@@ -154,10 +154,10 @@ discard block |
||
154 | 154 | $this->accept = $accept; |
155 | 155 | |
156 | 156 | // @see ticket #70 - we have to parse big xml docks in chunks to avoid errors |
157 | - for ($offset = 0; $offset < $len; $offset += $this->maxChunkLength) { |
|
157 | + for ($offset = 0; $offset<$len; $offset += $this->maxChunkLength) { |
|
158 | 158 | $chunk = substr($data, $offset, $this->maxChunkLength); |
159 | 159 | // error handling: xml not well formed |
160 | - if (!xml_parse($parser, $chunk, $offset + $this->maxChunkLength >= $len)) { |
|
160 | + if (!xml_parse($parser, $chunk, $offset+$this->maxChunkLength>=$len)) { |
|
161 | 161 | $errCode = xml_get_error_code($parser); |
162 | 162 | $errStr = sprintf('XML error %s: %s at line %d, column %d', $errCode, xml_error_string($errCode), |
163 | 163 | xml_get_current_line_number($parser), xml_get_current_column_number($parser)); |
@@ -182,7 +182,7 @@ discard block |
||
182 | 182 | public function xmlrpc_se($parser, $name, $attrs, $acceptSingleVals = false) |
183 | 183 | { |
184 | 184 | // if invalid xmlrpc already detected, skip all processing |
185 | - if ($this->_xh['isf'] < 2) { |
|
185 | + if ($this->_xh['isf']<2) { |
|
186 | 186 | |
187 | 187 | // check for correct element nesting |
188 | 188 | if (count($this->_xh['stack']) == 0) { |
@@ -202,7 +202,7 @@ discard block |
||
202 | 202 | $this->_xh['rt'] = strtolower($name); |
203 | 203 | } else { |
204 | 204 | $this->_xh['isf'] = 2; |
205 | - $this->_xh['isf_reason'] = 'missing top level xmlrpc element. Found: ' . $name; |
|
205 | + $this->_xh['isf_reason'] = 'missing top level xmlrpc element. Found: '.$name; |
|
206 | 206 | |
207 | 207 | return; |
208 | 208 | } |
@@ -296,7 +296,7 @@ discard block |
||
296 | 296 | break; |
297 | 297 | case 'MEMBER': |
298 | 298 | // set member name to null, in case we do not find in the xml later on |
299 | - $this->_xh['valuestack'][count($this->_xh['valuestack']) - 1]['name'] = ''; |
|
299 | + $this->_xh['valuestack'][count($this->_xh['valuestack'])-1]['name'] = ''; |
|
300 | 300 | //$this->_xh['ac']=''; |
301 | 301 | // Drop trough intentionally |
302 | 302 | case 'PARAM': |
@@ -357,7 +357,7 @@ discard block |
||
357 | 357 | */ |
358 | 358 | public function xmlrpc_ee($parser, $name, $rebuildXmlrpcvals = 1) |
359 | 359 | { |
360 | - if ($this->_xh['isf'] < 2) { |
|
360 | + if ($this->_xh['isf']<2) { |
|
361 | 361 | // push this element name from stack |
362 | 362 | // NB: if XML validates, correct opening/closing is guaranteed and |
363 | 363 | // we do not have to check for $name == $currElem. |
@@ -372,7 +372,7 @@ discard block |
||
372 | 372 | $this->_xh['vt'] = Value::$xmlrpcString; |
373 | 373 | } |
374 | 374 | |
375 | - if ($rebuildXmlrpcvals > 0) { |
|
375 | + if ($rebuildXmlrpcvals>0) { |
|
376 | 376 | // build the xmlrpc val out of the data received, and substitute it |
377 | 377 | $temp = new Value($this->_xh['value'], $this->_xh['vt']); |
378 | 378 | // in case we got info about underlying php class, save it |
@@ -381,15 +381,15 @@ discard block |
||
381 | 381 | $temp->_php_class = $this->_xh['php_class']; |
382 | 382 | } |
383 | 383 | $this->_xh['value'] = $temp; |
384 | - } elseif ($rebuildXmlrpcvals < 0) { |
|
384 | + } elseif ($rebuildXmlrpcvals<0) { |
|
385 | 385 | if ($this->_xh['vt'] == Value::$xmlrpcDateTime) { |
386 | - $this->_xh['value'] = (object)array( |
|
386 | + $this->_xh['value'] = (object) array( |
|
387 | 387 | 'xmlrpc_type' => 'datetime', |
388 | 388 | 'scalar' => $this->_xh['value'], |
389 | 389 | 'timestamp' => \PhpXmlRpc\Helper\Date::iso8601Decode($this->_xh['value']) |
390 | 390 | ); |
391 | 391 | } elseif ($this->_xh['vt'] == Value::$xmlrpcBase64) { |
392 | - $this->_xh['value'] = (object)array( |
|
392 | + $this->_xh['value'] = (object) array( |
|
393 | 393 | 'xmlrpc_type' => 'base64', |
394 | 394 | 'scalar' => $this->_xh['value'] |
395 | 395 | ); |
@@ -405,8 +405,8 @@ discard block |
||
405 | 405 | // check if we are inside an array or struct: |
406 | 406 | // if value just built is inside an array, let's move it into array on the stack |
407 | 407 | $vscount = count($this->_xh['valuestack']); |
408 | - if ($vscount && $this->_xh['valuestack'][$vscount - 1]['type'] == 'ARRAY') { |
|
409 | - $this->_xh['valuestack'][$vscount - 1]['values'][] = $this->_xh['value']; |
|
408 | + if ($vscount && $this->_xh['valuestack'][$vscount-1]['type'] == 'ARRAY') { |
|
409 | + $this->_xh['valuestack'][$vscount-1]['values'][] = $this->_xh['value']; |
|
410 | 410 | } |
411 | 411 | break; |
412 | 412 | case 'BOOLEAN': |
@@ -425,7 +425,7 @@ discard block |
||
425 | 425 | $this->_xh['value'] = $this->_xh['ac']; |
426 | 426 | } elseif ($name == 'DATETIME.ISO8601') { |
427 | 427 | if (!preg_match('/^[0-9]{8}T[0-9]{2}:[0-9]{2}:[0-9]{2}$/', $this->_xh['ac'])) { |
428 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': invalid value received in DATETIME: ' . $this->_xh['ac']); |
|
428 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': invalid value received in DATETIME: '.$this->_xh['ac']); |
|
429 | 429 | } |
430 | 430 | $this->_xh['vt'] = Value::$xmlrpcDateTime; |
431 | 431 | $this->_xh['value'] = $this->_xh['ac']; |
@@ -444,7 +444,7 @@ discard block |
||
444 | 444 | } else { |
445 | 445 | // log if receiving something strange, even though we set the value to false anyway |
446 | 446 | if ($this->_xh['ac'] != '0' && strcasecmp($this->_xh['ac'], 'false') != 0) { |
447 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': invalid value received in BOOLEAN: ' . $this->_xh['ac']); |
|
447 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': invalid value received in BOOLEAN: '.$this->_xh['ac']); |
|
448 | 448 | } |
449 | 449 | $this->_xh['value'] = false; |
450 | 450 | } |
@@ -454,37 +454,37 @@ discard block |
||
454 | 454 | // NOTE: regexp could be much stricter than this... |
455 | 455 | if (!preg_match('/^[+-eE0123456789 \t.]+$/', $this->_xh['ac'])) { |
456 | 456 | /// @todo: find a better way of throwing an error than this! |
457 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': non numeric value received in DOUBLE: ' . $this->_xh['ac']); |
|
457 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': non numeric value received in DOUBLE: '.$this->_xh['ac']); |
|
458 | 458 | $this->_xh['value'] = 'ERROR_NON_NUMERIC_FOUND'; |
459 | 459 | } else { |
460 | 460 | // it's ok, add it on |
461 | - $this->_xh['value'] = (double)$this->_xh['ac']; |
|
461 | + $this->_xh['value'] = (double) $this->_xh['ac']; |
|
462 | 462 | } |
463 | 463 | } else { |
464 | 464 | // we have an I4/I8/INT |
465 | 465 | // we must check that only 0123456789-<space> are characters here |
466 | 466 | if (!preg_match('/^[+-]?[0123456789 \t]+$/', $this->_xh['ac'])) { |
467 | 467 | /// @todo find a better way of throwing an error than this! |
468 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': non numeric value received in INT: ' . $this->_xh['ac']); |
|
468 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': non numeric value received in INT: '.$this->_xh['ac']); |
|
469 | 469 | $this->_xh['value'] = 'ERROR_NON_NUMERIC_FOUND'; |
470 | 470 | } else { |
471 | 471 | // it's ok, add it on |
472 | - $this->_xh['value'] = (int)$this->_xh['ac']; |
|
472 | + $this->_xh['value'] = (int) $this->_xh['ac']; |
|
473 | 473 | } |
474 | 474 | } |
475 | 475 | $this->_xh['lv'] = 3; // indicate we've found a value |
476 | 476 | break; |
477 | 477 | case 'NAME': |
478 | - $this->_xh['valuestack'][count($this->_xh['valuestack']) - 1]['name'] = $this->_xh['ac']; |
|
478 | + $this->_xh['valuestack'][count($this->_xh['valuestack'])-1]['name'] = $this->_xh['ac']; |
|
479 | 479 | break; |
480 | 480 | case 'MEMBER': |
481 | 481 | // add to array in the stack the last element built, |
482 | 482 | // unless no VALUE was found |
483 | 483 | if ($this->_xh['vt']) { |
484 | 484 | $vscount = count($this->_xh['valuestack']); |
485 | - $this->_xh['valuestack'][$vscount - 1]['values'][$this->_xh['valuestack'][$vscount - 1]['name']] = $this->_xh['value']; |
|
485 | + $this->_xh['valuestack'][$vscount-1]['values'][$this->_xh['valuestack'][$vscount-1]['name']] = $this->_xh['value']; |
|
486 | 486 | } else { |
487 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': missing VALUE inside STRUCT in received xml'); |
|
487 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': missing VALUE inside STRUCT in received xml'); |
|
488 | 488 | } |
489 | 489 | break; |
490 | 490 | case 'DATA': |
@@ -507,7 +507,7 @@ discard block |
||
507 | 507 | $this->_xh['params'][] = $this->_xh['value']; |
508 | 508 | $this->_xh['pt'][] = $this->_xh['vt']; |
509 | 509 | } else { |
510 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': missing VALUE inside PARAM in received xml'); |
|
510 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': missing VALUE inside PARAM in received xml'); |
|
511 | 511 | } |
512 | 512 | break; |
513 | 513 | case 'METHODNAME': |
@@ -566,7 +566,7 @@ discard block |
||
566 | 566 | public function xmlrpc_cd($parser, $data) |
567 | 567 | { |
568 | 568 | // skip processing if xml fault already detected |
569 | - if ($this->_xh['isf'] < 2) { |
|
569 | + if ($this->_xh['isf']<2) { |
|
570 | 570 | // "lookforvalue==3" means that we've found an entire value |
571 | 571 | // and should discard any further character data |
572 | 572 | if ($this->_xh['lv'] != 3) { |
@@ -585,7 +585,7 @@ discard block |
||
585 | 585 | public function xmlrpc_dh($parser, $data) |
586 | 586 | { |
587 | 587 | // skip processing if xml fault already detected |
588 | - if ($this->_xh['isf'] < 2) { |
|
588 | + if ($this->_xh['isf']<2) { |
|
589 | 589 | if (substr($data, 0, 1) == '&' && substr($data, -1, 1) == ';') { |
590 | 590 | $this->_xh['ac'] .= $data; |
591 | 591 | } |
@@ -659,8 +659,8 @@ discard block |
||
659 | 659 | // Details: |
660 | 660 | // SPACE: (#x20 | #x9 | #xD | #xA)+ === [ \x9\xD\xA]+ |
661 | 661 | // EQ: SPACE?=SPACE? === [ \x9\xD\xA]*=[ \x9\xD\xA]* |
662 | - if (preg_match('/^<\?xml\s+version\s*=\s*' . "((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))" . |
|
663 | - '\s+encoding\s*=\s*' . "((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
662 | + if (preg_match('/^<\?xml\s+version\s*=\s*'."((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))". |
|
663 | + '\s+encoding\s*=\s*'."((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
664 | 664 | $xmlChunk, $matches)) { |
665 | 665 | return strtoupper(substr($matches[2], 1, -1)); |
666 | 666 | } |
@@ -678,7 +678,7 @@ discard block |
||
678 | 678 | // NB: mb_detect likes to call it ascii, xml parser likes to call it US_ASCII... |
679 | 679 | // IANA also likes better US-ASCII, so go with it |
680 | 680 | if ($enc == 'ASCII') { |
681 | - $enc = 'US-' . $enc; |
|
681 | + $enc = 'US-'.$enc; |
|
682 | 682 | } |
683 | 683 | |
684 | 684 | return $enc; |
@@ -713,8 +713,8 @@ discard block |
||
713 | 713 | // Details: |
714 | 714 | // SPACE: (#x20 | #x9 | #xD | #xA)+ === [ \x9\xD\xA]+ |
715 | 715 | // EQ: SPACE?=SPACE? === [ \x9\xD\xA]*=[ \x9\xD\xA]* |
716 | - if (preg_match('/^<\?xml\s+version\s*=\s*' . "((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))" . |
|
717 | - '\s+encoding\s*=\s*' . "((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
716 | + if (preg_match('/^<\?xml\s+version\s*=\s*'."((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))". |
|
717 | + '\s+encoding\s*=\s*'."((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
718 | 718 | $xmlChunk, $matches)) { |
719 | 719 | return true; |
720 | 720 | } |
@@ -68,14 +68,14 @@ discard block |
||
68 | 68 | if (count($this->xml_iso88591_Entities['in'])) { |
69 | 69 | return; |
70 | 70 | } |
71 | - for ($i = 0; $i < 32; $i++) { |
|
71 | + for ($i = 0; $i<32; $i++) { |
|
72 | 72 | $this->xml_iso88591_Entities["in"][] = chr($i); |
73 | 73 | $this->xml_iso88591_Entities["out"][] = "&#{$i};"; |
74 | 74 | } |
75 | 75 | |
76 | 76 | /// @todo to be 'print safe', should we encode as well character 127 (DEL) ? |
77 | 77 | |
78 | - for ($i = 160; $i < 256; $i++) { |
|
78 | + for ($i = 160; $i<256; $i++) { |
|
79 | 79 | $this->xml_iso88591_Entities["in"][] = chr($i); |
80 | 80 | $this->xml_iso88591_Entities["out"][] = "&#{$i};"; |
81 | 81 | } |
@@ -103,7 +103,7 @@ discard block |
||
103 | 103 | break;*/ |
104 | 104 | |
105 | 105 | default: |
106 | - throw new \Exception('Unsupported table: ' . $tableName); |
|
106 | + throw new \Exception('Unsupported table: '.$tableName); |
|
107 | 107 | } |
108 | 108 | } |
109 | 109 | |
@@ -146,7 +146,7 @@ discard block |
||
146 | 146 | $destEncoding = 'US-ASCII'; |
147 | 147 | } |
148 | 148 | |
149 | - $conversion = strtoupper($srcEncoding . '_' . $destEncoding); |
|
149 | + $conversion = strtoupper($srcEncoding.'_'.$destEncoding); |
|
150 | 150 | |
151 | 151 | // list ordered with (expected) most common scenarios first |
152 | 152 | switch ($conversion) { |
@@ -164,20 +164,20 @@ discard block |
||
164 | 164 | // NB: this will choke on invalid UTF-8, going most likely beyond EOF |
165 | 165 | $escapedData = ''; |
166 | 166 | // be kind to users creating string xmlrpc values out of different php types |
167 | - $data = (string)$data; |
|
167 | + $data = (string) $data; |
|
168 | 168 | $ns = strlen($data); |
169 | - for ($nn = 0; $nn < $ns; $nn++) { |
|
169 | + for ($nn = 0; $nn<$ns; $nn++) { |
|
170 | 170 | $ch = $data[$nn]; |
171 | 171 | $ii = ord($ch); |
172 | 172 | // 7 bits in 1 byte: 0bbbbbbb (127) |
173 | - if ($ii < 32) { |
|
173 | + if ($ii<32) { |
|
174 | 174 | if ($conversion == 'UTF-8_US-ASCII') { |
175 | 175 | $escapedData .= sprintf('&#%d;', $ii); |
176 | 176 | } else { |
177 | 177 | $escapedData .= $ch; |
178 | 178 | } |
179 | 179 | } |
180 | - else if ($ii < 128) { |
|
180 | + else if ($ii<128) { |
|
181 | 181 | /// @todo shall we replace this with a (supposedly) faster str_replace? |
182 | 182 | /// @todo to be 'print safe', should we encode as well character 127 (DEL) ? |
183 | 183 | switch ($ii) { |
@@ -202,25 +202,25 @@ discard block |
||
202 | 202 | } // 11 bits in 2 bytes: 110bbbbb 10bbbbbb (2047) |
203 | 203 | elseif ($ii >> 5 == 6) { |
204 | 204 | $b1 = ($ii & 31); |
205 | - $b2 = (ord($data[$nn + 1]) & 63); |
|
206 | - $ii = ($b1 * 64) + $b2; |
|
205 | + $b2 = (ord($data[$nn+1]) & 63); |
|
206 | + $ii = ($b1 * 64)+$b2; |
|
207 | 207 | $escapedData .= sprintf('&#%d;', $ii); |
208 | 208 | $nn += 1; |
209 | 209 | } // 16 bits in 3 bytes: 1110bbbb 10bbbbbb 10bbbbbb |
210 | 210 | elseif ($ii >> 4 == 14) { |
211 | 211 | $b1 = ($ii & 15); |
212 | - $b2 = (ord($data[$nn + 1]) & 63); |
|
213 | - $b3 = (ord($data[$nn + 2]) & 63); |
|
214 | - $ii = ((($b1 * 64) + $b2) * 64) + $b3; |
|
212 | + $b2 = (ord($data[$nn+1]) & 63); |
|
213 | + $b3 = (ord($data[$nn+2]) & 63); |
|
214 | + $ii = ((($b1 * 64)+$b2) * 64)+$b3; |
|
215 | 215 | $escapedData .= sprintf('&#%d;', $ii); |
216 | 216 | $nn += 2; |
217 | 217 | } // 21 bits in 4 bytes: 11110bbb 10bbbbbb 10bbbbbb 10bbbbbb |
218 | 218 | elseif ($ii >> 3 == 30) { |
219 | 219 | $b1 = ($ii & 7); |
220 | - $b2 = (ord($data[$nn + 1]) & 63); |
|
221 | - $b3 = (ord($data[$nn + 2]) & 63); |
|
222 | - $b4 = (ord($data[$nn + 3]) & 63); |
|
223 | - $ii = ((((($b1 * 64) + $b2) * 64) + $b3) * 64) + $b4; |
|
220 | + $b2 = (ord($data[$nn+1]) & 63); |
|
221 | + $b3 = (ord($data[$nn+2]) & 63); |
|
222 | + $b4 = (ord($data[$nn+3]) & 63); |
|
223 | + $ii = ((((($b1 * 64)+$b2) * 64)+$b3) * 64)+$b4; |
|
224 | 224 | $escapedData .= sprintf('&#%d;', $ii); |
225 | 225 | $nn += 3; |
226 | 226 | } |
@@ -268,7 +268,7 @@ discard block |
||
268 | 268 | |
269 | 269 | default: |
270 | 270 | $escapedData = ''; |
271 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ": Converting from $srcEncoding to $destEncoding: not supported..."); |
|
271 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.": Converting from $srcEncoding to $destEncoding: not supported..."); |
|
272 | 272 | } |
273 | 273 | |
274 | 274 | return $escapedData; |
@@ -322,7 +322,7 @@ discard block |
||
322 | 322 | case 'iso88591': |
323 | 323 | return $this->xml_iso88591_Entities; |
324 | 324 | default: |
325 | - throw new \Exception('Unsupported charset: ' . $charset); |
|
325 | + throw new \Exception('Unsupported charset: '.$charset); |
|
326 | 326 | } |
327 | 327 | } |
328 | 328 | } |
@@ -92,13 +92,13 @@ discard block |
||
92 | 92 | <body> |
93 | 93 | <?php |
94 | 94 | |
95 | -include __DIR__ . '/common.php'; |
|
95 | +include __DIR__.'/common.php'; |
|
96 | 96 | |
97 | 97 | if ($action) { |
98 | 98 | |
99 | 99 | // make sure the script waits long enough for the call to complete... |
100 | 100 | if ($timeout) { |
101 | - set_time_limit($timeout + 10); |
|
101 | + set_time_limit($timeout+10); |
|
102 | 102 | } |
103 | 103 | |
104 | 104 | if ($wstype == 1) { |
@@ -123,13 +123,13 @@ discard block |
||
123 | 123 | $server = "$host$path"; |
124 | 124 | } |
125 | 125 | if ($protocol == 2 || $protocol == 3) { |
126 | - $server = 'https://' . $server; |
|
126 | + $server = 'https://'.$server; |
|
127 | 127 | } else { |
128 | - $server = 'http://' . $server; |
|
128 | + $server = 'http://'.$server; |
|
129 | 129 | } |
130 | 130 | if ($proxy != '') { |
131 | 131 | $pproxy = explode(':', $proxy); |
132 | - if (count($pproxy) > 1) { |
|
132 | + if (count($pproxy)>1) { |
|
133 | 133 | $pport = $pproxy[1]; |
134 | 134 | } else { |
135 | 135 | $pport = 8080; |
@@ -204,9 +204,9 @@ discard block |
||
204 | 204 | case 'wrap': |
205 | 205 | $msg[0] = new $requestClass('system.methodHelp', array(), $id); |
206 | 206 | $msg[0]->addparam(new PhpXmlRpc\Value($method)); |
207 | - $msg[1] = new $requestClass('system.methodSignature', array(), (int)$id + 1); |
|
207 | + $msg[1] = new $requestClass('system.methodSignature', array(), (int) $id+1); |
|
208 | 208 | $msg[1]->addparam(new PhpXmlRpc\Value($method)); |
209 | - $actionname = 'Description of method "' . $method . '"'; |
|
209 | + $actionname = 'Description of method "'.$method.'"'; |
|
210 | 210 | break; |
211 | 211 | case 'list': |
212 | 212 | $msg[0] = new $requestClass('system.listMethods', array(), $id); |
@@ -219,9 +219,9 @@ discard block |
||
219 | 219 | $msg[0] = new $requestClass($method, array(), $id); |
220 | 220 | // hack! build xml payload by hand |
221 | 221 | if ($wstype == 1) { |
222 | - $msg[0]->payload = "{\n" . |
|
223 | - '"method": "' . $method . "\",\n\"params\": [" . |
|
224 | - $payload . |
|
222 | + $msg[0]->payload = "{\n". |
|
223 | + '"method": "'.$method."\",\n\"params\": [". |
|
224 | + $payload. |
|
225 | 225 | "\n],\n\"id\": "; |
226 | 226 | // fix: if user gave an empty string, use NULL, or we'll break json syntax |
227 | 227 | if ($id == "") { |
@@ -234,20 +234,20 @@ discard block |
||
234 | 234 | } |
235 | 235 | } |
236 | 236 | } else { |
237 | - $msg[0]->payload = $msg[0]->xml_header($inputcharset) . |
|
238 | - '<methodName>' . $method . "</methodName>\n<params>" . |
|
239 | - $payload . |
|
240 | - "</params>\n" . $msg[0]->xml_footer(); |
|
237 | + $msg[0]->payload = $msg[0]->xml_header($inputcharset). |
|
238 | + '<methodName>'.$method."</methodName>\n<params>". |
|
239 | + $payload. |
|
240 | + "</params>\n".$msg[0]->xml_footer(); |
|
241 | 241 | } |
242 | - $actionname = 'Execution of method ' . $method; |
|
242 | + $actionname = 'Execution of method '.$method; |
|
243 | 243 | break; |
244 | 244 | default: // give a warning |
245 | - $actionname = '[ERROR: unknown action] "' . $action . '"'; |
|
245 | + $actionname = '[ERROR: unknown action] "'.$action.'"'; |
|
246 | 246 | } |
247 | 247 | |
248 | 248 | // Before calling execute, echo out brief description of action taken + date and time ??? |
249 | 249 | // this gives good user feedback for long-running methods... |
250 | - echo '<h2>' . htmlspecialchars($actionname, ENT_COMPAT, $inputcharset) . ' on server ' . htmlspecialchars($server, ENT_COMPAT, $inputcharset) . " ...</h2>\n"; |
|
250 | + echo '<h2>'.htmlspecialchars($actionname, ENT_COMPAT, $inputcharset).' on server '.htmlspecialchars($server, ENT_COMPAT, $inputcharset)." ...</h2>\n"; |
|
251 | 251 | flush(); |
252 | 252 | |
253 | 253 | $response = null; |
@@ -265,7 +265,7 @@ discard block |
||
265 | 265 | break; |
266 | 266 | } |
267 | 267 | } |
268 | - $time = microtime(true) - $time; |
|
268 | + $time = microtime(true)-$time; |
|
269 | 269 | if ($debug) { |
270 | 270 | echo "</div>\n"; |
271 | 271 | } |
@@ -275,8 +275,8 @@ discard block |
||
275 | 275 | // call failed! echo out error msg! |
276 | 276 | //echo '<h2>'.htmlspecialchars($actionname, ENT_COMPAT, $inputcharset).' on server '.htmlspecialchars($server, ENT_COMPAT, $inputcharset).'</h2>'; |
277 | 277 | echo "<h3>$protoName call FAILED!</h3>\n"; |
278 | - echo "<p>Fault code: [" . htmlspecialchars($response->faultCode(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding) . |
|
279 | - "] Reason: '" . htmlspecialchars($response->faultString(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding) . "'</p>\n"; |
|
278 | + echo "<p>Fault code: [".htmlspecialchars($response->faultCode(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding). |
|
279 | + "] Reason: '".htmlspecialchars($response->faultString(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding)."'</p>\n"; |
|
280 | 280 | echo(date("d/M/Y:H:i:s\n")); |
281 | 281 | } else { |
282 | 282 | // call succeeded: parse results |
@@ -292,36 +292,36 @@ discard block |
||
292 | 292 | $max = $v->count(); |
293 | 293 | echo "<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n"; |
294 | 294 | echo "<thead>\n<tr><th>Method ($max)</th><th>Description</th></tr>\n</thead>\n<tbody>\n"; |
295 | - foreach($v as $i => $rec) { |
|
295 | + foreach ($v as $i => $rec) { |
|
296 | 296 | if ($i % 2) { |
297 | 297 | $class = ' class="oddrow"'; |
298 | 298 | } else { |
299 | 299 | $class = ' class="evenrow"'; |
300 | 300 | } |
301 | - echo("<tr><td$class>" . htmlspecialchars($rec->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding) . "</td><td$class><form action=\"controller.php\" method=\"get\" target=\"frmcontroller\">" . |
|
302 | - "<input type=\"hidden\" name=\"host\" value=\"" . htmlspecialchars($host, ENT_COMPAT, $inputcharset) . "\" />" . |
|
303 | - "<input type=\"hidden\" name=\"port\" value=\"" . htmlspecialchars($port, ENT_COMPAT, $inputcharset) . "\" />" . |
|
304 | - "<input type=\"hidden\" name=\"path\" value=\"" . htmlspecialchars($path, ENT_COMPAT, $inputcharset) . "\" />" . |
|
305 | - "<input type=\"hidden\" name=\"id\" value=\"" . htmlspecialchars($id, ENT_COMPAT, $inputcharset) . "\" />" . |
|
306 | - "<input type=\"hidden\" name=\"debug\" value=\"$debug\" />" . |
|
307 | - "<input type=\"hidden\" name=\"username\" value=\"" . htmlspecialchars($username, ENT_COMPAT, $inputcharset) . "\" />" . |
|
308 | - "<input type=\"hidden\" name=\"password\" value=\"" . htmlspecialchars($password, ENT_COMPAT, $inputcharset) . "\" />" . |
|
309 | - "<input type=\"hidden\" name=\"authtype\" value=\"$authtype\" />" . |
|
310 | - "<input type=\"hidden\" name=\"verifyhost\" value=\"$verifyhost\" />" . |
|
311 | - "<input type=\"hidden\" name=\"verifypeer\" value=\"$verifypeer\" />" . |
|
312 | - "<input type=\"hidden\" name=\"cainfo\" value=\"" . htmlspecialchars($cainfo, ENT_COMPAT, $inputcharset) . "\" />" . |
|
313 | - "<input type=\"hidden\" name=\"proxy\" value=\"" . htmlspecialchars($proxy, ENT_COMPAT, $inputcharset) . "\" />" . |
|
314 | - "<input type=\"hidden\" name=\"proxyuser\" value=\"" . htmlspecialchars($proxyuser, ENT_COMPAT, $inputcharset) . "\" />" . |
|
315 | - "<input type=\"hidden\" name=\"proxypwd\" value=\"" . htmlspecialchars($proxypwd, ENT_COMPAT, $inputcharset) . "\" />" . |
|
316 | - "<input type=\"hidden\" name=\"responsecompression\" value=\"$responsecompression\" />" . |
|
317 | - "<input type=\"hidden\" name=\"requestcompression\" value=\"$requestcompression\" />" . |
|
318 | - "<input type=\"hidden\" name=\"clientcookies\" value=\"" . htmlspecialchars($clientcookies, ENT_COMPAT, $inputcharset) . "\" />" . |
|
319 | - "<input type=\"hidden\" name=\"protocol\" value=\"$protocol\" />" . |
|
320 | - "<input type=\"hidden\" name=\"timeout\" value=\"" . htmlspecialchars($timeout, ENT_COMPAT, $inputcharset) . "\" />" . |
|
321 | - "<input type=\"hidden\" name=\"method\" value=\"" . htmlspecialchars($rec->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding) . "\" />" . |
|
322 | - "<input type=\"hidden\" name=\"wstype\" value=\"$wstype\" />" . |
|
323 | - "<input type=\"hidden\" name=\"action\" value=\"describe\" />" . |
|
324 | - "<input type=\"hidden\" name=\"run\" value=\"now\" />" . |
|
301 | + echo("<tr><td$class>".htmlspecialchars($rec->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding)."</td><td$class><form action=\"controller.php\" method=\"get\" target=\"frmcontroller\">". |
|
302 | + "<input type=\"hidden\" name=\"host\" value=\"".htmlspecialchars($host, ENT_COMPAT, $inputcharset)."\" />". |
|
303 | + "<input type=\"hidden\" name=\"port\" value=\"".htmlspecialchars($port, ENT_COMPAT, $inputcharset)."\" />". |
|
304 | + "<input type=\"hidden\" name=\"path\" value=\"".htmlspecialchars($path, ENT_COMPAT, $inputcharset)."\" />". |
|
305 | + "<input type=\"hidden\" name=\"id\" value=\"".htmlspecialchars($id, ENT_COMPAT, $inputcharset)."\" />". |
|
306 | + "<input type=\"hidden\" name=\"debug\" value=\"$debug\" />". |
|
307 | + "<input type=\"hidden\" name=\"username\" value=\"".htmlspecialchars($username, ENT_COMPAT, $inputcharset)."\" />". |
|
308 | + "<input type=\"hidden\" name=\"password\" value=\"".htmlspecialchars($password, ENT_COMPAT, $inputcharset)."\" />". |
|
309 | + "<input type=\"hidden\" name=\"authtype\" value=\"$authtype\" />". |
|
310 | + "<input type=\"hidden\" name=\"verifyhost\" value=\"$verifyhost\" />". |
|
311 | + "<input type=\"hidden\" name=\"verifypeer\" value=\"$verifypeer\" />". |
|
312 | + "<input type=\"hidden\" name=\"cainfo\" value=\"".htmlspecialchars($cainfo, ENT_COMPAT, $inputcharset)."\" />". |
|
313 | + "<input type=\"hidden\" name=\"proxy\" value=\"".htmlspecialchars($proxy, ENT_COMPAT, $inputcharset)."\" />". |
|
314 | + "<input type=\"hidden\" name=\"proxyuser\" value=\"".htmlspecialchars($proxyuser, ENT_COMPAT, $inputcharset)."\" />". |
|
315 | + "<input type=\"hidden\" name=\"proxypwd\" value=\"".htmlspecialchars($proxypwd, ENT_COMPAT, $inputcharset)."\" />". |
|
316 | + "<input type=\"hidden\" name=\"responsecompression\" value=\"$responsecompression\" />". |
|
317 | + "<input type=\"hidden\" name=\"requestcompression\" value=\"$requestcompression\" />". |
|
318 | + "<input type=\"hidden\" name=\"clientcookies\" value=\"".htmlspecialchars($clientcookies, ENT_COMPAT, $inputcharset)."\" />". |
|
319 | + "<input type=\"hidden\" name=\"protocol\" value=\"$protocol\" />". |
|
320 | + "<input type=\"hidden\" name=\"timeout\" value=\"".htmlspecialchars($timeout, ENT_COMPAT, $inputcharset)."\" />". |
|
321 | + "<input type=\"hidden\" name=\"method\" value=\"".htmlspecialchars($rec->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding)."\" />". |
|
322 | + "<input type=\"hidden\" name=\"wstype\" value=\"$wstype\" />". |
|
323 | + "<input type=\"hidden\" name=\"action\" value=\"describe\" />". |
|
324 | + "<input type=\"hidden\" name=\"run\" value=\"now\" />". |
|
325 | 325 | "<input type=\"submit\" value=\"Describe\" /></form></td>"); |
326 | 326 | //echo("</tr>\n"); |
327 | 327 | |
@@ -348,7 +348,7 @@ discard block |
||
348 | 348 | $r2 = $resp[1]->value(); |
349 | 349 | |
350 | 350 | echo "<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n"; |
351 | - echo "<thead>\n<tr><th>Method</th><th>" . htmlspecialchars($method, ENT_COMPAT, $inputcharset) . "</th><th> </th><th> </th></tr>\n</thead>\n<tbody>\n"; |
|
351 | + echo "<thead>\n<tr><th>Method</th><th>".htmlspecialchars($method, ENT_COMPAT, $inputcharset)."</th><th> </th><th> </th></tr>\n</thead>\n<tbody>\n"; |
|
352 | 352 | $desc = htmlspecialchars($r1->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding); |
353 | 353 | if ($desc == "") { |
354 | 354 | $desc = "-"; |
@@ -358,41 +358,41 @@ discard block |
||
358 | 358 | if ($r2->kindOf() != "array") { |
359 | 359 | echo "<tr><td class=\"oddrow\">Signature</td><td class=\"oddrow\">Unknown</td><td class=\"oddrow\"> </td></tr>\n"; |
360 | 360 | } else { |
361 | - foreach($r2 as $i => $x) { |
|
361 | + foreach ($r2 as $i => $x) { |
|
362 | 362 | $payload = ""; |
363 | 363 | $alt_payload = ""; |
364 | - if ($i + 1 % 2) { |
|
364 | + if ($i+1 % 2) { |
|
365 | 365 | $class = ' class="oddrow"'; |
366 | 366 | } else { |
367 | 367 | $class = ' class="evenrow"'; |
368 | 368 | } |
369 | - echo "<tr><td$class>Signature " . ($i + 1) . "</td><td$class>"; |
|
369 | + echo "<tr><td$class>Signature ".($i+1)."</td><td$class>"; |
|
370 | 370 | if ($x->kindOf() == "array") { |
371 | 371 | $ret = $x[0]; |
372 | - echo "<code>OUT: " . htmlspecialchars($ret->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding) . "<br />IN: ("; |
|
373 | - if ($x->count() > 1) { |
|
374 | - foreach($x as $k => $y) { |
|
372 | + echo "<code>OUT: ".htmlspecialchars($ret->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding)."<br />IN: ("; |
|
373 | + if ($x->count()>1) { |
|
374 | + foreach ($x as $k => $y) { |
|
375 | 375 | if ($k == 0) continue; |
376 | 376 | echo htmlspecialchars($y->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding); |
377 | 377 | if ($wstype != 1) { |
378 | 378 | $type = $y->scalarval(); |
379 | 379 | $payload .= '<param><value>'; |
380 | - switch($type) { |
|
380 | + switch ($type) { |
|
381 | 381 | case 'undefined': |
382 | 382 | break; |
383 | 383 | case 'null'; |
384 | 384 | $type = 'nil'; |
385 | 385 | // fall thru intentionally |
386 | 386 | default: |
387 | - $payload .= '<' . |
|
388 | - htmlspecialchars($type, ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding) . |
|
389 | - '></' . htmlspecialchars($type, ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding) . |
|
387 | + $payload .= '<'. |
|
388 | + htmlspecialchars($type, ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding). |
|
389 | + '></'.htmlspecialchars($type, ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding). |
|
390 | 390 | '>'; |
391 | 391 | } |
392 | 392 | $payload .= "</value></param>\n"; |
393 | 393 | } |
394 | 394 | $alt_payload .= $y->scalarval(); |
395 | - if ($k < $x->count() - 1) { |
|
395 | + if ($k<$x->count()-1) { |
|
396 | 396 | $alt_payload .= ';'; |
397 | 397 | echo ", "; |
398 | 398 | } |
@@ -405,63 +405,63 @@ discard block |
||
405 | 405 | echo '</td>'; |
406 | 406 | // button to test this method |
407 | 407 | //$payload="<methodCall>\n<methodName>$method</methodName>\n<params>\n$payload</params>\n</methodCall>"; |
408 | - echo "<td$class><form action=\"controller.php\" target=\"frmcontroller\" method=\"get\">" . |
|
409 | - "<input type=\"hidden\" name=\"host\" value=\"" . htmlspecialchars($host, ENT_COMPAT, $inputcharset) . "\" />" . |
|
410 | - "<input type=\"hidden\" name=\"port\" value=\"" . htmlspecialchars($port, ENT_COMPAT, $inputcharset) . "\" />" . |
|
411 | - "<input type=\"hidden\" name=\"path\" value=\"" . htmlspecialchars($path, ENT_COMPAT, $inputcharset) . "\" />" . |
|
412 | - "<input type=\"hidden\" name=\"id\" value=\"" . htmlspecialchars($id, ENT_COMPAT, $inputcharset) . "\" />" . |
|
413 | - "<input type=\"hidden\" name=\"debug\" value=\"$debug\" />" . |
|
414 | - "<input type=\"hidden\" name=\"username\" value=\"" . htmlspecialchars($username, ENT_COMPAT, $inputcharset) . "\" />" . |
|
415 | - "<input type=\"hidden\" name=\"password\" value=\"" . htmlspecialchars($password, ENT_COMPAT, $inputcharset) . "\" />" . |
|
416 | - "<input type=\"hidden\" name=\"authtype\" value=\"$authtype\" />" . |
|
417 | - "<input type=\"hidden\" name=\"verifyhost\" value=\"$verifyhost\" />" . |
|
418 | - "<input type=\"hidden\" name=\"verifypeer\" value=\"$verifypeer\" />" . |
|
419 | - "<input type=\"hidden\" name=\"cainfo\" value=\"" . htmlspecialchars($cainfo, ENT_COMPAT, $inputcharset) . "\" />" . |
|
420 | - "<input type=\"hidden\" name=\"proxy\" value=\"" . htmlspecialchars($proxy, ENT_COMPAT, $inputcharset) . "\" />" . |
|
421 | - "<input type=\"hidden\" name=\"proxyuser\" value=\"" . htmlspecialchars($proxyuser, ENT_COMPAT, $inputcharset) . "\" />" . |
|
422 | - "<input type=\"hidden\" name=\"proxypwd\" value=\"" . htmlspecialchars($proxypwd, ENT_COMPAT, $inputcharset) . "\" />" . |
|
423 | - "<input type=\"hidden\" name=\"responsecompression\" value=\"$responsecompression\" />" . |
|
424 | - "<input type=\"hidden\" name=\"requestcompression\" value=\"$requestcompression\" />" . |
|
425 | - "<input type=\"hidden\" name=\"clientcookies\" value=\"" . htmlspecialchars($clientcookies, ENT_COMPAT, $inputcharset) . "\" />" . |
|
426 | - "<input type=\"hidden\" name=\"protocol\" value=\"$protocol\" />" . |
|
427 | - "<input type=\"hidden\" name=\"timeout\" value=\"" . htmlspecialchars($timeout, ENT_COMPAT, $inputcharset) . "\" />" . |
|
428 | - "<input type=\"hidden\" name=\"method\" value=\"" . htmlspecialchars($method, ENT_COMPAT, $inputcharset) . "\" />" . |
|
429 | - "<input type=\"hidden\" name=\"methodpayload\" value=\"" . htmlspecialchars($payload, ENT_COMPAT, $inputcharset) . "\" />" . |
|
430 | - "<input type=\"hidden\" name=\"altmethodpayload\" value=\"" . htmlspecialchars($alt_payload, ENT_COMPAT, $inputcharset) . "\" />" . |
|
431 | - "<input type=\"hidden\" name=\"wstype\" value=\"$wstype\" />" . |
|
408 | + echo "<td$class><form action=\"controller.php\" target=\"frmcontroller\" method=\"get\">". |
|
409 | + "<input type=\"hidden\" name=\"host\" value=\"".htmlspecialchars($host, ENT_COMPAT, $inputcharset)."\" />". |
|
410 | + "<input type=\"hidden\" name=\"port\" value=\"".htmlspecialchars($port, ENT_COMPAT, $inputcharset)."\" />". |
|
411 | + "<input type=\"hidden\" name=\"path\" value=\"".htmlspecialchars($path, ENT_COMPAT, $inputcharset)."\" />". |
|
412 | + "<input type=\"hidden\" name=\"id\" value=\"".htmlspecialchars($id, ENT_COMPAT, $inputcharset)."\" />". |
|
413 | + "<input type=\"hidden\" name=\"debug\" value=\"$debug\" />". |
|
414 | + "<input type=\"hidden\" name=\"username\" value=\"".htmlspecialchars($username, ENT_COMPAT, $inputcharset)."\" />". |
|
415 | + "<input type=\"hidden\" name=\"password\" value=\"".htmlspecialchars($password, ENT_COMPAT, $inputcharset)."\" />". |
|
416 | + "<input type=\"hidden\" name=\"authtype\" value=\"$authtype\" />". |
|
417 | + "<input type=\"hidden\" name=\"verifyhost\" value=\"$verifyhost\" />". |
|
418 | + "<input type=\"hidden\" name=\"verifypeer\" value=\"$verifypeer\" />". |
|
419 | + "<input type=\"hidden\" name=\"cainfo\" value=\"".htmlspecialchars($cainfo, ENT_COMPAT, $inputcharset)."\" />". |
|
420 | + "<input type=\"hidden\" name=\"proxy\" value=\"".htmlspecialchars($proxy, ENT_COMPAT, $inputcharset)."\" />". |
|
421 | + "<input type=\"hidden\" name=\"proxyuser\" value=\"".htmlspecialchars($proxyuser, ENT_COMPAT, $inputcharset)."\" />". |
|
422 | + "<input type=\"hidden\" name=\"proxypwd\" value=\"".htmlspecialchars($proxypwd, ENT_COMPAT, $inputcharset)."\" />". |
|
423 | + "<input type=\"hidden\" name=\"responsecompression\" value=\"$responsecompression\" />". |
|
424 | + "<input type=\"hidden\" name=\"requestcompression\" value=\"$requestcompression\" />". |
|
425 | + "<input type=\"hidden\" name=\"clientcookies\" value=\"".htmlspecialchars($clientcookies, ENT_COMPAT, $inputcharset)."\" />". |
|
426 | + "<input type=\"hidden\" name=\"protocol\" value=\"$protocol\" />". |
|
427 | + "<input type=\"hidden\" name=\"timeout\" value=\"".htmlspecialchars($timeout, ENT_COMPAT, $inputcharset)."\" />". |
|
428 | + "<input type=\"hidden\" name=\"method\" value=\"".htmlspecialchars($method, ENT_COMPAT, $inputcharset)."\" />". |
|
429 | + "<input type=\"hidden\" name=\"methodpayload\" value=\"".htmlspecialchars($payload, ENT_COMPAT, $inputcharset)."\" />". |
|
430 | + "<input type=\"hidden\" name=\"altmethodpayload\" value=\"".htmlspecialchars($alt_payload, ENT_COMPAT, $inputcharset)."\" />". |
|
431 | + "<input type=\"hidden\" name=\"wstype\" value=\"$wstype\" />". |
|
432 | 432 | "<input type=\"hidden\" name=\"action\" value=\"execute\" />"; |
433 | 433 | if ($wstype != 1) { |
434 | 434 | echo "<input type=\"submit\" value=\"Load method synopsis\" />"; |
435 | 435 | } |
436 | 436 | echo "</form></td>\n"; |
437 | 437 | |
438 | - echo "<td$class><form action=\"controller.php\" target=\"frmcontroller\" method=\"get\">" . |
|
439 | - "<input type=\"hidden\" name=\"host\" value=\"" . htmlspecialchars($host, ENT_COMPAT, $inputcharset) . "\" />" . |
|
440 | - "<input type=\"hidden\" name=\"port\" value=\"" . htmlspecialchars($port, ENT_COMPAT, $inputcharset) . "\" />" . |
|
441 | - "<input type=\"hidden\" name=\"path\" value=\"" . htmlspecialchars($path, ENT_COMPAT, $inputcharset) . "\" />" . |
|
442 | - "<input type=\"hidden\" name=\"id\" value=\"" . htmlspecialchars($id, ENT_COMPAT, $inputcharset) . "\" />" . |
|
443 | - "<input type=\"hidden\" name=\"debug\" value=\"$debug\" />" . |
|
444 | - "<input type=\"hidden\" name=\"username\" value=\"" . htmlspecialchars($username, ENT_COMPAT, $inputcharset) . "\" />" . |
|
445 | - "<input type=\"hidden\" name=\"password\" value=\"" . htmlspecialchars($password, ENT_COMPAT, $inputcharset) . "\" />" . |
|
446 | - "<input type=\"hidden\" name=\"authtype\" value=\"$authtype\" />" . |
|
447 | - "<input type=\"hidden\" name=\"verifyhost\" value=\"$verifyhost\" />" . |
|
448 | - "<input type=\"hidden\" name=\"verifypeer\" value=\"$verifypeer\" />" . |
|
449 | - "<input type=\"hidden\" name=\"cainfo\" value=\"" . htmlspecialchars($cainfo, ENT_COMPAT, $inputcharset) . "\" />" . |
|
450 | - "<input type=\"hidden\" name=\"proxy\" value=\"" . htmlspecialchars($proxy, ENT_COMPAT, $inputcharset) . "\" />" . |
|
451 | - "<input type=\"hidden\" name=\"proxyuser\" value=\"" . htmlspecialchars($proxyuser, ENT_COMPAT, $inputcharset) . "\" />" . |
|
452 | - "<input type=\"hidden\" name=\"proxypwd\" value=\"" . htmlspecialchars($proxypwd, ENT_COMPAT, $inputcharset) . "\" />" . |
|
453 | - "<input type=\"hidden\" name=\"responsecompression\" value=\"$responsecompression\" />" . |
|
454 | - "<input type=\"hidden\" name=\"requestcompression\" value=\"$requestcompression\" />" . |
|
455 | - "<input type=\"hidden\" name=\"clientcookies\" value=\"" . htmlspecialchars($clientcookies, ENT_COMPAT, $inputcharset) . "\" />" . |
|
456 | - "<input type=\"hidden\" name=\"protocol\" value=\"$protocol\" />" . |
|
457 | - "<input type=\"hidden\" name=\"timeout\" value=\"" . htmlspecialchars($timeout, ENT_COMPAT, $inputcharset) . "\" />" . |
|
458 | - "<input type=\"hidden\" name=\"method\" value=\"" . htmlspecialchars($method, ENT_COMPAT, $inputcharset) . "\" />" . |
|
459 | - "<input type=\"hidden\" name=\"methodsig\" value=\"" . $i . "\" />" . |
|
460 | - "<input type=\"hidden\" name=\"methodpayload\" value=\"" . htmlspecialchars($payload, ENT_COMPAT, $inputcharset) . "\" />" . |
|
461 | - "<input type=\"hidden\" name=\"altmethodpayload\" value=\"" . htmlspecialchars($alt_payload, ENT_COMPAT, $inputcharset) . "\" />" . |
|
462 | - "<input type=\"hidden\" name=\"wstype\" value=\"$wstype\" />" . |
|
463 | - "<input type=\"hidden\" name=\"run\" value=\"now\" />" . |
|
464 | - "<input type=\"hidden\" name=\"action\" value=\"wrap\" />" . |
|
438 | + echo "<td$class><form action=\"controller.php\" target=\"frmcontroller\" method=\"get\">". |
|
439 | + "<input type=\"hidden\" name=\"host\" value=\"".htmlspecialchars($host, ENT_COMPAT, $inputcharset)."\" />". |
|
440 | + "<input type=\"hidden\" name=\"port\" value=\"".htmlspecialchars($port, ENT_COMPAT, $inputcharset)."\" />". |
|
441 | + "<input type=\"hidden\" name=\"path\" value=\"".htmlspecialchars($path, ENT_COMPAT, $inputcharset)."\" />". |
|
442 | + "<input type=\"hidden\" name=\"id\" value=\"".htmlspecialchars($id, ENT_COMPAT, $inputcharset)."\" />". |
|
443 | + "<input type=\"hidden\" name=\"debug\" value=\"$debug\" />". |
|
444 | + "<input type=\"hidden\" name=\"username\" value=\"".htmlspecialchars($username, ENT_COMPAT, $inputcharset)."\" />". |
|
445 | + "<input type=\"hidden\" name=\"password\" value=\"".htmlspecialchars($password, ENT_COMPAT, $inputcharset)."\" />". |
|
446 | + "<input type=\"hidden\" name=\"authtype\" value=\"$authtype\" />". |
|
447 | + "<input type=\"hidden\" name=\"verifyhost\" value=\"$verifyhost\" />". |
|
448 | + "<input type=\"hidden\" name=\"verifypeer\" value=\"$verifypeer\" />". |
|
449 | + "<input type=\"hidden\" name=\"cainfo\" value=\"".htmlspecialchars($cainfo, ENT_COMPAT, $inputcharset)."\" />". |
|
450 | + "<input type=\"hidden\" name=\"proxy\" value=\"".htmlspecialchars($proxy, ENT_COMPAT, $inputcharset)."\" />". |
|
451 | + "<input type=\"hidden\" name=\"proxyuser\" value=\"".htmlspecialchars($proxyuser, ENT_COMPAT, $inputcharset)."\" />". |
|
452 | + "<input type=\"hidden\" name=\"proxypwd\" value=\"".htmlspecialchars($proxypwd, ENT_COMPAT, $inputcharset)."\" />". |
|
453 | + "<input type=\"hidden\" name=\"responsecompression\" value=\"$responsecompression\" />". |
|
454 | + "<input type=\"hidden\" name=\"requestcompression\" value=\"$requestcompression\" />". |
|
455 | + "<input type=\"hidden\" name=\"clientcookies\" value=\"".htmlspecialchars($clientcookies, ENT_COMPAT, $inputcharset)."\" />". |
|
456 | + "<input type=\"hidden\" name=\"protocol\" value=\"$protocol\" />". |
|
457 | + "<input type=\"hidden\" name=\"timeout\" value=\"".htmlspecialchars($timeout, ENT_COMPAT, $inputcharset)."\" />". |
|
458 | + "<input type=\"hidden\" name=\"method\" value=\"".htmlspecialchars($method, ENT_COMPAT, $inputcharset)."\" />". |
|
459 | + "<input type=\"hidden\" name=\"methodsig\" value=\"".$i."\" />". |
|
460 | + "<input type=\"hidden\" name=\"methodpayload\" value=\"".htmlspecialchars($payload, ENT_COMPAT, $inputcharset)."\" />". |
|
461 | + "<input type=\"hidden\" name=\"altmethodpayload\" value=\"".htmlspecialchars($alt_payload, ENT_COMPAT, $inputcharset)."\" />". |
|
462 | + "<input type=\"hidden\" name=\"wstype\" value=\"$wstype\" />". |
|
463 | + "<input type=\"hidden\" name=\"run\" value=\"now\" />". |
|
464 | + "<input type=\"hidden\" name=\"action\" value=\"wrap\" />". |
|
465 | 465 | "<input type=\"submit\" value=\"Generate method call stub code\" />"; |
466 | 466 | echo "</form></td></tr>\n"; |
467 | 467 | } |
@@ -473,14 +473,14 @@ discard block |
||
473 | 473 | case 'wrap': |
474 | 474 | $r1 = $resp[0]->value(); |
475 | 475 | $r2 = $resp[1]->value(); |
476 | - if ($r2->kindOf() != "array" || $r2->count() <= $methodsig) { |
|
476 | + if ($r2->kindOf() != "array" || $r2->count()<=$methodsig) { |
|
477 | 477 | echo "Error: signature unknown\n"; |
478 | 478 | } else { |
479 | 479 | $mdesc = $r1->scalarval(); |
480 | 480 | $encoder = new PhpXmlRpc\Encoder(); |
481 | 481 | $msig = $encoder->decode($r2); |
482 | 482 | $msig = $msig[$methodsig]; |
483 | - $proto = ($protocol == 1) ? 'http11' : ( $protocol == 2 ? 'https' : ( $protocol == 3 ? 'h2' : ( $protocol == 4 ? 'h2c' : '' ) ) ); |
|
483 | + $proto = ($protocol == 1) ? 'http11' : ($protocol == 2 ? 'https' : ($protocol == 3 ? 'h2' : ($protocol == 4 ? 'h2c' : ''))); |
|
484 | 484 | if ($proxy == '' && $username == '' && !$requestcompression && !$responsecompression && |
485 | 485 | $clientcookies == '' |
486 | 486 | ) { |
@@ -494,11 +494,11 @@ discard block |
||
494 | 494 | $prefix = 'xmlrpc'; |
495 | 495 | } |
496 | 496 | $wrapper = new PhpXmlRpc\Wrapper(); |
497 | - $code = $wrapper->buildWrapMethodSource($client, $method, array('timeout' => $timeout, 'protocol' => $proto, 'simple_client_copy' => $opts, 'prefix' => $prefix), str_replace('.', '_', $prefix . '_' . $method), $msig, $mdesc); |
|
497 | + $code = $wrapper->buildWrapMethodSource($client, $method, array('timeout' => $timeout, 'protocol' => $proto, 'simple_client_copy' => $opts, 'prefix' => $prefix), str_replace('.', '_', $prefix.'_'.$method), $msig, $mdesc); |
|
498 | 498 | //if ($code) |
499 | 499 | //{ |
500 | 500 | echo "<div id=\"phpcode\">\n"; |
501 | - highlight_string("<?php\n" . $code['docstring'] . $code['source'] . '?>'); |
|
501 | + highlight_string("<?php\n".$code['docstring'].$code['source'].'?>'); |
|
502 | 502 | echo "\n</div>"; |
503 | 503 | //} |
504 | 504 | //else |
@@ -509,7 +509,7 @@ discard block |
||
509 | 509 | break; |
510 | 510 | |
511 | 511 | case 'execute': |
512 | - echo '<div id="response"><h2>Response:</h2>' . htmlspecialchars($response->serialize()) . '</div>'; |
|
512 | + echo '<div id="response"><h2>Response:</h2>'.htmlspecialchars($response->serialize()).'</div>'; |
|
513 | 513 | break; |
514 | 514 | |
515 | 515 | default: // give a warning |
@@ -157,10 +157,10 @@ discard block |
||
157 | 157 | $server = $parts['host']; |
158 | 158 | $path = isset($parts['path']) ? $parts['path'] : ''; |
159 | 159 | if (isset($parts['query'])) { |
160 | - $path .= '?' . $parts['query']; |
|
160 | + $path .= '?'.$parts['query']; |
|
161 | 161 | } |
162 | 162 | if (isset($parts['fragment'])) { |
163 | - $path .= '#' . $parts['fragment']; |
|
163 | + $path .= '#'.$parts['fragment']; |
|
164 | 164 | } |
165 | 165 | if (isset($parts['port'])) { |
166 | 166 | $port = $parts['port']; |
@@ -176,7 +176,7 @@ discard block |
||
176 | 176 | } |
177 | 177 | } |
178 | 178 | if ($path == '' || $path[0] != '/') { |
179 | - $this->path = '/' . $path; |
|
179 | + $this->path = '/'.$path; |
|
180 | 180 | } else { |
181 | 181 | $this->path = $path; |
182 | 182 | } |
@@ -214,7 +214,7 @@ discard block |
||
214 | 214 | }*/ |
215 | 215 | |
216 | 216 | // initialize user_agent string |
217 | - $this->user_agent = PhpXmlRpc::$xmlrpcName . ' ' . PhpXmlRpc::$xmlrpcVersion; |
|
217 | + $this->user_agent = PhpXmlRpc::$xmlrpcName.' '.PhpXmlRpc::$xmlrpcVersion; |
|
218 | 218 | } |
219 | 219 | |
220 | 220 | /** |
@@ -592,7 +592,7 @@ discard block |
||
592 | 592 | */ |
593 | 593 | protected function sendPayloadHTTP10($req, $server, $port, $timeout = 0, $username = '', $password = '', |
594 | 594 | $authType = 1, $proxyHost = '', $proxyPort = 0, $proxyUsername = '', $proxyPassword = '', $proxyAuthType = 1, |
595 | - $method='http') |
|
595 | + $method = 'http') |
|
596 | 596 | { |
597 | 597 | //trigger_error('Method ' . __METHOD__ . ' is deprecated', E_USER_DEPRECATED); |
598 | 598 | |
@@ -624,7 +624,7 @@ discard block |
||
624 | 624 | * @param int $sslVersion |
625 | 625 | * @return Response |
626 | 626 | */ |
627 | - protected function sendPayloadHTTPS($req, $server, $port, $timeout = 0, $username = '', $password = '', |
|
627 | + protected function sendPayloadHTTPS($req, $server, $port, $timeout = 0, $username = '', $password = '', |
|
628 | 628 | $authType = 1, $cert = '', $certPass = '', $caCert = '', $caCertDir = '', $proxyHost = '', $proxyPort = 0, |
629 | 629 | $proxyUsername = '', $proxyPassword = '', $proxyAuthType = 1, $keepAlive = false, $key = '', $keyPass = '', |
630 | 630 | $sslVersion = 0) |
@@ -663,7 +663,7 @@ discard block |
||
663 | 663 | */ |
664 | 664 | protected function sendPayloadSocket($req, $server, $port, $timeout = 0, $username = '', $password = '', |
665 | 665 | $authType = 1, $cert = '', $certPass = '', $caCert = '', $caCertDir = '', $proxyHost = '', $proxyPort = 0, |
666 | - $proxyUsername = '', $proxyPassword = '', $proxyAuthType = 1, $method='http', $key = '', $keyPass = '', |
|
666 | + $proxyUsername = '', $proxyPassword = '', $proxyAuthType = 1, $method = 'http', $key = '', $keyPass = '', |
|
667 | 667 | $sslVersion = 0) |
668 | 668 | { |
669 | 669 | /// @todo log a warning if passed an unsupported method |
@@ -699,15 +699,15 @@ discard block |
||
699 | 699 | // thanks to Grant Rauscher <[email protected]> for this |
700 | 700 | $credentials = ''; |
701 | 701 | if ($username != '') { |
702 | - $credentials = 'Authorization: Basic ' . base64_encode($username . ':' . $password) . "\r\n"; |
|
702 | + $credentials = 'Authorization: Basic '.base64_encode($username.':'.$password)."\r\n"; |
|
703 | 703 | if ($authType != 1) { |
704 | - $this->getLogger()->errorLog('XML-RPC: ' . __METHOD__ . ': warning. Only Basic auth is supported with HTTP 1.0'); |
|
704 | + $this->getLogger()->errorLog('XML-RPC: '.__METHOD__.': warning. Only Basic auth is supported with HTTP 1.0'); |
|
705 | 705 | } |
706 | 706 | } |
707 | 707 | |
708 | 708 | $acceptedEncoding = ''; |
709 | 709 | if (is_array($this->accepted_compression) && count($this->accepted_compression)) { |
710 | - $acceptedEncoding = 'Accept-Encoding: ' . implode(', ', $this->accepted_compression) . "\r\n"; |
|
710 | + $acceptedEncoding = 'Accept-Encoding: '.implode(', ', $this->accepted_compression)."\r\n"; |
|
711 | 711 | } |
712 | 712 | |
713 | 713 | $proxyCredentials = ''; |
@@ -718,12 +718,12 @@ discard block |
||
718 | 718 | $connectServer = $proxyHost; |
719 | 719 | $connectPort = $proxyPort; |
720 | 720 | $transport = 'tcp'; |
721 | - $uri = 'http://' . $server . ':' . $port . $this->path; |
|
721 | + $uri = 'http://'.$server.':'.$port.$this->path; |
|
722 | 722 | if ($proxyUsername != '') { |
723 | 723 | if ($proxyAuthType != 1) { |
724 | - $this->getLogger()->errorLog('XML-RPC: ' . __METHOD__ . ': warning. Only Basic auth to proxy is supported with HTTP 1.0'); |
|
724 | + $this->getLogger()->errorLog('XML-RPC: '.__METHOD__.': warning. Only Basic auth to proxy is supported with HTTP 1.0'); |
|
725 | 725 | } |
726 | - $proxyCredentials = 'Proxy-Authorization: Basic ' . base64_encode($proxyUsername . ':' . $proxyPassword) . "\r\n"; |
|
726 | + $proxyCredentials = 'Proxy-Authorization: Basic '.base64_encode($proxyUsername.':'.$proxyPassword)."\r\n"; |
|
727 | 727 | } |
728 | 728 | } else { |
729 | 729 | $connectServer = $server; |
@@ -738,45 +738,45 @@ discard block |
||
738 | 738 | $version = ''; |
739 | 739 | foreach ($this->cookies as $name => $cookie) { |
740 | 740 | if ($cookie['version']) { |
741 | - $version = ' $Version="' . $cookie['version'] . '";'; |
|
742 | - $cookieHeader .= ' ' . $name . '="' . $cookie['value'] . '";'; |
|
741 | + $version = ' $Version="'.$cookie['version'].'";'; |
|
742 | + $cookieHeader .= ' '.$name.'="'.$cookie['value'].'";'; |
|
743 | 743 | if ($cookie['path']) { |
744 | - $cookieHeader .= ' $Path="' . $cookie['path'] . '";'; |
|
744 | + $cookieHeader .= ' $Path="'.$cookie['path'].'";'; |
|
745 | 745 | } |
746 | 746 | if ($cookie['domain']) { |
747 | - $cookieHeader .= ' $Domain="' . $cookie['domain'] . '";'; |
|
747 | + $cookieHeader .= ' $Domain="'.$cookie['domain'].'";'; |
|
748 | 748 | } |
749 | 749 | if ($cookie['port']) { |
750 | - $cookieHeader .= ' $Port="' . $cookie['port'] . '";'; |
|
750 | + $cookieHeader .= ' $Port="'.$cookie['port'].'";'; |
|
751 | 751 | } |
752 | 752 | } else { |
753 | - $cookieHeader .= ' ' . $name . '=' . $cookie['value'] . ";"; |
|
753 | + $cookieHeader .= ' '.$name.'='.$cookie['value'].";"; |
|
754 | 754 | } |
755 | 755 | } |
756 | - $cookieHeader = 'Cookie:' . $version . substr($cookieHeader, 0, -1) . "\r\n"; |
|
756 | + $cookieHeader = 'Cookie:'.$version.substr($cookieHeader, 0, -1)."\r\n"; |
|
757 | 757 | } |
758 | 758 | |
759 | 759 | // omit port if default |
760 | 760 | if (($port == 80 && in_array($method, array('http', 'http10'))) || ($port == 443 && $method == 'https')) { |
761 | - $port = ''; |
|
761 | + $port = ''; |
|
762 | 762 | } else { |
763 | - $port = ':' . $port; |
|
763 | + $port = ':'.$port; |
|
764 | 764 | } |
765 | 765 | |
766 | - $op = 'POST ' . $uri . " HTTP/1.0\r\n" . |
|
767 | - 'User-Agent: ' . $this->user_agent . "\r\n" . |
|
768 | - 'Host: ' . $server . $port . "\r\n" . |
|
769 | - $credentials . |
|
770 | - $proxyCredentials . |
|
771 | - $acceptedEncoding . |
|
772 | - $encodingHdr . |
|
773 | - 'Accept-Charset: ' . implode(',', $this->accepted_charset_encodings) . "\r\n" . |
|
774 | - $cookieHeader . |
|
775 | - 'Content-Type: ' . $req->content_type . "\r\nContent-Length: " . |
|
776 | - strlen($payload) . "\r\n\r\n" . |
|
766 | + $op = 'POST '.$uri." HTTP/1.0\r\n". |
|
767 | + 'User-Agent: '.$this->user_agent."\r\n". |
|
768 | + 'Host: '.$server.$port."\r\n". |
|
769 | + $credentials. |
|
770 | + $proxyCredentials. |
|
771 | + $acceptedEncoding. |
|
772 | + $encodingHdr. |
|
773 | + 'Accept-Charset: '.implode(',', $this->accepted_charset_encodings)."\r\n". |
|
774 | + $cookieHeader. |
|
775 | + 'Content-Type: '.$req->content_type."\r\nContent-Length: ". |
|
776 | + strlen($payload)."\r\n\r\n". |
|
777 | 777 | $payload; |
778 | 778 | |
779 | - if ($this->debug > 1) { |
|
779 | + if ($this->debug>1) { |
|
780 | 780 | $this->getLogger()->debugMessage("---SENDING---\n$op\n---END---"); |
781 | 781 | } |
782 | 782 | |
@@ -803,7 +803,7 @@ discard block |
||
803 | 803 | |
804 | 804 | $context = stream_context_create($contextOptions); |
805 | 805 | |
806 | - if ($timeout <= 0) { |
|
806 | + if ($timeout<=0) { |
|
807 | 807 | $connectTimeout = ini_get('default_socket_timeout'); |
808 | 808 | } else { |
809 | 809 | $connectTimeout = $timeout; |
@@ -815,7 +815,7 @@ discard block |
||
815 | 815 | $fp = @stream_socket_client("$transport://$connectServer:$connectPort", $this->errno, $this->errstr, $connectTimeout, |
816 | 816 | STREAM_CLIENT_CONNECT, $context); |
817 | 817 | if ($fp) { |
818 | - if ($timeout > 0) { |
|
818 | + if ($timeout>0) { |
|
819 | 819 | stream_set_timeout($fp, $timeout); |
820 | 820 | } |
821 | 821 | } else { |
@@ -824,8 +824,8 @@ discard block |
||
824 | 824 | $this->errstr = $err['message']; |
825 | 825 | } |
826 | 826 | |
827 | - $this->errstr = 'Connect error: ' . $this->errstr; |
|
828 | - $r = new Response(0, PhpXmlRpc::$xmlrpcerr['http_error'], $this->errstr . ' (' . $this->errno . ')'); |
|
827 | + $this->errstr = 'Connect error: '.$this->errstr; |
|
828 | + $r = new Response(0, PhpXmlRpc::$xmlrpcerr['http_error'], $this->errstr.' ('.$this->errno.')'); |
|
829 | 829 | |
830 | 830 | return $r; |
831 | 831 | } |
@@ -913,18 +913,18 @@ discard block |
||
913 | 913 | $keyPass, $sslVersion); |
914 | 914 | |
915 | 915 | if (!$curl) { |
916 | - return new Response(0, PhpXmlRpc::$xmlrpcerr['curl_fail'], PhpXmlRpc::$xmlrpcstr['curl_fail'] . ': error during curl initialization. Check php error log for details'); |
|
916 | + return new Response(0, PhpXmlRpc::$xmlrpcerr['curl_fail'], PhpXmlRpc::$xmlrpcstr['curl_fail'].': error during curl initialization. Check php error log for details'); |
|
917 | 917 | } |
918 | 918 | |
919 | 919 | $result = curl_exec($curl); |
920 | 920 | |
921 | - if ($this->debug > 1) { |
|
921 | + if ($this->debug>1) { |
|
922 | 922 | $message = "---CURL INFO---\n"; |
923 | 923 | foreach (curl_getinfo($curl) as $name => $val) { |
924 | 924 | if (is_array($val)) { |
925 | 925 | $val = implode("\n", $val); |
926 | 926 | } |
927 | - $message .= $name . ': ' . $val . "\n"; |
|
927 | + $message .= $name.': '.$val."\n"; |
|
928 | 928 | } |
929 | 929 | $message .= '---END---'; |
930 | 930 | $this->getLogger()->debugMessage($message); |
@@ -934,7 +934,7 @@ discard block |
||
934 | 934 | /// @todo we should use a better check here - what if we get back '' or '0'? |
935 | 935 | |
936 | 936 | $this->errstr = 'no response'; |
937 | - $resp = new Response(0, PhpXmlRpc::$xmlrpcerr['curl_fail'], PhpXmlRpc::$xmlrpcstr['curl_fail'] . ': ' . curl_error($curl)); |
|
937 | + $resp = new Response(0, PhpXmlRpc::$xmlrpcerr['curl_fail'], PhpXmlRpc::$xmlrpcstr['curl_fail'].': '.curl_error($curl)); |
|
938 | 938 | curl_close($curl); |
939 | 939 | if ($keepAlive) { |
940 | 940 | $this->xmlrpc_curl_handle = null; |
@@ -1004,12 +1004,12 @@ discard block |
||
1004 | 1004 | // http, https |
1005 | 1005 | $protocol = $method; |
1006 | 1006 | if (strpos($protocol, ':') !== false) { |
1007 | - $this->getLogger()->errorLog('XML-RPC: ' . __METHOD__ . ": warning - attempted hacking attempt?. The curl protocol requested for the call is: '$protocol'"); |
|
1007 | + $this->getLogger()->errorLog('XML-RPC: '.__METHOD__.": warning - attempted hacking attempt?. The curl protocol requested for the call is: '$protocol'"); |
|
1008 | 1008 | return false; |
1009 | 1009 | } |
1010 | 1010 | } |
1011 | 1011 | } |
1012 | - $curl = curl_init($protocol . '://' . $server . ':' . $port . $this->path); |
|
1012 | + $curl = curl_init($protocol.'://'.$server.':'.$port.$this->path); |
|
1013 | 1013 | if (!$curl) { |
1014 | 1014 | return false; |
1015 | 1015 | } |
@@ -1023,7 +1023,7 @@ discard block |
||
1023 | 1023 | // results into variable |
1024 | 1024 | curl_setopt($curl, CURLOPT_RETURNTRANSFER, true); |
1025 | 1025 | |
1026 | - if ($this->debug > 1) { |
|
1026 | + if ($this->debug>1) { |
|
1027 | 1027 | curl_setopt($curl, CURLOPT_VERBOSE, true); |
1028 | 1028 | /// @todo allow callers to redirect curlopt_stderr to some stream which can be buffered |
1029 | 1029 | } |
@@ -1048,7 +1048,7 @@ discard block |
||
1048 | 1048 | } |
1049 | 1049 | } |
1050 | 1050 | // extra headers |
1051 | - $headers = array('Content-Type: ' . $req->content_type, 'Accept-Charset: ' . implode(',', $this->accepted_charset_encodings)); |
|
1051 | + $headers = array('Content-Type: '.$req->content_type, 'Accept-Charset: '.implode(',', $this->accepted_charset_encodings)); |
|
1052 | 1052 | // if no keepalive is wanted, let the server know it in advance |
1053 | 1053 | if (!$keepAlive) { |
1054 | 1054 | $headers[] = 'Connection: close'; |
@@ -1065,7 +1065,7 @@ discard block |
||
1065 | 1065 | curl_setopt($curl, CURLOPT_HTTPHEADER, $headers); |
1066 | 1066 | // timeout is borked |
1067 | 1067 | if ($timeout) { |
1068 | - curl_setopt($curl, CURLOPT_TIMEOUT, $timeout == 1 ? 1 : $timeout - 1); |
|
1068 | + curl_setopt($curl, CURLOPT_TIMEOUT, $timeout == 1 ? 1 : $timeout-1); |
|
1069 | 1069 | } |
1070 | 1070 | |
1071 | 1071 | switch ($method) { |
@@ -1084,11 +1084,11 @@ discard block |
||
1084 | 1084 | } |
1085 | 1085 | |
1086 | 1086 | if ($username && $password) { |
1087 | - curl_setopt($curl, CURLOPT_USERPWD, $username . ':' . $password); |
|
1087 | + curl_setopt($curl, CURLOPT_USERPWD, $username.':'.$password); |
|
1088 | 1088 | if (defined('CURLOPT_HTTPAUTH')) { |
1089 | 1089 | curl_setopt($curl, CURLOPT_HTTPAUTH, $authType); |
1090 | 1090 | } elseif ($authType != 1) { |
1091 | - $this->getLogger()->errorLog('XML-RPC: ' . __METHOD__ . ': warning. Only Basic auth is supported by the current PHP/curl install'); |
|
1091 | + $this->getLogger()->errorLog('XML-RPC: '.__METHOD__.': warning. Only Basic auth is supported by the current PHP/curl install'); |
|
1092 | 1092 | } |
1093 | 1093 | } |
1094 | 1094 | |
@@ -1130,13 +1130,13 @@ discard block |
||
1130 | 1130 | if ($proxyPort == 0) { |
1131 | 1131 | $proxyPort = 8080; // NB: even for HTTPS, local connection is on port 8080 |
1132 | 1132 | } |
1133 | - curl_setopt($curl, CURLOPT_PROXY, $proxyHost . ':' . $proxyPort); |
|
1133 | + curl_setopt($curl, CURLOPT_PROXY, $proxyHost.':'.$proxyPort); |
|
1134 | 1134 | if ($proxyUsername) { |
1135 | - curl_setopt($curl, CURLOPT_PROXYUSERPWD, $proxyUsername . ':' . $proxyPassword); |
|
1135 | + curl_setopt($curl, CURLOPT_PROXYUSERPWD, $proxyUsername.':'.$proxyPassword); |
|
1136 | 1136 | if (defined('CURLOPT_PROXYAUTH')) { |
1137 | 1137 | curl_setopt($curl, CURLOPT_PROXYAUTH, $proxyAuthType); |
1138 | 1138 | } elseif ($proxyAuthType != 1) { |
1139 | - $this->getLogger()->errorLog('XML-RPC: ' . __METHOD__ . ': warning. Only Basic auth to proxy is supported by the current PHP/curl install'); |
|
1139 | + $this->getLogger()->errorLog('XML-RPC: '.__METHOD__.': warning. Only Basic auth to proxy is supported by the current PHP/curl install'); |
|
1140 | 1140 | } |
1141 | 1141 | } |
1142 | 1142 | } |
@@ -1146,7 +1146,7 @@ discard block |
||
1146 | 1146 | if (count($this->cookies)) { |
1147 | 1147 | $cookieHeader = ''; |
1148 | 1148 | foreach ($this->cookies as $name => $cookie) { |
1149 | - $cookieHeader .= $name . '=' . $cookie['value'] . '; '; |
|
1149 | + $cookieHeader .= $name.'='.$cookie['value'].'; '; |
|
1150 | 1150 | } |
1151 | 1151 | curl_setopt($curl, CURLOPT_COOKIE, substr($cookieHeader, 0, -2)); |
1152 | 1152 | } |
@@ -1155,7 +1155,7 @@ discard block |
||
1155 | 1155 | curl_setopt($curl, $opt, $val); |
1156 | 1156 | } |
1157 | 1157 | |
1158 | - if ($this->debug > 1) { |
|
1158 | + if ($this->debug>1) { |
|
1159 | 1159 | $this->getLogger()->debugMessage("---SENDING---\n$payload\n---END---"); |
1160 | 1160 | } |
1161 | 1161 | |
@@ -1253,7 +1253,7 @@ discard block |
||
1253 | 1253 | $call['methodName'] = new Value($req->method(), 'string'); |
1254 | 1254 | $numParams = $req->getNumParams(); |
1255 | 1255 | $params = array(); |
1256 | - for ($i = 0; $i < $numParams; $i++) { |
|
1256 | + for ($i = 0; $i<$numParams; $i++) { |
|
1257 | 1257 | $params[$i] = $req->getParam($i); |
1258 | 1258 | } |
1259 | 1259 | $call['params'] = new Value($params, 'array'); |
@@ -1279,15 +1279,15 @@ discard block |
||
1279 | 1279 | /// @todo test this code branch... |
1280 | 1280 | $rets = $result->value(); |
1281 | 1281 | if (!is_array($rets)) { |
1282 | - return false; // bad return type from system.multicall |
|
1282 | + return false; // bad return type from system.multicall |
|
1283 | 1283 | } |
1284 | 1284 | $numRets = count($rets); |
1285 | 1285 | if ($numRets != count($reqs)) { |
1286 | - return false; // wrong number of return values. |
|
1286 | + return false; // wrong number of return values. |
|
1287 | 1287 | } |
1288 | 1288 | |
1289 | 1289 | $response = array(); |
1290 | - for ($i = 0; $i < $numRets; $i++) { |
|
1290 | + for ($i = 0; $i<$numRets; $i++) { |
|
1291 | 1291 | $val = $rets[$i]; |
1292 | 1292 | if (!is_array($val)) { |
1293 | 1293 | return false; |
@@ -1295,7 +1295,7 @@ discard block |
||
1295 | 1295 | switch (count($val)) { |
1296 | 1296 | case 1: |
1297 | 1297 | if (!isset($val[0])) { |
1298 | - return false; // Bad value |
|
1298 | + return false; // Bad value |
|
1299 | 1299 | } |
1300 | 1300 | // Normal return value |
1301 | 1301 | $response[$i] = new Response($val[0], 0, '', 'phpvals'); |
@@ -1323,11 +1323,11 @@ discard block |
||
1323 | 1323 | |
1324 | 1324 | $rets = $result->value(); |
1325 | 1325 | if ($rets->kindOf() != 'array') { |
1326 | - return false; // bad return type from system.multicall |
|
1326 | + return false; // bad return type from system.multicall |
|
1327 | 1327 | } |
1328 | 1328 | $numRets = $rets->count(); |
1329 | 1329 | if ($numRets != count($reqs)) { |
1330 | - return false; // wrong number of return values. |
|
1330 | + return false; // wrong number of return values. |
|
1331 | 1331 | } |
1332 | 1332 | |
1333 | 1333 | $response = array(); |
@@ -1335,7 +1335,7 @@ discard block |
||
1335 | 1335 | switch ($val->kindOf()) { |
1336 | 1336 | case 'array': |
1337 | 1337 | if ($val->count() != 1) { |
1338 | - return false; // Bad value |
|
1338 | + return false; // Bad value |
|
1339 | 1339 | } |
1340 | 1340 | // Normal return value |
1341 | 1341 | $response[] = new Response($val[0]); |
@@ -119,7 +119,7 @@ discard block |
||
119 | 119 | $this->me['struct'] = $val; |
120 | 120 | break; |
121 | 121 | default: |
122 | - $this->getLogger()->errorLog("XML-RPC: " . __METHOD__ . ": not a known type ($type)"); |
|
122 | + $this->getLogger()->errorLog("XML-RPC: ".__METHOD__.": not a known type ($type)"); |
|
123 | 123 | } |
124 | 124 | } |
125 | 125 | } |
@@ -144,7 +144,7 @@ discard block |
||
144 | 144 | } |
145 | 145 | |
146 | 146 | if ($typeOf !== 1) { |
147 | - $this->getLogger()->errorLog("XML-RPC: " . __METHOD__ . ": not a scalar type ($type)"); |
|
147 | + $this->getLogger()->errorLog("XML-RPC: ".__METHOD__.": not a scalar type ($type)"); |
|
148 | 148 | return 0; |
149 | 149 | } |
150 | 150 | |
@@ -161,10 +161,10 @@ discard block |
||
161 | 161 | |
162 | 162 | switch ($this->mytype) { |
163 | 163 | case 1: |
164 | - $this->getLogger()->errorLog('XML-RPC: ' . __METHOD__ . ': scalar xmlrpc value can have only one value'); |
|
164 | + $this->getLogger()->errorLog('XML-RPC: '.__METHOD__.': scalar xmlrpc value can have only one value'); |
|
165 | 165 | return 0; |
166 | 166 | case 3: |
167 | - $this->getLogger()->errorLog('XML-RPC: ' . __METHOD__ . ': cannot add anonymous scalar to struct xmlrpc value'); |
|
167 | + $this->getLogger()->errorLog('XML-RPC: '.__METHOD__.': cannot add anonymous scalar to struct xmlrpc value'); |
|
168 | 168 | return 0; |
169 | 169 | case 2: |
170 | 170 | // we're adding a scalar value to an array here |
@@ -206,7 +206,7 @@ discard block |
||
206 | 206 | |
207 | 207 | return 1; |
208 | 208 | } else { |
209 | - $this->getLogger()->errorLog('XML-RPC: ' . __METHOD__ . ': already initialized as a [' . $this->kindOf() . ']'); |
|
209 | + $this->getLogger()->errorLog('XML-RPC: '.__METHOD__.': already initialized as a ['.$this->kindOf().']'); |
|
210 | 210 | return 0; |
211 | 211 | } |
212 | 212 | } |
@@ -237,7 +237,7 @@ discard block |
||
237 | 237 | |
238 | 238 | return 1; |
239 | 239 | } else { |
240 | - $this->getLogger()->errorLog('XML-RPC: ' . __METHOD__ . ': already initialized as a [' . $this->kindOf() . ']'); |
|
240 | + $this->getLogger()->errorLog('XML-RPC: '.__METHOD__.': already initialized as a ['.$this->kindOf().']'); |
|
241 | 241 | return 0; |
242 | 242 | } |
243 | 243 | } |
@@ -279,19 +279,19 @@ discard block |
||
279 | 279 | case 1: |
280 | 280 | switch ($typ) { |
281 | 281 | case static::$xmlrpcBase64: |
282 | - $rs .= "<{$typ}>" . base64_encode($val) . "</{$typ}>"; |
|
282 | + $rs .= "<{$typ}>".base64_encode($val)."</{$typ}>"; |
|
283 | 283 | break; |
284 | 284 | case static::$xmlrpcBoolean: |
285 | - $rs .= "<{$typ}>" . ($val ? '1' : '0') . "</{$typ}>"; |
|
285 | + $rs .= "<{$typ}>".($val ? '1' : '0')."</{$typ}>"; |
|
286 | 286 | break; |
287 | 287 | case static::$xmlrpcString: |
288 | 288 | // Do NOT use htmlentities, since it will produce named html entities, which are invalid xml |
289 | - $rs .= "<{$typ}>" . $this->getCharsetEncoder()->encodeEntities($val, PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding) . "</{$typ}>"; |
|
289 | + $rs .= "<{$typ}>".$this->getCharsetEncoder()->encodeEntities($val, PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding)."</{$typ}>"; |
|
290 | 290 | break; |
291 | 291 | case static::$xmlrpcInt: |
292 | 292 | case static::$xmlrpcI4: |
293 | 293 | case static::$xmlrpcI8: |
294 | - $rs .= "<{$typ}>" . (int)$val . "</{$typ}>"; |
|
294 | + $rs .= "<{$typ}>".(int) $val."</{$typ}>"; |
|
295 | 295 | break; |
296 | 296 | case static::$xmlrpcDouble: |
297 | 297 | // avoid using standard conversion of float to string because it is locale-dependent, |
@@ -299,16 +299,16 @@ discard block |
||
299 | 299 | // sprintf('%F') could be most likely ok but it fails eg. on 2e-14. |
300 | 300 | // The code below tries its best at keeping max precision while avoiding exp notation, |
301 | 301 | // but there is of course no limit in the number of decimal places to be used... |
302 | - $rs .= "<{$typ}>" . preg_replace('/\\.?0+$/', '', number_format((double)$val, PhpXmlRpc::$xmlpc_double_precision, '.', '')) . "</{$typ}>"; |
|
302 | + $rs .= "<{$typ}>".preg_replace('/\\.?0+$/', '', number_format((double) $val, PhpXmlRpc::$xmlpc_double_precision, '.', ''))."</{$typ}>"; |
|
303 | 303 | break; |
304 | 304 | case static::$xmlrpcDateTime: |
305 | 305 | if (is_string($val)) { |
306 | 306 | $rs .= "<{$typ}>{$val}</{$typ}>"; |
307 | 307 | // DateTimeInterface is not present in php 5.4... |
308 | 308 | } elseif (is_a($val, 'DateTimeInterface') || is_a($val, 'DateTime')) { |
309 | - $rs .= "<{$typ}>" . $val->format('Ymd\TH:i:s') . "</{$typ}>"; |
|
309 | + $rs .= "<{$typ}>".$val->format('Ymd\TH:i:s')."</{$typ}>"; |
|
310 | 310 | } elseif (is_int($val)) { |
311 | - $rs .= "<{$typ}>" . date('Ymd\TH:i:s', $val) . "</{$typ}>"; |
|
311 | + $rs .= "<{$typ}>".date('Ymd\TH:i:s', $val)."</{$typ}>"; |
|
312 | 312 | } else { |
313 | 313 | // not really a good idea here: but what should we output anyway? left for backward compat... |
314 | 314 | $rs .= "<{$typ}>{$val}</{$typ}>"; |
@@ -330,14 +330,14 @@ discard block |
||
330 | 330 | case 3: |
331 | 331 | // struct |
332 | 332 | if ($this->_php_class) { |
333 | - $rs .= '<struct php_class="' . $this->_php_class . "\">\n"; |
|
333 | + $rs .= '<struct php_class="'.$this->_php_class."\">\n"; |
|
334 | 334 | } else { |
335 | 335 | $rs .= "<struct>\n"; |
336 | 336 | } |
337 | 337 | $charsetEncoder = $this->getCharsetEncoder(); |
338 | 338 | /** @var Value $val2 */ |
339 | 339 | foreach ($val as $key2 => $val2) { |
340 | - $rs .= '<member><name>' . $charsetEncoder->encodeEntities($key2, PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding) . "</name>\n"; |
|
340 | + $rs .= '<member><name>'.$charsetEncoder->encodeEntities($key2, PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding)."</name>\n"; |
|
341 | 341 | //$rs.=$this->serializeval($val2); |
342 | 342 | $rs .= $val2->serialize($charsetEncoding); |
343 | 343 | $rs .= "</member>\n"; |
@@ -373,7 +373,7 @@ discard block |
||
373 | 373 | $val = reset($this->me); |
374 | 374 | $typ = key($this->me); |
375 | 375 | |
376 | - return '<value>' . $this->serializedata($typ, $val, $charsetEncoding) . "</value>\n"; |
|
376 | + return '<value>'.$this->serializedata($typ, $val, $charsetEncoding)."</value>\n"; |
|
377 | 377 | } |
378 | 378 | |
379 | 379 | /** |
@@ -4,7 +4,7 @@ discard block |
||
4 | 4 | * It uses a Berkeley DB database for storage. |
5 | 5 | */ |
6 | 6 | |
7 | -require_once __DIR__ . "/_prepend.php"; |
|
7 | +require_once __DIR__."/_prepend.php"; |
|
8 | 8 | |
9 | 9 | use PhpXmlRpc\Value; |
10 | 10 | |
@@ -35,8 +35,8 @@ discard block |
||
35 | 35 | $count = 0; |
36 | 36 | } |
37 | 37 | // add the new comment in |
38 | - dba_insert($msgID . "_comment_{$count}", $comment, $dbh); |
|
39 | - dba_insert($msgID . "_name_{$count}", $name, $dbh); |
|
38 | + dba_insert($msgID."_comment_{$count}", $comment, $dbh); |
|
39 | + dba_insert($msgID."_name_{$count}", $name, $dbh); |
|
40 | 40 | $count++; |
41 | 41 | dba_replace($countID, $count, $dbh); |
42 | 42 | dba_close($dbh); |
@@ -69,7 +69,7 @@ discard block |
||
69 | 69 | $countID = "{$msgID}_count"; |
70 | 70 | if (dba_exists($countID, $dbh)) { |
71 | 71 | $count = dba_fetch($countID, $dbh); |
72 | - for ($i = 0; $i < $count; $i++) { |
|
72 | + for ($i = 0; $i<$count; $i++) { |
|
73 | 73 | $name = dba_fetch("{$msgID}_name_{$i}", $dbh); |
74 | 74 | $comment = dba_fetch("{$msgID}_comment_{$i}", $dbh); |
75 | 75 | // push a new struct onto the return array |
@@ -1,11 +1,11 @@ discard block |
||
1 | 1 | <?php |
2 | 2 | |
3 | -include_once __DIR__ . '/../lib/xmlrpc.inc'; |
|
4 | -include_once __DIR__ . '/../lib/xmlrpcs.inc'; |
|
3 | +include_once __DIR__.'/../lib/xmlrpc.inc'; |
|
4 | +include_once __DIR__.'/../lib/xmlrpcs.inc'; |
|
5 | 5 | |
6 | -include_once __DIR__ . '/parse_args.php'; |
|
6 | +include_once __DIR__.'/parse_args.php'; |
|
7 | 7 | |
8 | -include_once __DIR__ . '/PolyfillTestCase.php'; |
|
8 | +include_once __DIR__.'/PolyfillTestCase.php'; |
|
9 | 9 | |
10 | 10 | use PHPUnit\Runner\BaseTestRunner; |
11 | 11 | |
@@ -103,7 +103,7 @@ discard block |
||
103 | 103 | |
104 | 104 | public function testI8() |
105 | 105 | { |
106 | - if (PHP_INT_SIZE == 4 ) { |
|
106 | + if (PHP_INT_SIZE == 4) { |
|
107 | 107 | $this->markTestSkipped('Can not test i8 as php is compiled in 32 bit mode'); |
108 | 108 | return; |
109 | 109 | } |
@@ -133,7 +133,7 @@ discard block |
||
133 | 133 | |
134 | 134 | public function testUnicodeInMemberName() |
135 | 135 | { |
136 | - $str = "G" . chr(252) . "nter, El" . chr(232) . "ne"; |
|
136 | + $str = "G".chr(252)."nter, El".chr(232)."ne"; |
|
137 | 137 | $v = array($str => new xmlrpcval(1)); |
138 | 138 | $r = new xmlrpcresp(new xmlrpcval($v, 'struct')); |
139 | 139 | $r = $r->serialize(); |
@@ -150,7 +150,7 @@ discard block |
||
150 | 150 | '<?xml version="1.0"?> |
151 | 151 | <!-- $Id --> |
152 | 152 | <!-- found by G. Giunta, covers what happens when lib receives UTF8 chars in response text and comments --> |
153 | -<!-- ' . chr(224) . chr(252) . chr(232) . 'àüè --> |
|
153 | +<!-- ' . chr(224).chr(252).chr(232).'àüè --> |
|
154 | 154 | <methodResponse> |
155 | 155 | <fault> |
156 | 156 | <value> |
@@ -161,7 +161,7 @@ discard block |
||
161 | 161 | </member> |
162 | 162 | <member> |
163 | 163 | <name>faultString</name> |
164 | -<value><string>' . chr(224) . chr(252) . chr(232) . 'àüè</string></value> |
|
164 | +<value><string>' . chr(224).chr(252).chr(232).'àüè</string></value> |
|
165 | 165 | </member> |
166 | 166 | </struct> |
167 | 167 | </value> |
@@ -170,7 +170,7 @@ discard block |
||
170 | 170 | $m = $this->newMsg('dummy'); |
171 | 171 | $r = $m->parseResponse($response); |
172 | 172 | $v = $r->faultString(); |
173 | - $this->assertEquals(chr(224) . chr(252) . chr(232) . chr(224) . chr(252) . chr(232), $v); |
|
173 | + $this->assertEquals(chr(224).chr(252).chr(232).chr(224).chr(252).chr(232), $v); |
|
174 | 174 | } |
175 | 175 | |
176 | 176 | public function testBrokenRequests() |
@@ -410,11 +410,11 @@ discard block |
||
410 | 410 | |
411 | 411 | public function testUTF8Response() |
412 | 412 | { |
413 | - $string = chr(224) . chr(252) . chr(232); |
|
413 | + $string = chr(224).chr(252).chr(232); |
|
414 | 414 | |
415 | 415 | $s = $this->newMsg('dummy'); |
416 | - $f = "HTTP/1.1 200 OK\r\nContent-type: text/xml; charset=UTF-8\r\n\r\n" . '<?xml version="1.0"?><methodResponse><params><param><value><struct><member><name>userid</name><value>311127</value></member> |
|
417 | -<member><name>dateCreated</name><value><dateTime.iso8601>20011126T09:17:52</dateTime.iso8601></value></member><member><name>content</name><value>' . @utf8_encode($string) . '</value></member><member><name>postid</name><value>7414222</value></member></struct></value></param></params></methodResponse> |
|
416 | + $f = "HTTP/1.1 200 OK\r\nContent-type: text/xml; charset=UTF-8\r\n\r\n".'<?xml version="1.0"?><methodResponse><params><param><value><struct><member><name>userid</name><value>311127</value></member> |
|
417 | +<member><name>dateCreated</name><value><dateTime.iso8601>20011126T09:17:52</dateTime.iso8601></value></member><member><name>content</name><value>' . @utf8_encode($string).'</value></member><member><name>postid</name><value>7414222</value></member></struct></value></param></params></methodResponse> |
|
418 | 418 | '; |
419 | 419 | $r = $s->parseResponse($f, false, 'phpvals'); |
420 | 420 | $v = $r->value(); |
@@ -422,7 +422,7 @@ discard block |
||
422 | 422 | $this->assertEquals($string, $v); |
423 | 423 | |
424 | 424 | $f = '<?xml version="1.0" encoding="UTF-8"?><methodResponse><params><param><value><struct><member><name>userid</name><value>311127</value></member> |
425 | -<member><name>dateCreated</name><value><dateTime.iso8601>20011126T09:17:52</dateTime.iso8601></value></member><member><name>content</name><value>' . @utf8_encode($string) . '</value></member><member><name>postid</name><value>7414222</value></member></struct></value></param></params></methodResponse> |
|
425 | +<member><name>dateCreated</name><value><dateTime.iso8601>20011126T09:17:52</dateTime.iso8601></value></member><member><name>content</name><value>' . @utf8_encode($string).'</value></member><member><name>postid</name><value>7414222</value></member></struct></value></param></params></methodResponse> |
|
426 | 426 | '; |
427 | 427 | $r = $s->parseResponse($f, false, 'phpvals'); |
428 | 428 | $v = $r->value(); |
@@ -438,11 +438,11 @@ discard block |
||
438 | 438 | |
439 | 439 | public function testLatin1Response() |
440 | 440 | { |
441 | - $string = chr(224) . chr(252) . chr(232); |
|
441 | + $string = chr(224).chr(252).chr(232); |
|
442 | 442 | |
443 | 443 | $s = $this->newMsg('dummy'); |
444 | - $f = "HTTP/1.1 200 OK\r\nContent-type: text/xml; charset=ISO-8859-1\r\n\r\n" . '<?xml version="1.0"?><methodResponse><params><param><value><struct><member><name>userid</name><value>311127</value></member> |
|
445 | -<member><name>dateCreated</name><value><dateTime.iso8601>20011126T09:17:52</dateTime.iso8601></value></member><member><name>content</name><value>' . $string . '</value></member><member><name>postid</name><value>7414222</value></member></struct></value></param></params></methodResponse> |
|
444 | + $f = "HTTP/1.1 200 OK\r\nContent-type: text/xml; charset=ISO-8859-1\r\n\r\n".'<?xml version="1.0"?><methodResponse><params><param><value><struct><member><name>userid</name><value>311127</value></member> |
|
445 | +<member><name>dateCreated</name><value><dateTime.iso8601>20011126T09:17:52</dateTime.iso8601></value></member><member><name>content</name><value>' . $string.'</value></member><member><name>postid</name><value>7414222</value></member></struct></value></param></params></methodResponse> |
|
446 | 446 | '; |
447 | 447 | $r = $s->parseResponse($f, false, 'phpvals'); |
448 | 448 | $v = $r->value(); |
@@ -450,7 +450,7 @@ discard block |
||
450 | 450 | $this->assertEquals($string, $v); |
451 | 451 | |
452 | 452 | $f = '<?xml version="1.0" encoding="ISO-8859-1"?><methodResponse><params><param><value><struct><member><name>userid</name><value>311127</value></member> |
453 | -<member><name>dateCreated</name><value><dateTime.iso8601>20011126T09:17:52</dateTime.iso8601></value></member><member><name>content</name><value>' . $string . '</value></member><member><name>postid</name><value>7414222</value></member></struct></value></param></params></methodResponse> |
|
453 | +<member><name>dateCreated</name><value><dateTime.iso8601>20011126T09:17:52</dateTime.iso8601></value></member><member><name>content</name><value>' . $string.'</value></member><member><name>postid</name><value>7414222</value></member></struct></value></param></params></methodResponse> |
|
454 | 454 | '; |
455 | 455 | $r = $s->parseResponse($f, false, 'phpvals'); |
456 | 456 | $v = $r->value(); |
@@ -203,7 +203,7 @@ discard block |
||
203 | 203 | */ |
204 | 204 | public static function xmlrpc_debugmsg($msg) |
205 | 205 | { |
206 | - static::$_xmlrpc_debuginfo .= $msg . "\n"; |
|
206 | + static::$_xmlrpc_debuginfo .= $msg."\n"; |
|
207 | 207 | } |
208 | 208 | |
209 | 209 | /** |
@@ -215,7 +215,7 @@ discard block |
||
215 | 215 | */ |
216 | 216 | public static function error_occurred($msg) |
217 | 217 | { |
218 | - static::$_xmlrpcs_occurred_errors .= $msg . "\n"; |
|
218 | + static::$_xmlrpcs_occurred_errors .= $msg."\n"; |
|
219 | 219 | } |
220 | 220 | |
221 | 221 | /** |
@@ -234,10 +234,10 @@ discard block |
||
234 | 234 | // user debug info should be encoded by the end user using the INTERNAL_ENCODING |
235 | 235 | $out = ''; |
236 | 236 | if ($this->debug_info != '') { |
237 | - $out .= "<!-- SERVER DEBUG INFO (BASE64 ENCODED):\n" . base64_encode($this->debug_info) . "\n-->\n"; |
|
237 | + $out .= "<!-- SERVER DEBUG INFO (BASE64 ENCODED):\n".base64_encode($this->debug_info)."\n-->\n"; |
|
238 | 238 | } |
239 | 239 | if (static::$_xmlrpc_debuginfo != '') { |
240 | - $out .= "<!-- DEBUG INFO:\n" . $this->getCharsetEncoder()->encodeEntities(str_replace('--', '_-', static::$_xmlrpc_debuginfo), PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding) . "\n-->\n"; |
|
240 | + $out .= "<!-- DEBUG INFO:\n".$this->getCharsetEncoder()->encodeEntities(str_replace('--', '_-', static::$_xmlrpc_debuginfo), PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding)."\n-->\n"; |
|
241 | 241 | // NB: a better solution MIGHT be to use CDATA, but we need to insert it |
242 | 242 | // into return payload AFTER the beginning tag |
243 | 243 | //$out .= "<![CDATA[ DEBUG INFO:\n\n" . str_replace(']]>', ']_]_>', static::$_xmlrpc_debuginfo) . "\n]]>\n"; |
@@ -267,8 +267,8 @@ discard block |
||
267 | 267 | $this->debug_info = ''; |
268 | 268 | |
269 | 269 | // Save what we received, before parsing it |
270 | - if ($this->debug > 1) { |
|
271 | - $this->debugmsg("+++GOT+++\n" . $data . "\n+++END+++"); |
|
270 | + if ($this->debug>1) { |
|
271 | + $this->debugmsg("+++GOT+++\n".$data."\n+++END+++"); |
|
272 | 272 | } |
273 | 273 | |
274 | 274 | $r = $this->parseRequestHeaders($data, $reqCharset, $respCharset, $respEncoding); |
@@ -282,21 +282,21 @@ discard block |
||
282 | 282 | $r->raw_data = $rawData; |
283 | 283 | } |
284 | 284 | |
285 | - if ($this->debug > 2 && static::$_xmlrpcs_occurred_errors) { |
|
286 | - $this->debugmsg("+++PROCESSING ERRORS AND WARNINGS+++\n" . |
|
287 | - static::$_xmlrpcs_occurred_errors . "+++END+++"); |
|
285 | + if ($this->debug>2 && static::$_xmlrpcs_occurred_errors) { |
|
286 | + $this->debugmsg("+++PROCESSING ERRORS AND WARNINGS+++\n". |
|
287 | + static::$_xmlrpcs_occurred_errors."+++END+++"); |
|
288 | 288 | } |
289 | 289 | |
290 | 290 | $payload = $this->xml_header($respCharset); |
291 | - if ($this->debug > 0) { |
|
292 | - $payload = $payload . $this->serializeDebug($respCharset); |
|
291 | + if ($this->debug>0) { |
|
292 | + $payload = $payload.$this->serializeDebug($respCharset); |
|
293 | 293 | } |
294 | 294 | |
295 | 295 | // Do not create response serialization if it has already happened. Helps building json magic |
296 | 296 | if (empty($r->payload)) { |
297 | 297 | $r->serialize($respCharset); |
298 | 298 | } |
299 | - $payload = $payload . $r->payload; |
|
299 | + $payload = $payload.$r->payload; |
|
300 | 300 | |
301 | 301 | if ($returnPayload) { |
302 | 302 | return $payload; |
@@ -305,7 +305,7 @@ discard block |
||
305 | 305 | // if we get a warning/error that has output some text before here, then we cannot |
306 | 306 | // add a new header. We cannot say we are sending xml, either... |
307 | 307 | if (!headers_sent()) { |
308 | - header('Content-Type: ' . $r->content_type); |
|
308 | + header('Content-Type: '.$r->content_type); |
|
309 | 309 | // we do not know if client actually told us an accepted charset, but if he did |
310 | 310 | // we have to tell him what we did |
311 | 311 | header("Vary: Accept-Charset"); |
@@ -334,10 +334,10 @@ discard block |
||
334 | 334 | // Note that Apache/mod_php will add (and even alter!) the Content-Length header on its own, but only for |
335 | 335 | // responses up to 8000 bytes |
336 | 336 | if ($phpNoSelfCompress) { |
337 | - header('Content-Length: ' . (int)strlen($payload)); |
|
337 | + header('Content-Length: '.(int) strlen($payload)); |
|
338 | 338 | } |
339 | 339 | } else { |
340 | - $this->getLogger()->errorLog('XML-RPC: ' . __METHOD__ . ': http headers already sent before response is fully generated. Check for php warning or error messages'); |
|
340 | + $this->getLogger()->errorLog('XML-RPC: '.__METHOD__.': http headers already sent before response is fully generated. Check for php warning or error messages'); |
|
341 | 341 | } |
342 | 342 | |
343 | 343 | print $payload; |
@@ -392,9 +392,9 @@ discard block |
||
392 | 392 | $numParams = count($in); |
393 | 393 | } |
394 | 394 | foreach ($sigs as $curSig) { |
395 | - if (count($curSig) == $numParams + 1) { |
|
395 | + if (count($curSig) == $numParams+1) { |
|
396 | 396 | $itsOK = 1; |
397 | - for ($n = 0; $n < $numParams; $n++) { |
|
397 | + for ($n = 0; $n<$numParams; $n++) { |
|
398 | 398 | if (is_object($in)) { |
399 | 399 | $p = $in->getParam($n); |
400 | 400 | if ($p->kindOf() == 'scalar') { |
@@ -407,10 +407,10 @@ discard block |
||
407 | 407 | } |
408 | 408 | |
409 | 409 | // param index is $n+1, as first member of sig is return type |
410 | - if ($pt != $curSig[$n + 1] && $curSig[$n + 1] != Value::$xmlrpcValue) { |
|
410 | + if ($pt != $curSig[$n+1] && $curSig[$n+1] != Value::$xmlrpcValue) { |
|
411 | 411 | $itsOK = 0; |
412 | - $pno = $n + 1; |
|
413 | - $wanted = $curSig[$n + 1]; |
|
412 | + $pno = $n+1; |
|
413 | + $wanted = $curSig[$n+1]; |
|
414 | 414 | $got = $pt; |
415 | 415 | break; |
416 | 416 | } |
@@ -437,10 +437,10 @@ discard block |
||
437 | 437 | // check if $_SERVER is populated: it might have been disabled via ini file |
438 | 438 | // (this is true even when in CLI mode) |
439 | 439 | if (count($_SERVER) == 0) { |
440 | - $this->getLogger()->errorLog('XML-RPC: ' . __METHOD__ . ': cannot parse request headers as $_SERVER is not populated'); |
|
440 | + $this->getLogger()->errorLog('XML-RPC: '.__METHOD__.': cannot parse request headers as $_SERVER is not populated'); |
|
441 | 441 | } |
442 | 442 | |
443 | - if ($this->debug > 1) { |
|
443 | + if ($this->debug>1) { |
|
444 | 444 | if (function_exists('getallheaders')) { |
445 | 445 | $this->debugmsg(''); // empty line |
446 | 446 | foreach (getallheaders() as $name => $val) { |
@@ -464,13 +464,13 @@ discard block |
||
464 | 464 | if (function_exists('gzinflate') && in_array($contentEncoding, $this->accepted_compression)) { |
465 | 465 | if ($contentEncoding == 'deflate' && $degzdata = @gzuncompress($data)) { |
466 | 466 | $data = $degzdata; |
467 | - if ($this->debug > 1) { |
|
468 | - $this->debugmsg("\n+++INFLATED REQUEST+++[" . strlen($data) . " chars]+++\n" . $data . "\n+++END+++"); |
|
467 | + if ($this->debug>1) { |
|
468 | + $this->debugmsg("\n+++INFLATED REQUEST+++[".strlen($data)." chars]+++\n".$data."\n+++END+++"); |
|
469 | 469 | } |
470 | 470 | } elseif ($contentEncoding == 'gzip' && $degzdata = @gzinflate(substr($data, 10))) { |
471 | 471 | $data = $degzdata; |
472 | - if ($this->debug > 1) { |
|
473 | - $this->debugmsg("+++INFLATED REQUEST+++[" . strlen($data) . " chars]+++\n" . $data . "\n+++END+++"); |
|
472 | + if ($this->debug>1) { |
|
473 | + $this->debugmsg("+++INFLATED REQUEST+++[".strlen($data)." chars]+++\n".$data."\n+++END+++"); |
|
474 | 474 | } |
475 | 475 | } else { |
476 | 476 | $r = new Response(0, PhpXmlRpc::$xmlrpcerr['server_decompress_fail'], |
@@ -564,7 +564,7 @@ discard block |
||
564 | 564 | if ($reqEncoding == 'ISO-8859-1') { |
565 | 565 | $data = utf8_encode($data); |
566 | 566 | } else { |
567 | - $this->getLogger()->errorLog('XML-RPC: ' . __METHOD__ . ': invalid charset encoding of received request: ' . $reqEncoding); |
|
567 | + $this->getLogger()->errorLog('XML-RPC: '.__METHOD__.': invalid charset encoding of received request: '.$reqEncoding); |
|
568 | 568 | } |
569 | 569 | } |
570 | 570 | } |
@@ -583,16 +583,16 @@ discard block |
||
583 | 583 | |
584 | 584 | $xmlRpcParser = $this->getParser(); |
585 | 585 | $xmlRpcParser->parse($data, $this->functions_parameters_type, XMLParser::ACCEPT_REQUEST, $options); |
586 | - if ($xmlRpcParser->_xh['isf'] > 2) { |
|
586 | + if ($xmlRpcParser->_xh['isf']>2) { |
|
587 | 587 | // (BC) we return XML error as a faultCode |
588 | 588 | preg_match('/^XML error ([0-9]+)/', $xmlRpcParser->_xh['isf_reason'], $matches); |
589 | 589 | $r = new Response(0, |
590 | - PhpXmlRpc::$xmlrpcerrxml + $matches[1], |
|
590 | + PhpXmlRpc::$xmlrpcerrxml+$matches[1], |
|
591 | 591 | $xmlRpcParser->_xh['isf_reason']); |
592 | 592 | } elseif ($xmlRpcParser->_xh['isf']) { |
593 | 593 | $r = new Response(0, |
594 | 594 | PhpXmlRpc::$xmlrpcerr['invalid_request'], |
595 | - PhpXmlRpc::$xmlrpcstr['invalid_request'] . ' ' . $xmlRpcParser->_xh['isf_reason']); |
|
595 | + PhpXmlRpc::$xmlrpcstr['invalid_request'].' '.$xmlRpcParser->_xh['isf_reason']); |
|
596 | 596 | } else { |
597 | 597 | // small layering violation in favor of speed and memory usage: |
598 | 598 | // we should allow the 'execute' method handle this, but in the |
@@ -603,20 +603,20 @@ discard block |
||
603 | 603 | ($this->dmap[$xmlRpcParser->_xh['method']]['parameters_type'] != 'xmlrpcvals') |
604 | 604 | ) |
605 | 605 | ) { |
606 | - if ($this->debug > 1) { |
|
607 | - $this->debugmsg("\n+++PARSED+++\n" . var_export($xmlRpcParser->_xh['params'], true) . "\n+++END+++"); |
|
606 | + if ($this->debug>1) { |
|
607 | + $this->debugmsg("\n+++PARSED+++\n".var_export($xmlRpcParser->_xh['params'], true)."\n+++END+++"); |
|
608 | 608 | } |
609 | 609 | $r = $this->execute($xmlRpcParser->_xh['method'], $xmlRpcParser->_xh['params'], $xmlRpcParser->_xh['pt']); |
610 | 610 | } else { |
611 | 611 | // build a Request object with data parsed from xml |
612 | 612 | $req = new Request($xmlRpcParser->_xh['method']); |
613 | 613 | // now add parameters in |
614 | - for ($i = 0; $i < count($xmlRpcParser->_xh['params']); $i++) { |
|
614 | + for ($i = 0; $i<count($xmlRpcParser->_xh['params']); $i++) { |
|
615 | 615 | $req->addParam($xmlRpcParser->_xh['params'][$i]); |
616 | 616 | } |
617 | 617 | |
618 | - if ($this->debug > 1) { |
|
619 | - $this->debugmsg("\n+++PARSED+++\n" . var_export($req, true) . "\n+++END+++"); |
|
618 | + if ($this->debug>1) { |
|
619 | + $this->debugmsg("\n+++PARSED+++\n".var_export($req, true)."\n+++END+++"); |
|
620 | 620 | } |
621 | 621 | $r = $this->execute($req); |
622 | 622 | } |
@@ -669,7 +669,7 @@ discard block |
||
669 | 669 | return new Response( |
670 | 670 | 0, |
671 | 671 | PhpXmlRpc::$xmlrpcerr['incorrect_params'], |
672 | - PhpXmlRpc::$xmlrpcstr['incorrect_params'] . ": {$errStr}" |
|
672 | + PhpXmlRpc::$xmlrpcstr['incorrect_params'].": {$errStr}" |
|
673 | 673 | ); |
674 | 674 | } |
675 | 675 | } |
@@ -682,7 +682,7 @@ discard block |
||
682 | 682 | |
683 | 683 | if (is_array($func)) { |
684 | 684 | if (is_object($func[0])) { |
685 | - $funcName = get_class($func[0]) . '->' . $func[1]; |
|
685 | + $funcName = get_class($func[0]).'->'.$func[1]; |
|
686 | 686 | } else { |
687 | 687 | $funcName = implode('::', $func); |
688 | 688 | } |
@@ -694,17 +694,17 @@ discard block |
||
694 | 694 | |
695 | 695 | // verify that function to be invoked is in fact callable |
696 | 696 | if (!is_callable($func)) { |
697 | - $this->getLogger()->errorLog("XML-RPC: " . __METHOD__ . ": function '$funcName' registered as method handler is not callable"); |
|
697 | + $this->getLogger()->errorLog("XML-RPC: ".__METHOD__.": function '$funcName' registered as method handler is not callable"); |
|
698 | 698 | return new Response( |
699 | 699 | 0, |
700 | 700 | PhpXmlRpc::$xmlrpcerr['server_error'], |
701 | - PhpXmlRpc::$xmlrpcstr['server_error'] . ": no function matches method" |
|
701 | + PhpXmlRpc::$xmlrpcstr['server_error'].": no function matches method" |
|
702 | 702 | ); |
703 | 703 | } |
704 | 704 | |
705 | 705 | // If debug level is 3, we should catch all errors generated during |
706 | 706 | // processing of user function, and log them as part of response |
707 | - if ($this->debug > 2) { |
|
707 | + if ($this->debug>2) { |
|
708 | 708 | self::$_xmlrpcs_prev_ehandler = set_error_handler(array('\PhpXmlRpc\Server', '_xmlrpcs_errorHandler')); |
709 | 709 | } |
710 | 710 | |
@@ -717,14 +717,14 @@ discard block |
||
717 | 717 | $r = call_user_func($func, $req); |
718 | 718 | } |
719 | 719 | if (!is_a($r, 'PhpXmlRpc\Response')) { |
720 | - $this->getLogger()->errorLog("XML-RPC: " . __METHOD__ . ": function '$funcName' registered as method handler does not return an xmlrpc response object but a " . gettype($r)); |
|
720 | + $this->getLogger()->errorLog("XML-RPC: ".__METHOD__.": function '$funcName' registered as method handler does not return an xmlrpc response object but a ".gettype($r)); |
|
721 | 721 | if (is_a($r, 'PhpXmlRpc\Value')) { |
722 | 722 | $r = new Response($r); |
723 | 723 | } else { |
724 | 724 | $r = new Response( |
725 | 725 | 0, |
726 | 726 | PhpXmlRpc::$xmlrpcerr['server_error'], |
727 | - PhpXmlRpc::$xmlrpcstr['server_error'] . ": function does not return xmlrpc response object" |
|
727 | + PhpXmlRpc::$xmlrpcstr['server_error'].": function does not return xmlrpc response object" |
|
728 | 728 | ); |
729 | 729 | } |
730 | 730 | } |
@@ -740,7 +740,7 @@ discard block |
||
740 | 740 | // mimic EPI behaviour: if we get an array that looks like an error, make it |
741 | 741 | // an error response |
742 | 742 | if (is_array($r) && array_key_exists('faultCode', $r) && array_key_exists('faultString', $r)) { |
743 | - $r = new Response(0, (integer)$r['faultCode'], (string)$r['faultString']); |
|
743 | + $r = new Response(0, (integer) $r['faultCode'], (string) $r['faultString']); |
|
744 | 744 | } else { |
745 | 745 | // functions using EPI api should NOT return resp objects, |
746 | 746 | // so make sure we encode the return type correctly |
@@ -764,7 +764,7 @@ discard block |
||
764 | 764 | // in the called function, we wrap it in a proper error-response |
765 | 765 | switch ($this->exception_handling) { |
766 | 766 | case 2: |
767 | - if ($this->debug > 2) { |
|
767 | + if ($this->debug>2) { |
|
768 | 768 | if (self::$_xmlrpcs_prev_ehandler) { |
769 | 769 | set_error_handler(self::$_xmlrpcs_prev_ehandler); |
770 | 770 | } else { |
@@ -779,7 +779,7 @@ discard block |
||
779 | 779 | $r = new Response(0, PhpXmlRpc::$xmlrpcerr['server_error'], PhpXmlRpc::$xmlrpcstr['server_error']); |
780 | 780 | } |
781 | 781 | } |
782 | - if ($this->debug > 2) { |
|
782 | + if ($this->debug>2) { |
|
783 | 783 | // note: restore the error handler we found before calling the |
784 | 784 | // user func, even if it has been changed inside the func itself |
785 | 785 | if (self::$_xmlrpcs_prev_ehandler) { |
@@ -799,7 +799,7 @@ discard block |
||
799 | 799 | */ |
800 | 800 | protected function debugmsg($string) |
801 | 801 | { |
802 | - $this->debug_info .= $string . "\n"; |
|
802 | + $this->debug_info .= $string."\n"; |
|
803 | 803 | } |
804 | 804 | |
805 | 805 | /** |
@@ -809,9 +809,9 @@ discard block |
||
809 | 809 | protected function xml_header($charsetEncoding = '') |
810 | 810 | { |
811 | 811 | if ($charsetEncoding != '') { |
812 | - return "<?xml version=\"1.0\" encoding=\"$charsetEncoding\"?" . ">\n"; |
|
812 | + return "<?xml version=\"1.0\" encoding=\"$charsetEncoding\"?".">\n"; |
|
813 | 813 | } else { |
814 | - return "<?xml version=\"1.0\"?" . ">\n"; |
|
814 | + return "<?xml version=\"1.0\"?".">\n"; |
|
815 | 815 | } |
816 | 816 | } |
817 | 817 | |
@@ -1068,7 +1068,7 @@ discard block |
||
1068 | 1068 | $i++; // for error message, we count params from 1 |
1069 | 1069 | return static::_xmlrpcs_multicall_error(new Response(0, |
1070 | 1070 | PhpXmlRpc::$xmlrpcerr['incorrect_params'], |
1071 | - PhpXmlRpc::$xmlrpcstr['incorrect_params'] . ": probable xml error in param " . $i)); |
|
1071 | + PhpXmlRpc::$xmlrpcstr['incorrect_params'].": probable xml error in param ".$i)); |
|
1072 | 1072 | } |
1073 | 1073 | } |
1074 | 1074 | |
@@ -1145,7 +1145,7 @@ discard block |
||
1145 | 1145 | } |
1146 | 1146 | } else { |
1147 | 1147 | $numCalls = count($req); |
1148 | - for ($i = 0; $i < $numCalls; $i++) { |
|
1148 | + for ($i = 0; $i<$numCalls; $i++) { |
|
1149 | 1149 | $result[$i] = static::_xmlrpcs_multicall_do_call_phpvals($server, $req[$i]); |
1150 | 1150 | } |
1151 | 1151 | } |
@@ -76,13 +76,13 @@ discard block |
||
76 | 76 | 'scalar' => $val, |
77 | 77 | 'timestamp' => \PhpXmlRpc\Helper\Date::iso8601Decode($val) |
78 | 78 | ); |
79 | - return (object)$xmlrpcVal; |
|
79 | + return (object) $xmlrpcVal; |
|
80 | 80 | case 'base64': |
81 | 81 | $xmlrpcVal = array( |
82 | 82 | 'xmlrpc_type' => 'base64', |
83 | 83 | 'scalar' => $val |
84 | 84 | ); |
85 | - return (object)$xmlrpcVal; |
|
85 | + return (object) $xmlrpcVal; |
|
86 | 86 | case 'string': |
87 | 87 | if (isset($options['extension_api_encoding'])) { |
88 | 88 | $dval = @iconv('UTF-8', $options['extension_api_encoding'], $val); |
@@ -145,7 +145,7 @@ discard block |
||
145 | 145 | case 'msg': |
146 | 146 | $paramCount = $xmlrpcVal->getNumParams(); |
147 | 147 | $arr = array(); |
148 | - for ($i = 0; $i < $paramCount; $i++) { |
|
148 | + for ($i = 0; $i<$paramCount; $i++) { |
|
149 | 149 | $arr[] = $this->decode($xmlrpcVal->getParam($i), $options); |
150 | 150 | } |
151 | 151 | return $arr; |
@@ -262,7 +262,7 @@ discard block |
||
262 | 262 | break; |
263 | 263 | case 'resource': |
264 | 264 | if (in_array('extension_api', $options)) { |
265 | - $xmlrpcVal = new Value((int)$phpVal, Value::$xmlrpcInt); |
|
265 | + $xmlrpcVal = new Value((int) $phpVal, Value::$xmlrpcInt); |
|
266 | 266 | } else { |
267 | 267 | $xmlrpcVal = new Value(); |
268 | 268 | } |
@@ -310,7 +310,7 @@ discard block |
||
310 | 310 | if ($valEncoding == 'ISO-8859-1') { |
311 | 311 | $xmlVal = utf8_encode($xmlVal); |
312 | 312 | } else { |
313 | - $this->getLogger()->errorLog('XML-RPC: ' . __METHOD__ . ': invalid charset encoding of xml text: ' . $valEncoding); |
|
313 | + $this->getLogger()->errorLog('XML-RPC: '.__METHOD__.': invalid charset encoding of xml text: '.$valEncoding); |
|
314 | 314 | } |
315 | 315 | } |
316 | 316 | } |
@@ -332,7 +332,7 @@ discard block |
||
332 | 332 | $parserOptions |
333 | 333 | ); |
334 | 334 | |
335 | - if ($xmlRpcParser->_xh['isf'] > 1) { |
|
335 | + if ($xmlRpcParser->_xh['isf']>1) { |
|
336 | 336 | // test that $xmlrpc->_xh['value'] is an obj, too??? |
337 | 337 | |
338 | 338 | $this->getLogger()->errorLog($xmlRpcParser->_xh['isf_reason']); |
@@ -356,7 +356,7 @@ discard block |
||
356 | 356 | |
357 | 357 | case 'methodcall': |
358 | 358 | $req = new Request($xmlRpcParser->_xh['method']); |
359 | - for ($i = 0; $i < count($xmlRpcParser->_xh['params']); $i++) { |
|
359 | + for ($i = 0; $i<count($xmlRpcParser->_xh['params']); $i++) { |
|
360 | 360 | $req->addParam($xmlRpcParser->_xh['params'][$i]); |
361 | 361 | } |
362 | 362 | return $req; |