @access public |
|
234 | - */ |
|
230 | + * gets the global debug level, which applies to future instances |
|
231 | + * |
|
232 | + * @return integer Debug level 0-9, where 0 turns off |
|
233 | + * @access public |
|
234 | + */ |
|
235 | 235 | public function getGlobalDebugLevel() { |
236 | 236 | return $GLOBALS['_transient']['static']['nusoap_base']['globalDebugLevel']; |
237 | 237 | } |
238 | 238 | |
239 | 239 | /** |
240 | - * sets the global debug level, which applies to future instances |
|
241 | - * |
|
242 | - * @param int $level Debug level 0-9, where 0 turns off |
|
243 | - * @access public |
|
244 | - */ |
|
240 | + * sets the global debug level, which applies to future instances |
|
241 | + * |
|
242 | + * @param int $level Debug level 0-9, where 0 turns off |
|
243 | + * @access public |
|
244 | + */ |
|
245 | 245 | public function setGlobalDebugLevel($level) { |
246 | 246 | $GLOBALS['_transient']['static']['nusoap_base']['globalDebugLevel'] = $level; |
247 | 247 | } |
248 | 248 | |
249 | 249 | /** |
250 | - * gets the debug level for this instance |
|
251 | - * |
|
252 | - * @return int Debug level 0-9, where 0 turns off |
|
253 | - * @access public |
|
254 | - */ |
|
250 | + * gets the debug level for this instance |
|
251 | + * |
|
252 | + * @return int Debug level 0-9, where 0 turns off |
|
253 | + * @access public |
|
254 | + */ |
|
255 | 255 | public function getDebugLevel() { |
256 | 256 | return $this->debugLevel; |
257 | 257 | } |
258 | 258 | |
259 | 259 | /** |
260 | - * sets the debug level for this instance |
|
261 | - * |
|
262 | - * @param int $level Debug level 0-9, where 0 turns off |
|
263 | - * @access public |
|
264 | - */ |
|
260 | + * sets the debug level for this instance |
|
261 | + * |
|
262 | + * @param int $level Debug level 0-9, where 0 turns off |
|
263 | + * @access public |
|
264 | + */ |
|
265 | 265 | public function setDebugLevel($level) { |
266 | 266 | $this->debugLevel = $level; |
267 | 267 | } |
268 | 268 | |
269 | 269 | /** |
270 | - * adds debug data to the instance debug string with formatting |
|
271 | - * |
|
272 | - * @param string $string debug data |
|
273 | - * @access private |
|
274 | - */ |
|
270 | + * adds debug data to the instance debug string with formatting |
|
271 | + * |
|
272 | + * @param string $string debug data |
|
273 | + * @access private |
|
274 | + */ |
|
275 | 275 | public function debug($string){ |
276 | 276 | if ($this->debugLevel > 0) { |
277 | 277 | $this->appendDebug($this->getmicrotime().' '.get_class($this).": $string\n"); |
@@ -279,11 +279,11 @@ discard block |
||
279 | 279 | } |
280 | 280 | |
281 | 281 | /** |
282 | - * adds debug data to the instance debug string without formatting |
|
283 | - * |
|
284 | - * @param string $string debug data |
|
285 | - * @access public |
|
286 | - */ |
|
282 | + * adds debug data to the instance debug string without formatting |
|
283 | + * |
|
284 | + * @param string $string debug data |
|
285 | + * @access public |
|
286 | + */ |
|
287 | 287 | public function appendDebug($string){ |
288 | 288 | if ($this->debugLevel > 0) { |
289 | 289 | // it would be nice to use a memory stream here to use |
@@ -293,10 +293,10 @@ discard block |
||
293 | 293 | } |
294 | 294 | |
295 | 295 | /** |
296 | - * clears the current debug data for this instance |
|
297 | - * |
|
298 | - * @access public |
|
299 | - */ |
|
296 | + * clears the current debug data for this instance |
|
297 | + * |
|
298 | + * @access public |
|
299 | + */ |
|
300 | 300 | public function clearDebug() { |
301 | 301 | // it would be nice to use a memory stream here to use |
302 | 302 | // memory more efficiently |
@@ -304,11 +304,11 @@ discard block |
||
304 | 304 | } |
305 | 305 | |
306 | 306 | /** |
307 | - * gets the current debug data for this instance |
|
308 | - * |
|
309 | - * @return debug data |
|
310 | - * @access public |
|
311 | - */ |
|
307 | + * gets the current debug data for this instance |
|
308 | + * |
|
309 | + * @return debug data |
|
310 | + * @access public |
|
311 | + */ |
|
312 | 312 | public function &getDebug() { |
313 | 313 | // it would be nice to use a memory stream here to use |
314 | 314 | // memory more efficiently |
@@ -316,12 +316,12 @@ discard block |
||
316 | 316 | } |
317 | 317 | |
318 | 318 | /** |
319 | - * gets the current debug data for this instance as an XML comment |
|
320 | - * this may change the contents of the debug data |
|
321 | - * |
|
322 | - * @return debug data as an XML comment |
|
323 | - * @access public |
|
324 | - */ |
|
319 | + * gets the current debug data for this instance as an XML comment |
|
320 | + * this may change the contents of the debug data |
|
321 | + * |
|
322 | + * @return debug data as an XML comment |
|
323 | + * @access public |
|
324 | + */ |
|
325 | 325 | public function &getDebugAsXMLComment() { |
326 | 326 | // it would be nice to use a memory stream here to use |
327 | 327 | // memory more efficiently |
@@ -329,32 +329,32 @@ discard block |
||
329 | 329 | $this->debug_str = str_replace('--', '- -', $this->debug_str); |
330 | 330 | } |
331 | 331 | $ret = "<!--\n" . $this->debug_str . "\n-->"; |
332 | - return $ret; |
|
332 | + return $ret; |
|
333 | 333 | } |
334 | 334 | |
335 | 335 | /** |
336 | - * expands entities, e.g. changes '<' to '<'. |
|
337 | - * |
|
338 | - * @param string $val The string in which to expand entities. |
|
339 | - * @access private |
|
340 | - */ |
|
336 | + * expands entities, e.g. changes '<' to '<'. |
|
337 | + * |
|
338 | + * @param string $val The string in which to expand entities. |
|
339 | + * @access private |
|
340 | + */ |
|
341 | 341 | public function expandEntities($val) { |
342 | 342 | if ($this->charencoding) { |
343 | - $val = str_replace('&', '&', $val); |
|
344 | - $val = str_replace("'", ''', $val); |
|
345 | - $val = str_replace('"', '"', $val); |
|
346 | - $val = str_replace('<', '<', $val); |
|
347 | - $val = str_replace('>', '>', $val); |
|
348 | - } |
|
349 | - return $val; |
|
343 | + $val = str_replace('&', '&', $val); |
|
344 | + $val = str_replace("'", ''', $val); |
|
345 | + $val = str_replace('"', '"', $val); |
|
346 | + $val = str_replace('<', '<', $val); |
|
347 | + $val = str_replace('>', '>', $val); |
|
348 | + } |
|
349 | + return $val; |
|
350 | 350 | } |
351 | 351 | |
352 | 352 | /** |
353 | - * returns error string if present |
|
354 | - * |
|
355 | - * @return mixed error string or false |
|
356 | - * @access public |
|
357 | - */ |
|
353 | + * returns error string if present |
|
354 | + * |
|
355 | + * @return mixed error string or false |
|
356 | + * @access public |
|
357 | + */ |
|
358 | 358 | public function getError(){ |
359 | 359 | if($this->error_str != ''){ |
360 | 360 | return $this->error_str; |
@@ -363,24 +363,24 @@ discard block |
||
363 | 363 | } |
364 | 364 | |
365 | 365 | /** |
366 | - * sets error string |
|
367 | - * |
|
368 | - * @return boolean $string error string |
|
369 | - * @access private |
|
370 | - */ |
|
366 | + * sets error string |
|
367 | + * |
|
368 | + * @return boolean $string error string |
|
369 | + * @access private |
|
370 | + */ |
|
371 | 371 | public function setError($str){ |
372 | 372 | $this->error_str = $str; |
373 | 373 | } |
374 | 374 | |
375 | 375 | /** |
376 | - * detect if array is a simple array or a struct (associative array) |
|
377 | - * |
|
378 | - * @param mixed $val The PHP array |
|
379 | - * @return string (arraySimple|arrayStruct) |
|
380 | - * @access private |
|
381 | - */ |
|
376 | + * detect if array is a simple array or a struct (associative array) |
|
377 | + * |
|
378 | + * @param mixed $val The PHP array |
|
379 | + * @return string (arraySimple|arrayStruct) |
|
380 | + * @access private |
|
381 | + */ |
|
382 | 382 | public function isArraySimpleOrStruct($val) { |
383 | - $keyList = array_keys($val); |
|
383 | + $keyList = array_keys($val); |
|
384 | 384 | foreach ($keyList as $keyListValue) { |
385 | 385 | if (!is_int($keyListValue)) { |
386 | 386 | return 'arrayStruct'; |
@@ -390,33 +390,33 @@ discard block |
||
390 | 390 | } |
391 | 391 | |
392 | 392 | /** |
393 | - * serializes PHP values in accordance w/ section 5. Type information is |
|
394 | - * not serialized if $use == 'literal'. |
|
395 | - * |
|
396 | - * @param mixed $val The value to serialize |
|
397 | - * @param string $name The name (local part) of the XML element |
|
398 | - * @param string $type The XML schema type (local part) for the element |
|
399 | - * @param string $name_ns The namespace for the name of the XML element |
|
400 | - * @param string $type_ns The namespace for the type of the element |
|
401 | - * @param array $attributes The attributes to serialize as name=>value pairs |
|
402 | - * @param string $use The WSDL "use" (encoded|literal) |
|
403 | - * @param boolean $soapval Whether this is called from soapval. |
|
404 | - * @return string The serialized element, possibly with child elements |
|
405 | - * @access public |
|
406 | - */ |
|
393 | + * serializes PHP values in accordance w/ section 5. Type information is |
|
394 | + * not serialized if $use == 'literal'. |
|
395 | + * |
|
396 | + * @param mixed $val The value to serialize |
|
397 | + * @param string $name The name (local part) of the XML element |
|
398 | + * @param string $type The XML schema type (local part) for the element |
|
399 | + * @param string $name_ns The namespace for the name of the XML element |
|
400 | + * @param string $type_ns The namespace for the type of the element |
|
401 | + * @param array $attributes The attributes to serialize as name=>value pairs |
|
402 | + * @param string $use The WSDL "use" (encoded|literal) |
|
403 | + * @param boolean $soapval Whether this is called from soapval. |
|
404 | + * @return string The serialized element, possibly with child elements |
|
405 | + * @access public |
|
406 | + */ |
|
407 | 407 | public function serialize_val($val,$name=false,$type=false,$name_ns=false,$type_ns=false,$attributes=false,$use='encoded',$soapval=false) { |
408 | 408 | $this->debug("in serialize_val: name=$name, type=$type, name_ns=$name_ns, type_ns=$type_ns, use=$use, soapval=$soapval"); |
409 | 409 | $this->appendDebug('value=' . $this->varDump($val)); |
410 | 410 | $this->appendDebug('attributes=' . $this->varDump($attributes)); |
411 | 411 | |
412 | - if (is_object($val) && get_class($val) == 'soapval' && (! $soapval)) { |
|
413 | - $this->debug("serialize_val: serialize soapval"); |
|
414 | - $xml = $val->serialize($use); |
|
412 | + if (is_object($val) && get_class($val) == 'soapval' && (! $soapval)) { |
|
413 | + $this->debug("serialize_val: serialize soapval"); |
|
414 | + $xml = $val->serialize($use); |
|
415 | 415 | $this->appendDebug($val->getDebug()); |
416 | 416 | $val->clearDebug(); |
417 | 417 | $this->debug("serialize_val of soapval returning $xml"); |
418 | 418 | return $xml; |
419 | - } |
|
419 | + } |
|
420 | 420 | // force valid name if necessary |
421 | 421 | if (is_numeric($name)) { |
422 | 422 | $name = '__numeric_' . $name; |
@@ -425,7 +425,7 @@ discard block |
||
425 | 425 | } |
426 | 426 | // if name has ns, add ns prefix to name |
427 | 427 | $xmlns = ''; |
428 | - if($name_ns){ |
|
428 | + if($name_ns){ |
|
429 | 429 | $prefix = 'nu'.rand(1000,9999); |
430 | 430 | $name = $prefix.':'.$name; |
431 | 431 | $xmlns .= " xmlns:$prefix=\"$name_ns\""; |
@@ -433,7 +433,7 @@ discard block |
||
433 | 433 | // if type is prefixed, create type prefix |
434 | 434 | if($type_ns != '' && $type_ns == $this->namespaces['xsd']){ |
435 | 435 | // need to fix this. shouldn't default to xsd if no ns specified |
436 | - // w/o checking against typemap |
|
436 | + // w/o checking against typemap |
|
437 | 437 | $type_prefix = 'xsd'; |
438 | 438 | } elseif($type_ns){ |
439 | 439 | $type_prefix = 'ns'.rand(1000,9999); |
@@ -448,12 +448,12 @@ discard block |
||
448 | 448 | } |
449 | 449 | // serialize null value |
450 | 450 | if (is_null($val)) { |
451 | - $this->debug("serialize_val: serialize null"); |
|
451 | + $this->debug("serialize_val: serialize null"); |
|
452 | 452 | if ($use == 'literal') { |
453 | 453 | $xml = "<$name$xmlns$atts/>"; |
454 | 454 | $this->debug("serialize_val returning $xml"); |
455 | - return $xml; |
|
456 | - } else { |
|
455 | + return $xml; |
|
456 | + } else { |
|
457 | 457 | if (isset($type) && isset($type_prefix)) { |
458 | 458 | $type_str = " xsi:type=\"$type_prefix:$type\""; |
459 | 459 | } else { |
@@ -461,41 +461,41 @@ discard block |
||
461 | 461 | } |
462 | 462 | $xml = "<$name$xmlns$type_str$atts xsi:nil=\"true\"/>"; |
463 | 463 | $this->debug("serialize_val returning $xml"); |
464 | - return $xml; |
|
465 | - } |
|
464 | + return $xml; |
|
465 | + } |
|
466 | 466 | } |
467 | - // serialize if an xsd built-in primitive type |
|
468 | - if($type != '' && isset($this->typemap[$this->XMLSchemaVersion][$type])){ |
|
469 | - $this->debug("serialize_val: serialize xsd built-in primitive type"); |
|
470 | - if (is_bool($val)) { |
|
471 | - if ($type == 'boolean') { |
|
472 | - $val = $val ? 'true' : 'false'; |
|
473 | - } elseif (! $val) { |
|
474 | - $val = 0; |
|
475 | - } |
|
467 | + // serialize if an xsd built-in primitive type |
|
468 | + if($type != '' && isset($this->typemap[$this->XMLSchemaVersion][$type])){ |
|
469 | + $this->debug("serialize_val: serialize xsd built-in primitive type"); |
|
470 | + if (is_bool($val)) { |
|
471 | + if ($type == 'boolean') { |
|
472 | + $val = $val ? 'true' : 'false'; |
|
473 | + } elseif (! $val) { |
|
474 | + $val = 0; |
|
475 | + } |
|
476 | 476 | } else if (is_string($val)) { |
477 | 477 | $val = $this->expandEntities($val); |
478 | 478 | } |
479 | 479 | if ($use == 'literal') { |
480 | 480 | $xml = "<$name$xmlns$atts>$val</$name>"; |
481 | 481 | $this->debug("serialize_val returning $xml"); |
482 | - return $xml; |
|
483 | - } else { |
|
482 | + return $xml; |
|
483 | + } else { |
|
484 | 484 | $xml = "<$name$xmlns xsi:type=\"xsd:$type\"$atts>$val</$name>"; |
485 | 485 | $this->debug("serialize_val returning $xml"); |
486 | - return $xml; |
|
487 | - } |
|
488 | - } |
|
486 | + return $xml; |
|
487 | + } |
|
488 | + } |
|
489 | 489 | // detect type and serialize |
490 | 490 | $xml = ''; |
491 | 491 | switch(true) { |
492 | 492 | case (is_bool($val) || $type == 'boolean'): |
493 | 493 | $this->debug("serialize_val: serialize boolean"); |
494 | - if ($type == 'boolean') { |
|
495 | - $val = $val ? 'true' : 'false'; |
|
496 | - } elseif (! $val) { |
|
497 | - $val = 0; |
|
498 | - } |
|
494 | + if ($type == 'boolean') { |
|
495 | + $val = $val ? 'true' : 'false'; |
|
496 | + } elseif (! $val) { |
|
497 | + $val = 0; |
|
498 | + } |
|
499 | 499 | if ($use == 'literal') { |
500 | 500 | $xml .= "<$name$xmlns$atts>$val</$name>"; |
501 | 501 | } else { |
@@ -529,12 +529,12 @@ discard block |
||
529 | 529 | break; |
530 | 530 | case is_object($val): |
531 | 531 | $this->debug("serialize_val: serialize object"); |
532 | - if (get_class($val) == 'soapval') { |
|
533 | - $this->debug("serialize_val: serialize soapval object"); |
|
534 | - $pXml = $val->serialize($use); |
|
532 | + if (get_class($val) == 'soapval') { |
|
533 | + $this->debug("serialize_val: serialize soapval object"); |
|
534 | + $pXml = $val->serialize($use); |
|
535 | 535 | $this->appendDebug($val->getDebug()); |
536 | 536 | $val->clearDebug(); |
537 | - } else { |
|
537 | + } else { |
|
538 | 538 | if (! $name) { |
539 | 539 | $name = get_class($val); |
540 | 540 | $this->debug("In serialize_val, used class name $name as element name"); |
@@ -560,19 +560,19 @@ discard block |
||
560 | 560 | case (is_array($val) || $type): |
561 | 561 | // detect if struct or array |
562 | 562 | $valueType = $this->isArraySimpleOrStruct($val); |
563 | - if($valueType=='arraySimple' || preg_match('/^ArrayOf/',$type)){ |
|
563 | + if($valueType=='arraySimple' || preg_match('/^ArrayOf/',$type)){ |
|
564 | 564 | $this->debug("serialize_val: serialize array"); |
565 | 565 | $i = 0; |
566 | 566 | if(is_array($val) && count($val)> 0){ |
567 | 567 | foreach($val as $v){ |
568 | - if(is_object($v) && get_class($v) == 'soapval'){ |
|
568 | + if(is_object($v) && get_class($v) == 'soapval'){ |
|
569 | 569 | $tt_ns = $v->type_ns; |
570 | 570 | $tt = $v->type; |
571 | 571 | } elseif (is_array($v)) { |
572 | 572 | $tt = $this->isArraySimpleOrStruct($v); |
573 | 573 | } else { |
574 | 574 | $tt = gettype($v); |
575 | - } |
|
575 | + } |
|
576 | 576 | $array_types[$tt] = 1; |
577 | 577 | $xml .= $this->serialize_val($v,'item',false,false,false,false,$use); |
578 | 578 | ++$i; |
@@ -655,19 +655,19 @@ discard block |
||
655 | 655 | return $xml; |
656 | 656 | } |
657 | 657 | |
658 | - /** |
|
659 | - * serializes a message |
|
660 | - * |
|
661 | - * @param string $body the XML of the SOAP body |
|
662 | - * @param mixed $headers optional string of XML with SOAP header content, or array of soapval objects for SOAP headers, or associative array |
|
663 | - * @param array $namespaces optional the namespaces used in generating the body and headers |
|
664 | - * @param string $style optional (rpc|document) |
|
665 | - * @param string $use optional (encoded|literal) |
|
666 | - * @param string $encodingStyle optional (usually 'http://schemas.xmlsoap.org/soap/encoding/' for encoded) |
|
667 | - * @return string the message |
|
668 | - * @access public |
|
669 | - */ |
|
670 | - public function serializeEnvelope($body,$headers=false,$namespaces=array(),$style='rpc',$use='encoded',$encodingStyle='http://schemas.xmlsoap.org/soap/encoding/'){ |
|
658 | + /** |
|
659 | + * serializes a message |
|
660 | + * |
|
661 | + * @param string $body the XML of the SOAP body |
|
662 | + * @param mixed $headers optional string of XML with SOAP header content, or array of soapval objects for SOAP headers, or associative array |
|
663 | + * @param array $namespaces optional the namespaces used in generating the body and headers |
|
664 | + * @param string $style optional (rpc|document) |
|
665 | + * @param string $use optional (encoded|literal) |
|
666 | + * @param string $encodingStyle optional (usually 'http://schemas.xmlsoap.org/soap/encoding/' for encoded) |
|
667 | + * @return string the message |
|
668 | + * @access public |
|
669 | + */ |
|
670 | + public function serializeEnvelope($body,$headers=false,$namespaces=array(),$style='rpc',$use='encoded',$encodingStyle='http://schemas.xmlsoap.org/soap/encoding/'){ |
|
671 | 671 | |
672 | 672 | $this->debug("In serializeEnvelope length=" . strlen($body) . " body (max 1000 characters)=" . substr($body, 0, 1000) . " style=$style use=$use encodingStyle=$encodingStyle"); |
673 | 673 | $this->debug("headers:"); |
@@ -676,7 +676,7 @@ discard block |
||
676 | 676 | $this->appendDebug($this->varDump($namespaces)); |
677 | 677 | |
678 | 678 | // serialize namespaces |
679 | - $ns_string = ''; |
|
679 | + $ns_string = ''; |
|
680 | 680 | foreach(array_merge($this->namespaces,$namespaces) as $k => $v){ |
681 | 681 | $ns_string .= " xmlns:$k=\"$v\""; |
682 | 682 | } |
@@ -709,7 +709,7 @@ discard block |
||
709 | 709 | $body. |
710 | 710 | "</SOAP-ENV:Body>". |
711 | 711 | "</SOAP-ENV:Envelope>"; |
712 | - } |
|
712 | + } |
|
713 | 713 | |
714 | 714 | /** |
715 | 715 | * formats a string to be inserted into an HTML stream |
@@ -719,18 +719,18 @@ discard block |
||
719 | 719 | * @access public |
720 | 720 | * @deprecated |
721 | 721 | */ |
722 | - public function formatDump($str){ |
|
722 | + public function formatDump($str){ |
|
723 | 723 | $str = htmlspecialchars($str); |
724 | 724 | return nl2br($str); |
725 | - } |
|
725 | + } |
|
726 | 726 | |
727 | 727 | /** |
728 | - * contracts (changes namespace to prefix) a qualified name |
|
729 | - * |
|
730 | - * @param string $qname qname |
|
731 | - * @return string contracted qname |
|
732 | - * @access private |
|
733 | - */ |
|
728 | + * contracts (changes namespace to prefix) a qualified name |
|
729 | + * |
|
730 | + * @param string $qname qname |
|
731 | + * @return string contracted qname |
|
732 | + * @access private |
|
733 | + */ |
|
734 | 734 | public function contractQname($qname){ |
735 | 735 | // get element namespace |
736 | 736 | if (strrpos($qname, ':')) { |
@@ -749,12 +749,12 @@ discard block |
||
749 | 749 | } |
750 | 750 | |
751 | 751 | /** |
752 | - * expands (changes prefix to namespace) a qualified name |
|
753 | - * |
|
754 | - * @param string $qname qname |
|
755 | - * @return string expanded qname |
|
756 | - * @access private |
|
757 | - */ |
|
752 | + * expands (changes prefix to namespace) a qualified name |
|
753 | + * |
|
754 | + * @param string $qname qname |
|
755 | + * @return string expanded qname |
|
756 | + * @access private |
|
757 | + */ |
|
758 | 758 | public function expandQname($qname){ |
759 | 759 | // get element prefix |
760 | 760 | if(strpos($qname,':') && !preg_match('/^http:\/\//',$qname)){ |
@@ -772,14 +772,14 @@ discard block |
||
772 | 772 | } |
773 | 773 | } |
774 | 774 | |
775 | - /** |
|
776 | - * returns the local part of a prefixed string |
|
777 | - * returns the original string, if not prefixed |
|
778 | - * |
|
779 | - * @param string $str The prefixed string |
|
780 | - * @return string The local part |
|
781 | - * @access public |
|
782 | - */ |
|
775 | + /** |
|
776 | + * returns the local part of a prefixed string |
|
777 | + * returns the original string, if not prefixed |
|
778 | + * |
|
779 | + * @param string $str The prefixed string |
|
780 | + * @return string The local part |
|
781 | + * @access public |
|
782 | + */ |
|
783 | 783 | public function getLocalPart($str){ |
784 | 784 | if($sstr = strrchr($str,':')){ |
785 | 785 | // get unqualified name |
@@ -790,13 +790,13 @@ discard block |
||
790 | 790 | } |
791 | 791 | |
792 | 792 | /** |
793 | - * returns the prefix part of a prefixed string |
|
794 | - * returns false, if not prefixed |
|
795 | - * |
|
796 | - * @param string $str The prefixed string |
|
797 | - * @return mixed The prefix or false if there is no prefix |
|
798 | - * @access public |
|
799 | - */ |
|
793 | + * returns the prefix part of a prefixed string |
|
794 | + * returns false, if not prefixed |
|
795 | + * |
|
796 | + * @param string $str The prefixed string |
|
797 | + * @return mixed The prefix or false if there is no prefix |
|
798 | + * @access public |
|
799 | + */ |
|
800 | 800 | public function getPrefix($str){ |
801 | 801 | if($pos = strrpos($str,':')){ |
802 | 802 | // get prefix |
@@ -806,12 +806,12 @@ discard block |
||
806 | 806 | } |
807 | 807 | |
808 | 808 | /** |
809 | - * pass it a prefix, it returns a namespace |
|
810 | - * |
|
811 | - * @param string $prefix The prefix |
|
812 | - * @return mixed The namespace, false if no namespace has the specified prefix |
|
813 | - * @access public |
|
814 | - */ |
|
809 | + * pass it a prefix, it returns a namespace |
|
810 | + * |
|
811 | + * @param string $prefix The prefix |
|
812 | + * @return mixed The namespace, false if no namespace has the specified prefix |
|
813 | + * @access public |
|
814 | + */ |
|
815 | 815 | public function getNamespaceFromPrefix($prefix){ |
816 | 816 | if (isset($this->namespaces[$prefix])) { |
817 | 817 | return $this->namespaces[$prefix]; |
@@ -820,17 +820,17 @@ discard block |
||
820 | 820 | } |
821 | 821 | |
822 | 822 | /** |
823 | - * returns the prefix for a given namespace (or prefix) |
|
824 | - * or false if no prefixes registered for the given namespace |
|
825 | - * |
|
826 | - * @param string $ns The namespace |
|
827 | - * @return mixed The prefix, false if the namespace has no prefixes |
|
828 | - * @access public |
|
829 | - */ |
|
823 | + * returns the prefix for a given namespace (or prefix) |
|
824 | + * or false if no prefixes registered for the given namespace |
|
825 | + * |
|
826 | + * @param string $ns The namespace |
|
827 | + * @return mixed The prefix, false if the namespace has no prefixes |
|
828 | + * @access public |
|
829 | + */ |
|
830 | 830 | public function getPrefixFromNamespace($ns) { |
831 | 831 | foreach ($this->namespaces as $p => $n) { |
832 | 832 | if ($ns == $n || $ns == $p) { |
833 | - $this->usedNamespaces[$p] = $n; |
|
833 | + $this->usedNamespaces[$p] = $n; |
|
834 | 834 | return $p; |
835 | 835 | } |
836 | 836 | } |
@@ -838,11 +838,11 @@ discard block |
||
838 | 838 | } |
839 | 839 | |
840 | 840 | /** |
841 | - * returns the time in ODBC canonical form with microseconds |
|
842 | - * |
|
843 | - * @return string The time in ODBC canonical form with microseconds |
|
844 | - * @access public |
|
845 | - */ |
|
841 | + * returns the time in ODBC canonical form with microseconds |
|
842 | + * |
|
843 | + * @return string The time in ODBC canonical form with microseconds |
|
844 | + * @access public |
|
845 | + */ |
|
846 | 846 | public function getmicrotime() { |
847 | 847 | if (function_exists('gettimeofday')) { |
848 | 848 | $tod = gettimeofday(); |
@@ -862,7 +862,7 @@ discard block |
||
862 | 862 | * @return string The output of var_dump |
863 | 863 | * @access public |
864 | 864 | */ |
865 | - public function varDump($data) { |
|
865 | + public function varDump($data) { |
|
866 | 866 | // <-------- YetiForce Sp. z o.o. --------> |
867 | 867 | // original code: ob_start(); var_dump($data); $ret_val = ob_get_contents(); ob_end_clean(); |
868 | 868 | $ret_val = var_export($data, true); |
@@ -871,11 +871,11 @@ discard block |
||
871 | 871 | } |
872 | 872 | |
873 | 873 | /** |
874 | - * represents the object as a string |
|
875 | - * |
|
876 | - * @return string |
|
877 | - * @access public |
|
878 | - */ |
|
874 | + * represents the object as a string |
|
875 | + * |
|
876 | + * @return string |
|
877 | + * @access public |
|
878 | + */ |
|
879 | 879 | public function __toString() { |
880 | 880 | return $this->varDump($this); |
881 | 881 | } |
@@ -183,26 +183,26 @@ discard block |
||
183 | 183 | */ |
184 | 184 | var $typemap = array( |
185 | 185 | 'http://www.w3.org/2001/XMLSchema' => array( |
186 | - 'string'=>'string','boolean'=>'boolean','float'=>'double','double'=>'double','decimal'=>'double', |
|
187 | - 'duration'=>'','dateTime'=>'string','time'=>'string','date'=>'string','gYearMonth'=>'', |
|
188 | - 'gYear'=>'','gMonthDay'=>'','gDay'=>'','gMonth'=>'','hexBinary'=>'string','base64Binary'=>'string', |
|
186 | + 'string'=>'string', 'boolean'=>'boolean', 'float'=>'double', 'double'=>'double', 'decimal'=>'double', |
|
187 | + 'duration'=>'', 'dateTime'=>'string', 'time'=>'string', 'date'=>'string', 'gYearMonth'=>'', |
|
188 | + 'gYear'=>'', 'gMonthDay'=>'', 'gDay'=>'', 'gMonth'=>'', 'hexBinary'=>'string', 'base64Binary'=>'string', |
|
189 | 189 | // abstract "any" types |
190 | - 'anyType'=>'string','anySimpleType'=>'string', |
|
190 | + 'anyType'=>'string', 'anySimpleType'=>'string', |
|
191 | 191 | // derived datatypes |
192 | - 'normalizedString'=>'string','token'=>'string','language'=>'','NMTOKEN'=>'','NMTOKENS'=>'','Name'=>'','NCName'=>'','ID'=>'', |
|
193 | - 'IDREF'=>'','IDREFS'=>'','ENTITY'=>'','ENTITIES'=>'','integer'=>'integer','nonPositiveInteger'=>'integer', |
|
194 | - 'negativeInteger'=>'integer','long'=>'integer','int'=>'integer','short'=>'integer','byte'=>'integer','nonNegativeInteger'=>'integer', |
|
195 | - 'unsignedLong'=>'','unsignedInt'=>'','unsignedShort'=>'','unsignedByte'=>'','positiveInteger'=>''), |
|
192 | + 'normalizedString'=>'string', 'token'=>'string', 'language'=>'', 'NMTOKEN'=>'', 'NMTOKENS'=>'', 'Name'=>'', 'NCName'=>'', 'ID'=>'', |
|
193 | + 'IDREF'=>'', 'IDREFS'=>'', 'ENTITY'=>'', 'ENTITIES'=>'', 'integer'=>'integer', 'nonPositiveInteger'=>'integer', |
|
194 | + 'negativeInteger'=>'integer', 'long'=>'integer', 'int'=>'integer', 'short'=>'integer', 'byte'=>'integer', 'nonNegativeInteger'=>'integer', |
|
195 | + 'unsignedLong'=>'', 'unsignedInt'=>'', 'unsignedShort'=>'', 'unsignedByte'=>'', 'positiveInteger'=>''), |
|
196 | 196 | 'http://www.w3.org/2000/10/XMLSchema' => array( |
197 | - 'i4'=>'','int'=>'integer','boolean'=>'boolean','string'=>'string','double'=>'double', |
|
198 | - 'float'=>'double','dateTime'=>'string', |
|
199 | - 'timeInstant'=>'string','base64Binary'=>'string','base64'=>'string','ur-type'=>'array'), |
|
197 | + 'i4'=>'', 'int'=>'integer', 'boolean'=>'boolean', 'string'=>'string', 'double'=>'double', |
|
198 | + 'float'=>'double', 'dateTime'=>'string', |
|
199 | + 'timeInstant'=>'string', 'base64Binary'=>'string', 'base64'=>'string', 'ur-type'=>'array'), |
|
200 | 200 | 'http://www.w3.org/1999/XMLSchema' => array( |
201 | - 'i4'=>'','int'=>'integer','boolean'=>'boolean','string'=>'string','double'=>'double', |
|
202 | - 'float'=>'double','dateTime'=>'string', |
|
203 | - 'timeInstant'=>'string','base64Binary'=>'string','base64'=>'string','ur-type'=>'array'), |
|
201 | + 'i4'=>'', 'int'=>'integer', 'boolean'=>'boolean', 'string'=>'string', 'double'=>'double', |
|
202 | + 'float'=>'double', 'dateTime'=>'string', |
|
203 | + 'timeInstant'=>'string', 'base64Binary'=>'string', 'base64'=>'string', 'ur-type'=>'array'), |
|
204 | 204 | 'http://soapinterop.org/xsd' => array('SOAPStruct'=>'struct'), |
205 | - 'http://schemas.xmlsoap.org/soap/encoding/' => array('base64'=>'string','array'=>'array','Array'=>'array'), |
|
205 | + 'http://schemas.xmlsoap.org/soap/encoding/' => array('base64'=>'string', 'array'=>'array', 'Array'=>'array'), |
|
206 | 206 | 'http://xml.apache.org/xml-soap' => array('Map') |
207 | 207 | ); |
208 | 208 | |
@@ -214,8 +214,8 @@ discard block |
||
214 | 214 | * @deprecated |
215 | 215 | * @see expandEntities |
216 | 216 | */ |
217 | - var $xmlEntities = array('quot' => '"','amp' => '&', |
|
218 | - 'lt' => '<','gt' => '>','apos' => "'"); |
|
217 | + var $xmlEntities = array('quot' => '"', 'amp' => '&', |
|
218 | + 'lt' => '<', 'gt' => '>', 'apos' => "'"); |
|
219 | 219 | |
220 | 220 | /** |
221 | 221 | * constructor |
@@ -272,9 +272,9 @@ discard block |
||
272 | 272 | * @param string $string debug data |
273 | 273 | * @access private |
274 | 274 | */ |
275 | - public function debug($string){ |
|
275 | + public function debug($string) { |
|
276 | 276 | if ($this->debugLevel > 0) { |
277 | - $this->appendDebug($this->getmicrotime().' '.get_class($this).": $string\n"); |
|
277 | + $this->appendDebug($this->getmicrotime() . ' ' . get_class($this) . ": $string\n"); |
|
278 | 278 | } |
279 | 279 | } |
280 | 280 | |
@@ -284,7 +284,7 @@ discard block |
||
284 | 284 | * @param string $string debug data |
285 | 285 | * @access public |
286 | 286 | */ |
287 | - public function appendDebug($string){ |
|
287 | + public function appendDebug($string) { |
|
288 | 288 | if ($this->debugLevel > 0) { |
289 | 289 | // it would be nice to use a memory stream here to use |
290 | 290 | // memory more efficiently |
@@ -355,8 +355,8 @@ discard block |
||
355 | 355 | * @return mixed error string or false |
356 | 356 | * @access public |
357 | 357 | */ |
358 | - public function getError(){ |
|
359 | - if($this->error_str != ''){ |
|
358 | + public function getError() { |
|
359 | + if ($this->error_str != '') { |
|
360 | 360 | return $this->error_str; |
361 | 361 | } |
362 | 362 | return false; |
@@ -368,7 +368,7 @@ discard block |
||
368 | 368 | * @return boolean $string error string |
369 | 369 | * @access private |
370 | 370 | */ |
371 | - public function setError($str){ |
|
371 | + public function setError($str) { |
|
372 | 372 | $this->error_str = $str; |
373 | 373 | } |
374 | 374 | |
@@ -404,12 +404,12 @@ discard block |
||
404 | 404 | * @return string The serialized element, possibly with child elements |
405 | 405 | * @access public |
406 | 406 | */ |
407 | - public function serialize_val($val,$name=false,$type=false,$name_ns=false,$type_ns=false,$attributes=false,$use='encoded',$soapval=false) { |
|
407 | + public function serialize_val($val, $name = false, $type = false, $name_ns = false, $type_ns = false, $attributes = false, $use = 'encoded', $soapval = false) { |
|
408 | 408 | $this->debug("in serialize_val: name=$name, type=$type, name_ns=$name_ns, type_ns=$type_ns, use=$use, soapval=$soapval"); |
409 | 409 | $this->appendDebug('value=' . $this->varDump($val)); |
410 | 410 | $this->appendDebug('attributes=' . $this->varDump($attributes)); |
411 | 411 | |
412 | - if (is_object($val) && get_class($val) == 'soapval' && (! $soapval)) { |
|
412 | + if (is_object($val) && get_class($val) == 'soapval' && (!$soapval)) { |
|
413 | 413 | $this->debug("serialize_val: serialize soapval"); |
414 | 414 | $xml = $val->serialize($use); |
415 | 415 | $this->appendDebug($val->getDebug()); |
@@ -420,30 +420,30 @@ discard block |
||
420 | 420 | // force valid name if necessary |
421 | 421 | if (is_numeric($name)) { |
422 | 422 | $name = '__numeric_' . $name; |
423 | - } elseif (! $name) { |
|
423 | + } elseif (!$name) { |
|
424 | 424 | $name = 'noname'; |
425 | 425 | } |
426 | 426 | // if name has ns, add ns prefix to name |
427 | 427 | $xmlns = ''; |
428 | - if($name_ns){ |
|
429 | - $prefix = 'nu'.rand(1000,9999); |
|
430 | - $name = $prefix.':'.$name; |
|
428 | + if ($name_ns) { |
|
429 | + $prefix = 'nu' . rand(1000, 9999); |
|
430 | + $name = $prefix . ':' . $name; |
|
431 | 431 | $xmlns .= " xmlns:$prefix=\"$name_ns\""; |
432 | 432 | } |
433 | 433 | // if type is prefixed, create type prefix |
434 | - if($type_ns != '' && $type_ns == $this->namespaces['xsd']){ |
|
434 | + if ($type_ns != '' && $type_ns == $this->namespaces['xsd']) { |
|
435 | 435 | // need to fix this. shouldn't default to xsd if no ns specified |
436 | 436 | // w/o checking against typemap |
437 | 437 | $type_prefix = 'xsd'; |
438 | - } elseif($type_ns){ |
|
439 | - $type_prefix = 'ns'.rand(1000,9999); |
|
438 | + } elseif ($type_ns) { |
|
439 | + $type_prefix = 'ns' . rand(1000, 9999); |
|
440 | 440 | $xmlns .= " xmlns:$type_prefix=\"$type_ns\""; |
441 | 441 | } |
442 | 442 | // serialize attributes if present |
443 | 443 | $atts = ''; |
444 | - if($attributes){ |
|
445 | - foreach($attributes as $k => $v){ |
|
446 | - $atts .= " $k=\"".$this->expandEntities($v).'"'; |
|
444 | + if ($attributes) { |
|
445 | + foreach ($attributes as $k => $v) { |
|
446 | + $atts .= " $k=\"" . $this->expandEntities($v) . '"'; |
|
447 | 447 | } |
448 | 448 | } |
449 | 449 | // serialize null value |
@@ -465,12 +465,12 @@ discard block |
||
465 | 465 | } |
466 | 466 | } |
467 | 467 | // serialize if an xsd built-in primitive type |
468 | - if($type != '' && isset($this->typemap[$this->XMLSchemaVersion][$type])){ |
|
468 | + if ($type != '' && isset($this->typemap[$this->XMLSchemaVersion][$type])) { |
|
469 | 469 | $this->debug("serialize_val: serialize xsd built-in primitive type"); |
470 | 470 | if (is_bool($val)) { |
471 | 471 | if ($type == 'boolean') { |
472 | 472 | $val = $val ? 'true' : 'false'; |
473 | - } elseif (! $val) { |
|
473 | + } elseif (!$val) { |
|
474 | 474 | $val = 0; |
475 | 475 | } |
476 | 476 | } else if (is_string($val)) { |
@@ -488,12 +488,12 @@ discard block |
||
488 | 488 | } |
489 | 489 | // detect type and serialize |
490 | 490 | $xml = ''; |
491 | - switch(true) { |
|
491 | + switch (true) { |
|
492 | 492 | case (is_bool($val) || $type == 'boolean'): |
493 | 493 | $this->debug("serialize_val: serialize boolean"); |
494 | 494 | if ($type == 'boolean') { |
495 | 495 | $val = $val ? 'true' : 'false'; |
496 | - } elseif (! $val) { |
|
496 | + } elseif (!$val) { |
|
497 | 497 | $val = 0; |
498 | 498 | } |
499 | 499 | if ($use == 'literal') { |
@@ -510,7 +510,7 @@ discard block |
||
510 | 510 | $xml .= "<$name$xmlns xsi:type=\"xsd:int\"$atts>$val</$name>"; |
511 | 511 | } |
512 | 512 | break; |
513 | - case (is_float($val)|| is_double($val) || $type == 'float'): |
|
513 | + case (is_float($val) || is_double($val) || $type == 'float'): |
|
514 | 514 | $this->debug("serialize_val: serialize float"); |
515 | 515 | if ($use == 'literal') { |
516 | 516 | $xml .= "<$name$xmlns$atts>$val</$name>"; |
@@ -535,17 +535,17 @@ discard block |
||
535 | 535 | $this->appendDebug($val->getDebug()); |
536 | 536 | $val->clearDebug(); |
537 | 537 | } else { |
538 | - if (! $name) { |
|
538 | + if (!$name) { |
|
539 | 539 | $name = get_class($val); |
540 | 540 | $this->debug("In serialize_val, used class name $name as element name"); |
541 | 541 | } else { |
542 | 542 | $this->debug("In serialize_val, do not override name $name for element name for class " . get_class($val)); |
543 | 543 | } |
544 | - foreach(get_object_vars($val) as $k => $v){ |
|
545 | - $pXml = isset($pXml) ? $pXml.$this->serialize_val($v,$k,false,false,false,false,$use) : $this->serialize_val($v,$k,false,false,false,false,$use); |
|
544 | + foreach (get_object_vars($val) as $k => $v) { |
|
545 | + $pXml = isset($pXml) ? $pXml . $this->serialize_val($v, $k, false, false, false, false, $use) : $this->serialize_val($v, $k, false, false, false, false, $use); |
|
546 | 546 | } |
547 | 547 | } |
548 | - if(isset($type) && isset($type_prefix)){ |
|
548 | + if (isset($type) && isset($type_prefix)) { |
|
549 | 549 | $type_str = " xsi:type=\"$type_prefix:$type\""; |
550 | 550 | } else { |
551 | 551 | $type_str = ''; |
@@ -560,12 +560,12 @@ discard block |
||
560 | 560 | case (is_array($val) || $type): |
561 | 561 | // detect if struct or array |
562 | 562 | $valueType = $this->isArraySimpleOrStruct($val); |
563 | - if($valueType=='arraySimple' || preg_match('/^ArrayOf/',$type)){ |
|
563 | + if ($valueType == 'arraySimple' || preg_match('/^ArrayOf/', $type)) { |
|
564 | 564 | $this->debug("serialize_val: serialize array"); |
565 | 565 | $i = 0; |
566 | - if(is_array($val) && count($val)> 0){ |
|
567 | - foreach($val as $v){ |
|
568 | - if(is_object($v) && get_class($v) == 'soapval'){ |
|
566 | + if (is_array($val) && count($val) > 0) { |
|
567 | + foreach ($val as $v) { |
|
568 | + if (is_object($v) && get_class($v) == 'soapval') { |
|
569 | 569 | $tt_ns = $v->type_ns; |
570 | 570 | $tt = $v->type; |
571 | 571 | } elseif (is_array($v)) { |
@@ -574,23 +574,23 @@ discard block |
||
574 | 574 | $tt = gettype($v); |
575 | 575 | } |
576 | 576 | $array_types[$tt] = 1; |
577 | - $xml .= $this->serialize_val($v,'item',false,false,false,false,$use); |
|
577 | + $xml .= $this->serialize_val($v, 'item', false, false, false, false, $use); |
|
578 | 578 | ++$i; |
579 | 579 | } |
580 | - if(count($array_types) > 1){ |
|
580 | + if (count($array_types) > 1) { |
|
581 | 581 | $array_typename = 'xsd:anyType'; |
582 | - } elseif(isset($tt) && isset($this->typemap[$this->XMLSchemaVersion][$tt])) { |
|
582 | + } elseif (isset($tt) && isset($this->typemap[$this->XMLSchemaVersion][$tt])) { |
|
583 | 583 | if ($tt == 'integer') { |
584 | 584 | $tt = 'int'; |
585 | 585 | } |
586 | - $array_typename = 'xsd:'.$tt; |
|
587 | - } elseif(isset($tt) && $tt == 'arraySimple'){ |
|
586 | + $array_typename = 'xsd:' . $tt; |
|
587 | + } elseif (isset($tt) && $tt == 'arraySimple') { |
|
588 | 588 | $array_typename = 'SOAP-ENC:Array'; |
589 | - } elseif(isset($tt) && $tt == 'arrayStruct'){ |
|
589 | + } elseif (isset($tt) && $tt == 'arrayStruct') { |
|
590 | 590 | $array_typename = 'unnamed_struct_use_soapval'; |
591 | 591 | } else { |
592 | 592 | // if type is prefixed, create type prefix |
593 | - if ($tt_ns != '' && $tt_ns == $this->namespaces['xsd']){ |
|
593 | + if ($tt_ns != '' && $tt_ns == $this->namespaces['xsd']) { |
|
594 | 594 | $array_typename = 'xsd:' . $tt; |
595 | 595 | } elseif ($tt_ns) { |
596 | 596 | $tt_prefix = 'ns' . rand(1000, 9999); |
@@ -606,7 +606,7 @@ discard block |
||
606 | 606 | } else if (isset($type) && isset($type_prefix)) { |
607 | 607 | $type_str = " xsi:type=\"$type_prefix:$type\""; |
608 | 608 | } else { |
609 | - $type_str = " xsi:type=\"SOAP-ENC:Array\" SOAP-ENC:arrayType=\"".$array_typename."[$array_type]\""; |
|
609 | + $type_str = " xsi:type=\"SOAP-ENC:Array\" SOAP-ENC:arrayType=\"" . $array_typename . "[$array_type]\""; |
|
610 | 610 | } |
611 | 611 | // empty array |
612 | 612 | } else { |
@@ -618,11 +618,11 @@ discard block |
||
618 | 618 | $type_str = " xsi:type=\"SOAP-ENC:Array\" SOAP-ENC:arrayType=\"xsd:anyType[0]\""; |
619 | 619 | } |
620 | 620 | } |
621 | - $xml = "<$name$xmlns$type_str$atts>".$xml."</$name>"; |
|
621 | + $xml = "<$name$xmlns$type_str$atts>" . $xml . "</$name>"; |
|
622 | 622 | } else { |
623 | 623 | // got a struct |
624 | 624 | $this->debug("serialize_val: serialize struct"); |
625 | - if(isset($type) && isset($type_prefix)){ |
|
625 | + if (isset($type) && isset($type_prefix)) { |
|
626 | 626 | $type_str = " xsi:type=\"$type_prefix:$type\""; |
627 | 627 | } else { |
628 | 628 | $type_str = ''; |
@@ -632,15 +632,15 @@ discard block |
||
632 | 632 | } else { |
633 | 633 | $xml .= "<$name$xmlns$type_str$atts>"; |
634 | 634 | } |
635 | - foreach($val as $k => $v){ |
|
635 | + foreach ($val as $k => $v) { |
|
636 | 636 | // Apache Map |
637 | 637 | if ($type == 'Map' && $type_ns == 'http://xml.apache.org/xml-soap') { |
638 | 638 | $xml .= '<item>'; |
639 | - $xml .= $this->serialize_val($k,'key',false,false,false,false,$use); |
|
640 | - $xml .= $this->serialize_val($v,'value',false,false,false,false,$use); |
|
639 | + $xml .= $this->serialize_val($k, 'key', false, false, false, false, $use); |
|
640 | + $xml .= $this->serialize_val($v, 'value', false, false, false, false, $use); |
|
641 | 641 | $xml .= '</item>'; |
642 | 642 | } else { |
643 | - $xml .= $this->serialize_val($v,$k,false,false,false,false,$use); |
|
643 | + $xml .= $this->serialize_val($v, $k, false, false, false, false, $use); |
|
644 | 644 | } |
645 | 645 | } |
646 | 646 | $xml .= "</$name>"; |
@@ -648,7 +648,7 @@ discard block |
||
648 | 648 | break; |
649 | 649 | default: |
650 | 650 | $this->debug("serialize_val: serialize unknown"); |
651 | - $xml .= 'not detected, got '.gettype($val).' for '.$val; |
|
651 | + $xml .= 'not detected, got ' . gettype($val) . ' for ' . $val; |
|
652 | 652 | break; |
653 | 653 | } |
654 | 654 | $this->debug("serialize_val returning $xml"); |
@@ -667,7 +667,7 @@ discard block |
||
667 | 667 | * @return string the message |
668 | 668 | * @access public |
669 | 669 | */ |
670 | - public function serializeEnvelope($body,$headers=false,$namespaces=array(),$style='rpc',$use='encoded',$encodingStyle='http://schemas.xmlsoap.org/soap/encoding/'){ |
|
670 | + public function serializeEnvelope($body, $headers = false, $namespaces = array(), $style = 'rpc', $use = 'encoded', $encodingStyle = 'http://schemas.xmlsoap.org/soap/encoding/') { |
|
671 | 671 | |
672 | 672 | $this->debug("In serializeEnvelope length=" . strlen($body) . " body (max 1000 characters)=" . substr($body, 0, 1000) . " style=$style use=$use encodingStyle=$encodingStyle"); |
673 | 673 | $this->debug("headers:"); |
@@ -677,15 +677,15 @@ discard block |
||
677 | 677 | |
678 | 678 | // serialize namespaces |
679 | 679 | $ns_string = ''; |
680 | - foreach(array_merge($this->namespaces,$namespaces) as $k => $v){ |
|
680 | + foreach (array_merge($this->namespaces, $namespaces) as $k => $v) { |
|
681 | 681 | $ns_string .= " xmlns:$k=\"$v\""; |
682 | 682 | } |
683 | - if($encodingStyle) { |
|
683 | + if ($encodingStyle) { |
|
684 | 684 | $ns_string = " SOAP-ENV:encodingStyle=\"$encodingStyle\"$ns_string"; |
685 | 685 | } |
686 | 686 | |
687 | 687 | // serialize headers |
688 | - if($headers){ |
|
688 | + if ($headers) { |
|
689 | 689 | if (is_array($headers)) { |
690 | 690 | $xml = ''; |
691 | 691 | foreach ($headers as $k => $v) { |
@@ -698,16 +698,16 @@ discard block |
||
698 | 698 | $headers = $xml; |
699 | 699 | $this->debug("In serializeEnvelope, serialized array of headers to $headers"); |
700 | 700 | } |
701 | - $headers = "<SOAP-ENV:Header>".$headers."</SOAP-ENV:Header>"; |
|
701 | + $headers = "<SOAP-ENV:Header>" . $headers . "</SOAP-ENV:Header>"; |
|
702 | 702 | } |
703 | 703 | // serialize envelope |
704 | 704 | return |
705 | - '<?xml version="1.0" encoding="'.$this->soap_defencoding .'"?'.">". |
|
706 | - '<SOAP-ENV:Envelope'.$ns_string.">". |
|
707 | - $headers. |
|
708 | - "<SOAP-ENV:Body>". |
|
709 | - $body. |
|
710 | - "</SOAP-ENV:Body>". |
|
705 | + '<?xml version="1.0" encoding="' . $this->soap_defencoding . '"?' . ">" . |
|
706 | + '<SOAP-ENV:Envelope' . $ns_string . ">" . |
|
707 | + $headers . |
|
708 | + "<SOAP-ENV:Body>" . |
|
709 | + $body . |
|
710 | + "</SOAP-ENV:Body>" . |
|
711 | 711 | "</SOAP-ENV:Envelope>"; |
712 | 712 | } |
713 | 713 | |
@@ -719,7 +719,7 @@ discard block |
||
719 | 719 | * @access public |
720 | 720 | * @deprecated |
721 | 721 | */ |
722 | - public function formatDump($str){ |
|
722 | + public function formatDump($str) { |
|
723 | 723 | $str = htmlspecialchars($str); |
724 | 724 | return nl2br($str); |
725 | 725 | } |
@@ -731,7 +731,7 @@ discard block |
||
731 | 731 | * @return string contracted qname |
732 | 732 | * @access private |
733 | 733 | */ |
734 | - public function contractQname($qname){ |
|
734 | + public function contractQname($qname) { |
|
735 | 735 | // get element namespace |
736 | 736 | if (strrpos($qname, ':')) { |
737 | 737 | // get unqualified name |
@@ -755,15 +755,15 @@ discard block |
||
755 | 755 | * @return string expanded qname |
756 | 756 | * @access private |
757 | 757 | */ |
758 | - public function expandQname($qname){ |
|
758 | + public function expandQname($qname) { |
|
759 | 759 | // get element prefix |
760 | - if(strpos($qname,':') && !preg_match('/^http:\/\//',$qname)){ |
|
760 | + if (strpos($qname, ':') && !preg_match('/^http:\/\//', $qname)) { |
|
761 | 761 | // get unqualified name |
762 | - $name = substr(strstr($qname,':'),1); |
|
762 | + $name = substr(strstr($qname, ':'), 1); |
|
763 | 763 | // get ns prefix |
764 | - $prefix = substr($qname,0,strpos($qname,':')); |
|
765 | - if(isset($this->namespaces[$prefix])){ |
|
766 | - return $this->namespaces[$prefix].':'.$name; |
|
764 | + $prefix = substr($qname, 0, strpos($qname, ':')); |
|
765 | + if (isset($this->namespaces[$prefix])) { |
|
766 | + return $this->namespaces[$prefix] . ':' . $name; |
|
767 | 767 | } else { |
768 | 768 | return $qname; |
769 | 769 | } |
@@ -780,10 +780,10 @@ discard block |
||
780 | 780 | * @return string The local part |
781 | 781 | * @access public |
782 | 782 | */ |
783 | - public function getLocalPart($str){ |
|
784 | - if($sstr = strrchr($str,':')){ |
|
783 | + public function getLocalPart($str) { |
|
784 | + if ($sstr = strrchr($str, ':')) { |
|
785 | 785 | // get unqualified name |
786 | - return substr( $sstr, 1 ); |
|
786 | + return substr($sstr, 1); |
|
787 | 787 | } else { |
788 | 788 | return $str; |
789 | 789 | } |
@@ -797,10 +797,10 @@ discard block |
||
797 | 797 | * @return mixed The prefix or false if there is no prefix |
798 | 798 | * @access public |
799 | 799 | */ |
800 | - public function getPrefix($str){ |
|
801 | - if($pos = strrpos($str,':')){ |
|
800 | + public function getPrefix($str) { |
|
801 | + if ($pos = strrpos($str, ':')) { |
|
802 | 802 | // get prefix |
803 | - return substr($str,0,$pos); |
|
803 | + return substr($str, 0, $pos); |
|
804 | 804 | } |
805 | 805 | return false; |
806 | 806 | } |
@@ -812,7 +812,7 @@ discard block |
||
812 | 812 | * @return mixed The namespace, false if no namespace has the specified prefix |
813 | 813 | * @access public |
814 | 814 | */ |
815 | - public function getNamespaceFromPrefix($prefix){ |
|
815 | + public function getNamespaceFromPrefix($prefix) { |
|
816 | 816 | if (isset($this->namespaces[$prefix])) { |
817 | 817 | return $this->namespaces[$prefix]; |
818 | 818 | } |
@@ -893,8 +893,8 @@ discard block |
||
893 | 893 | * @return mixed ISO 8601 date string or false |
894 | 894 | * @access public |
895 | 895 | */ |
896 | -function timestamp_to_iso8601($timestamp,$utc=true){ |
|
897 | - $datestr = date('Y-m-d\TH:i:sO',$timestamp); |
|
896 | +function timestamp_to_iso8601($timestamp, $utc = true) { |
|
897 | + $datestr = date('Y-m-d\TH:i:sO', $timestamp); |
|
898 | 898 | $pos = strrpos($datestr, "+"); |
899 | 899 | if ($pos === false) { |
900 | 900 | $pos = strrpos($datestr, "-"); |
@@ -904,20 +904,20 @@ discard block |
||
904 | 904 | $datestr = substr($datestr, 0, $pos + 3) . ':' . substr($datestr, -2); |
905 | 905 | } |
906 | 906 | } |
907 | - if($utc){ |
|
908 | - $pattern = '/'. |
|
909 | - '([0-9]{4})-'. // centuries & years CCYY- |
|
910 | - '([0-9]{2})-'. // months MM- |
|
911 | - '([0-9]{2})'. // days DD |
|
912 | - 'T'. // separator T |
|
913 | - '([0-9]{2}):'. // hours hh: |
|
914 | - '([0-9]{2}):'. // minutes mm: |
|
915 | - '([0-9]{2})(\.[0-9]*)?'. // seconds ss.ss... |
|
916 | - '(Z|[+\-][0-9]{2}:?[0-9]{2})?'. // Z to indicate UTC, -/+HH:MM:SS.SS... for local tz's |
|
907 | + if ($utc) { |
|
908 | + $pattern = '/' . |
|
909 | + '([0-9]{4})-' . // centuries & years CCYY- |
|
910 | + '([0-9]{2})-' . // months MM- |
|
911 | + '([0-9]{2})' . // days DD |
|
912 | + 'T' . // separator T |
|
913 | + '([0-9]{2}):' . // hours hh: |
|
914 | + '([0-9]{2}):' . // minutes mm: |
|
915 | + '([0-9]{2})(\.[0-9]*)?' . // seconds ss.ss... |
|
916 | + '(Z|[+\-][0-9]{2}:?[0-9]{2})?' . // Z to indicate UTC, -/+HH:MM:SS.SS... for local tz's |
|
917 | 917 | '/'; |
918 | 918 | |
919 | - if(preg_match($pattern,$datestr,$regs)){ |
|
920 | - return sprintf('%04d-%02d-%02dT%02d:%02d:%02dZ',$regs[1],$regs[2],$regs[3],$regs[4],$regs[5],$regs[6]); |
|
919 | + if (preg_match($pattern, $datestr, $regs)) { |
|
920 | + return sprintf('%04d-%02d-%02dT%02d:%02d:%02dZ', $regs[1], $regs[2], $regs[3], $regs[4], $regs[5], $regs[6]); |
|
921 | 921 | } |
922 | 922 | return false; |
923 | 923 | } else { |
@@ -932,27 +932,27 @@ discard block |
||
932 | 932 | * @return mixed Unix timestamp (int) or false |
933 | 933 | * @access public |
934 | 934 | */ |
935 | -function iso8601_to_timestamp($datestr){ |
|
936 | - $pattern = '/'. |
|
937 | - '([0-9]{4})-'. // centuries & years CCYY- |
|
938 | - '([0-9]{2})-'. // months MM- |
|
939 | - '([0-9]{2})'. // days DD |
|
940 | - 'T'. // separator T |
|
941 | - '([0-9]{2}):'. // hours hh: |
|
942 | - '([0-9]{2}):'. // minutes mm: |
|
943 | - '([0-9]{2})(\.[0-9]+)?'. // seconds ss.ss... |
|
944 | - '(Z|[+\-][0-9]{2}:?[0-9]{2})?'. // Z to indicate UTC, -/+HH:MM:SS.SS... for local tz's |
|
935 | +function iso8601_to_timestamp($datestr) { |
|
936 | + $pattern = '/' . |
|
937 | + '([0-9]{4})-' . // centuries & years CCYY- |
|
938 | + '([0-9]{2})-' . // months MM- |
|
939 | + '([0-9]{2})' . // days DD |
|
940 | + 'T' . // separator T |
|
941 | + '([0-9]{2}):' . // hours hh: |
|
942 | + '([0-9]{2}):' . // minutes mm: |
|
943 | + '([0-9]{2})(\.[0-9]+)?' . // seconds ss.ss... |
|
944 | + '(Z|[+\-][0-9]{2}:?[0-9]{2})?' . // Z to indicate UTC, -/+HH:MM:SS.SS... for local tz's |
|
945 | 945 | '/'; |
946 | - if(preg_match($pattern,$datestr,$regs)){ |
|
946 | + if (preg_match($pattern, $datestr, $regs)) { |
|
947 | 947 | // not utc |
948 | - if($regs[8] != 'Z'){ |
|
949 | - $op = substr($regs[8],0,1); |
|
950 | - $h = substr($regs[8],1,2); |
|
951 | - $m = substr($regs[8],strlen($regs[8])-2,2); |
|
952 | - if($op == '-'){ |
|
948 | + if ($regs[8] != 'Z') { |
|
949 | + $op = substr($regs[8], 0, 1); |
|
950 | + $h = substr($regs[8], 1, 2); |
|
951 | + $m = substr($regs[8], strlen($regs[8]) - 2, 2); |
|
952 | + if ($op == '-') { |
|
953 | 953 | $regs[4] = $regs[4] + $h; |
954 | 954 | $regs[5] = $regs[5] + $m; |
955 | - } elseif($op == '+'){ |
|
955 | + } elseif ($op == '+') { |
|
956 | 956 | $regs[4] = $regs[4] - $h; |
957 | 957 | $regs[5] = $regs[5] - $m; |
958 | 958 | } |
@@ -43,7 +43,7 @@ |
||
43 | 43 | * @param string $faultcode (SOAP-ENV:Client | SOAP-ENV:Server) |
44 | 44 | * @param string $faultactor only used when msg routed between multiple actors |
45 | 45 | * @param string $faultstring human readable error message |
46 | - * @param mixed $faultdetail detail, typically a string or array of string |
|
46 | + * @param string $faultdetail detail, typically a string or array of string |
|
47 | 47 | */ |
48 | 48 | public function nusoap_fault($faultcode,$faultactor='',$faultstring='',$faultdetail=''){ |
49 | 49 | parent::nusoap_base(); |
@@ -38,13 +38,13 @@ discard block |
||
38 | 38 | var $faultdetail; |
39 | 39 | |
40 | 40 | /** |
41 | - * constructor |
|
42 | - * |
|
43 | - * @param string $faultcode (SOAP-ENV:Client | SOAP-ENV:Server) |
|
44 | - * @param string $faultactor only used when msg routed between multiple actors |
|
45 | - * @param string $faultstring human readable error message |
|
46 | - * @param mixed $faultdetail detail, typically a string or array of string |
|
47 | - */ |
|
41 | + * constructor |
|
42 | + * |
|
43 | + * @param string $faultcode (SOAP-ENV:Client | SOAP-ENV:Server) |
|
44 | + * @param string $faultactor only used when msg routed between multiple actors |
|
45 | + * @param string $faultstring human readable error message |
|
46 | + * @param mixed $faultdetail detail, typically a string or array of string |
|
47 | + */ |
|
48 | 48 | public function nusoap_fault($faultcode,$faultactor='',$faultstring='',$faultdetail=''){ |
49 | 49 | parent::nusoap_base(); |
50 | 50 | $this->faultcode = $faultcode; |
@@ -54,11 +54,11 @@ discard block |
||
54 | 54 | } |
55 | 55 | |
56 | 56 | /** |
57 | - * serialize a fault |
|
58 | - * |
|
59 | - * @return string The serialization of the fault instance. |
|
60 | - * @access public |
|
61 | - */ |
|
57 | + * serialize a fault |
|
58 | + * |
|
59 | + * @return string The serialization of the fault instance. |
|
60 | + * @access public |
|
61 | + */ |
|
62 | 62 | public function serialize(){ |
63 | 63 | $ns_string = ''; |
64 | 64 | foreach($this->namespaces as $k => $v){ |
@@ -45,7 +45,7 @@ discard block |
||
45 | 45 | * @param string $faultstring human readable error message |
46 | 46 | * @param mixed $faultdetail detail, typically a string or array of string |
47 | 47 | */ |
48 | - public function nusoap_fault($faultcode,$faultactor='',$faultstring='',$faultdetail=''){ |
|
48 | + public function nusoap_fault($faultcode, $faultactor = '', $faultstring = '', $faultdetail = '') { |
|
49 | 49 | parent::nusoap_base(); |
50 | 50 | $this->faultcode = $faultcode; |
51 | 51 | $this->faultactor = $faultactor; |
@@ -59,22 +59,22 @@ discard block |
||
59 | 59 | * @return string The serialization of the fault instance. |
60 | 60 | * @access public |
61 | 61 | */ |
62 | - public function serialize(){ |
|
62 | + public function serialize() { |
|
63 | 63 | $ns_string = ''; |
64 | - foreach($this->namespaces as $k => $v){ |
|
64 | + foreach ($this->namespaces as $k => $v) { |
|
65 | 65 | $ns_string .= "\n xmlns:$k=\"$v\""; |
66 | 66 | } |
67 | 67 | $return_msg = |
68 | - '<?xml version="1.0" encoding="'.$this->soap_defencoding.'"?>'. |
|
69 | - '<SOAP-ENV:Envelope SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"'.$ns_string.">\n". |
|
70 | - '<SOAP-ENV:Body>'. |
|
71 | - '<SOAP-ENV:Fault>'. |
|
72 | - $this->serialize_val($this->faultcode, 'faultcode'). |
|
73 | - $this->serialize_val($this->faultactor, 'faultactor'). |
|
74 | - $this->serialize_val($this->faultstring, 'faultstring'). |
|
75 | - $this->serialize_val($this->faultdetail, 'detail'). |
|
76 | - '</SOAP-ENV:Fault>'. |
|
77 | - '</SOAP-ENV:Body>'. |
|
68 | + '<?xml version="1.0" encoding="' . $this->soap_defencoding . '"?>' . |
|
69 | + '<SOAP-ENV:Envelope SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"' . $ns_string . ">\n" . |
|
70 | + '<SOAP-ENV:Body>' . |
|
71 | + '<SOAP-ENV:Fault>' . |
|
72 | + $this->serialize_val($this->faultcode, 'faultcode') . |
|
73 | + $this->serialize_val($this->faultactor, 'faultactor') . |
|
74 | + $this->serialize_val($this->faultstring, 'faultstring') . |
|
75 | + $this->serialize_val($this->faultdetail, 'detail') . |
|
76 | + '</SOAP-ENV:Fault>' . |
|
77 | + '</SOAP-ENV:Body>' . |
|
78 | 78 | '</SOAP-ENV:Envelope>'; |
79 | 79 | return $return_msg; |
80 | 80 | } |