@@ -1,6 +1,6 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -include_once __DIR__ . '/ServerAwareTestCase.php'; |
|
| 3 | +include_once __DIR__.'/ServerAwareTestCase.php'; |
|
| 4 | 4 | |
| 5 | 5 | abstract class PhpXmlRpc_WebTestCase extends PhpXmlRpc_ServerAwareTestCase |
| 6 | 6 | { |
@@ -15,7 +15,7 @@ discard block |
||
| 15 | 15 | */ |
| 16 | 16 | protected function request($path, $method = 'GET', $payload = '', $emptyPageOk = false) |
| 17 | 17 | { |
| 18 | - $url = $this->baseUrl . $path; |
|
| 18 | + $url = $this->baseUrl.$path; |
|
| 19 | 19 | |
| 20 | 20 | $ch = curl_init($url); |
| 21 | 21 | curl_setopt_array($ch, array( |
@@ -29,21 +29,21 @@ discard block |
||
| 29 | 29 | CURLOPT_POSTFIELDS => $payload |
| 30 | 30 | )); |
| 31 | 31 | } |
| 32 | - $cookie = 'PHPUNIT_RANDOM_TEST_ID=' . static::$randId; |
|
| 32 | + $cookie = 'PHPUNIT_RANDOM_TEST_ID='.static::$randId; |
|
| 33 | 33 | if ($this->collectCodeCoverageInformation) |
| 34 | 34 | { |
| 35 | - $cookie .= '; PHPUNIT_SELENIUM_TEST_ID=' . $this->testId; |
|
| 35 | + $cookie .= '; PHPUNIT_SELENIUM_TEST_ID='.$this->testId; |
|
| 36 | 36 | } |
| 37 | 37 | curl_setopt($ch, CURLOPT_COOKIE, $cookie); |
| 38 | 38 | |
| 39 | - if ($this->args['DEBUG'] > 0) { |
|
| 39 | + if ($this->args['DEBUG']>0) { |
|
| 40 | 40 | curl_setopt($ch, CURLOPT_VERBOSE, 1); |
| 41 | 41 | } |
| 42 | 42 | $page = curl_exec($ch); |
| 43 | 43 | $info = curl_getinfo($ch); |
| 44 | 44 | curl_close($ch); |
| 45 | 45 | |
| 46 | - $this->assertNotFalse($page, 'Curl request should not fail. Url: ' . @$info['url'] . ', Http code: ' . @$info['http_code']); |
|
| 46 | + $this->assertNotFalse($page, 'Curl request should not fail. Url: '.@$info['url'].', Http code: '.@$info['http_code']); |
|
| 47 | 47 | if (!$emptyPageOk) { |
| 48 | 48 | $this->assertNotEquals('', $page, 'Retrieved web page should not be empty'); |
| 49 | 49 | } |
@@ -62,7 +62,7 @@ discard block |
||
| 62 | 62 | */ |
| 63 | 63 | protected function newClient($path) |
| 64 | 64 | { |
| 65 | - $client = new \PhpXmlRpc\Client($this->baseUrl . $path); |
|
| 65 | + $client = new \PhpXmlRpc\Client($this->baseUrl.$path); |
|
| 66 | 66 | $client->setCookie('PHPUNIT_RANDOM_TEST_ID', static::$randId); |
| 67 | 67 | if ($this->collectCodeCoverageInformation) { |
| 68 | 68 | $client->setCookie('PHPUNIT_SELENIUM_TEST_ID', $this->testId); |
@@ -187,12 +187,12 @@ discard block |
||
| 187 | 187 | // q: can php be built without ctype? should we use a regexp? |
| 188 | 188 | if (is_string($key) && !ctype_digit($key)) { |
| 189 | 189 | /// @todo on invalid options, throw/error-out instead of logging an error message? |
| 190 | - switch($key) { |
|
| 190 | + switch ($key) { |
|
| 191 | 191 | case 'target_charset': |
| 192 | 192 | if (function_exists('mb_convert_encoding')) { |
| 193 | 193 | $this->current_parsing_options['target_charset'] = $val; |
| 194 | 194 | } else { |
| 195 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ": 'target_charset' option is unsupported without mbstring"); |
|
| 195 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.": 'target_charset' option is unsupported without mbstring"); |
|
| 196 | 196 | } |
| 197 | 197 | break; |
| 198 | 198 | |
@@ -200,7 +200,7 @@ discard block |
||
| 200 | 200 | if (is_callable($val)) { |
| 201 | 201 | $this->current_parsing_options['methodname_callback'] = $val; |
| 202 | 202 | } else { |
| 203 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ": Callback passed as 'methodname_callback' is not callable"); |
|
| 203 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.": Callback passed as 'methodname_callback' is not callable"); |
|
| 204 | 204 | } |
| 205 | 205 | break; |
| 206 | 206 | |
@@ -211,7 +211,7 @@ discard block |
||
| 211 | 211 | break; |
| 212 | 212 | |
| 213 | 213 | default: |
| 214 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ": unsupported option: $key"); |
|
| 214 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.": unsupported option: $key"); |
|
| 215 | 215 | } |
| 216 | 216 | unset($mergedOptions[$key]); |
| 217 | 217 | } |
@@ -257,10 +257,10 @@ discard block |
||
| 257 | 257 | |
| 258 | 258 | try { |
| 259 | 259 | // @see ticket #70 - we have to parse big xml docs in chunks to avoid errors |
| 260 | - for ($offset = 0; $offset < $len; $offset += $this->maxChunkLength) { |
|
| 260 | + for ($offset = 0; $offset<$len; $offset += $this->maxChunkLength) { |
|
| 261 | 261 | $chunk = substr($data, $offset, $this->maxChunkLength); |
| 262 | 262 | // error handling: xml not well formed |
| 263 | - if (!@xml_parse($parser, $chunk, $offset + $this->maxChunkLength >= $len)) { |
|
| 263 | + if (!@xml_parse($parser, $chunk, $offset+$this->maxChunkLength>=$len)) { |
|
| 264 | 264 | $errCode = xml_get_error_code($parser); |
| 265 | 265 | $errStr = sprintf('XML error %s: %s at line %d, column %d', $errCode, xml_error_string($errCode), |
| 266 | 266 | xml_get_current_line_number($parser), xml_get_current_column_number($parser)); |
@@ -268,7 +268,7 @@ discard block |
||
| 268 | 268 | $this->_xh['isf_reason'] = $errStr; |
| 269 | 269 | } |
| 270 | 270 | // no need to parse further if we already have a fatal error |
| 271 | - if ($this->_xh['isf'] >= 2) { |
|
| 271 | + if ($this->_xh['isf']>=2) { |
|
| 272 | 272 | break; |
| 273 | 273 | } |
| 274 | 274 | } |
@@ -313,7 +313,7 @@ discard block |
||
| 313 | 313 | public function xmlrpc_se($parser, $name, $attrs, $acceptSingleVals = false) |
| 314 | 314 | { |
| 315 | 315 | // if invalid xml-rpc already detected, skip all processing |
| 316 | - if ($this->_xh['isf'] >= 2) { |
|
| 316 | + if ($this->_xh['isf']>=2) { |
|
| 317 | 317 | return; |
| 318 | 318 | } |
| 319 | 319 | |
@@ -327,7 +327,7 @@ discard block |
||
| 327 | 327 | if ($acceptSingleVals === false) { |
| 328 | 328 | $accept = $this->current_parsing_options['accept']; |
| 329 | 329 | } else { |
| 330 | - $this->logDeprecation('Using argument $acceptSingleVals for method ' . __METHOD__ . ' is deprecated'); |
|
| 330 | + $this->logDeprecation('Using argument $acceptSingleVals for method '.__METHOD__.' is deprecated'); |
|
| 331 | 331 | $accept = self::ACCEPT_REQUEST | self::ACCEPT_RESPONSE | self::ACCEPT_VALUE; |
| 332 | 332 | } |
| 333 | 333 | if (($name == 'METHODCALL' && ($accept & self::ACCEPT_REQUEST)) || |
@@ -337,7 +337,7 @@ discard block |
||
| 337 | 337 | $this->_xh['rt'] = strtolower($name); |
| 338 | 338 | } else { |
| 339 | 339 | $this->_xh['isf'] = 2; |
| 340 | - $this->_xh['isf_reason'] = 'missing top level xmlrpc element. Found: ' . $name; |
|
| 340 | + $this->_xh['isf_reason'] = 'missing top level xmlrpc element. Found: '.$name; |
|
| 341 | 341 | |
| 342 | 342 | return; |
| 343 | 343 | } |
@@ -442,7 +442,7 @@ discard block |
||
| 442 | 442 | |
| 443 | 443 | case 'MEMBER': |
| 444 | 444 | // set member name to null, in case we do not find in the xml later on |
| 445 | - $this->_xh['valuestack'][count($this->_xh['valuestack']) - 1]['name'] = null; |
|
| 445 | + $this->_xh['valuestack'][count($this->_xh['valuestack'])-1]['name'] = null; |
|
| 446 | 446 | //$this->_xh['ac']=''; |
| 447 | 447 | // Drop trough intentionally |
| 448 | 448 | |
@@ -505,7 +505,7 @@ discard block |
||
| 505 | 505 | */ |
| 506 | 506 | public function xmlrpc_ee($parser, $name, $rebuildXmlrpcvals = 1) |
| 507 | 507 | { |
| 508 | - if ($this->_xh['isf'] >= 2) { |
|
| 508 | + if ($this->_xh['isf']>=2) { |
|
| 509 | 509 | return; |
| 510 | 510 | } |
| 511 | 511 | |
@@ -527,7 +527,7 @@ discard block |
||
| 527 | 527 | $this->_xh['value'] = mb_convert_encoding($this->_xh['value'], $this->current_parsing_options['target_charset'], 'UTF-8'); |
| 528 | 528 | } |
| 529 | 529 | |
| 530 | - if ($rebuildXmlrpcvals > 0) { |
|
| 530 | + if ($rebuildXmlrpcvals>0) { |
|
| 531 | 531 | // build the xml-rpc val out of the data received, and substitute it |
| 532 | 532 | $temp = new Value($this->_xh['value'], $this->_xh['vt']); |
| 533 | 533 | // in case we got info about underlying php class, save it in the object we're rebuilding |
@@ -535,15 +535,15 @@ discard block |
||
| 535 | 535 | $temp->_php_class = $this->_xh['php_class']; |
| 536 | 536 | } |
| 537 | 537 | $this->_xh['value'] = $temp; |
| 538 | - } elseif ($rebuildXmlrpcvals < 0) { |
|
| 538 | + } elseif ($rebuildXmlrpcvals<0) { |
|
| 539 | 539 | if ($this->_xh['vt'] == Value::$xmlrpcDateTime) { |
| 540 | - $this->_xh['value'] = (object)array( |
|
| 540 | + $this->_xh['value'] = (object) array( |
|
| 541 | 541 | 'xmlrpc_type' => 'datetime', |
| 542 | 542 | 'scalar' => $this->_xh['value'], |
| 543 | 543 | 'timestamp' => \PhpXmlRpc\Helper\Date::iso8601Decode($this->_xh['value']) |
| 544 | 544 | ); |
| 545 | 545 | } elseif ($this->_xh['vt'] == Value::$xmlrpcBase64) { |
| 546 | - $this->_xh['value'] = (object)array( |
|
| 546 | + $this->_xh['value'] = (object) array( |
|
| 547 | 547 | 'xmlrpc_type' => 'base64', |
| 548 | 548 | 'scalar' => $this->_xh['value'] |
| 549 | 549 | ); |
@@ -558,8 +558,8 @@ discard block |
||
| 558 | 558 | // check if we are inside an array or struct: |
| 559 | 559 | // if value just built is inside an array, let's move it into array on the stack |
| 560 | 560 | $vscount = count($this->_xh['valuestack']); |
| 561 | - if ($vscount && $this->_xh['valuestack'][$vscount - 1]['type'] == 'ARRAY') { |
|
| 562 | - $this->_xh['valuestack'][$vscount - 1]['values'][] = $this->_xh['value']; |
|
| 561 | + if ($vscount && $this->_xh['valuestack'][$vscount-1]['type'] == 'ARRAY') { |
|
| 562 | + $this->_xh['valuestack'][$vscount-1]['values'][] = $this->_xh['value']; |
|
| 563 | 563 | } |
| 564 | 564 | break; |
| 565 | 565 | |
@@ -586,7 +586,7 @@ discard block |
||
| 586 | 586 | // log if receiving something strange, even though we set the value to false anyway |
| 587 | 587 | /// @todo to be consistent with the other types, we should return a value outside the good-value domain, e.g. NULL |
| 588 | 588 | if ($this->_xh['ac'] != '0' && strcasecmp($this->_xh['ac'], 'false') !== 0) { |
| 589 | - if (!$this->handleParsingError('invalid data received in BOOLEAN value: ' . |
|
| 589 | + if (!$this->handleParsingError('invalid data received in BOOLEAN value: '. |
|
| 590 | 590 | $this->truncateValueForLog($this->_xh['ac']), __METHOD__)) { |
| 591 | 591 | return; |
| 592 | 592 | } |
@@ -606,7 +606,7 @@ discard block |
||
| 606 | 606 | $this->_xh['vt'] = strtolower($name); |
| 607 | 607 | $this->_xh['lv'] = 3; // indicate we've found a value |
| 608 | 608 | if (!preg_match(PhpXmlRpc::$xmlrpc_int_format, $this->_xh['ac'])) { |
| 609 | - if (!$this->handleParsingError('non numeric data received in INT value: ' . |
|
| 609 | + if (!$this->handleParsingError('non numeric data received in INT value: '. |
|
| 610 | 610 | $this->truncateValueForLog($this->_xh['ac']), __METHOD__)) { |
| 611 | 611 | return; |
| 612 | 612 | } |
@@ -614,7 +614,7 @@ discard block |
||
| 614 | 614 | $this->_xh['value'] = 'ERROR_NON_NUMERIC_FOUND'; |
| 615 | 615 | } else { |
| 616 | 616 | // it's ok, add it on |
| 617 | - $this->_xh['value'] = (int)$this->_xh['ac']; |
|
| 617 | + $this->_xh['value'] = (int) $this->_xh['ac']; |
|
| 618 | 618 | } |
| 619 | 619 | break; |
| 620 | 620 | |
@@ -622,7 +622,7 @@ discard block |
||
| 622 | 622 | $this->_xh['vt'] = Value::$xmlrpcDouble; |
| 623 | 623 | $this->_xh['lv'] = 3; // indicate we've found a value |
| 624 | 624 | if (!preg_match(PhpXmlRpc::$xmlrpc_double_format, $this->_xh['ac'])) { |
| 625 | - if (!$this->handleParsingError('non numeric data received in DOUBLE value: ' . |
|
| 625 | + if (!$this->handleParsingError('non numeric data received in DOUBLE value: '. |
|
| 626 | 626 | $this->truncateValueForLog($this->_xh['ac']), __METHOD__)) { |
| 627 | 627 | return; |
| 628 | 628 | } |
@@ -630,7 +630,7 @@ discard block |
||
| 630 | 630 | $this->_xh['value'] = 'ERROR_NON_NUMERIC_FOUND'; |
| 631 | 631 | } else { |
| 632 | 632 | // it's ok, add it on |
| 633 | - $this->_xh['value'] = (double)$this->_xh['ac']; |
|
| 633 | + $this->_xh['value'] = (double) $this->_xh['ac']; |
|
| 634 | 634 | } |
| 635 | 635 | break; |
| 636 | 636 | |
@@ -638,7 +638,7 @@ discard block |
||
| 638 | 638 | $this->_xh['vt'] = Value::$xmlrpcDateTime; |
| 639 | 639 | $this->_xh['lv'] = 3; // indicate we've found a value |
| 640 | 640 | if (!preg_match(PhpXmlRpc::$xmlrpc_datetime_format, $this->_xh['ac'])) { |
| 641 | - if (!$this->handleParsingError('invalid data received in DATETIME value: ' . |
|
| 641 | + if (!$this->handleParsingError('invalid data received in DATETIME value: '. |
|
| 642 | 642 | $this->truncateValueForLog($this->_xh['ac']), __METHOD__)) { |
| 643 | 643 | return; |
| 644 | 644 | } |
@@ -649,9 +649,9 @@ discard block |
||
| 649 | 649 | |
| 650 | 650 | // the default regex used to validate the date string a few lines above should make this case impossible, |
| 651 | 651 | // but one never knows... |
| 652 | - } catch(\Exception $e) { |
|
| 652 | + } catch (\Exception $e) { |
|
| 653 | 653 | // what to do? We can not guarantee that a valid date can be created. We return null... |
| 654 | - if (!$this->handleParsingError('invalid data received in DATETIME value. Error ' . |
|
| 654 | + if (!$this->handleParsingError('invalid data received in DATETIME value. Error '. |
|
| 655 | 655 | $e->getMessage(), __METHOD__)) { |
| 656 | 656 | return; |
| 657 | 657 | } |
@@ -668,14 +668,14 @@ discard block |
||
| 668 | 668 | $v = base64_decode($this->_xh['ac'], true); |
| 669 | 669 | if ($v === false) { |
| 670 | 670 | $this->_xh['isf'] = 2; |
| 671 | - $this->_xh['isf_reason'] = 'Invalid data received in BASE64 value: '. $this->truncateValueForLog($this->_xh['ac']); |
|
| 671 | + $this->_xh['isf_reason'] = 'Invalid data received in BASE64 value: '.$this->truncateValueForLog($this->_xh['ac']); |
|
| 672 | 672 | return; |
| 673 | 673 | } |
| 674 | 674 | } else { |
| 675 | 675 | $v = base64_decode($this->_xh['ac']); |
| 676 | 676 | if ($v === '' && $this->_xh['ac'] !== '') { |
| 677 | 677 | // only the empty string should decode to the empty string |
| 678 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': invalid data received in BASE64 value: ' . |
|
| 678 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.': invalid data received in BASE64 value: '. |
|
| 679 | 679 | $this->truncateValueForLog($this->_xh['ac'])); |
| 680 | 680 | } |
| 681 | 681 | } |
@@ -683,20 +683,20 @@ discard block |
||
| 683 | 683 | break; |
| 684 | 684 | |
| 685 | 685 | case 'NAME': |
| 686 | - $this->_xh['valuestack'][count($this->_xh['valuestack']) - 1]['name'] = $this->_xh['ac']; |
|
| 686 | + $this->_xh['valuestack'][count($this->_xh['valuestack'])-1]['name'] = $this->_xh['ac']; |
|
| 687 | 687 | break; |
| 688 | 688 | |
| 689 | 689 | case 'MEMBER': |
| 690 | 690 | // add to array in the stack the last element built, unless no VALUE or no NAME were found |
| 691 | 691 | if ($this->_xh['vt']) { |
| 692 | 692 | $vscount = count($this->_xh['valuestack']); |
| 693 | - if ($this->_xh['valuestack'][$vscount - 1]['name'] === null) { |
|
| 693 | + if ($this->_xh['valuestack'][$vscount-1]['name'] === null) { |
|
| 694 | 694 | if (!$this->handleParsingError('missing NAME inside STRUCT in received xml', __METHOD__)) { |
| 695 | 695 | return; |
| 696 | 696 | } |
| 697 | - $this->_xh['valuestack'][$vscount - 1]['name'] = ''; |
|
| 697 | + $this->_xh['valuestack'][$vscount-1]['name'] = ''; |
|
| 698 | 698 | } |
| 699 | - $this->_xh['valuestack'][$vscount - 1]['values'][$this->_xh['valuestack'][$vscount - 1]['name']] = $this->_xh['value']; |
|
| 699 | + $this->_xh['valuestack'][$vscount-1]['values'][$this->_xh['valuestack'][$vscount-1]['name']] = $this->_xh['value']; |
|
| 700 | 700 | } else { |
| 701 | 701 | if (!$this->handleParsingError('missing VALUE inside STRUCT in received xml', __METHOD__)) { |
| 702 | 702 | return; |
@@ -830,7 +830,7 @@ discard block |
||
| 830 | 830 | public function xmlrpc_cd($parser, $data) |
| 831 | 831 | { |
| 832 | 832 | // skip processing if xml fault already detected |
| 833 | - if ($this->_xh['isf'] >= 2) { |
|
| 833 | + if ($this->_xh['isf']>=2) { |
|
| 834 | 834 | return; |
| 835 | 835 | } |
| 836 | 836 | |
@@ -852,7 +852,7 @@ discard block |
||
| 852 | 852 | public function xmlrpc_dh($parser, $data) |
| 853 | 853 | { |
| 854 | 854 | // skip processing if xml fault already detected |
| 855 | - if ($this->_xh['isf'] >= 2) { |
|
| 855 | + if ($this->_xh['isf']>=2) { |
|
| 856 | 856 | return; |
| 857 | 857 | } |
| 858 | 858 | |
@@ -932,8 +932,8 @@ discard block |
||
| 932 | 932 | // SPACE: (#x20 | #x9 | #xD | #xA)+ === [ \x9\xD\xA]+ |
| 933 | 933 | // EQ: SPACE?=SPACE? === [ \x9\xD\xA]*=[ \x9\xD\xA]* |
| 934 | 934 | // We could be stricter on version number: VersionNum ::= '1.' [0-9]+ |
| 935 | - if (preg_match('/^<\?xml\s+version\s*=\s*' . "((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))" . |
|
| 936 | - '\s+encoding\s*=\s*' . "((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
| 935 | + if (preg_match('/^<\?xml\s+version\s*=\s*'."((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))". |
|
| 936 | + '\s+encoding\s*=\s*'."((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
| 937 | 937 | $xmlChunk, $matches)) { |
| 938 | 938 | return strtoupper(substr($matches[2], 1, -1)); |
| 939 | 939 | } |
@@ -951,7 +951,7 @@ discard block |
||
| 951 | 951 | // NB: mb_detect likes to call it ascii, xml parser likes to call it US_ASCII... |
| 952 | 952 | // IANA also likes better US-ASCII, so go with it |
| 953 | 953 | if ($enc == 'ASCII') { |
| 954 | - $enc = 'US-' . $enc; |
|
| 954 | + $enc = 'US-'.$enc; |
|
| 955 | 955 | } |
| 956 | 956 | |
| 957 | 957 | return $enc; |
@@ -992,8 +992,8 @@ discard block |
||
| 992 | 992 | // SPACE: (#x20 | #x9 | #xD | #xA)+ === [ \x9\xD\xA]+ |
| 993 | 993 | // EQ: SPACE?=SPACE? === [ \x9\xD\xA]*=[ \x9\xD\xA]* |
| 994 | 994 | // We could be stricter on version number: VersionNum ::= '1.' [0-9]+ |
| 995 | - if (preg_match('/^<\?xml\s+version\s*=\s*' . "((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))" . |
|
| 996 | - '\s+encoding\s*=\s*' . "((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
| 995 | + if (preg_match('/^<\?xml\s+version\s*=\s*'."((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))". |
|
| 996 | + '\s+encoding\s*=\s*'."((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
| 997 | 997 | $xmlChunk)) { |
| 998 | 998 | return true; |
| 999 | 999 | } |
@@ -1013,7 +1013,7 @@ discard block |
||
| 1013 | 1013 | $this->_xh['isf_reason'] = ucfirst($message); |
| 1014 | 1014 | return false; |
| 1015 | 1015 | } else { |
| 1016 | - $this->getLogger()->error('XML-RPC: ' . ($method != '' ? $method . ': ' : '') . $message); |
|
| 1016 | + $this->getLogger()->error('XML-RPC: '.($method != '' ? $method.': ' : '').$message); |
|
| 1017 | 1017 | return true; |
| 1018 | 1018 | } |
| 1019 | 1019 | } |
@@ -1025,8 +1025,8 @@ discard block |
||
| 1025 | 1025 | */ |
| 1026 | 1026 | protected function truncateValueForLog($data) |
| 1027 | 1027 | { |
| 1028 | - if (strlen($data) > $this->maxLogValueLength) { |
|
| 1029 | - return substr($data, 0, $this->maxLogValueLength - 3) . '...'; |
|
| 1028 | + if (strlen($data)>$this->maxLogValueLength) { |
|
| 1029 | + return substr($data, 0, $this->maxLogValueLength-3).'...'; |
|
| 1030 | 1030 | } |
| 1031 | 1031 | |
| 1032 | 1032 | return $data; |
@@ -1047,7 +1047,7 @@ discard block |
||
| 1047 | 1047 | public function xmlrpc_se_any($parser, $name, $attrs) |
| 1048 | 1048 | { |
| 1049 | 1049 | // this will be spamming the log if this method is in use... |
| 1050 | - $this->logDeprecation('Method ' . __METHOD__ . ' is deprecated'); |
|
| 1050 | + $this->logDeprecation('Method '.__METHOD__.' is deprecated'); |
|
| 1051 | 1051 | |
| 1052 | 1052 | $this->xmlrpc_se($parser, $name, $attrs, true); |
| 1053 | 1053 | } |
@@ -1057,12 +1057,12 @@ discard block |
||
| 1057 | 1057 | switch ($name) { |
| 1058 | 1058 | case '_xh': |
| 1059 | 1059 | case 'xmlrpc_valid_parents': |
| 1060 | - $this->logDeprecation('Getting property XMLParser::' . $name . ' is deprecated'); |
|
| 1060 | + $this->logDeprecation('Getting property XMLParser::'.$name.' is deprecated'); |
|
| 1061 | 1061 | return $this->$name; |
| 1062 | 1062 | default: |
| 1063 | 1063 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
| 1064 | 1064 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
| 1065 | - trigger_error('Undefined property via __get(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
| 1065 | + trigger_error('Undefined property via __get(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
| 1066 | 1066 | $result = null; |
| 1067 | 1067 | return $result; |
| 1068 | 1068 | } |
@@ -1073,18 +1073,18 @@ discard block |
||
| 1073 | 1073 | switch ($name) { |
| 1074 | 1074 | // this should only ever be called by subclasses which overtook `parse()` |
| 1075 | 1075 | case 'accept': |
| 1076 | - $this->logDeprecation('Setting property XMLParser::' . $name . ' is deprecated'); |
|
| 1076 | + $this->logDeprecation('Setting property XMLParser::'.$name.' is deprecated'); |
|
| 1077 | 1077 | $this->current_parsing_options['accept'] = $value; |
| 1078 | 1078 | break; |
| 1079 | 1079 | case '_xh': |
| 1080 | 1080 | case 'xmlrpc_valid_parents': |
| 1081 | - $this->logDeprecation('Setting property XMLParser::' . $name . ' is deprecated'); |
|
| 1081 | + $this->logDeprecation('Setting property XMLParser::'.$name.' is deprecated'); |
|
| 1082 | 1082 | $this->$name = $value; |
| 1083 | 1083 | break; |
| 1084 | 1084 | default: |
| 1085 | 1085 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
| 1086 | 1086 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
| 1087 | - trigger_error('Undefined property via __set(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
| 1087 | + trigger_error('Undefined property via __set(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
| 1088 | 1088 | } |
| 1089 | 1089 | } |
| 1090 | 1090 | |
@@ -1092,11 +1092,11 @@ discard block |
||
| 1092 | 1092 | { |
| 1093 | 1093 | switch ($name) { |
| 1094 | 1094 | case 'accept': |
| 1095 | - $this->logDeprecation('Checking property XMLParser::' . $name . ' is deprecated'); |
|
| 1095 | + $this->logDeprecation('Checking property XMLParser::'.$name.' is deprecated'); |
|
| 1096 | 1096 | return isset($this->current_parsing_options['accept']); |
| 1097 | 1097 | case '_xh': |
| 1098 | 1098 | case 'xmlrpc_valid_parents': |
| 1099 | - $this->logDeprecation('Checking property XMLParser::' . $name . ' is deprecated'); |
|
| 1099 | + $this->logDeprecation('Checking property XMLParser::'.$name.' is deprecated'); |
|
| 1100 | 1100 | return isset($this->$name); |
| 1101 | 1101 | default: |
| 1102 | 1102 | return false; |
@@ -1108,18 +1108,18 @@ discard block |
||
| 1108 | 1108 | switch ($name) { |
| 1109 | 1109 | // q: does this make sense at all? |
| 1110 | 1110 | case 'accept': |
| 1111 | - $this->logDeprecation('Unsetting property XMLParser::' . $name . ' is deprecated'); |
|
| 1111 | + $this->logDeprecation('Unsetting property XMLParser::'.$name.' is deprecated'); |
|
| 1112 | 1112 | unset($this->current_parsing_options['accept']); |
| 1113 | 1113 | break; |
| 1114 | 1114 | case '_xh': |
| 1115 | 1115 | case 'xmlrpc_valid_parents': |
| 1116 | - $this->logDeprecation('Unsetting property XMLParser::' . $name . ' is deprecated'); |
|
| 1116 | + $this->logDeprecation('Unsetting property XMLParser::'.$name.' is deprecated'); |
|
| 1117 | 1117 | unset($this->$name); |
| 1118 | 1118 | break; |
| 1119 | 1119 | default: |
| 1120 | 1120 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
| 1121 | 1121 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
| 1122 | - trigger_error('Undefined property via __unset(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
| 1122 | + trigger_error('Undefined property via __unset(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
| 1123 | 1123 | } |
| 1124 | 1124 | } |
| 1125 | 1125 | } |
@@ -84,7 +84,7 @@ discard block |
||
| 84 | 84 | |
| 85 | 85 | return true; |
| 86 | 86 | } else { |
| 87 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': value passed in must be a PhpXmlRpc\Value'); |
|
| 87 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.': value passed in must be a PhpXmlRpc\Value'); |
|
| 88 | 88 | return false; |
| 89 | 89 | } |
| 90 | 90 | } |
@@ -134,17 +134,17 @@ discard block |
||
| 134 | 134 | $this->logDeprecationUnlessCalledBy('serialize'); |
| 135 | 135 | |
| 136 | 136 | if ($charsetEncoding != '') { |
| 137 | - $this->content_type = 'text/xml; charset=' . $charsetEncoding; |
|
| 137 | + $this->content_type = 'text/xml; charset='.$charsetEncoding; |
|
| 138 | 138 | } else { |
| 139 | 139 | $this->content_type = 'text/xml'; |
| 140 | 140 | } |
| 141 | 141 | |
| 142 | 142 | $result = $this->xml_header($charsetEncoding); |
| 143 | - $result .= '<methodName>' . $this->getCharsetEncoder()->encodeEntities( |
|
| 144 | - $this->methodname, PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding) . "</methodName>\n"; |
|
| 143 | + $result .= '<methodName>'.$this->getCharsetEncoder()->encodeEntities( |
|
| 144 | + $this->methodname, PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding)."</methodName>\n"; |
|
| 145 | 145 | $result .= "<params>\n"; |
| 146 | 146 | foreach ($this->params as $p) { |
| 147 | - $result .= "<param>\n" . $p->serialize($charsetEncoding) . |
|
| 147 | + $result .= "<param>\n".$p->serialize($charsetEncoding). |
|
| 148 | 148 | "</param>\n"; |
| 149 | 149 | } |
| 150 | 150 | $result .= "</params>\n"; |
@@ -164,9 +164,9 @@ discard block |
||
| 164 | 164 | $this->logDeprecationUnlessCalledBy('createPayload'); |
| 165 | 165 | |
| 166 | 166 | if ($charsetEncoding != '') { |
| 167 | - return "<?xml version=\"1.0\" encoding=\"$charsetEncoding\" ?" . ">\n<methodCall>\n"; |
|
| 167 | + return "<?xml version=\"1.0\" encoding=\"$charsetEncoding\" ?".">\n<methodCall>\n"; |
|
| 168 | 168 | } else { |
| 169 | - return "<?xml version=\"1.0\"?" . ">\n<methodCall>\n"; |
|
| 169 | + return "<?xml version=\"1.0\"?".">\n<methodCall>\n"; |
|
| 170 | 170 | } |
| 171 | 171 | } |
| 172 | 172 | |
@@ -228,14 +228,14 @@ discard block |
||
| 228 | 228 | */ |
| 229 | 229 | public function parseResponse($data = '', $headersProcessed = false, $returnType = XMLParser::RETURN_XMLRPCVALS) |
| 230 | 230 | { |
| 231 | - if ($this->debug > 0) { |
|
| 231 | + if ($this->debug>0) { |
|
| 232 | 232 | $this->getLogger()->debug("---GOT---\n$data\n---END---"); |
| 233 | 233 | } |
| 234 | 234 | |
| 235 | 235 | $this->httpResponse = array('raw_data' => $data, 'headers' => array(), 'cookies' => array()); |
| 236 | 236 | |
| 237 | 237 | if ($data == '') { |
| 238 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': no response received from server.'); |
|
| 238 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.': no response received from server.'); |
|
| 239 | 239 | return new Response(0, PhpXmlRpc::$xmlrpcerr['no_data'], PhpXmlRpc::$xmlrpcstr['no_data']); |
| 240 | 240 | } |
| 241 | 241 | |
@@ -243,12 +243,12 @@ discard block |
||
| 243 | 243 | if (substr($data, 0, 4) == 'HTTP') { |
| 244 | 244 | $httpParser = new Http(); |
| 245 | 245 | try { |
| 246 | - $httpResponse = $httpParser->parseResponseHeaders($data, $headersProcessed, $this->debug > 0); |
|
| 246 | + $httpResponse = $httpParser->parseResponseHeaders($data, $headersProcessed, $this->debug>0); |
|
| 247 | 247 | } catch (HttpException $e) { |
| 248 | 248 | // failed processing of HTTP response headers |
| 249 | 249 | // save into response obj the full payload received, for debugging |
| 250 | 250 | return new Response(0, $e->getCode(), $e->getMessage(), '', array('raw_data' => $data, 'status_code' => $e->statusCode())); |
| 251 | - } catch(\Exception $e) { |
|
| 251 | + } catch (\Exception $e) { |
|
| 252 | 252 | return new Response(0, $e->getCode(), $e->getMessage(), '', array('raw_data' => $data)); |
| 253 | 253 | } |
| 254 | 254 | } else { |
@@ -264,7 +264,7 @@ discard block |
||
| 264 | 264 | // idea from Luca Mariano, originally in PEARified version of the lib |
| 265 | 265 | $pos = strrpos($data, '</methodResponse>'); |
| 266 | 266 | if ($pos !== false) { |
| 267 | - $data = substr($data, 0, $pos + 17); |
|
| 267 | + $data = substr($data, 0, $pos+17); |
|
| 268 | 268 | } |
| 269 | 269 | |
| 270 | 270 | // try to 'guestimate' the character encoding of the received response |
@@ -273,21 +273,21 @@ discard block |
||
| 273 | 273 | $data |
| 274 | 274 | ); |
| 275 | 275 | |
| 276 | - if ($this->debug >= 0) { |
|
| 276 | + if ($this->debug>=0) { |
|
| 277 | 277 | $this->httpResponse = $httpResponse; |
| 278 | 278 | } else { |
| 279 | 279 | $httpResponse = null; |
| 280 | 280 | } |
| 281 | 281 | |
| 282 | - if ($this->debug > 0) { |
|
| 282 | + if ($this->debug>0) { |
|
| 283 | 283 | $start = strpos($data, '<!-- SERVER DEBUG INFO (BASE64 ENCODED):'); |
| 284 | 284 | if ($start) { |
| 285 | 285 | $start += strlen('<!-- SERVER DEBUG INFO (BASE64 ENCODED):'); |
| 286 | 286 | /// @todo what if there is no end tag? |
| 287 | 287 | $end = strpos($data, '-->', $start); |
| 288 | - $comments = substr($data, $start, $end - $start); |
|
| 289 | - $this->getLogger()->debug("---SERVER DEBUG INFO (DECODED)---\n\t" . |
|
| 290 | - str_replace("\n", "\n\t", base64_decode($comments)) . "\n---END---", array('encoding' => $respEncoding)); |
|
| 288 | + $comments = substr($data, $start, $end-$start); |
|
| 289 | + $this->getLogger()->debug("---SERVER DEBUG INFO (DECODED)---\n\t". |
|
| 290 | + str_replace("\n", "\n\t", base64_decode($comments))."\n---END---", array('encoding' => $respEncoding)); |
|
| 291 | 291 | } |
| 292 | 292 | } |
| 293 | 293 | |
@@ -309,7 +309,7 @@ discard block |
||
| 309 | 309 | if ($respEncoding == 'ISO-8859-1') { |
| 310 | 310 | $data = utf8_encode($data); |
| 311 | 311 | } else { |
| 312 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': unsupported charset encoding of received response: ' . $respEncoding); |
|
| 312 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.': unsupported charset encoding of received response: '.$respEncoding); |
|
| 313 | 313 | } |
| 314 | 314 | } |
| 315 | 315 | } |
@@ -339,16 +339,16 @@ discard block |
||
| 339 | 339 | // there could be proxies meddling with the request, or network data corruption... |
| 340 | 340 | |
| 341 | 341 | $r = new Response(0, PhpXmlRpc::$xmlrpcerr['invalid_xml'], |
| 342 | - PhpXmlRpc::$xmlrpcstr['invalid_xml'] . ' ' . $_xh['isf_reason'], '', $httpResponse); |
|
| 342 | + PhpXmlRpc::$xmlrpcstr['invalid_xml'].' '.$_xh['isf_reason'], '', $httpResponse); |
|
| 343 | 343 | |
| 344 | - if ($this->debug > 0) { |
|
| 344 | + if ($this->debug>0) { |
|
| 345 | 345 | $this->getLogger()->debug($_xh['isf_reason']); |
| 346 | 346 | } |
| 347 | 347 | } |
| 348 | 348 | // second error check: xml well-formed but not xml-rpc compliant |
| 349 | 349 | elseif ($_xh['isf'] == 2) { |
| 350 | 350 | $r = new Response(0, PhpXmlRpc::$xmlrpcerr['xml_not_compliant'], |
| 351 | - PhpXmlRpc::$xmlrpcstr['xml_not_compliant'] . ' ' . $_xh['isf_reason'], '', $httpResponse); |
|
| 351 | + PhpXmlRpc::$xmlrpcstr['xml_not_compliant'].' '.$_xh['isf_reason'], '', $httpResponse); |
|
| 352 | 352 | |
| 353 | 353 | /// @todo echo something for the user? check if it was already done by the parser... |
| 354 | 354 | //if ($this->debug > 0) { |
@@ -358,7 +358,7 @@ discard block |
||
| 358 | 358 | // third error check: parsing of the response has somehow gone boink. |
| 359 | 359 | /// @todo shall we omit the 2nd part of this check, since we trust the parsing code? |
| 360 | 360 | /// Either that, or check the fault results too... |
| 361 | - elseif ($_xh['isf'] > 3 || ($returnType == XMLParser::RETURN_XMLRPCVALS && !$_xh['isf'] && !is_object($_xh['value']))) { |
|
| 361 | + elseif ($_xh['isf']>3 || ($returnType == XMLParser::RETURN_XMLRPCVALS && !$_xh['isf'] && !is_object($_xh['value']))) { |
|
| 362 | 362 | // something odd has happened and it's time to generate a client side error indicating something odd went on |
| 363 | 363 | $r = new Response(0, PhpXmlRpc::$xmlrpcerr['xml_parsing_error'], PhpXmlRpc::$xmlrpcstr['xml_parsing_error'], |
| 364 | 364 | '', $httpResponse |
@@ -366,7 +366,7 @@ discard block |
||
| 366 | 366 | |
| 367 | 367 | /// @todo echo something for the user? |
| 368 | 368 | } else { |
| 369 | - if ($this->debug > 1) { |
|
| 369 | + if ($this->debug>1) { |
|
| 370 | 370 | $this->getLogger()->debug( |
| 371 | 371 | "---PARSED---\n".var_export($_xh['value'], true)."\n---END---" |
| 372 | 372 | ); |
@@ -390,7 +390,7 @@ discard block |
||
| 390 | 390 | if ($errNo == 0) { |
| 391 | 391 | // FAULT returned, errno needs to reflect that |
| 392 | 392 | /// @todo feature creep - add this code to PhpXmlRpc::$xmlrpcerr |
| 393 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': fault response received with faultCode 0 or null. Converted it to -1'); |
|
| 393 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.': fault response received with faultCode 0 or null. Converted it to -1'); |
|
| 394 | 394 | /// @todo in Encoder::decodeXML, we use PhpXmlRpc::$xmlrpcerr['invalid_return'] for this case (see |
| 395 | 395 | /// also the todo 17 lines above) |
| 396 | 396 | $errNo = -1; |
@@ -438,7 +438,7 @@ discard block |
||
| 438 | 438 | case '_php_class': |
| 439 | 439 | case 'payload': |
| 440 | 440 | case 'content_type': |
| 441 | - $this->logDeprecation('Getting property Request::' . $name . ' is deprecated'); |
|
| 441 | + $this->logDeprecation('Getting property Request::'.$name.' is deprecated'); |
|
| 442 | 442 | return $this->$name; |
| 443 | 443 | case 'httpResponse': |
| 444 | 444 | // manually implement the 'protected property' behaviour |
@@ -450,16 +450,16 @@ discard block |
||
| 450 | 450 | } |
| 451 | 451 | } |
| 452 | 452 | if ($canAccess) { |
| 453 | - $this->logDeprecation('Getting property Request::' . $name . ' is deprecated'); |
|
| 453 | + $this->logDeprecation('Getting property Request::'.$name.' is deprecated'); |
|
| 454 | 454 | return $this->httpResponse; |
| 455 | 455 | } else { |
| 456 | - trigger_error("Cannot access protected property Request::httpResponse in " . __FILE__, E_USER_ERROR); |
|
| 456 | + trigger_error("Cannot access protected property Request::httpResponse in ".__FILE__, E_USER_ERROR); |
|
| 457 | 457 | } |
| 458 | 458 | break; |
| 459 | 459 | default: |
| 460 | 460 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
| 461 | 461 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
| 462 | - trigger_error('Undefined property via __get(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
| 462 | + trigger_error('Undefined property via __get(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
| 463 | 463 | $result = null; |
| 464 | 464 | return $result; |
| 465 | 465 | } |
@@ -473,7 +473,7 @@ discard block |
||
| 473 | 473 | case 'debug': |
| 474 | 474 | case 'payload': |
| 475 | 475 | case 'content_type': |
| 476 | - $this->logDeprecation('Setting property Request::' . $name . ' is deprecated'); |
|
| 476 | + $this->logDeprecation('Setting property Request::'.$name.' is deprecated'); |
|
| 477 | 477 | $this->$name = $value; |
| 478 | 478 | break; |
| 479 | 479 | case 'httpResponse': |
@@ -486,16 +486,16 @@ discard block |
||
| 486 | 486 | } |
| 487 | 487 | } |
| 488 | 488 | if ($canAccess) { |
| 489 | - $this->logDeprecation('Setting property Request::' . $name . ' is deprecated'); |
|
| 489 | + $this->logDeprecation('Setting property Request::'.$name.' is deprecated'); |
|
| 490 | 490 | $this->httpResponse = $value; |
| 491 | 491 | } else { |
| 492 | - trigger_error("Cannot access protected property Request::httpResponse in " . __FILE__, E_USER_ERROR); |
|
| 492 | + trigger_error("Cannot access protected property Request::httpResponse in ".__FILE__, E_USER_ERROR); |
|
| 493 | 493 | } |
| 494 | 494 | break; |
| 495 | 495 | default: |
| 496 | 496 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
| 497 | 497 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
| 498 | - trigger_error('Undefined property via __set(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
| 498 | + trigger_error('Undefined property via __set(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
| 499 | 499 | } |
| 500 | 500 | } |
| 501 | 501 | |
@@ -507,7 +507,7 @@ discard block |
||
| 507 | 507 | case 'debug': |
| 508 | 508 | case 'payload': |
| 509 | 509 | case 'content_type': |
| 510 | - $this->logDeprecation('Checking property Request::' . $name . ' is deprecated'); |
|
| 510 | + $this->logDeprecation('Checking property Request::'.$name.' is deprecated'); |
|
| 511 | 511 | return isset($this->$name); |
| 512 | 512 | case 'httpResponse': |
| 513 | 513 | // manually implement the 'protected property' behaviour |
@@ -519,7 +519,7 @@ discard block |
||
| 519 | 519 | } |
| 520 | 520 | } |
| 521 | 521 | if ($canAccess) { |
| 522 | - $this->logDeprecation('Checking property Request::' . $name . ' is deprecated'); |
|
| 522 | + $this->logDeprecation('Checking property Request::'.$name.' is deprecated'); |
|
| 523 | 523 | return isset($this->httpResponse); |
| 524 | 524 | } |
| 525 | 525 | // break through voluntarily |
@@ -536,7 +536,7 @@ discard block |
||
| 536 | 536 | case 'debug': |
| 537 | 537 | case 'payload': |
| 538 | 538 | case 'content_type': |
| 539 | - $this->logDeprecation('Unsetting property Request::' . $name . ' is deprecated'); |
|
| 539 | + $this->logDeprecation('Unsetting property Request::'.$name.' is deprecated'); |
|
| 540 | 540 | unset($this->$name); |
| 541 | 541 | break; |
| 542 | 542 | case 'httpResponse': |
@@ -549,16 +549,16 @@ discard block |
||
| 549 | 549 | } |
| 550 | 550 | } |
| 551 | 551 | if ($canAccess) { |
| 552 | - $this->logDeprecation('Unsetting property Request::' . $name . ' is deprecated'); |
|
| 552 | + $this->logDeprecation('Unsetting property Request::'.$name.' is deprecated'); |
|
| 553 | 553 | unset($this->httpResponse); |
| 554 | 554 | } else { |
| 555 | - trigger_error("Cannot access protected property Request::httpResponse in " . __FILE__, E_USER_ERROR); |
|
| 555 | + trigger_error("Cannot access protected property Request::httpResponse in ".__FILE__, E_USER_ERROR); |
|
| 556 | 556 | } |
| 557 | 557 | break; |
| 558 | 558 | default: |
| 559 | 559 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
| 560 | 560 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
| 561 | - trigger_error('Undefined property via __unset(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
| 561 | + trigger_error('Undefined property via __unset(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
| 562 | 562 | } |
| 563 | 563 | } |
| 564 | 564 | } |
@@ -1,8 +1,8 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -include_once __DIR__ . '/../lib/xmlrpc_wrappers.inc'; |
|
| 3 | +include_once __DIR__.'/../lib/xmlrpc_wrappers.inc'; |
|
| 4 | 4 | |
| 5 | -include_once __DIR__ . '/ServerAwareTestCase.php'; |
|
| 5 | +include_once __DIR__.'/ServerAwareTestCase.php'; |
|
| 6 | 6 | |
| 7 | 7 | /** |
| 8 | 8 | * Tests which involve interaction with the server - carried out via the client. |
@@ -29,7 +29,7 @@ discard block |
||
| 29 | 29 | // (but only if not called from subclass objects / multitests) |
| 30 | 30 | if (function_exists('debug_backtrace') && strtolower(get_called_class()) == 'localhosttests') { |
| 31 | 31 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS); |
| 32 | - for ($i = 0; $i < count($trace); $i++) { |
|
| 32 | + for ($i = 0; $i<count($trace); $i++) { |
|
| 33 | 33 | if (strpos($trace[$i]['function'], 'test') === 0) { |
| 34 | 34 | self::$failed_tests[$trace[$i]['function']] = true; |
| 35 | 35 | break; |
@@ -65,9 +65,9 @@ discard block |
||
| 65 | 65 | } |
| 66 | 66 | $this->validateResponse($r); |
| 67 | 67 | if (is_array($errorCode)) { |
| 68 | - $this->assertContains($r->faultCode(), $errorCode, 'Error ' . $r->faultCode() . ' connecting to server: ' . $r->faultString()); |
|
| 68 | + $this->assertContains($r->faultCode(), $errorCode, 'Error '.$r->faultCode().' connecting to server: '.$r->faultString()); |
|
| 69 | 69 | } else { |
| 70 | - $this->assertEquals($errorCode, $r->faultCode(), 'Error ' . $r->faultCode() . ' connecting to server: ' . $r->faultString()); |
|
| 70 | + $this->assertEquals($errorCode, $r->faultCode(), 'Error '.$r->faultCode().' connecting to server: '.$r->faultString()); |
|
| 71 | 71 | } |
| 72 | 72 | if (!$r->faultCode()) { |
| 73 | 73 | if ($returnResponse) { |
@@ -94,20 +94,20 @@ discard block |
||
| 94 | 94 | $query = parse_url($this->client->path, PHP_URL_QUERY); |
| 95 | 95 | parse_str($query, $vars); |
| 96 | 96 | $query = http_build_query(array_merge($vars, $data)); |
| 97 | - $this->client->path = parse_url($this->client->path, PHP_URL_PATH) . '?' . $query; |
|
| 97 | + $this->client->path = parse_url($this->client->path, PHP_URL_PATH).'?'.$query; |
|
| 98 | 98 | } |
| 99 | 99 | |
| 100 | 100 | public function testString() |
| 101 | 101 | { |
| 102 | - $sendString = "here are 3 \"entities\": < > & " . |
|
| 103 | - "and here's a dollar sign: \$pretendvarname and a backslash too: " . chr(92) . |
|
| 104 | - " - isn't that great? \\\"hackery\\\" at it's best " . |
|
| 105 | - " also don't want to miss out on \$item[0]. " . |
|
| 106 | - "The real weird stuff follows: CRLF here" . chr(13) . chr(10) . |
|
| 107 | - "a simple CR here" . chr(13) . |
|
| 108 | - "a simple LF here" . chr(10) . |
|
| 109 | - "and then LFCR" . chr(10) . chr(13) . |
|
| 110 | - "last but not least weird names: G" . chr(252) . "nter, El" . chr(232) . "ne, and an xml comment closing tag: -->"; |
|
| 102 | + $sendString = "here are 3 \"entities\": < > & ". |
|
| 103 | + "and here's a dollar sign: \$pretendvarname and a backslash too: ".chr(92). |
|
| 104 | + " - isn't that great? \\\"hackery\\\" at it's best ". |
|
| 105 | + " also don't want to miss out on \$item[0]. ". |
|
| 106 | + "The real weird stuff follows: CRLF here".chr(13).chr(10). |
|
| 107 | + "a simple CR here".chr(13). |
|
| 108 | + "a simple LF here".chr(10). |
|
| 109 | + "and then LFCR".chr(10).chr(13). |
|
| 110 | + "last but not least weird names: G".chr(252)."nter, El".chr(232)."ne, and an xml comment closing tag: -->"; |
|
| 111 | 111 | $m = new xmlrpcmsg('examples.stringecho', array( |
| 112 | 112 | new xmlrpcval($sendString, 'string'), |
| 113 | 113 | )); |
@@ -128,7 +128,7 @@ discard block |
||
| 128 | 128 | public function testLatin1String() |
| 129 | 129 | { |
| 130 | 130 | $sendString = |
| 131 | - "last but not least weird names: G" . chr(252) . "nter, El" . chr(232) . "ne"; |
|
| 131 | + "last but not least weird names: G".chr(252)."nter, El".chr(232)."ne"; |
|
| 132 | 132 | $x = '<?xml version="1.0" encoding="ISO-8859-1"?><methodCall><methodName>examples.stringecho</methodName><params><param><value>'. |
| 133 | 133 | $sendString. |
| 134 | 134 | '</value></param></params></methodCall>'; |
@@ -237,7 +237,7 @@ discard block |
||
| 237 | 237 | public function testUtf8Method() |
| 238 | 238 | { |
| 239 | 239 | PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding = 'UTF-8'; |
| 240 | - $m = new xmlrpcmsg("tests.utf8methodname." . 'κόσμε', array( |
|
| 240 | + $m = new xmlrpcmsg("tests.utf8methodname.".'κόσμε', array( |
|
| 241 | 241 | new xmlrpcval('hello') |
| 242 | 242 | )); |
| 243 | 243 | $v = $this->send($m); |
@@ -258,7 +258,7 @@ discard block |
||
| 258 | 258 | )); |
| 259 | 259 | $v = $this->send($m); |
| 260 | 260 | if ($v) { |
| 261 | - $this->assertEquals($a + $b, $v->scalarval()); |
|
| 261 | + $this->assertEquals($a+$b, $v->scalarval()); |
|
| 262 | 262 | } |
| 263 | 263 | } |
| 264 | 264 | |
@@ -270,7 +270,7 @@ discard block |
||
| 270 | 270 | )); |
| 271 | 271 | $v = $this->send($m); |
| 272 | 272 | if ($v) { |
| 273 | - $this->assertEquals(12 - 23, $v->scalarval()); |
|
| 273 | + $this->assertEquals(12-23, $v->scalarval()); |
|
| 274 | 274 | } |
| 275 | 275 | } |
| 276 | 276 | |
@@ -309,7 +309,7 @@ discard block |
||
| 309 | 309 | if ($v) { |
| 310 | 310 | $sz = $v->arraysize(); |
| 311 | 311 | $got = ''; |
| 312 | - for ($i = 0; $i < $sz; $i++) { |
|
| 312 | + for ($i = 0; $i<$sz; $i++) { |
|
| 313 | 313 | $b = $v->arraymem($i); |
| 314 | 314 | if ($b->scalarval()) { |
| 315 | 315 | $got .= '1'; |
@@ -356,7 +356,7 @@ discard block |
||
| 356 | 356 | $got = ''; |
| 357 | 357 | $expected = '37210'; |
| 358 | 358 | $expect_array = array('ctLeftAngleBrackets', 'ctRightAngleBrackets', 'ctAmpersands', 'ctApostrophes', 'ctQuotes'); |
| 359 | - foreach($expect_array as $val) { |
|
| 359 | + foreach ($expect_array as $val) { |
|
| 360 | 360 | $b = $v->structmem($val); |
| 361 | 361 | $got .= $b->scalarVal(); |
| 362 | 362 | } |
@@ -859,7 +859,7 @@ discard block |
||
| 859 | 859 | { |
| 860 | 860 | // make a 'deep client copy' as the original one might have many properties set |
| 861 | 861 | // also for speed only wrap one method of the whole server |
| 862 | - $class = wrap_xmlrpc_server($this->client, array('simple_client_copy' => 0, 'method_filter' => '/examples\.getStateName/' )); |
|
| 862 | + $class = wrap_xmlrpc_server($this->client, array('simple_client_copy' => 0, 'method_filter' => '/examples\.getStateName/')); |
|
| 863 | 863 | if ($class == '') { |
| 864 | 864 | $this->fail('Registration of remote server failed'); |
| 865 | 865 | } else { |
@@ -898,9 +898,9 @@ discard block |
||
| 898 | 898 | $cookies = array( |
| 899 | 899 | //'c1' => array(), |
| 900 | 900 | 'c2' => array('value' => 'c2'), |
| 901 | - 'c3' => array('value' => 'c3', 'expires' => time() + 60 * 60 * 24 * 30), |
|
| 902 | - 'c4' => array('value' => 'c4', 'expires' => time() + 60 * 60 * 24 * 30, 'path' => '/'), |
|
| 903 | - 'c5' => array('value' => 'c5', 'expires' => time() + 60 * 60 * 24 * 30, 'path' => '/', 'domain' => 'localhost'), |
|
| 901 | + 'c3' => array('value' => 'c3', 'expires' => time()+60 * 60 * 24 * 30), |
|
| 902 | + 'c4' => array('value' => 'c4', 'expires' => time()+60 * 60 * 24 * 30, 'path' => '/'), |
|
| 903 | + 'c5' => array('value' => 'c5', 'expires' => time()+60 * 60 * 24 * 30, 'path' => '/', 'domain' => 'localhost'), |
|
| 904 | 904 | ); |
| 905 | 905 | $cookiesval = php_xmlrpc_encode($cookies); |
| 906 | 906 | $m = new xmlrpcmsg('tests.setcookies', array($cookiesval)); |
@@ -948,10 +948,10 @@ discard block |
||
| 948 | 948 | $m = new xmlrpcmsg('tests.getcookies', array()); |
| 949 | 949 | foreach ($cookies as $cookie => $val) { |
| 950 | 950 | $this->client->setCookie($cookie, $val); |
| 951 | - $cookies[$cookie] = (string)$cookies[$cookie]; |
|
| 951 | + $cookies[$cookie] = (string) $cookies[$cookie]; |
|
| 952 | 952 | } |
| 953 | 953 | $r = $this->client->send($m, $this->timeout, $this->method); |
| 954 | - $this->assertEquals(0, $r->faultCode(), 'Error ' . $r->faultCode() . ' connecting to server: ' . $r->faultString()); |
|
| 954 | + $this->assertEquals(0, $r->faultCode(), 'Error '.$r->faultCode().' connecting to server: '.$r->faultString()); |
|
| 955 | 955 | if (!$r->faultCode()) { |
| 956 | 956 | $v = $r->value(); |
| 957 | 957 | $v = php_xmlrpc_decode($v); |
@@ -1,6 +1,6 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -include_once __DIR__ . '/ServerAwareTestCase.php'; |
|
| 3 | +include_once __DIR__.'/ServerAwareTestCase.php'; |
|
| 4 | 4 | |
| 5 | 5 | /** |
| 6 | 6 | * Tests involving the Client class (and mostly no server). |
@@ -59,7 +59,7 @@ discard block |
||
| 59 | 59 | $this->client->server .= 'XXX'; |
| 60 | 60 | $dnsinfo = @dns_get_record($this->client->server); |
| 61 | 61 | if ($dnsinfo) { |
| 62 | - $this->markTestSkipped('Seems like there is a catchall DNS in effect: host ' . $this->client->server . ' found'); |
|
| 62 | + $this->markTestSkipped('Seems like there is a catchall DNS in effect: host '.$this->client->server.' found'); |
|
| 63 | 63 | } else { |
| 64 | 64 | $m = new xmlrpcmsg('examples.echo', array( |
| 65 | 65 | new xmlrpcval('hello', 'string'), |
@@ -89,7 +89,7 @@ discard block |
||
| 89 | 89 | |
| 90 | 90 | // now test a successful connection |
| 91 | 91 | $server = explode(':', $this->args['HTTPSERVER']); |
| 92 | - if (count($server) > 1) { |
|
| 92 | + if (count($server)>1) { |
|
| 93 | 93 | $this->client->port = $server[1]; |
| 94 | 94 | } |
| 95 | 95 | $this->client->server = $server[0]; |
@@ -1,6 +1,6 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -include_once __DIR__ . '/LoggerAwareTestCase.php'; |
|
| 3 | +include_once __DIR__.'/LoggerAwareTestCase.php'; |
|
| 4 | 4 | |
| 5 | 5 | use PHPUnit\Extensions\SeleniumCommon\RemoteCoverage; |
| 6 | 6 | use PHPUnit\Framework\TestResult; |
@@ -30,7 +30,7 @@ discard block |
||
| 30 | 30 | */ |
| 31 | 31 | public function _run($result = NULL) |
| 32 | 32 | { |
| 33 | - $this->testId = get_class($this) . '__' . $this->getName(); |
|
| 33 | + $this->testId = get_class($this).'__'.$this->getName(); |
|
| 34 | 34 | |
| 35 | 35 | if ($result === NULL) { |
| 36 | 36 | $result = $this->createResult(); |
@@ -62,13 +62,13 @@ discard block |
||
| 62 | 62 | |
| 63 | 63 | // Set up a database connection or other fixture which needs to be available. |
| 64 | 64 | self::$randId = uniqid(); |
| 65 | - file_put_contents(sys_get_temp_dir() . '/phpunit_rand_id.txt', self::$randId); |
|
| 65 | + file_put_contents(sys_get_temp_dir().'/phpunit_rand_id.txt', self::$randId); |
|
| 66 | 66 | } |
| 67 | 67 | |
| 68 | 68 | public static function tear_down_after_class() |
| 69 | 69 | { |
| 70 | - if (is_file(sys_get_temp_dir() . '/phpunit_rand_id.txt')) { |
|
| 71 | - unlink(sys_get_temp_dir() . '/phpunit_rand_id.txt'); |
|
| 70 | + if (is_file(sys_get_temp_dir().'/phpunit_rand_id.txt')) { |
|
| 71 | + unlink(sys_get_temp_dir().'/phpunit_rand_id.txt'); |
|
| 72 | 72 | } |
| 73 | 73 | |
| 74 | 74 | parent::tear_down_after_class(); |
@@ -79,14 +79,14 @@ discard block |
||
| 79 | 79 | parent::set_up(); |
| 80 | 80 | |
| 81 | 81 | // assumes HTTPURI to be in the form /tests/index.php?etc... |
| 82 | - $this->baseUrl = 'http://' . $this->args['HTTPSERVER'] . preg_replace('|\?.+|', '', $this->args['HTTPURI']); |
|
| 83 | - $this->coverageScriptUrl = 'http://' . $this->args['HTTPSERVER'] . preg_replace('|/tests/index\.php(\?.*)?|', '/tests/phpunit_coverage.php', $this->args['HTTPURI']); |
|
| 82 | + $this->baseUrl = 'http://'.$this->args['HTTPSERVER'].preg_replace('|\?.+|', '', $this->args['HTTPURI']); |
|
| 83 | + $this->coverageScriptUrl = 'http://'.$this->args['HTTPSERVER'].preg_replace('|/tests/index\.php(\?.*)?|', '/tests/phpunit_coverage.php', $this->args['HTTPURI']); |
|
| 84 | 84 | } |
| 85 | 85 | |
| 86 | 86 | protected function getClient() |
| 87 | 87 | { |
| 88 | 88 | $server = explode(':', $this->args['HTTPSERVER']); |
| 89 | - if (count($server) > 1) { |
|
| 89 | + if (count($server)>1) { |
|
| 90 | 90 | $client = new xmlrpc_client($this->args['HTTPURI'], $server[0], $server[1]); |
| 91 | 91 | } else { |
| 92 | 92 | $client = new xmlrpc_client($this->args['HTTPURI'], $this->args['HTTPSERVER']); |