@@ -7,7 +7,7 @@ discard block |
||
| 7 | 7 | // In case this file is made available on an open-access server, avoid it being useable by anyone who can not also |
| 8 | 8 | // write a specific file to disk. |
| 9 | 9 | // NB: keep filename, cookie name in sync with the code within the TestCase classes sending http requests to this file |
| 10 | -$idFile = sys_get_temp_dir() . '/phpunit_rand_id.txt'; |
|
| 10 | +$idFile = sys_get_temp_dir().'/phpunit_rand_id.txt'; |
|
| 11 | 11 | $randId = isset($_COOKIE['PHPUNIT_RANDOM_TEST_ID']) ? $_COOKIE['PHPUNIT_RANDOM_TEST_ID'] : ''; |
| 12 | 12 | $fileId = file_exists($idFile) ? file_get_contents($idFile) : ''; |
| 13 | 13 | if ($randId == '' || $fileId == '' || $fileId !== $randId) { |
@@ -31,7 +31,7 @@ discard block |
||
| 31 | 31 | chmod($GLOBALS['PHPUNIT_COVERAGE_DATA_DIRECTORY'], 0777); |
| 32 | 32 | } |
| 33 | 33 | |
| 34 | - include_once __DIR__ . "/../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/prepend.php"; |
|
| 34 | + include_once __DIR__."/../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/prepend.php"; |
|
| 35 | 35 | } |
| 36 | 36 | |
| 37 | 37 | $targetFile = null; |
@@ -54,5 +54,5 @@ discard block |
||
| 54 | 54 | } |
| 55 | 55 | |
| 56 | 56 | if (isset($_COOKIE['PHPUNIT_SELENIUM_TEST_ID']) && extension_loaded('xdebug')) { |
| 57 | - include_once __DIR__ . "/../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/append.php"; |
|
| 57 | + include_once __DIR__."/../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/append.php"; |
|
| 58 | 58 | } |
@@ -46,7 +46,7 @@ discard block |
||
| 46 | 46 | // check for command line params (passed as env vars) vs. web page input params (passed as GET/POST) |
| 47 | 47 | // Note that the only use-case for web-page mode is when this is used by benchmark.php |
| 48 | 48 | if (!isset($_SERVER['REQUEST_METHOD'])) { |
| 49 | - foreach($_SERVER as $key => $val) { |
|
| 49 | + foreach ($_SERVER as $key => $val) { |
|
| 50 | 50 | if (array_key_exists($key, $args)) { |
| 51 | 51 | $$key = $val; |
| 52 | 52 | } |
@@ -91,7 +91,7 @@ discard block |
||
| 91 | 91 | //} |
| 92 | 92 | } |
| 93 | 93 | if ($HTTPURI[0] != '/') { |
| 94 | - $HTTPURI = '/' . $HTTPURI; |
|
| 94 | + $HTTPURI = '/'.$HTTPURI; |
|
| 95 | 95 | } |
| 96 | 96 | $args['HTTPURI'] = $HTTPURI; |
| 97 | 97 | |
@@ -105,21 +105,21 @@ discard block |
||
| 105 | 105 | } |
| 106 | 106 | |
| 107 | 107 | if (isset($HTTPSIGNOREPEER)) { |
| 108 | - $args['HTTPSIGNOREPEER'] = (bool)$HTTPSIGNOREPEER; |
|
| 108 | + $args['HTTPSIGNOREPEER'] = (bool) $HTTPSIGNOREPEER; |
|
| 109 | 109 | } |
| 110 | 110 | |
| 111 | 111 | if (isset($HTTPSVERIFYHOST)) { |
| 112 | - $args['HTTPSVERIFYHOST'] = (int)$HTTPSVERIFYHOST; |
|
| 112 | + $args['HTTPSVERIFYHOST'] = (int) $HTTPSVERIFYHOST; |
|
| 113 | 113 | } |
| 114 | 114 | |
| 115 | 115 | if (isset($SSLVERSION)) { |
| 116 | - $args['SSLVERSION'] = (int)$SSLVERSION; |
|
| 116 | + $args['SSLVERSION'] = (int) $SSLVERSION; |
|
| 117 | 117 | } |
| 118 | 118 | |
| 119 | 119 | if (isset($PROXYSERVER)) { |
| 120 | 120 | $arr = explode(':', $PROXYSERVER); |
| 121 | 121 | $args['PROXYSERVER'] = $arr[0]; |
| 122 | - if (count($arr) > 1) { |
|
| 122 | + if (count($arr)>1) { |
|
| 123 | 123 | $args['PROXYPORT'] = $arr[1]; |
| 124 | 124 | } else { |
| 125 | 125 | $args['PROXYPORT'] = 8080; |
@@ -5,8 +5,8 @@ |
||
| 5 | 5 | * It mimics server.php, but does not rely on other autoload mechanisms than the loading of xmlrpc.inc and xmlrpcs.inc |
| 6 | 6 | */ |
| 7 | 7 | |
| 8 | -require_once __DIR__ . "/../../lib/xmlrpc.inc"; |
|
| 9 | -require_once __DIR__ . "/../../lib/xmlrpcs.inc"; |
|
| 8 | +require_once __DIR__."/../../lib/xmlrpc.inc"; |
|
| 9 | +require_once __DIR__."/../../lib/xmlrpcs.inc"; |
|
| 10 | 10 | |
| 11 | 11 | $signatures1 = include(__DIR__.'/methodProviders/functions.php'); |
| 12 | 12 | $signatures2 = include(__DIR__.'/methodProviders/interop.php'); |
@@ -4,15 +4,15 @@ discard block |
||
| 4 | 4 | * A test file designed to test the legacy API class-loading mechanism, ie. not using phpunit/composer's autoload_ |
| 5 | 5 | */ |
| 6 | 6 | |
| 7 | -include_once __DIR__ . '/../lib/xmlrpc.inc'; |
|
| 7 | +include_once __DIR__.'/../lib/xmlrpc.inc'; |
|
| 8 | 8 | |
| 9 | -include_once __DIR__ . '/parse_args.php'; |
|
| 9 | +include_once __DIR__.'/parse_args.php'; |
|
| 10 | 10 | |
| 11 | 11 | $args = argParser::getArgs(); |
| 12 | -$baseurl = 'http://' . $args['HTTPSERVER'] . str_replace('/server.php', '/legacy.php', $args['HTTPURI']); |
|
| 12 | +$baseurl = 'http://'.$args['HTTPSERVER'].str_replace('/server.php', '/legacy.php', $args['HTTPURI']); |
|
| 13 | 13 | |
| 14 | 14 | $randId = uniqid(); |
| 15 | -file_put_contents(sys_get_temp_dir() . '/phpunit_rand_id.txt', $randId); |
|
| 15 | +file_put_contents(sys_get_temp_dir().'/phpunit_rand_id.txt', $randId); |
|
| 16 | 16 | |
| 17 | 17 | $client = new xmlrpc_client($baseurl); |
| 18 | 18 | $client->setCookie('PHPUNIT_RANDOM_TEST_ID', $randId); |
@@ -20,7 +20,7 @@ discard block |
||
| 20 | 20 | $req = new xmlrpcmsg('system.listMethods', array()); |
| 21 | 21 | $resp = $client->send($req); |
| 22 | 22 | if ($resp->faultCode() !== 0) { |
| 23 | - throw new \Exception("system.listMethods returned fault " . $resp->faultCode()); |
|
| 23 | + throw new \Exception("system.listMethods returned fault ".$resp->faultCode()); |
|
| 24 | 24 | } |
| 25 | 25 | |
| 26 | -unlink(sys_get_temp_dir() . '/phpunit_rand_id.txt'); |
|
| 26 | +unlink(sys_get_temp_dir().'/phpunit_rand_id.txt'); |
|
@@ -1,6 +1,6 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -include_once __DIR__ . '/ServerAwareTestCase.php'; |
|
| 3 | +include_once __DIR__.'/ServerAwareTestCase.php'; |
|
| 4 | 4 | |
| 5 | 5 | /** |
| 6 | 6 | * Long-term, this should replace all testing of the legacy API done via the main test-suite... |
@@ -11,7 +11,7 @@ discard block |
||
| 11 | 11 | { |
| 12 | 12 | /// @todo pass on as cli args for the executed script all the args that are already parsed by now, plus $this->testId |
| 13 | 13 | |
| 14 | - exec('php ' . __DIR__ . '/legacy_loader_test.php', $out, $result); |
|
| 14 | + exec('php '.__DIR__.'/legacy_loader_test.php', $out, $result); |
|
| 15 | 15 | |
| 16 | 16 | /// @todo dump output if in debug mode or if test fails |
| 17 | 17 | |
@@ -251,7 +251,7 @@ discard block |
||
| 251 | 251 | public function getOptions() |
| 252 | 252 | { |
| 253 | 253 | $values = array(); |
| 254 | - foreach(static::$options as $opt) { |
|
| 254 | + foreach (static::$options as $opt) { |
|
| 255 | 255 | $values[$opt] = $this->getOption($opt); |
| 256 | 256 | } |
| 257 | 257 | return $values; |
@@ -264,7 +264,7 @@ discard block |
||
| 264 | 264 | */ |
| 265 | 265 | public function setOptions($options) |
| 266 | 266 | { |
| 267 | - foreach($options as $name => $value) { |
|
| 267 | + foreach ($options as $name => $value) { |
|
| 268 | 268 | $this->setOption($name, $value); |
| 269 | 269 | } |
| 270 | 270 | |
@@ -302,7 +302,7 @@ discard block |
||
| 302 | 302 | */ |
| 303 | 303 | public static function xmlrpc_debugmsg($msg) |
| 304 | 304 | { |
| 305 | - static::$_xmlrpc_debuginfo .= $msg . "\n"; |
|
| 305 | + static::$_xmlrpc_debuginfo .= $msg."\n"; |
|
| 306 | 306 | } |
| 307 | 307 | |
| 308 | 308 | /** |
@@ -314,7 +314,7 @@ discard block |
||
| 314 | 314 | */ |
| 315 | 315 | public static function error_occurred($msg) |
| 316 | 316 | { |
| 317 | - static::$_xmlrpcs_occurred_errors .= $msg . "\n"; |
|
| 317 | + static::$_xmlrpcs_occurred_errors .= $msg."\n"; |
|
| 318 | 318 | } |
| 319 | 319 | |
| 320 | 320 | /** |
@@ -335,10 +335,10 @@ discard block |
||
| 335 | 335 | // user debug info should be encoded by the end user using the INTERNAL_ENCODING |
| 336 | 336 | $out = ''; |
| 337 | 337 | if ($this->debug_info != '') { |
| 338 | - $out .= "<!-- SERVER DEBUG INFO (BASE64 ENCODED):\n" . base64_encode($this->debug_info) . "\n-->\n"; |
|
| 338 | + $out .= "<!-- SERVER DEBUG INFO (BASE64 ENCODED):\n".base64_encode($this->debug_info)."\n-->\n"; |
|
| 339 | 339 | } |
| 340 | 340 | if (static::$_xmlrpc_debuginfo != '') { |
| 341 | - $out .= "<!-- DEBUG INFO:\n" . $this->getCharsetEncoder()->encodeEntities(str_replace('--', '_-', static::$_xmlrpc_debuginfo), PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding) . "\n-->\n"; |
|
| 341 | + $out .= "<!-- DEBUG INFO:\n".$this->getCharsetEncoder()->encodeEntities(str_replace('--', '_-', static::$_xmlrpc_debuginfo), PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding)."\n-->\n"; |
|
| 342 | 342 | // NB: a better solution MIGHT be to use CDATA, but we need to insert it |
| 343 | 343 | // into return payload AFTER the beginning tag |
| 344 | 344 | //$out .= "<![CDATA[ DEBUG INFO:\n\n" . str_replace(']]>', ']_]_>', static::$_xmlrpc_debuginfo) . "\n]]>\n"; |
@@ -367,8 +367,8 @@ discard block |
||
| 367 | 367 | $this->debug_info = ''; |
| 368 | 368 | |
| 369 | 369 | // Save what we received, before parsing it |
| 370 | - if ($this->debug > 1) { |
|
| 371 | - $this->debugMsg("+++GOT+++\n" . $data . "\n+++END+++"); |
|
| 370 | + if ($this->debug>1) { |
|
| 371 | + $this->debugMsg("+++GOT+++\n".$data."\n+++END+++"); |
|
| 372 | 372 | } |
| 373 | 373 | |
| 374 | 374 | $resp = $this->parseRequestHeaders($data, $reqCharset, $respCharset, $respEncoding); |
@@ -385,13 +385,13 @@ discard block |
||
| 385 | 385 | $resp->raw_data = $rawData; |
| 386 | 386 | } |
| 387 | 387 | |
| 388 | - if ($this->debug > 2 && static::$_xmlrpcs_occurred_errors != '') { |
|
| 389 | - $this->debugMsg("+++PROCESSING ERRORS AND WARNINGS+++\n" . |
|
| 390 | - static::$_xmlrpcs_occurred_errors . "+++END+++"); |
|
| 388 | + if ($this->debug>2 && static::$_xmlrpcs_occurred_errors != '') { |
|
| 389 | + $this->debugMsg("+++PROCESSING ERRORS AND WARNINGS+++\n". |
|
| 390 | + static::$_xmlrpcs_occurred_errors."+++END+++"); |
|
| 391 | 391 | } |
| 392 | 392 | |
| 393 | 393 | $header = $resp->xml_header($respCharset); |
| 394 | - if ($this->debug > 0) { |
|
| 394 | + if ($this->debug>0) { |
|
| 395 | 395 | $header .= $this->serializeDebug($respCharset); |
| 396 | 396 | } |
| 397 | 397 | |
@@ -402,7 +402,7 @@ discard block |
||
| 402 | 402 | if (empty($payload)) { |
| 403 | 403 | $payload = $resp->serialize($respCharset); |
| 404 | 404 | } |
| 405 | - $payload = $header . $payload; |
|
| 405 | + $payload = $header.$payload; |
|
| 406 | 406 | |
| 407 | 407 | if ($returnPayload) { |
| 408 | 408 | return $payload; |
@@ -411,7 +411,7 @@ discard block |
||
| 411 | 411 | // if we get a warning/error that has output some text before here, then we cannot |
| 412 | 412 | // add a new header. We cannot say we are sending xml, either... |
| 413 | 413 | if (!headers_sent()) { |
| 414 | - header('Content-Type: ' . $resp->getContentType()); |
|
| 414 | + header('Content-Type: '.$resp->getContentType()); |
|
| 415 | 415 | // we do not know if client actually told us an accepted charset, but if it did we have to tell it what we did |
| 416 | 416 | header("Vary: Accept-Charset"); |
| 417 | 417 | |
@@ -434,10 +434,10 @@ discard block |
||
| 434 | 434 | // Note that Apache/mod_php will add (and even alter!) the Content-Length header on its own, but only for |
| 435 | 435 | // responses up to 8000 bytes |
| 436 | 436 | if ($phpNoSelfCompress) { |
| 437 | - header('Content-Length: ' . (int)strlen($payload)); |
|
| 437 | + header('Content-Length: '.(int) strlen($payload)); |
|
| 438 | 438 | } |
| 439 | 439 | } else { |
| 440 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': http headers already sent before response is fully generated. Check for php warning or error messages'); |
|
| 440 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.': http headers already sent before response is fully generated. Check for php warning or error messages'); |
|
| 441 | 441 | } |
| 442 | 442 | |
| 443 | 443 | print $payload; |
@@ -526,9 +526,9 @@ discard block |
||
| 526 | 526 | $numParams = count($in); |
| 527 | 527 | } |
| 528 | 528 | foreach ($sigs as $curSig) { |
| 529 | - if (count($curSig) == $numParams + 1) { |
|
| 529 | + if (count($curSig) == $numParams+1) { |
|
| 530 | 530 | $itsOK = 1; |
| 531 | - for ($n = 0; $n < $numParams; $n++) { |
|
| 531 | + for ($n = 0; $n<$numParams; $n++) { |
|
| 532 | 532 | if (is_object($in)) { |
| 533 | 533 | $p = $in->getParam($n); |
| 534 | 534 | if ($p->kindOf() == 'scalar') { |
@@ -541,10 +541,10 @@ discard block |
||
| 541 | 541 | } |
| 542 | 542 | |
| 543 | 543 | // param index is $n+1, as first member of sig is return type |
| 544 | - if ($pt != $curSig[$n + 1] && $curSig[$n + 1] != Value::$xmlrpcValue) { |
|
| 544 | + if ($pt != $curSig[$n+1] && $curSig[$n+1] != Value::$xmlrpcValue) { |
|
| 545 | 545 | $itsOK = 0; |
| 546 | - $pno = $n + 1; |
|
| 547 | - $wanted = $curSig[$n + 1]; |
|
| 546 | + $pno = $n+1; |
|
| 547 | + $wanted = $curSig[$n+1]; |
|
| 548 | 548 | $got = $pt; |
| 549 | 549 | break; |
| 550 | 550 | } |
@@ -571,10 +571,10 @@ discard block |
||
| 571 | 571 | // check if $_SERVER is populated: it might have been disabled via ini file |
| 572 | 572 | // (this is true even when in CLI mode) |
| 573 | 573 | if (count($_SERVER) == 0) { |
| 574 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': cannot parse request headers as $_SERVER is not populated'); |
|
| 574 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.': cannot parse request headers as $_SERVER is not populated'); |
|
| 575 | 575 | } |
| 576 | 576 | |
| 577 | - if ($this->debug > 1) { |
|
| 577 | + if ($this->debug>1) { |
|
| 578 | 578 | if (function_exists('getallheaders')) { |
| 579 | 579 | $this->debugMsg(''); // empty line |
| 580 | 580 | foreach (getallheaders() as $name => $val) { |
@@ -599,13 +599,13 @@ discard block |
||
| 599 | 599 | if (function_exists('gzinflate') && in_array($contentEncoding, $this->accepted_compression)) { |
| 600 | 600 | if ($contentEncoding == 'deflate' && $degzdata = @gzuncompress($data)) { |
| 601 | 601 | $data = $degzdata; |
| 602 | - if ($this->debug > 1) { |
|
| 603 | - $this->debugMsg("\n+++INFLATED REQUEST+++[" . strlen($data) . " chars]+++\n" . $data . "\n+++END+++"); |
|
| 602 | + if ($this->debug>1) { |
|
| 603 | + $this->debugMsg("\n+++INFLATED REQUEST+++[".strlen($data)." chars]+++\n".$data."\n+++END+++"); |
|
| 604 | 604 | } |
| 605 | 605 | } elseif ($contentEncoding == 'gzip' && $degzdata = @gzinflate(substr($data, 10))) { |
| 606 | 606 | $data = $degzdata; |
| 607 | - if ($this->debug > 1) { |
|
| 608 | - $this->debugMsg("+++INFLATED REQUEST+++[" . strlen($data) . " chars]+++\n" . $data . "\n+++END+++"); |
|
| 607 | + if ($this->debug>1) { |
|
| 608 | + $this->debugMsg("+++INFLATED REQUEST+++[".strlen($data)." chars]+++\n".$data."\n+++END+++"); |
|
| 609 | 609 | } |
| 610 | 610 | } else { |
| 611 | 611 | $r = new static::$responseClass(0, PhpXmlRpc::$xmlrpcerr['server_decompress_fail'], |
@@ -693,7 +693,7 @@ discard block |
||
| 693 | 693 | if ($reqEncoding == 'ISO-8859-1') { |
| 694 | 694 | $data = utf8_encode($data); |
| 695 | 695 | } else { |
| 696 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': unsupported charset encoding of received request: ' . $reqEncoding); |
|
| 696 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.': unsupported charset encoding of received request: '.$reqEncoding); |
|
| 697 | 697 | } |
| 698 | 698 | } |
| 699 | 699 | } |
@@ -724,7 +724,7 @@ discard block |
||
| 724 | 724 | preg_match('/^XML error ([0-9]+)/', $_xh['isf_reason'], $matches); |
| 725 | 725 | return new static::$responseClass( |
| 726 | 726 | 0, |
| 727 | - PhpXmlRpc::$xmlrpcerrxml + (int)$matches[1], |
|
| 727 | + PhpXmlRpc::$xmlrpcerrxml+(int) $matches[1], |
|
| 728 | 728 | $_xh['isf_reason']); |
| 729 | 729 | } elseif ($_xh['isf']) { |
| 730 | 730 | /// @todo separate better the various cases, as we have done in Request::parseResponse: invalid xml-rpc vs. |
@@ -732,7 +732,7 @@ discard block |
||
| 732 | 732 | return new static::$responseClass( |
| 733 | 733 | 0, |
| 734 | 734 | PhpXmlRpc::$xmlrpcerr['invalid_request'], |
| 735 | - PhpXmlRpc::$xmlrpcstr['invalid_request'] . ' ' . $_xh['isf_reason']); |
|
| 735 | + PhpXmlRpc::$xmlrpcstr['invalid_request'].' '.$_xh['isf_reason']); |
|
| 736 | 736 | } else { |
| 737 | 737 | // small layering violation in favor of speed and memory usage: we should allow the 'execute' method handle |
| 738 | 738 | // this, but in the most common scenario (xml-rpc values type server with some methods registered as phpvals) |
@@ -742,8 +742,8 @@ discard block |
||
| 742 | 742 | ($this->dmap[$_xh['method']]['parameters_type'] != 'xmlrpcvals') |
| 743 | 743 | ) |
| 744 | 744 | ) { |
| 745 | - if ($this->debug > 1) { |
|
| 746 | - $this->debugMsg("\n+++PARSED+++\n" . var_export($_xh['params'], true) . "\n+++END+++"); |
|
| 745 | + if ($this->debug>1) { |
|
| 746 | + $this->debugMsg("\n+++PARSED+++\n".var_export($_xh['params'], true)."\n+++END+++"); |
|
| 747 | 747 | } |
| 748 | 748 | |
| 749 | 749 | return $this->execute($_xh['method'], $_xh['params'], $_xh['pt']); |
@@ -751,12 +751,12 @@ discard block |
||
| 751 | 751 | // build a Request object with data parsed from xml and add parameters in |
| 752 | 752 | $req = new Request($_xh['method']); |
| 753 | 753 | /// @todo for more speed, we could just pass in the array to the constructor (and loose the type validation)... |
| 754 | - for ($i = 0; $i < count($_xh['params']); $i++) { |
|
| 754 | + for ($i = 0; $i<count($_xh['params']); $i++) { |
|
| 755 | 755 | $req->addParam($_xh['params'][$i]); |
| 756 | 756 | } |
| 757 | 757 | |
| 758 | - if ($this->debug > 1) { |
|
| 759 | - $this->debugMsg("\n+++PARSED+++\n" . var_export($req, true) . "\n+++END+++"); |
|
| 758 | + if ($this->debug>1) { |
|
| 759 | + $this->debugMsg("\n+++PARSED+++\n".var_export($req, true)."\n+++END+++"); |
|
| 760 | 760 | } |
| 761 | 761 | |
| 762 | 762 | return $this->execute($req); |
@@ -806,7 +806,7 @@ discard block |
||
| 806 | 806 | return new static::$responseClass( |
| 807 | 807 | 0, |
| 808 | 808 | PhpXmlRpc::$xmlrpcerr['incorrect_params'], |
| 809 | - PhpXmlRpc::$xmlrpcstr['incorrect_params'] . ": {$errStr}" |
|
| 809 | + PhpXmlRpc::$xmlrpcstr['incorrect_params'].": {$errStr}" |
|
| 810 | 810 | ); |
| 811 | 811 | } |
| 812 | 812 | } |
@@ -821,7 +821,7 @@ discard block |
||
| 821 | 821 | // build string representation of function 'name' |
| 822 | 822 | if (is_array($func)) { |
| 823 | 823 | if (is_object($func[0])) { |
| 824 | - $funcName = get_class($func[0]) . '->' . $func[1]; |
|
| 824 | + $funcName = get_class($func[0]).'->'.$func[1]; |
|
| 825 | 825 | } else { |
| 826 | 826 | $funcName = implode('::', $func); |
| 827 | 827 | } |
@@ -833,16 +833,16 @@ discard block |
||
| 833 | 833 | |
| 834 | 834 | // verify that function to be invoked is in fact callable |
| 835 | 835 | if (!is_callable($func)) { |
| 836 | - $this->getLogger()->error("XML-RPC: " . __METHOD__ . ": function '$funcName' registered as method handler is not callable"); |
|
| 836 | + $this->getLogger()->error("XML-RPC: ".__METHOD__.": function '$funcName' registered as method handler is not callable"); |
|
| 837 | 837 | return new static::$responseClass( |
| 838 | 838 | 0, |
| 839 | 839 | PhpXmlRpc::$xmlrpcerr['server_error'], |
| 840 | - PhpXmlRpc::$xmlrpcstr['server_error'] . ": no function matches method" |
|
| 840 | + PhpXmlRpc::$xmlrpcstr['server_error'].": no function matches method" |
|
| 841 | 841 | ); |
| 842 | 842 | } |
| 843 | 843 | |
| 844 | 844 | if (isset($dmap[$methodName]['exception_handling'])) { |
| 845 | - $exception_handling = (int)$dmap[$methodName]['exception_handling']; |
|
| 845 | + $exception_handling = (int) $dmap[$methodName]['exception_handling']; |
|
| 846 | 846 | } else { |
| 847 | 847 | $exception_handling = $this->exception_handling; |
| 848 | 848 | } |
@@ -863,14 +863,14 @@ discard block |
||
| 863 | 863 | $r = call_user_func($func, $req); |
| 864 | 864 | } |
| 865 | 865 | if (!is_a($r, 'PhpXmlRpc\Response')) { |
| 866 | - $this->getLogger()->error("XML-RPC: " . __METHOD__ . ": function '$funcName' registered as method handler does not return an xmlrpc response object but a " . gettype($r)); |
|
| 866 | + $this->getLogger()->error("XML-RPC: ".__METHOD__.": function '$funcName' registered as method handler does not return an xmlrpc response object but a ".gettype($r)); |
|
| 867 | 867 | if (is_a($r, 'PhpXmlRpc\Value')) { |
| 868 | 868 | $r = new static::$responseClass($r); |
| 869 | 869 | } else { |
| 870 | 870 | $r = new static::$responseClass( |
| 871 | 871 | 0, |
| 872 | 872 | PhpXmlRpc::$xmlrpcerr['server_error'], |
| 873 | - PhpXmlRpc::$xmlrpcstr['server_error'] . ": function does not return xmlrpc response object" |
|
| 873 | + PhpXmlRpc::$xmlrpcstr['server_error'].": function does not return xmlrpc response object" |
|
| 874 | 874 | ); |
| 875 | 875 | } |
| 876 | 876 | } |
@@ -885,7 +885,7 @@ discard block |
||
| 885 | 885 | $r = call_user_func_array($func, array($methodName, $params, $this->user_data)); |
| 886 | 886 | // mimic EPI behaviour: if we get an array that looks like an error, make it an error response |
| 887 | 887 | if (is_array($r) && array_key_exists('faultCode', $r) && array_key_exists('faultString', $r)) { |
| 888 | - $r = new static::$responseClass(0, (integer)$r['faultCode'], (string)$r['faultString']); |
|
| 888 | + $r = new static::$responseClass(0, (integer) $r['faultCode'], (string) $r['faultString']); |
|
| 889 | 889 | } else { |
| 890 | 890 | // functions using EPI api should NOT return resp objects, so make sure we encode the |
| 891 | 891 | // return type correctly |
@@ -1016,7 +1016,7 @@ discard block |
||
| 1016 | 1016 | */ |
| 1017 | 1017 | protected function debugMsg($string) |
| 1018 | 1018 | { |
| 1019 | - $this->debug_info .= $string . "\n"; |
|
| 1019 | + $this->debug_info .= $string."\n"; |
|
| 1020 | 1020 | } |
| 1021 | 1021 | |
| 1022 | 1022 | /** |
@@ -1307,7 +1307,7 @@ discard block |
||
| 1307 | 1307 | $i++; // for error message, we count params from 1 |
| 1308 | 1308 | return static::_xmlrpcs_multicall_error(new static::$responseClass(0, |
| 1309 | 1309 | PhpXmlRpc::$xmlrpcerr['incorrect_params'], |
| 1310 | - PhpXmlRpc::$xmlrpcstr['incorrect_params'] . ": probable xml error in param " . $i)); |
|
| 1310 | + PhpXmlRpc::$xmlrpcstr['incorrect_params'].": probable xml error in param ".$i)); |
|
| 1311 | 1311 | } |
| 1312 | 1312 | } |
| 1313 | 1313 | |
@@ -1388,7 +1388,7 @@ discard block |
||
| 1388 | 1388 | } |
| 1389 | 1389 | } else { |
| 1390 | 1390 | $numCalls = count($req); |
| 1391 | - for ($i = 0; $i < $numCalls; $i++) { |
|
| 1391 | + for ($i = 0; $i<$numCalls; $i++) { |
|
| 1392 | 1392 | $result[$i] = static::_xmlrpcs_multicall_do_call_phpvals($server, $req[$i]); |
| 1393 | 1393 | } |
| 1394 | 1394 | } |
@@ -1453,12 +1453,12 @@ discard block |
||
| 1453 | 1453 | */ |
| 1454 | 1454 | protected function xml_header($charsetEncoding = '') |
| 1455 | 1455 | { |
| 1456 | - $this->logDeprecation('Method ' . __METHOD__ . ' is deprecated'); |
|
| 1456 | + $this->logDeprecation('Method '.__METHOD__.' is deprecated'); |
|
| 1457 | 1457 | |
| 1458 | 1458 | if ($charsetEncoding != '') { |
| 1459 | - return "<?xml version=\"1.0\" encoding=\"$charsetEncoding\"?" . ">\n"; |
|
| 1459 | + return "<?xml version=\"1.0\" encoding=\"$charsetEncoding\"?".">\n"; |
|
| 1460 | 1460 | } else { |
| 1461 | - return "<?xml version=\"1.0\"?" . ">\n"; |
|
| 1461 | + return "<?xml version=\"1.0\"?".">\n"; |
|
| 1462 | 1462 | } |
| 1463 | 1463 | } |
| 1464 | 1464 | |
@@ -1474,7 +1474,7 @@ discard block |
||
| 1474 | 1474 | case self::OPT_FUNCTIONS_PARAMETERS_TYPE: |
| 1475 | 1475 | case self::OPT_PHPVALS_ENCODING_OPTIONS: |
| 1476 | 1476 | case self::OPT_RESPONSE_CHARSET_ENCODING: |
| 1477 | - $this->logDeprecation('Getting property Request::' . $name . ' is deprecated'); |
|
| 1477 | + $this->logDeprecation('Getting property Request::'.$name.' is deprecated'); |
|
| 1478 | 1478 | return $this->$name; |
| 1479 | 1479 | case 'accepted_charset_encodings': |
| 1480 | 1480 | // manually implement the 'protected property' behaviour |
@@ -1486,16 +1486,16 @@ discard block |
||
| 1486 | 1486 | } |
| 1487 | 1487 | } |
| 1488 | 1488 | if ($canAccess) { |
| 1489 | - $this->logDeprecation('Getting property Request::' . $name . ' is deprecated'); |
|
| 1489 | + $this->logDeprecation('Getting property Request::'.$name.' is deprecated'); |
|
| 1490 | 1490 | return $this->accepted_compression; |
| 1491 | 1491 | } else { |
| 1492 | - trigger_error("Cannot access protected property Server::accepted_charset_encodings in " . __FILE__, E_USER_ERROR); |
|
| 1492 | + trigger_error("Cannot access protected property Server::accepted_charset_encodings in ".__FILE__, E_USER_ERROR); |
|
| 1493 | 1493 | } |
| 1494 | 1494 | break; |
| 1495 | 1495 | default: |
| 1496 | 1496 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
| 1497 | 1497 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
| 1498 | - trigger_error('Undefined property via __get(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
| 1498 | + trigger_error('Undefined property via __get(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
| 1499 | 1499 | $result = null; |
| 1500 | 1500 | return $result; |
| 1501 | 1501 | } |
@@ -1512,7 +1512,7 @@ discard block |
||
| 1512 | 1512 | case self::OPT_FUNCTIONS_PARAMETERS_TYPE: |
| 1513 | 1513 | case self::OPT_PHPVALS_ENCODING_OPTIONS: |
| 1514 | 1514 | case self::OPT_RESPONSE_CHARSET_ENCODING: |
| 1515 | - $this->logDeprecation('Setting property Request::' . $name . ' is deprecated'); |
|
| 1515 | + $this->logDeprecation('Setting property Request::'.$name.' is deprecated'); |
|
| 1516 | 1516 | $this->$name = $value; |
| 1517 | 1517 | break; |
| 1518 | 1518 | case 'accepted_charset_encodings': |
@@ -1525,16 +1525,16 @@ discard block |
||
| 1525 | 1525 | } |
| 1526 | 1526 | } |
| 1527 | 1527 | if ($canAccess) { |
| 1528 | - $this->logDeprecation('Setting property Request::' . $name . ' is deprecated'); |
|
| 1528 | + $this->logDeprecation('Setting property Request::'.$name.' is deprecated'); |
|
| 1529 | 1529 | $this->accepted_compression = $value; |
| 1530 | 1530 | } else { |
| 1531 | - trigger_error("Cannot access protected property Server::accepted_charset_encodings in " . __FILE__, E_USER_ERROR); |
|
| 1531 | + trigger_error("Cannot access protected property Server::accepted_charset_encodings in ".__FILE__, E_USER_ERROR); |
|
| 1532 | 1532 | } |
| 1533 | 1533 | break; |
| 1534 | 1534 | default: |
| 1535 | 1535 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
| 1536 | 1536 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
| 1537 | - trigger_error('Undefined property via __set(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
| 1537 | + trigger_error('Undefined property via __set(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
| 1538 | 1538 | } |
| 1539 | 1539 | } |
| 1540 | 1540 | |
@@ -1549,7 +1549,7 @@ discard block |
||
| 1549 | 1549 | case self::OPT_FUNCTIONS_PARAMETERS_TYPE: |
| 1550 | 1550 | case self::OPT_PHPVALS_ENCODING_OPTIONS: |
| 1551 | 1551 | case self::OPT_RESPONSE_CHARSET_ENCODING: |
| 1552 | - $this->logDeprecation('Checking property Request::' . $name . ' is deprecated'); |
|
| 1552 | + $this->logDeprecation('Checking property Request::'.$name.' is deprecated'); |
|
| 1553 | 1553 | return isset($this->$name); |
| 1554 | 1554 | case 'accepted_charset_encodings': |
| 1555 | 1555 | // manually implement the 'protected property' behaviour |
@@ -1561,7 +1561,7 @@ discard block |
||
| 1561 | 1561 | } |
| 1562 | 1562 | } |
| 1563 | 1563 | if ($canAccess) { |
| 1564 | - $this->logDeprecation('Checking property Request::' . $name . ' is deprecated'); |
|
| 1564 | + $this->logDeprecation('Checking property Request::'.$name.' is deprecated'); |
|
| 1565 | 1565 | return isset($this->accepted_compression); |
| 1566 | 1566 | } |
| 1567 | 1567 | // break through voluntarily |
@@ -1581,7 +1581,7 @@ discard block |
||
| 1581 | 1581 | case self::OPT_FUNCTIONS_PARAMETERS_TYPE: |
| 1582 | 1582 | case self::OPT_PHPVALS_ENCODING_OPTIONS: |
| 1583 | 1583 | case self::OPT_RESPONSE_CHARSET_ENCODING: |
| 1584 | - $this->logDeprecation('Unsetting property Request::' . $name . ' is deprecated'); |
|
| 1584 | + $this->logDeprecation('Unsetting property Request::'.$name.' is deprecated'); |
|
| 1585 | 1585 | unset($this->$name); |
| 1586 | 1586 | break; |
| 1587 | 1587 | case 'accepted_charset_encodings': |
@@ -1594,16 +1594,16 @@ discard block |
||
| 1594 | 1594 | } |
| 1595 | 1595 | } |
| 1596 | 1596 | if ($canAccess) { |
| 1597 | - $this->logDeprecation('Unsetting property Request::' . $name . ' is deprecated'); |
|
| 1597 | + $this->logDeprecation('Unsetting property Request::'.$name.' is deprecated'); |
|
| 1598 | 1598 | unset($this->accepted_compression); |
| 1599 | 1599 | } else { |
| 1600 | - trigger_error("Cannot access protected property Server::accepted_charset_encodings in " . __FILE__, E_USER_ERROR); |
|
| 1600 | + trigger_error("Cannot access protected property Server::accepted_charset_encodings in ".__FILE__, E_USER_ERROR); |
|
| 1601 | 1601 | } |
| 1602 | 1602 | break; |
| 1603 | 1603 | default: |
| 1604 | 1604 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
| 1605 | 1605 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
| 1606 | - trigger_error('Undefined property via __unset(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
| 1606 | + trigger_error('Undefined property via __unset(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
| 1607 | 1607 | } |
| 1608 | 1608 | } |
| 1609 | 1609 | } |
@@ -1,6 +1,6 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -include_once __DIR__ . '/08ServerTest.php'; |
|
| 3 | +include_once __DIR__.'/08ServerTest.php'; |
|
| 4 | 4 | |
| 5 | 5 | /** |
| 6 | 6 | * Tests which stress http features of the library. |
@@ -25,7 +25,7 @@ discard block |
||
| 25 | 25 | ); |
| 26 | 26 | |
| 27 | 27 | $methods = array(); |
| 28 | - foreach(get_class_methods('ServerTest') as $method) |
|
| 28 | + foreach (get_class_methods('ServerTest') as $method) |
|
| 29 | 29 | { |
| 30 | 30 | if (strpos($method, 'test') === 0 && !in_array($method, $unsafeMethods)) |
| 31 | 31 | { |
@@ -295,7 +295,7 @@ discard block |
||
| 295 | 295 | if (version_compare(PHP_VERSION, '8.0', '>=') && $this->args['SSLVERSION'] == 0) |
| 296 | 296 | { |
| 297 | 297 | $version = explode('.', PHP_VERSION); |
| 298 | - $this->client->setSSLVersion(min(4 + $version[1], 7)); |
|
| 298 | + $this->client->setSSLVersion(min(4+$version[1], 7)); |
|
| 299 | 299 | } |
| 300 | 300 | |
| 301 | 301 | $this->$method(); |
@@ -325,7 +325,7 @@ discard block |
||
| 325 | 325 | preg_match('/ubunutu([0-9]+)/', $output[0], $matches); |
| 326 | 326 | $ubuntuVersion = @$matches[1]; |
| 327 | 327 | } |
| 328 | - if ($ubuntuVersion >= 20) { |
|
| 328 | + if ($ubuntuVersion>=20) { |
|
| 329 | 329 | $this->markTestSkipped('HTTPS via Socket known to fail on php less than 7.2 on Ubuntu 20 and higher'); |
| 330 | 330 | return; |
| 331 | 331 | } |
@@ -345,11 +345,11 @@ discard block |
||
| 345 | 345 | { |
| 346 | 346 | $version = explode('.', PHP_VERSION); |
| 347 | 347 | $this->client->setOption(\PhpXmlRpc\Client::OPT_EXTRA_SOCKET_OPTS, |
| 348 | - array('ssl' => array('security_level' => 2 + $version[1]))); |
|
| 348 | + array('ssl' => array('security_level' => 2+$version[1]))); |
|
| 349 | 349 | /// @todo we should probably look deeper into the Apache config / ssl version in use to find out why this |
| 350 | 350 | /// does not work well with TLS < 1.2 |
| 351 | 351 | if ($this->args['SSLVERSION'] == 0) { |
| 352 | - $this->client->setSSLVersion(min(5 + $version[1], 7)); |
|
| 352 | + $this->client->setSSLVersion(min(5+$version[1], 7)); |
|
| 353 | 353 | } |
| 354 | 354 | } |
| 355 | 355 | $this->$method(); |
@@ -389,7 +389,7 @@ discard block |
||
| 389 | 389 | if (version_compare(PHP_VERSION, '8.0', '>=') && $this->args['SSLVERSION'] == 0) |
| 390 | 390 | { |
| 391 | 391 | $version = explode('.', PHP_VERSION); |
| 392 | - $this->client->setSSLVersion(min(4 + $version[1], 7)); |
|
| 392 | + $this->client->setSSLVersion(min(4+$version[1], 7)); |
|
| 393 | 393 | } |
| 394 | 394 | |
| 395 | 395 | $this->$method(); |
@@ -1,6 +1,6 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -include_once __DIR__ . '/ServerAwareTestCase.php'; |
|
| 3 | +include_once __DIR__.'/ServerAwareTestCase.php'; |
|
| 4 | 4 | |
| 5 | 5 | abstract class PhpXmlRpc_WebTestCase extends PhpXmlRpc_ServerAwareTestCase |
| 6 | 6 | { |
@@ -15,7 +15,7 @@ discard block |
||
| 15 | 15 | */ |
| 16 | 16 | protected function request($path, $method = 'GET', $payload = '', $emptyPageOk = false) |
| 17 | 17 | { |
| 18 | - $url = $this->baseUrl . $path; |
|
| 18 | + $url = $this->baseUrl.$path; |
|
| 19 | 19 | |
| 20 | 20 | $ch = curl_init($url); |
| 21 | 21 | curl_setopt_array($ch, array( |
@@ -29,21 +29,21 @@ discard block |
||
| 29 | 29 | CURLOPT_POSTFIELDS => $payload |
| 30 | 30 | )); |
| 31 | 31 | } |
| 32 | - $cookie = 'PHPUNIT_RANDOM_TEST_ID=' . static::$randId; |
|
| 32 | + $cookie = 'PHPUNIT_RANDOM_TEST_ID='.static::$randId; |
|
| 33 | 33 | if ($this->collectCodeCoverageInformation) |
| 34 | 34 | { |
| 35 | - $cookie .= '; PHPUNIT_SELENIUM_TEST_ID=' . $this->testId; |
|
| 35 | + $cookie .= '; PHPUNIT_SELENIUM_TEST_ID='.$this->testId; |
|
| 36 | 36 | } |
| 37 | 37 | curl_setopt($ch, CURLOPT_COOKIE, $cookie); |
| 38 | 38 | |
| 39 | - if ($this->args['DEBUG'] > 0) { |
|
| 39 | + if ($this->args['DEBUG']>0) { |
|
| 40 | 40 | curl_setopt($ch, CURLOPT_VERBOSE, 1); |
| 41 | 41 | } |
| 42 | 42 | $page = curl_exec($ch); |
| 43 | 43 | $info = curl_getinfo($ch); |
| 44 | 44 | curl_close($ch); |
| 45 | 45 | |
| 46 | - $this->assertNotFalse($page, 'Curl request should not fail. Url: ' . @$info['url'] . ', Http code: ' . @$info['http_code']); |
|
| 46 | + $this->assertNotFalse($page, 'Curl request should not fail. Url: '.@$info['url'].', Http code: '.@$info['http_code']); |
|
| 47 | 47 | if (!$emptyPageOk) { |
| 48 | 48 | $this->assertNotEquals('', $page, 'Retrieved web page should not be empty'); |
| 49 | 49 | } |
@@ -62,7 +62,7 @@ discard block |
||
| 62 | 62 | */ |
| 63 | 63 | protected function newClient($path) |
| 64 | 64 | { |
| 65 | - $client = new \PhpXmlRpc\Client($this->baseUrl . $path); |
|
| 65 | + $client = new \PhpXmlRpc\Client($this->baseUrl.$path); |
|
| 66 | 66 | $client->setCookie('PHPUNIT_RANDOM_TEST_ID', static::$randId); |
| 67 | 67 | if ($this->collectCodeCoverageInformation) { |
| 68 | 68 | $client->setCookie('PHPUNIT_SELENIUM_TEST_ID', $this->testId); |
@@ -187,12 +187,12 @@ discard block |
||
| 187 | 187 | // q: can php be built without ctype? should we use a regexp? |
| 188 | 188 | if (is_string($key) && !ctype_digit($key)) { |
| 189 | 189 | /// @todo on invalid options, throw/error-out instead of logging an error message? |
| 190 | - switch($key) { |
|
| 190 | + switch ($key) { |
|
| 191 | 191 | case 'target_charset': |
| 192 | 192 | if (function_exists('mb_convert_encoding')) { |
| 193 | 193 | $this->current_parsing_options['target_charset'] = $val; |
| 194 | 194 | } else { |
| 195 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ": 'target_charset' option is unsupported without mbstring"); |
|
| 195 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.": 'target_charset' option is unsupported without mbstring"); |
|
| 196 | 196 | } |
| 197 | 197 | break; |
| 198 | 198 | |
@@ -200,7 +200,7 @@ discard block |
||
| 200 | 200 | if (is_callable($val)) { |
| 201 | 201 | $this->current_parsing_options['methodname_callback'] = $val; |
| 202 | 202 | } else { |
| 203 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ": Callback passed as 'methodname_callback' is not callable"); |
|
| 203 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.": Callback passed as 'methodname_callback' is not callable"); |
|
| 204 | 204 | } |
| 205 | 205 | break; |
| 206 | 206 | |
@@ -211,7 +211,7 @@ discard block |
||
| 211 | 211 | break; |
| 212 | 212 | |
| 213 | 213 | default: |
| 214 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ": unsupported option: $key"); |
|
| 214 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.": unsupported option: $key"); |
|
| 215 | 215 | } |
| 216 | 216 | unset($mergedOptions[$key]); |
| 217 | 217 | } |
@@ -257,10 +257,10 @@ discard block |
||
| 257 | 257 | |
| 258 | 258 | try { |
| 259 | 259 | // @see ticket #70 - we have to parse big xml docs in chunks to avoid errors |
| 260 | - for ($offset = 0; $offset < $len; $offset += $this->maxChunkLength) { |
|
| 260 | + for ($offset = 0; $offset<$len; $offset += $this->maxChunkLength) { |
|
| 261 | 261 | $chunk = substr($data, $offset, $this->maxChunkLength); |
| 262 | 262 | // error handling: xml not well formed |
| 263 | - if (!@xml_parse($parser, $chunk, $offset + $this->maxChunkLength >= $len)) { |
|
| 263 | + if (!@xml_parse($parser, $chunk, $offset+$this->maxChunkLength>=$len)) { |
|
| 264 | 264 | $errCode = xml_get_error_code($parser); |
| 265 | 265 | $errStr = sprintf('XML error %s: %s at line %d, column %d', $errCode, xml_error_string($errCode), |
| 266 | 266 | xml_get_current_line_number($parser), xml_get_current_column_number($parser)); |
@@ -268,7 +268,7 @@ discard block |
||
| 268 | 268 | $this->_xh['isf_reason'] = $errStr; |
| 269 | 269 | } |
| 270 | 270 | // no need to parse further if we already have a fatal error |
| 271 | - if ($this->_xh['isf'] >= 2) { |
|
| 271 | + if ($this->_xh['isf']>=2) { |
|
| 272 | 272 | break; |
| 273 | 273 | } |
| 274 | 274 | } |
@@ -313,7 +313,7 @@ discard block |
||
| 313 | 313 | public function xmlrpc_se($parser, $name, $attrs, $acceptSingleVals = false) |
| 314 | 314 | { |
| 315 | 315 | // if invalid xml-rpc already detected, skip all processing |
| 316 | - if ($this->_xh['isf'] >= 2) { |
|
| 316 | + if ($this->_xh['isf']>=2) { |
|
| 317 | 317 | return; |
| 318 | 318 | } |
| 319 | 319 | |
@@ -327,7 +327,7 @@ discard block |
||
| 327 | 327 | if ($acceptSingleVals === false) { |
| 328 | 328 | $accept = $this->current_parsing_options['accept']; |
| 329 | 329 | } else { |
| 330 | - $this->logDeprecation('Using argument $acceptSingleVals for method ' . __METHOD__ . ' is deprecated'); |
|
| 330 | + $this->logDeprecation('Using argument $acceptSingleVals for method '.__METHOD__.' is deprecated'); |
|
| 331 | 331 | $accept = self::ACCEPT_REQUEST | self::ACCEPT_RESPONSE | self::ACCEPT_VALUE; |
| 332 | 332 | } |
| 333 | 333 | if (($name == 'METHODCALL' && ($accept & self::ACCEPT_REQUEST)) || |
@@ -337,7 +337,7 @@ discard block |
||
| 337 | 337 | $this->_xh['rt'] = strtolower($name); |
| 338 | 338 | } else { |
| 339 | 339 | $this->_xh['isf'] = 2; |
| 340 | - $this->_xh['isf_reason'] = 'missing top level xmlrpc element. Found: ' . $name; |
|
| 340 | + $this->_xh['isf_reason'] = 'missing top level xmlrpc element. Found: '.$name; |
|
| 341 | 341 | |
| 342 | 342 | return; |
| 343 | 343 | } |
@@ -442,7 +442,7 @@ discard block |
||
| 442 | 442 | |
| 443 | 443 | case 'MEMBER': |
| 444 | 444 | // set member name to null, in case we do not find in the xml later on |
| 445 | - $this->_xh['valuestack'][count($this->_xh['valuestack']) - 1]['name'] = null; |
|
| 445 | + $this->_xh['valuestack'][count($this->_xh['valuestack'])-1]['name'] = null; |
|
| 446 | 446 | //$this->_xh['ac']=''; |
| 447 | 447 | // Drop trough intentionally |
| 448 | 448 | |
@@ -505,7 +505,7 @@ discard block |
||
| 505 | 505 | */ |
| 506 | 506 | public function xmlrpc_ee($parser, $name, $rebuildXmlrpcvals = 1) |
| 507 | 507 | { |
| 508 | - if ($this->_xh['isf'] >= 2) { |
|
| 508 | + if ($this->_xh['isf']>=2) { |
|
| 509 | 509 | return; |
| 510 | 510 | } |
| 511 | 511 | |
@@ -527,7 +527,7 @@ discard block |
||
| 527 | 527 | $this->_xh['value'] = mb_convert_encoding($this->_xh['value'], $this->current_parsing_options['target_charset'], 'UTF-8'); |
| 528 | 528 | } |
| 529 | 529 | |
| 530 | - if ($rebuildXmlrpcvals > 0) { |
|
| 530 | + if ($rebuildXmlrpcvals>0) { |
|
| 531 | 531 | // build the xml-rpc val out of the data received, and substitute it |
| 532 | 532 | $temp = new Value($this->_xh['value'], $this->_xh['vt']); |
| 533 | 533 | // in case we got info about underlying php class, save it in the object we're rebuilding |
@@ -535,15 +535,15 @@ discard block |
||
| 535 | 535 | $temp->_php_class = $this->_xh['php_class']; |
| 536 | 536 | } |
| 537 | 537 | $this->_xh['value'] = $temp; |
| 538 | - } elseif ($rebuildXmlrpcvals < 0) { |
|
| 538 | + } elseif ($rebuildXmlrpcvals<0) { |
|
| 539 | 539 | if ($this->_xh['vt'] == Value::$xmlrpcDateTime) { |
| 540 | - $this->_xh['value'] = (object)array( |
|
| 540 | + $this->_xh['value'] = (object) array( |
|
| 541 | 541 | 'xmlrpc_type' => 'datetime', |
| 542 | 542 | 'scalar' => $this->_xh['value'], |
| 543 | 543 | 'timestamp' => \PhpXmlRpc\Helper\Date::iso8601Decode($this->_xh['value']) |
| 544 | 544 | ); |
| 545 | 545 | } elseif ($this->_xh['vt'] == Value::$xmlrpcBase64) { |
| 546 | - $this->_xh['value'] = (object)array( |
|
| 546 | + $this->_xh['value'] = (object) array( |
|
| 547 | 547 | 'xmlrpc_type' => 'base64', |
| 548 | 548 | 'scalar' => $this->_xh['value'] |
| 549 | 549 | ); |
@@ -558,8 +558,8 @@ discard block |
||
| 558 | 558 | // check if we are inside an array or struct: |
| 559 | 559 | // if value just built is inside an array, let's move it into array on the stack |
| 560 | 560 | $vscount = count($this->_xh['valuestack']); |
| 561 | - if ($vscount && $this->_xh['valuestack'][$vscount - 1]['type'] == 'ARRAY') { |
|
| 562 | - $this->_xh['valuestack'][$vscount - 1]['values'][] = $this->_xh['value']; |
|
| 561 | + if ($vscount && $this->_xh['valuestack'][$vscount-1]['type'] == 'ARRAY') { |
|
| 562 | + $this->_xh['valuestack'][$vscount-1]['values'][] = $this->_xh['value']; |
|
| 563 | 563 | } |
| 564 | 564 | break; |
| 565 | 565 | |
@@ -586,7 +586,7 @@ discard block |
||
| 586 | 586 | // log if receiving something strange, even though we set the value to false anyway |
| 587 | 587 | /// @todo to be consistent with the other types, we should return a value outside the good-value domain, e.g. NULL |
| 588 | 588 | if ($this->_xh['ac'] != '0' && strcasecmp($this->_xh['ac'], 'false') !== 0) { |
| 589 | - if (!$this->handleParsingError('invalid data received in BOOLEAN value: ' . |
|
| 589 | + if (!$this->handleParsingError('invalid data received in BOOLEAN value: '. |
|
| 590 | 590 | $this->truncateValueForLog($this->_xh['ac']), __METHOD__)) { |
| 591 | 591 | return; |
| 592 | 592 | } |
@@ -606,7 +606,7 @@ discard block |
||
| 606 | 606 | $this->_xh['vt'] = strtolower($name); |
| 607 | 607 | $this->_xh['lv'] = 3; // indicate we've found a value |
| 608 | 608 | if (!preg_match(PhpXmlRpc::$xmlrpc_int_format, $this->_xh['ac'])) { |
| 609 | - if (!$this->handleParsingError('non numeric data received in INT value: ' . |
|
| 609 | + if (!$this->handleParsingError('non numeric data received in INT value: '. |
|
| 610 | 610 | $this->truncateValueForLog($this->_xh['ac']), __METHOD__)) { |
| 611 | 611 | return; |
| 612 | 612 | } |
@@ -614,7 +614,7 @@ discard block |
||
| 614 | 614 | $this->_xh['value'] = 'ERROR_NON_NUMERIC_FOUND'; |
| 615 | 615 | } else { |
| 616 | 616 | // it's ok, add it on |
| 617 | - $this->_xh['value'] = (int)$this->_xh['ac']; |
|
| 617 | + $this->_xh['value'] = (int) $this->_xh['ac']; |
|
| 618 | 618 | } |
| 619 | 619 | break; |
| 620 | 620 | |
@@ -622,7 +622,7 @@ discard block |
||
| 622 | 622 | $this->_xh['vt'] = Value::$xmlrpcDouble; |
| 623 | 623 | $this->_xh['lv'] = 3; // indicate we've found a value |
| 624 | 624 | if (!preg_match(PhpXmlRpc::$xmlrpc_double_format, $this->_xh['ac'])) { |
| 625 | - if (!$this->handleParsingError('non numeric data received in DOUBLE value: ' . |
|
| 625 | + if (!$this->handleParsingError('non numeric data received in DOUBLE value: '. |
|
| 626 | 626 | $this->truncateValueForLog($this->_xh['ac']), __METHOD__)) { |
| 627 | 627 | return; |
| 628 | 628 | } |
@@ -630,7 +630,7 @@ discard block |
||
| 630 | 630 | $this->_xh['value'] = 'ERROR_NON_NUMERIC_FOUND'; |
| 631 | 631 | } else { |
| 632 | 632 | // it's ok, add it on |
| 633 | - $this->_xh['value'] = (double)$this->_xh['ac']; |
|
| 633 | + $this->_xh['value'] = (double) $this->_xh['ac']; |
|
| 634 | 634 | } |
| 635 | 635 | break; |
| 636 | 636 | |
@@ -638,7 +638,7 @@ discard block |
||
| 638 | 638 | $this->_xh['vt'] = Value::$xmlrpcDateTime; |
| 639 | 639 | $this->_xh['lv'] = 3; // indicate we've found a value |
| 640 | 640 | if (!preg_match(PhpXmlRpc::$xmlrpc_datetime_format, $this->_xh['ac'])) { |
| 641 | - if (!$this->handleParsingError('invalid data received in DATETIME value: ' . |
|
| 641 | + if (!$this->handleParsingError('invalid data received in DATETIME value: '. |
|
| 642 | 642 | $this->truncateValueForLog($this->_xh['ac']), __METHOD__)) { |
| 643 | 643 | return; |
| 644 | 644 | } |
@@ -649,9 +649,9 @@ discard block |
||
| 649 | 649 | |
| 650 | 650 | // the default regex used to validate the date string a few lines above should make this case impossible, |
| 651 | 651 | // but one never knows... |
| 652 | - } catch(\Exception $e) { |
|
| 652 | + } catch (\Exception $e) { |
|
| 653 | 653 | // what to do? We can not guarantee that a valid date can be created. We return null... |
| 654 | - if (!$this->handleParsingError('invalid data received in DATETIME value. Error ' . |
|
| 654 | + if (!$this->handleParsingError('invalid data received in DATETIME value. Error '. |
|
| 655 | 655 | $e->getMessage(), __METHOD__)) { |
| 656 | 656 | return; |
| 657 | 657 | } |
@@ -668,14 +668,14 @@ discard block |
||
| 668 | 668 | $v = base64_decode($this->_xh['ac'], true); |
| 669 | 669 | if ($v === false) { |
| 670 | 670 | $this->_xh['isf'] = 2; |
| 671 | - $this->_xh['isf_reason'] = 'Invalid data received in BASE64 value: '. $this->truncateValueForLog($this->_xh['ac']); |
|
| 671 | + $this->_xh['isf_reason'] = 'Invalid data received in BASE64 value: '.$this->truncateValueForLog($this->_xh['ac']); |
|
| 672 | 672 | return; |
| 673 | 673 | } |
| 674 | 674 | } else { |
| 675 | 675 | $v = base64_decode($this->_xh['ac']); |
| 676 | 676 | if ($v === '' && $this->_xh['ac'] !== '') { |
| 677 | 677 | // only the empty string should decode to the empty string |
| 678 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': invalid data received in BASE64 value: ' . |
|
| 678 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.': invalid data received in BASE64 value: '. |
|
| 679 | 679 | $this->truncateValueForLog($this->_xh['ac'])); |
| 680 | 680 | } |
| 681 | 681 | } |
@@ -683,20 +683,20 @@ discard block |
||
| 683 | 683 | break; |
| 684 | 684 | |
| 685 | 685 | case 'NAME': |
| 686 | - $this->_xh['valuestack'][count($this->_xh['valuestack']) - 1]['name'] = $this->_xh['ac']; |
|
| 686 | + $this->_xh['valuestack'][count($this->_xh['valuestack'])-1]['name'] = $this->_xh['ac']; |
|
| 687 | 687 | break; |
| 688 | 688 | |
| 689 | 689 | case 'MEMBER': |
| 690 | 690 | // add to array in the stack the last element built, unless no VALUE or no NAME were found |
| 691 | 691 | if ($this->_xh['vt']) { |
| 692 | 692 | $vscount = count($this->_xh['valuestack']); |
| 693 | - if ($this->_xh['valuestack'][$vscount - 1]['name'] === null) { |
|
| 693 | + if ($this->_xh['valuestack'][$vscount-1]['name'] === null) { |
|
| 694 | 694 | if (!$this->handleParsingError('missing NAME inside STRUCT in received xml', __METHOD__)) { |
| 695 | 695 | return; |
| 696 | 696 | } |
| 697 | - $this->_xh['valuestack'][$vscount - 1]['name'] = ''; |
|
| 697 | + $this->_xh['valuestack'][$vscount-1]['name'] = ''; |
|
| 698 | 698 | } |
| 699 | - $this->_xh['valuestack'][$vscount - 1]['values'][$this->_xh['valuestack'][$vscount - 1]['name']] = $this->_xh['value']; |
|
| 699 | + $this->_xh['valuestack'][$vscount-1]['values'][$this->_xh['valuestack'][$vscount-1]['name']] = $this->_xh['value']; |
|
| 700 | 700 | } else { |
| 701 | 701 | if (!$this->handleParsingError('missing VALUE inside STRUCT in received xml', __METHOD__)) { |
| 702 | 702 | return; |
@@ -830,7 +830,7 @@ discard block |
||
| 830 | 830 | public function xmlrpc_cd($parser, $data) |
| 831 | 831 | { |
| 832 | 832 | // skip processing if xml fault already detected |
| 833 | - if ($this->_xh['isf'] >= 2) { |
|
| 833 | + if ($this->_xh['isf']>=2) { |
|
| 834 | 834 | return; |
| 835 | 835 | } |
| 836 | 836 | |
@@ -852,7 +852,7 @@ discard block |
||
| 852 | 852 | public function xmlrpc_dh($parser, $data) |
| 853 | 853 | { |
| 854 | 854 | // skip processing if xml fault already detected |
| 855 | - if ($this->_xh['isf'] >= 2) { |
|
| 855 | + if ($this->_xh['isf']>=2) { |
|
| 856 | 856 | return; |
| 857 | 857 | } |
| 858 | 858 | |
@@ -932,8 +932,8 @@ discard block |
||
| 932 | 932 | // SPACE: (#x20 | #x9 | #xD | #xA)+ === [ \x9\xD\xA]+ |
| 933 | 933 | // EQ: SPACE?=SPACE? === [ \x9\xD\xA]*=[ \x9\xD\xA]* |
| 934 | 934 | // We could be stricter on version number: VersionNum ::= '1.' [0-9]+ |
| 935 | - if (preg_match('/^<\?xml\s+version\s*=\s*' . "((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))" . |
|
| 936 | - '\s+encoding\s*=\s*' . "((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
| 935 | + if (preg_match('/^<\?xml\s+version\s*=\s*'."((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))". |
|
| 936 | + '\s+encoding\s*=\s*'."((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
| 937 | 937 | $xmlChunk, $matches)) { |
| 938 | 938 | return strtoupper(substr($matches[2], 1, -1)); |
| 939 | 939 | } |
@@ -951,7 +951,7 @@ discard block |
||
| 951 | 951 | // NB: mb_detect likes to call it ascii, xml parser likes to call it US_ASCII... |
| 952 | 952 | // IANA also likes better US-ASCII, so go with it |
| 953 | 953 | if ($enc == 'ASCII') { |
| 954 | - $enc = 'US-' . $enc; |
|
| 954 | + $enc = 'US-'.$enc; |
|
| 955 | 955 | } |
| 956 | 956 | |
| 957 | 957 | return $enc; |
@@ -992,8 +992,8 @@ discard block |
||
| 992 | 992 | // SPACE: (#x20 | #x9 | #xD | #xA)+ === [ \x9\xD\xA]+ |
| 993 | 993 | // EQ: SPACE?=SPACE? === [ \x9\xD\xA]*=[ \x9\xD\xA]* |
| 994 | 994 | // We could be stricter on version number: VersionNum ::= '1.' [0-9]+ |
| 995 | - if (preg_match('/^<\?xml\s+version\s*=\s*' . "((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))" . |
|
| 996 | - '\s+encoding\s*=\s*' . "((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
| 995 | + if (preg_match('/^<\?xml\s+version\s*=\s*'."((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))". |
|
| 996 | + '\s+encoding\s*=\s*'."((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
| 997 | 997 | $xmlChunk)) { |
| 998 | 998 | return true; |
| 999 | 999 | } |
@@ -1013,7 +1013,7 @@ discard block |
||
| 1013 | 1013 | $this->_xh['isf_reason'] = ucfirst($message); |
| 1014 | 1014 | return false; |
| 1015 | 1015 | } else { |
| 1016 | - $this->getLogger()->error('XML-RPC: ' . ($method != '' ? $method . ': ' : '') . $message); |
|
| 1016 | + $this->getLogger()->error('XML-RPC: '.($method != '' ? $method.': ' : '').$message); |
|
| 1017 | 1017 | return true; |
| 1018 | 1018 | } |
| 1019 | 1019 | } |
@@ -1025,8 +1025,8 @@ discard block |
||
| 1025 | 1025 | */ |
| 1026 | 1026 | protected function truncateValueForLog($data) |
| 1027 | 1027 | { |
| 1028 | - if (strlen($data) > $this->maxLogValueLength) { |
|
| 1029 | - return substr($data, 0, $this->maxLogValueLength - 3) . '...'; |
|
| 1028 | + if (strlen($data)>$this->maxLogValueLength) { |
|
| 1029 | + return substr($data, 0, $this->maxLogValueLength-3).'...'; |
|
| 1030 | 1030 | } |
| 1031 | 1031 | |
| 1032 | 1032 | return $data; |
@@ -1047,7 +1047,7 @@ discard block |
||
| 1047 | 1047 | public function xmlrpc_se_any($parser, $name, $attrs) |
| 1048 | 1048 | { |
| 1049 | 1049 | // this will be spamming the log if this method is in use... |
| 1050 | - $this->logDeprecation('Method ' . __METHOD__ . ' is deprecated'); |
|
| 1050 | + $this->logDeprecation('Method '.__METHOD__.' is deprecated'); |
|
| 1051 | 1051 | |
| 1052 | 1052 | $this->xmlrpc_se($parser, $name, $attrs, true); |
| 1053 | 1053 | } |
@@ -1057,12 +1057,12 @@ discard block |
||
| 1057 | 1057 | switch ($name) { |
| 1058 | 1058 | case '_xh': |
| 1059 | 1059 | case 'xmlrpc_valid_parents': |
| 1060 | - $this->logDeprecation('Getting property XMLParser::' . $name . ' is deprecated'); |
|
| 1060 | + $this->logDeprecation('Getting property XMLParser::'.$name.' is deprecated'); |
|
| 1061 | 1061 | return $this->$name; |
| 1062 | 1062 | default: |
| 1063 | 1063 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
| 1064 | 1064 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
| 1065 | - trigger_error('Undefined property via __get(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
| 1065 | + trigger_error('Undefined property via __get(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
| 1066 | 1066 | $result = null; |
| 1067 | 1067 | return $result; |
| 1068 | 1068 | } |
@@ -1073,18 +1073,18 @@ discard block |
||
| 1073 | 1073 | switch ($name) { |
| 1074 | 1074 | // this should only ever be called by subclasses which overtook `parse()` |
| 1075 | 1075 | case 'accept': |
| 1076 | - $this->logDeprecation('Setting property XMLParser::' . $name . ' is deprecated'); |
|
| 1076 | + $this->logDeprecation('Setting property XMLParser::'.$name.' is deprecated'); |
|
| 1077 | 1077 | $this->current_parsing_options['accept'] = $value; |
| 1078 | 1078 | break; |
| 1079 | 1079 | case '_xh': |
| 1080 | 1080 | case 'xmlrpc_valid_parents': |
| 1081 | - $this->logDeprecation('Setting property XMLParser::' . $name . ' is deprecated'); |
|
| 1081 | + $this->logDeprecation('Setting property XMLParser::'.$name.' is deprecated'); |
|
| 1082 | 1082 | $this->$name = $value; |
| 1083 | 1083 | break; |
| 1084 | 1084 | default: |
| 1085 | 1085 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
| 1086 | 1086 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
| 1087 | - trigger_error('Undefined property via __set(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
| 1087 | + trigger_error('Undefined property via __set(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
| 1088 | 1088 | } |
| 1089 | 1089 | } |
| 1090 | 1090 | |
@@ -1092,11 +1092,11 @@ discard block |
||
| 1092 | 1092 | { |
| 1093 | 1093 | switch ($name) { |
| 1094 | 1094 | case 'accept': |
| 1095 | - $this->logDeprecation('Checking property XMLParser::' . $name . ' is deprecated'); |
|
| 1095 | + $this->logDeprecation('Checking property XMLParser::'.$name.' is deprecated'); |
|
| 1096 | 1096 | return isset($this->current_parsing_options['accept']); |
| 1097 | 1097 | case '_xh': |
| 1098 | 1098 | case 'xmlrpc_valid_parents': |
| 1099 | - $this->logDeprecation('Checking property XMLParser::' . $name . ' is deprecated'); |
|
| 1099 | + $this->logDeprecation('Checking property XMLParser::'.$name.' is deprecated'); |
|
| 1100 | 1100 | return isset($this->$name); |
| 1101 | 1101 | default: |
| 1102 | 1102 | return false; |
@@ -1108,18 +1108,18 @@ discard block |
||
| 1108 | 1108 | switch ($name) { |
| 1109 | 1109 | // q: does this make sense at all? |
| 1110 | 1110 | case 'accept': |
| 1111 | - $this->logDeprecation('Unsetting property XMLParser::' . $name . ' is deprecated'); |
|
| 1111 | + $this->logDeprecation('Unsetting property XMLParser::'.$name.' is deprecated'); |
|
| 1112 | 1112 | unset($this->current_parsing_options['accept']); |
| 1113 | 1113 | break; |
| 1114 | 1114 | case '_xh': |
| 1115 | 1115 | case 'xmlrpc_valid_parents': |
| 1116 | - $this->logDeprecation('Unsetting property XMLParser::' . $name . ' is deprecated'); |
|
| 1116 | + $this->logDeprecation('Unsetting property XMLParser::'.$name.' is deprecated'); |
|
| 1117 | 1117 | unset($this->$name); |
| 1118 | 1118 | break; |
| 1119 | 1119 | default: |
| 1120 | 1120 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
| 1121 | 1121 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
| 1122 | - trigger_error('Undefined property via __unset(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
| 1122 | + trigger_error('Undefined property via __unset(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
| 1123 | 1123 | } |
| 1124 | 1124 | } |
| 1125 | 1125 | } |