@@ -66,7 +66,7 @@ discard block |
||
66 | 66 | public function xmlrpc_se($parser, $name, $attrs, $acceptSingleVals = false) |
67 | 67 | { |
68 | 68 | // if invalid xmlrpc already detected, skip all processing |
69 | - if ($this->_xh['isf'] < 2) { |
|
69 | + if ($this->_xh['isf']<2) { |
|
70 | 70 | // check for correct element nesting |
71 | 71 | // top level element can only be of 2 types |
72 | 72 | /// @todo optimization creep: save this check into a bool variable, instead of using count() every time: |
@@ -171,7 +171,7 @@ discard block |
||
171 | 171 | $this->_xh['isf'] = 1; |
172 | 172 | break; |
173 | 173 | case 'MEMBER': |
174 | - $this->_xh['valuestack'][count($this->_xh['valuestack']) - 1]['name'] = ''; // set member name to null, in case we do not find in the xml later on |
|
174 | + $this->_xh['valuestack'][count($this->_xh['valuestack'])-1]['name'] = ''; // set member name to null, in case we do not find in the xml later on |
|
175 | 175 | //$this->_xh['ac']=''; |
176 | 176 | // Drop trough intentionally |
177 | 177 | case 'PARAM': |
@@ -223,7 +223,7 @@ discard block |
||
223 | 223 | */ |
224 | 224 | public function xmlrpc_ee($parser, $name, $rebuildXmlrpcvals = true) |
225 | 225 | { |
226 | - if ($this->_xh['isf'] < 2) { |
|
226 | + if ($this->_xh['isf']<2) { |
|
227 | 227 | // push this element name from stack |
228 | 228 | // NB: if XML validates, correct opening/closing is guaranteed and |
229 | 229 | // we do not have to check for $name == $currElem. |
@@ -249,8 +249,8 @@ discard block |
||
249 | 249 | // check if we are inside an array or struct: |
250 | 250 | // if value just built is inside an array, let's move it into array on the stack |
251 | 251 | $vscount = count($this->_xh['valuestack']); |
252 | - if ($vscount && $this->_xh['valuestack'][$vscount - 1]['type'] == 'ARRAY') { |
|
253 | - $this->_xh['valuestack'][$vscount - 1]['values'][] = $temp; |
|
252 | + if ($vscount && $this->_xh['valuestack'][$vscount-1]['type'] == 'ARRAY') { |
|
253 | + $this->_xh['valuestack'][$vscount-1]['values'][] = $temp; |
|
254 | 254 | } else { |
255 | 255 | $this->_xh['value'] = $temp; |
256 | 256 | } |
@@ -264,8 +264,8 @@ discard block |
||
264 | 264 | // check if we are inside an array or struct: |
265 | 265 | // if value just built is inside an array, let's move it into array on the stack |
266 | 266 | $vscount = count($this->_xh['valuestack']); |
267 | - if ($vscount && $this->_xh['valuestack'][$vscount - 1]['type'] == 'ARRAY') { |
|
268 | - $this->_xh['valuestack'][$vscount - 1]['values'][] = $this->_xh['value']; |
|
267 | + if ($vscount && $this->_xh['valuestack'][$vscount-1]['type'] == 'ARRAY') { |
|
268 | + $this->_xh['valuestack'][$vscount-1]['values'][] = $this->_xh['value']; |
|
269 | 269 | } |
270 | 270 | } |
271 | 271 | break; |
@@ -285,7 +285,7 @@ discard block |
||
285 | 285 | $this->_xh['value'] = $this->_xh['ac']; |
286 | 286 | } elseif ($name == 'DATETIME.ISO8601') { |
287 | 287 | if (!preg_match('/^[0-9]{8}T[0-9]{2}:[0-9]{2}:[0-9]{2}$/', $this->_xh['ac'])) { |
288 | - error_log('XML-RPC: ' . __METHOD__ . ': invalid value received in DATETIME: ' . $this->_xh['ac']); |
|
288 | + error_log('XML-RPC: '.__METHOD__.': invalid value received in DATETIME: '.$this->_xh['ac']); |
|
289 | 289 | } |
290 | 290 | $this->_xh['vt'] = Value::$xmlrpcDateTime; |
291 | 291 | $this->_xh['value'] = $this->_xh['ac']; |
@@ -304,7 +304,7 @@ discard block |
||
304 | 304 | } else { |
305 | 305 | // log if receiving something strange, even though we set the value to false anyway |
306 | 306 | if ($this->_xh['ac'] != '0' && strcasecmp($this->_xh['ac'], 'false') != 0) { |
307 | - error_log('XML-RPC: ' . __METHOD__ . ': invalid value received in BOOLEAN: ' . $this->_xh['ac']); |
|
307 | + error_log('XML-RPC: '.__METHOD__.': invalid value received in BOOLEAN: '.$this->_xh['ac']); |
|
308 | 308 | } |
309 | 309 | $this->_xh['value'] = false; |
310 | 310 | } |
@@ -314,37 +314,37 @@ discard block |
||
314 | 314 | // NOTE: regexp could be much stricter than this... |
315 | 315 | if (!preg_match('/^[+-eE0123456789 \t.]+$/', $this->_xh['ac'])) { |
316 | 316 | /// @todo: find a better way of throwing an error than this! |
317 | - error_log('XML-RPC: ' . __METHOD__ . ': non numeric value received in DOUBLE: ' . $this->_xh['ac']); |
|
317 | + error_log('XML-RPC: '.__METHOD__.': non numeric value received in DOUBLE: '.$this->_xh['ac']); |
|
318 | 318 | $this->_xh['value'] = 'ERROR_NON_NUMERIC_FOUND'; |
319 | 319 | } else { |
320 | 320 | // it's ok, add it on |
321 | - $this->_xh['value'] = (double)$this->_xh['ac']; |
|
321 | + $this->_xh['value'] = (double) $this->_xh['ac']; |
|
322 | 322 | } |
323 | 323 | } else { |
324 | 324 | // we have an I4/I8/INT |
325 | 325 | // we must check that only 0123456789-<space> are characters here |
326 | 326 | if (!preg_match('/^[+-]?[0123456789 \t]+$/', $this->_xh['ac'])) { |
327 | 327 | /// @todo find a better way of throwing an error than this! |
328 | - error_log('XML-RPC: ' . __METHOD__ . ': non numeric value received in INT: ' . $this->_xh['ac']); |
|
328 | + error_log('XML-RPC: '.__METHOD__.': non numeric value received in INT: '.$this->_xh['ac']); |
|
329 | 329 | $this->_xh['value'] = 'ERROR_NON_NUMERIC_FOUND'; |
330 | 330 | } else { |
331 | 331 | // it's ok, add it on |
332 | - $this->_xh['value'] = (int)$this->_xh['ac']; |
|
332 | + $this->_xh['value'] = (int) $this->_xh['ac']; |
|
333 | 333 | } |
334 | 334 | } |
335 | 335 | $this->_xh['lv'] = 3; // indicate we've found a value |
336 | 336 | break; |
337 | 337 | case 'NAME': |
338 | - $this->_xh['valuestack'][count($this->_xh['valuestack']) - 1]['name'] = $this->_xh['ac']; |
|
338 | + $this->_xh['valuestack'][count($this->_xh['valuestack'])-1]['name'] = $this->_xh['ac']; |
|
339 | 339 | break; |
340 | 340 | case 'MEMBER': |
341 | 341 | // add to array in the stack the last element built, |
342 | 342 | // unless no VALUE was found |
343 | 343 | if ($this->_xh['vt']) { |
344 | 344 | $vscount = count($this->_xh['valuestack']); |
345 | - $this->_xh['valuestack'][$vscount - 1]['values'][$this->_xh['valuestack'][$vscount - 1]['name']] = $this->_xh['value']; |
|
345 | + $this->_xh['valuestack'][$vscount-1]['values'][$this->_xh['valuestack'][$vscount-1]['name']] = $this->_xh['value']; |
|
346 | 346 | } else { |
347 | - error_log('XML-RPC: ' . __METHOD__ . ': missing VALUE inside STRUCT in received xml'); |
|
347 | + error_log('XML-RPC: '.__METHOD__.': missing VALUE inside STRUCT in received xml'); |
|
348 | 348 | } |
349 | 349 | break; |
350 | 350 | case 'DATA': |
@@ -367,7 +367,7 @@ discard block |
||
367 | 367 | $this->_xh['params'][] = $this->_xh['value']; |
368 | 368 | $this->_xh['pt'][] = $this->_xh['vt']; |
369 | 369 | } else { |
370 | - error_log('XML-RPC: ' . __METHOD__ . ': missing VALUE inside PARAM in received xml'); |
|
370 | + error_log('XML-RPC: '.__METHOD__.': missing VALUE inside PARAM in received xml'); |
|
371 | 371 | } |
372 | 372 | break; |
373 | 373 | case 'METHODNAME': |
@@ -409,7 +409,7 @@ discard block |
||
409 | 409 | public function xmlrpc_cd($parser, $data) |
410 | 410 | { |
411 | 411 | // skip processing if xml fault already detected |
412 | - if ($this->_xh['isf'] < 2) { |
|
412 | + if ($this->_xh['isf']<2) { |
|
413 | 413 | // "lookforvalue==3" means that we've found an entire value |
414 | 414 | // and should discard any further character data |
415 | 415 | if ($this->_xh['lv'] != 3) { |
@@ -425,7 +425,7 @@ discard block |
||
425 | 425 | public function xmlrpc_dh($parser, $data) |
426 | 426 | { |
427 | 427 | // skip processing if xml fault already detected |
428 | - if ($this->_xh['isf'] < 2) { |
|
428 | + if ($this->_xh['isf']<2) { |
|
429 | 429 | if (substr($data, 0, 1) == '&' && substr($data, -1, 1) == ';') { |
430 | 430 | $this->_xh['ac'] .= $data; |
431 | 431 | } |
@@ -496,8 +496,8 @@ discard block |
||
496 | 496 | // Details: |
497 | 497 | // SPACE: (#x20 | #x9 | #xD | #xA)+ === [ \x9\xD\xA]+ |
498 | 498 | // EQ: SPACE?=SPACE? === [ \x9\xD\xA]*=[ \x9\xD\xA]* |
499 | - if (preg_match('/^<\?xml\s+version\s*=\s*' . "((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))" . |
|
500 | - '\s+encoding\s*=\s*' . "((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
499 | + if (preg_match('/^<\?xml\s+version\s*=\s*'."((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))". |
|
500 | + '\s+encoding\s*=\s*'."((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
501 | 501 | $xmlChunk, $matches)) { |
502 | 502 | return strtoupper(substr($matches[2], 1, -1)); |
503 | 503 | } |
@@ -515,7 +515,7 @@ discard block |
||
515 | 515 | // NB: mb_detect likes to call it ascii, xml parser likes to call it US_ASCII... |
516 | 516 | // IANA also likes better US-ASCII, so go with it |
517 | 517 | if ($enc == 'ASCII') { |
518 | - $enc = 'US-' . $enc; |
|
518 | + $enc = 'US-'.$enc; |
|
519 | 519 | } |
520 | 520 | |
521 | 521 | return $enc; |
@@ -550,8 +550,8 @@ discard block |
||
550 | 550 | // Details: |
551 | 551 | // SPACE: (#x20 | #x9 | #xD | #xA)+ === [ \x9\xD\xA]+ |
552 | 552 | // EQ: SPACE?=SPACE? === [ \x9\xD\xA]*=[ \x9\xD\xA]* |
553 | - if (preg_match('/^<\?xml\s+version\s*=\s*' . "((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))" . |
|
554 | - '\s+encoding\s*=\s*' . "((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
553 | + if (preg_match('/^<\?xml\s+version\s*=\s*'."((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))". |
|
554 | + '\s+encoding\s*=\s*'."((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
555 | 555 | $xmlChunk, $matches)) { |
556 | 556 | return true; |
557 | 557 | } |
@@ -75,7 +75,7 @@ discard block |
||
75 | 75 | return $xmlrpcVal->scalarval(); |
76 | 76 | case 'array': |
77 | 77 | $arr = array(); |
78 | - foreach($xmlrpcVal as $value) { |
|
78 | + foreach ($xmlrpcVal as $value) { |
|
79 | 79 | $arr[] = $this->decode($value, $options); |
80 | 80 | } |
81 | 81 | |
@@ -105,7 +105,7 @@ discard block |
||
105 | 105 | case 'msg': |
106 | 106 | $paramCount = $xmlrpcVal->getNumParams(); |
107 | 107 | $arr = array(); |
108 | - for ($i = 0; $i < $paramCount; $i++) { |
|
108 | + for ($i = 0; $i<$paramCount; $i++) { |
|
109 | 109 | $arr[] = $this->decode($xmlrpcVal->getParam($i), $options); |
110 | 110 | } |
111 | 111 | |
@@ -183,7 +183,7 @@ discard block |
||
183 | 183 | $xmlrpcVal = new Value($phpVal->format('Ymd\TH:i:s'), Value::$xmlrpcStruct); |
184 | 184 | } else { |
185 | 185 | $arr = array(); |
186 | - foreach($phpVal as $k => $v) { |
|
186 | + foreach ($phpVal as $k => $v) { |
|
187 | 187 | $arr[$k] = $this->encode($v, $options); |
188 | 188 | } |
189 | 189 | $xmlrpcVal = new Value($arr, Value::$xmlrpcStruct); |
@@ -205,7 +205,7 @@ discard block |
||
205 | 205 | break; |
206 | 206 | case 'resource': |
207 | 207 | if (in_array('extension_api', $options)) { |
208 | - $xmlrpcVal = new Value((int)$phpVal, Value::$xmlrpcInt); |
|
208 | + $xmlrpcVal = new Value((int) $phpVal, Value::$xmlrpcInt); |
|
209 | 209 | } else { |
210 | 210 | $xmlrpcVal = new Value(); |
211 | 211 | } |
@@ -248,7 +248,7 @@ discard block |
||
248 | 248 | if (extension_loaded('mbstring')) { |
249 | 249 | $xmlVal = mb_convert_encoding($xmlVal, 'UTF-8', $valEncoding); |
250 | 250 | } else { |
251 | - error_log('XML-RPC: ' . __METHOD__ . ': invalid charset encoding of xml text: ' . $valEncoding); |
|
251 | + error_log('XML-RPC: '.__METHOD__.': invalid charset encoding of xml text: '.$valEncoding); |
|
252 | 252 | } |
253 | 253 | } |
254 | 254 | } |
@@ -280,7 +280,7 @@ discard block |
||
280 | 280 | return false; |
281 | 281 | } |
282 | 282 | xml_parser_free($parser); |
283 | - if ($xmlRpcParser->_xh['isf'] > 1) { |
|
283 | + if ($xmlRpcParser->_xh['isf']>1) { |
|
284 | 284 | // test that $xmlrpc->_xh['value'] is an obj, too??? |
285 | 285 | |
286 | 286 | error_log($xmlRpcParser->_xh['isf_reason']); |
@@ -301,7 +301,7 @@ discard block |
||
301 | 301 | return $r; |
302 | 302 | case 'methodcall': |
303 | 303 | $req = new Request($xmlRpcParser->_xh['method']); |
304 | - for ($i = 0; $i < count($xmlRpcParser->_xh['params']); $i++) { |
|
304 | + for ($i = 0; $i<count($xmlRpcParser->_xh['params']); $i++) { |
|
305 | 305 | $req->addParam($xmlRpcParser->_xh['params'][$i]); |
306 | 306 | } |
307 | 307 |
@@ -130,10 +130,10 @@ discard block |
||
130 | 130 | $server = $parts['host']; |
131 | 131 | $path = isset($parts['path']) ? $parts['path'] : ''; |
132 | 132 | if (isset($parts['query'])) { |
133 | - $path .= '?' . $parts['query']; |
|
133 | + $path .= '?'.$parts['query']; |
|
134 | 134 | } |
135 | 135 | if (isset($parts['fragment'])) { |
136 | - $path .= '#' . $parts['fragment']; |
|
136 | + $path .= '#'.$parts['fragment']; |
|
137 | 137 | } |
138 | 138 | if (isset($parts['port'])) { |
139 | 139 | $port = $parts['port']; |
@@ -149,7 +149,7 @@ discard block |
||
149 | 149 | } |
150 | 150 | } |
151 | 151 | if ($path == '' || $path[0] != '/') { |
152 | - $this->path = '/' . $path; |
|
152 | + $this->path = '/'.$path; |
|
153 | 153 | } else { |
154 | 154 | $this->path = $path; |
155 | 155 | } |
@@ -187,7 +187,7 @@ discard block |
||
187 | 187 | }*/ |
188 | 188 | |
189 | 189 | // initialize user_agent string |
190 | - $this->user_agent = PhpXmlRpc::$xmlrpcName . ' ' . PhpXmlRpc::$xmlrpcVersion; |
|
190 | + $this->user_agent = PhpXmlRpc::$xmlrpcName.' '.PhpXmlRpc::$xmlrpcVersion; |
|
191 | 191 | } |
192 | 192 | |
193 | 193 | /** |
@@ -550,7 +550,7 @@ discard block |
||
550 | 550 | */ |
551 | 551 | protected function sendPayloadHTTP10($req, $server, $port, $timeout = 0, $username = '', $password = '', |
552 | 552 | $authType = 1, $proxyHost = '', $proxyPort = 0, $proxyUsername = '', $proxyPassword = '', $proxyAuthType = 1, |
553 | - $method='http') |
|
553 | + $method = 'http') |
|
554 | 554 | { |
555 | 555 | return $this->sendPayloadSocket($req, $server, $port, $timeout, $username, $password, $authType, null, null, |
556 | 556 | null, null, $proxyHost, $proxyPort, $proxyUsername, $proxyPassword, $proxyAuthType); |
@@ -580,7 +580,7 @@ discard block |
||
580 | 580 | * @param int $sslVersion |
581 | 581 | * @return Response |
582 | 582 | */ |
583 | - protected function sendPayloadHTTPS($req, $server, $port, $timeout = 0, $username = '', $password = '', |
|
583 | + protected function sendPayloadHTTPS($req, $server, $port, $timeout = 0, $username = '', $password = '', |
|
584 | 584 | $authType = 1, $cert = '', $certPass = '', $caCert = '', $caCertDir = '', $proxyHost = '', $proxyPort = 0, |
585 | 585 | $proxyUsername = '', $proxyPassword = '', $proxyAuthType = 1, $keepAlive = false, $key = '', $keyPass = '', |
586 | 586 | $sslVersion = 0) |
@@ -615,11 +615,11 @@ discard block |
||
615 | 615 | */ |
616 | 616 | protected function sendPayloadSocket($req, $server, $port, $timeout = 0, $username = '', $password = '', |
617 | 617 | $authType = 1, $cert = '', $certPass = '', $caCert = '', $caCertDir = '', $proxyHost = '', $proxyPort = 0, |
618 | - $proxyUsername = '', $proxyPassword = '', $proxyAuthType = 1, $method='http', $key = '', $keyPass = '', |
|
618 | + $proxyUsername = '', $proxyPassword = '', $proxyAuthType = 1, $method = 'http', $key = '', $keyPass = '', |
|
619 | 619 | $sslVersion = 0) |
620 | 620 | { |
621 | 621 | if ($port == 0) { |
622 | - $port = ( $method === 'https' ) ? 443 : 80; |
|
622 | + $port = ($method === 'https') ? 443 : 80; |
|
623 | 623 | } |
624 | 624 | |
625 | 625 | // Only create the payload if it was not created previously |
@@ -650,15 +650,15 @@ discard block |
||
650 | 650 | // thanks to Grant Rauscher <[email protected]> for this |
651 | 651 | $credentials = ''; |
652 | 652 | if ($username != '') { |
653 | - $credentials = 'Authorization: Basic ' . base64_encode($username . ':' . $password) . "\r\n"; |
|
653 | + $credentials = 'Authorization: Basic '.base64_encode($username.':'.$password)."\r\n"; |
|
654 | 654 | if ($authType != 1) { |
655 | - error_log('XML-RPC: ' . __METHOD__ . ': warning. Only Basic auth is supported with HTTP 1.0'); |
|
655 | + error_log('XML-RPC: '.__METHOD__.': warning. Only Basic auth is supported with HTTP 1.0'); |
|
656 | 656 | } |
657 | 657 | } |
658 | 658 | |
659 | 659 | $acceptedEncoding = ''; |
660 | 660 | if (is_array($this->accepted_compression) && count($this->accepted_compression)) { |
661 | - $acceptedEncoding = 'Accept-Encoding: ' . implode(', ', $this->accepted_compression) . "\r\n"; |
|
661 | + $acceptedEncoding = 'Accept-Encoding: '.implode(', ', $this->accepted_compression)."\r\n"; |
|
662 | 662 | } |
663 | 663 | |
664 | 664 | $proxyCredentials = ''; |
@@ -669,18 +669,18 @@ discard block |
||
669 | 669 | $connectServer = $proxyHost; |
670 | 670 | $connectPort = $proxyPort; |
671 | 671 | $transport = 'tcp'; |
672 | - $uri = 'http://' . $server . ':' . $port . $this->path; |
|
672 | + $uri = 'http://'.$server.':'.$port.$this->path; |
|
673 | 673 | if ($proxyUsername != '') { |
674 | 674 | if ($proxyAuthType != 1) { |
675 | - error_log('XML-RPC: ' . __METHOD__ . ': warning. Only Basic auth to proxy is supported with HTTP 1.0'); |
|
675 | + error_log('XML-RPC: '.__METHOD__.': warning. Only Basic auth to proxy is supported with HTTP 1.0'); |
|
676 | 676 | } |
677 | - $proxyCredentials = 'Proxy-Authorization: Basic ' . base64_encode($proxyUsername . ':' . $proxyPassword) . "\r\n"; |
|
677 | + $proxyCredentials = 'Proxy-Authorization: Basic '.base64_encode($proxyUsername.':'.$proxyPassword)."\r\n"; |
|
678 | 678 | } |
679 | 679 | } else { |
680 | 680 | $connectServer = $server; |
681 | 681 | $connectPort = $port; |
682 | 682 | /// @todo if supporting https, we should support all its current options as well: peer name verification etc... |
683 | - $transport = ( $method === 'https' ) ? 'tls' : 'tcp'; |
|
683 | + $transport = ($method === 'https') ? 'tls' : 'tcp'; |
|
684 | 684 | $uri = $this->path; |
685 | 685 | } |
686 | 686 | |
@@ -691,45 +691,45 @@ discard block |
||
691 | 691 | $version = ''; |
692 | 692 | foreach ($this->cookies as $name => $cookie) { |
693 | 693 | if ($cookie['version']) { |
694 | - $version = ' $Version="' . $cookie['version'] . '";'; |
|
695 | - $cookieHeader .= ' ' . $name . '="' . $cookie['value'] . '";'; |
|
694 | + $version = ' $Version="'.$cookie['version'].'";'; |
|
695 | + $cookieHeader .= ' '.$name.'="'.$cookie['value'].'";'; |
|
696 | 696 | if ($cookie['path']) { |
697 | - $cookieHeader .= ' $Path="' . $cookie['path'] . '";'; |
|
697 | + $cookieHeader .= ' $Path="'.$cookie['path'].'";'; |
|
698 | 698 | } |
699 | 699 | if ($cookie['domain']) { |
700 | - $cookieHeader .= ' $Domain="' . $cookie['domain'] . '";'; |
|
700 | + $cookieHeader .= ' $Domain="'.$cookie['domain'].'";'; |
|
701 | 701 | } |
702 | 702 | if ($cookie['port']) { |
703 | - $cookieHeader .= ' $Port="' . $cookie['port'] . '";'; |
|
703 | + $cookieHeader .= ' $Port="'.$cookie['port'].'";'; |
|
704 | 704 | } |
705 | 705 | } else { |
706 | - $cookieHeader .= ' ' . $name . '=' . $cookie['value'] . ";"; |
|
706 | + $cookieHeader .= ' '.$name.'='.$cookie['value'].";"; |
|
707 | 707 | } |
708 | 708 | } |
709 | - $cookieHeader = 'Cookie:' . $version . substr($cookieHeader, 0, -1) . "\r\n"; |
|
709 | + $cookieHeader = 'Cookie:'.$version.substr($cookieHeader, 0, -1)."\r\n"; |
|
710 | 710 | } |
711 | 711 | |
712 | 712 | // omit port if default |
713 | 713 | if (($port == 80 && in_array($method, array('http', 'http10'))) || ($port == 443 && $method == 'https')) { |
714 | - $port = ''; |
|
714 | + $port = ''; |
|
715 | 715 | } else { |
716 | - $port = ':' . $port; |
|
716 | + $port = ':'.$port; |
|
717 | 717 | } |
718 | 718 | |
719 | - $op = 'POST ' . $uri . " HTTP/1.0\r\n" . |
|
720 | - 'User-Agent: ' . $this->user_agent . "\r\n" . |
|
721 | - 'Host: ' . $server . $port . "\r\n" . |
|
722 | - $credentials . |
|
723 | - $proxyCredentials . |
|
724 | - $acceptedEncoding . |
|
725 | - $encodingHdr . |
|
726 | - 'Accept-Charset: ' . implode(',', $this->accepted_charset_encodings) . "\r\n" . |
|
727 | - $cookieHeader . |
|
728 | - 'Content-Type: ' . $req->content_type . "\r\nContent-Length: " . |
|
729 | - strlen($payload) . "\r\n\r\n" . |
|
719 | + $op = 'POST '.$uri." HTTP/1.0\r\n". |
|
720 | + 'User-Agent: '.$this->user_agent."\r\n". |
|
721 | + 'Host: '.$server.$port."\r\n". |
|
722 | + $credentials. |
|
723 | + $proxyCredentials. |
|
724 | + $acceptedEncoding. |
|
725 | + $encodingHdr. |
|
726 | + 'Accept-Charset: '.implode(',', $this->accepted_charset_encodings)."\r\n". |
|
727 | + $cookieHeader. |
|
728 | + 'Content-Type: '.$req->content_type."\r\nContent-Length: ". |
|
729 | + strlen($payload)."\r\n\r\n". |
|
730 | 730 | $payload; |
731 | 731 | |
732 | - if ($this->debug > 1) { |
|
732 | + if ($this->debug>1) { |
|
733 | 733 | Logger::instance()->debugMessage("---SENDING---\n$op\n---END---"); |
734 | 734 | } |
735 | 735 | |
@@ -755,7 +755,7 @@ discard block |
||
755 | 755 | } |
756 | 756 | $context = stream_context_create($contextOptions); |
757 | 757 | |
758 | - if ($timeout <= 0) { |
|
758 | + if ($timeout<=0) { |
|
759 | 759 | $connectTimeout = ini_get('default_socket_timeout'); |
760 | 760 | } else { |
761 | 761 | $connectTimeout = $timeout; |
@@ -764,12 +764,12 @@ discard block |
||
764 | 764 | $fp = @stream_socket_client("$transport://$connectServer:$connectPort", $this->errno, $this->errstr, $connectTimeout, |
765 | 765 | STREAM_CLIENT_CONNECT, $context); |
766 | 766 | if ($fp) { |
767 | - if ($timeout > 0) { |
|
767 | + if ($timeout>0) { |
|
768 | 768 | stream_set_timeout($fp, $timeout); |
769 | 769 | } |
770 | 770 | } else { |
771 | - $this->errstr = 'Connect error: ' . $this->errstr; |
|
772 | - $r = new Response(0, PhpXmlRpc::$xmlrpcerr['http_error'], $this->errstr . ' (' . $this->errno . ')'); |
|
771 | + $this->errstr = 'Connect error: '.$this->errstr; |
|
772 | + $r = new Response(0, PhpXmlRpc::$xmlrpcerr['http_error'], $this->errstr.' ('.$this->errno.')'); |
|
773 | 773 | |
774 | 774 | return $r; |
775 | 775 | } |
@@ -877,7 +877,7 @@ discard block |
||
877 | 877 | $encodingHdr = ''; |
878 | 878 | } |
879 | 879 | |
880 | - if ($this->debug > 1) { |
|
880 | + if ($this->debug>1) { |
|
881 | 881 | Logger::instance()->debugMessage("---SENDING---\n$payload\n---END---"); |
882 | 882 | } |
883 | 883 | |
@@ -887,7 +887,7 @@ discard block |
||
887 | 887 | } else { |
888 | 888 | $protocol = $method; |
889 | 889 | } |
890 | - $curl = curl_init($protocol . '://' . $server . ':' . $port . $this->path); |
|
890 | + $curl = curl_init($protocol.'://'.$server.':'.$port.$this->path); |
|
891 | 891 | if ($keepAlive) { |
892 | 892 | $this->xmlrpc_curl_handle = $curl; |
893 | 893 | } |
@@ -898,7 +898,7 @@ discard block |
||
898 | 898 | // results into variable |
899 | 899 | curl_setopt($curl, CURLOPT_RETURNTRANSFER, true); |
900 | 900 | |
901 | - if ($this->debug > 1) { |
|
901 | + if ($this->debug>1) { |
|
902 | 902 | curl_setopt($curl, CURLOPT_VERBOSE, true); |
903 | 903 | /// @todo allow callers to redirect curlopt_stderr to some stream which can be buffered |
904 | 904 | } |
@@ -924,7 +924,7 @@ discard block |
||
924 | 924 | } |
925 | 925 | } |
926 | 926 | // extra headers |
927 | - $headers = array('Content-Type: ' . $req->content_type, 'Accept-Charset: ' . implode(',', $this->accepted_charset_encodings)); |
|
927 | + $headers = array('Content-Type: '.$req->content_type, 'Accept-Charset: '.implode(',', $this->accepted_charset_encodings)); |
|
928 | 928 | // if no keepalive is wanted, let the server know it in advance |
929 | 929 | if (!$keepAlive) { |
930 | 930 | $headers[] = 'Connection: close'; |
@@ -941,7 +941,7 @@ discard block |
||
941 | 941 | curl_setopt($curl, CURLOPT_HTTPHEADER, $headers); |
942 | 942 | // timeout is borked |
943 | 943 | if ($timeout) { |
944 | - curl_setopt($curl, CURLOPT_TIMEOUT, $timeout == 1 ? 1 : $timeout - 1); |
|
944 | + curl_setopt($curl, CURLOPT_TIMEOUT, $timeout == 1 ? 1 : $timeout-1); |
|
945 | 945 | } |
946 | 946 | |
947 | 947 | if ($method == 'http10') { |
@@ -951,11 +951,11 @@ discard block |
||
951 | 951 | } |
952 | 952 | |
953 | 953 | if ($username && $password) { |
954 | - curl_setopt($curl, CURLOPT_USERPWD, $username . ':' . $password); |
|
954 | + curl_setopt($curl, CURLOPT_USERPWD, $username.':'.$password); |
|
955 | 955 | if (defined('CURLOPT_HTTPAUTH')) { |
956 | 956 | curl_setopt($curl, CURLOPT_HTTPAUTH, $authType); |
957 | 957 | } elseif ($authType != 1) { |
958 | - error_log('XML-RPC: ' . __METHOD__ . ': warning. Only Basic auth is supported by the current PHP/curl install'); |
|
958 | + error_log('XML-RPC: '.__METHOD__.': warning. Only Basic auth is supported by the current PHP/curl install'); |
|
959 | 959 | } |
960 | 960 | } |
961 | 961 | |
@@ -996,13 +996,13 @@ discard block |
||
996 | 996 | if ($proxyPort == 0) { |
997 | 997 | $proxyPort = 8080; // NB: even for HTTPS, local connection is on port 8080 |
998 | 998 | } |
999 | - curl_setopt($curl, CURLOPT_PROXY, $proxyHost . ':' . $proxyPort); |
|
999 | + curl_setopt($curl, CURLOPT_PROXY, $proxyHost.':'.$proxyPort); |
|
1000 | 1000 | if ($proxyUsername) { |
1001 | - curl_setopt($curl, CURLOPT_PROXYUSERPWD, $proxyUsername . ':' . $proxyPassword); |
|
1001 | + curl_setopt($curl, CURLOPT_PROXYUSERPWD, $proxyUsername.':'.$proxyPassword); |
|
1002 | 1002 | if (defined('CURLOPT_PROXYAUTH')) { |
1003 | 1003 | curl_setopt($curl, CURLOPT_PROXYAUTH, $proxyAuthType); |
1004 | 1004 | } elseif ($proxyAuthType != 1) { |
1005 | - error_log('XML-RPC: ' . __METHOD__ . ': warning. Only Basic auth to proxy is supported by the current PHP/curl install'); |
|
1005 | + error_log('XML-RPC: '.__METHOD__.': warning. Only Basic auth to proxy is supported by the current PHP/curl install'); |
|
1006 | 1006 | } |
1007 | 1007 | } |
1008 | 1008 | } |
@@ -1013,7 +1013,7 @@ discard block |
||
1013 | 1013 | if (count($this->cookies)) { |
1014 | 1014 | $cookieHeader = ''; |
1015 | 1015 | foreach ($this->cookies as $name => $cookie) { |
1016 | - $cookieHeader .= $name . '=' . $cookie['value'] . '; '; |
|
1016 | + $cookieHeader .= $name.'='.$cookie['value'].'; '; |
|
1017 | 1017 | } |
1018 | 1018 | curl_setopt($curl, CURLOPT_COOKIE, substr($cookieHeader, 0, -2)); |
1019 | 1019 | } |
@@ -1024,13 +1024,13 @@ discard block |
||
1024 | 1024 | |
1025 | 1025 | $result = curl_exec($curl); |
1026 | 1026 | |
1027 | - if ($this->debug > 1) { |
|
1027 | + if ($this->debug>1) { |
|
1028 | 1028 | $message = "---CURL INFO---\n"; |
1029 | 1029 | foreach (curl_getinfo($curl) as $name => $val) { |
1030 | 1030 | if (is_array($val)) { |
1031 | 1031 | $val = implode("\n", $val); |
1032 | 1032 | } |
1033 | - $message .= $name . ': ' . $val . "\n"; |
|
1033 | + $message .= $name.': '.$val."\n"; |
|
1034 | 1034 | } |
1035 | 1035 | $message .= '---END---'; |
1036 | 1036 | Logger::instance()->debugMessage($message); |
@@ -1040,7 +1040,7 @@ discard block |
||
1040 | 1040 | /// @todo we should use a better check here - what if we get back '' or '0'? |
1041 | 1041 | |
1042 | 1042 | $this->errstr = 'no response'; |
1043 | - $resp = new Response(0, PhpXmlRpc::$xmlrpcerr['curl_fail'], PhpXmlRpc::$xmlrpcstr['curl_fail'] . ': ' . curl_error($curl)); |
|
1043 | + $resp = new Response(0, PhpXmlRpc::$xmlrpcerr['curl_fail'], PhpXmlRpc::$xmlrpcstr['curl_fail'].': '.curl_error($curl)); |
|
1044 | 1044 | curl_close($curl); |
1045 | 1045 | if ($keepAlive) { |
1046 | 1046 | $this->xmlrpc_curl_handle = null; |
@@ -1150,7 +1150,7 @@ discard block |
||
1150 | 1150 | $call['methodName'] = new Value($req->method(), 'string'); |
1151 | 1151 | $numParams = $req->getNumParams(); |
1152 | 1152 | $params = array(); |
1153 | - for ($i = 0; $i < $numParams; $i++) { |
|
1153 | + for ($i = 0; $i<$numParams; $i++) { |
|
1154 | 1154 | $params[$i] = $req->getParam($i); |
1155 | 1155 | } |
1156 | 1156 | $call['params'] = new Value($params, 'array'); |
@@ -1176,15 +1176,15 @@ discard block |
||
1176 | 1176 | /// @todo test this code branch... |
1177 | 1177 | $rets = $result->value(); |
1178 | 1178 | if (!is_array($rets)) { |
1179 | - return false; // bad return type from system.multicall |
|
1179 | + return false; // bad return type from system.multicall |
|
1180 | 1180 | } |
1181 | 1181 | $numRets = count($rets); |
1182 | 1182 | if ($numRets != count($reqs)) { |
1183 | - return false; // wrong number of return values. |
|
1183 | + return false; // wrong number of return values. |
|
1184 | 1184 | } |
1185 | 1185 | |
1186 | 1186 | $response = array(); |
1187 | - for ($i = 0; $i < $numRets; $i++) { |
|
1187 | + for ($i = 0; $i<$numRets; $i++) { |
|
1188 | 1188 | $val = $rets[$i]; |
1189 | 1189 | if (!is_array($val)) { |
1190 | 1190 | return false; |
@@ -1192,7 +1192,7 @@ discard block |
||
1192 | 1192 | switch (count($val)) { |
1193 | 1193 | case 1: |
1194 | 1194 | if (!isset($val[0])) { |
1195 | - return false; // Bad value |
|
1195 | + return false; // Bad value |
|
1196 | 1196 | } |
1197 | 1197 | // Normal return value |
1198 | 1198 | $response[$i] = new Response($val[0], 0, '', 'phpvals'); |
@@ -1220,19 +1220,19 @@ discard block |
||
1220 | 1220 | |
1221 | 1221 | $rets = $result->value(); |
1222 | 1222 | if ($rets->kindOf() != 'array') { |
1223 | - return false; // bad return type from system.multicall |
|
1223 | + return false; // bad return type from system.multicall |
|
1224 | 1224 | } |
1225 | 1225 | $numRets = $rets->count(); |
1226 | 1226 | if ($numRets != count($reqs)) { |
1227 | - return false; // wrong number of return values. |
|
1227 | + return false; // wrong number of return values. |
|
1228 | 1228 | } |
1229 | 1229 | |
1230 | 1230 | $response = array(); |
1231 | - foreach($rets as $val) { |
|
1231 | + foreach ($rets as $val) { |
|
1232 | 1232 | switch ($val->kindOf()) { |
1233 | 1233 | case 'array': |
1234 | 1234 | if ($val->count() != 1) { |
1235 | - return false; // Bad value |
|
1235 | + return false; // Bad value |
|
1236 | 1236 | } |
1237 | 1237 | // Normal return value |
1238 | 1238 | $response[] = new Response($val[0]); |
@@ -22,12 +22,12 @@ discard block |
||
22 | 22 | |
23 | 23 | // read chunk-size, chunk-extension (if any) and crlf |
24 | 24 | // get the position of the linebreak |
25 | - $chunkEnd = strpos($buffer, "\r\n") + 2; |
|
25 | + $chunkEnd = strpos($buffer, "\r\n")+2; |
|
26 | 26 | $temp = substr($buffer, 0, $chunkEnd); |
27 | 27 | $chunkSize = hexdec(trim($temp)); |
28 | 28 | $chunkStart = $chunkEnd; |
29 | - while ($chunkSize > 0) { |
|
30 | - $chunkEnd = strpos($buffer, "\r\n", $chunkStart + $chunkSize); |
|
29 | + while ($chunkSize>0) { |
|
30 | + $chunkEnd = strpos($buffer, "\r\n", $chunkStart+$chunkSize); |
|
31 | 31 | |
32 | 32 | // just in case we got a broken connection |
33 | 33 | if ($chunkEnd == false) { |
@@ -39,19 +39,19 @@ discard block |
||
39 | 39 | } |
40 | 40 | |
41 | 41 | // read chunk-data and crlf |
42 | - $chunk = substr($buffer, $chunkStart, $chunkEnd - $chunkStart); |
|
42 | + $chunk = substr($buffer, $chunkStart, $chunkEnd-$chunkStart); |
|
43 | 43 | // append chunk-data to entity-body |
44 | 44 | $new .= $chunk; |
45 | 45 | // length := length + chunk-size |
46 | 46 | $length += strlen($chunk); |
47 | 47 | // read chunk-size and crlf |
48 | - $chunkStart = $chunkEnd + 2; |
|
48 | + $chunkStart = $chunkEnd+2; |
|
49 | 49 | |
50 | - $chunkEnd = strpos($buffer, "\r\n", $chunkStart) + 2; |
|
50 | + $chunkEnd = strpos($buffer, "\r\n", $chunkStart)+2; |
|
51 | 51 | if ($chunkEnd == false) { |
52 | 52 | break; //just in case we got a broken connection |
53 | 53 | } |
54 | - $temp = substr($buffer, $chunkStart, $chunkEnd - $chunkStart); |
|
54 | + $temp = substr($buffer, $chunkStart, $chunkEnd-$chunkStart); |
|
55 | 55 | $chunkSize = hexdec(trim($temp)); |
56 | 56 | $chunkStart = $chunkEnd; |
57 | 57 | } |
@@ -68,7 +68,7 @@ discard block |
||
68 | 68 | * @return array with keys 'headers' and 'cookies' |
69 | 69 | * @throws \Exception |
70 | 70 | */ |
71 | - public function parseResponseHeaders(&$data, $headersProcessed = false, $debug=0) |
|
71 | + public function parseResponseHeaders(&$data, $headersProcessed = false, $debug = 0) |
|
72 | 72 | { |
73 | 73 | $httpResponse = array('raw_data' => $data, 'headers'=> array(), 'cookies' => array()); |
74 | 74 | |
@@ -78,11 +78,11 @@ discard block |
||
78 | 78 | // (even though it is not valid http) |
79 | 79 | $pos = strpos($data, "\r\n\r\n"); |
80 | 80 | if ($pos || is_int($pos)) { |
81 | - $bd = $pos + 4; |
|
81 | + $bd = $pos+4; |
|
82 | 82 | } else { |
83 | 83 | $pos = strpos($data, "\n\n"); |
84 | 84 | if ($pos || is_int($pos)) { |
85 | - $bd = $pos + 2; |
|
85 | + $bd = $pos+2; |
|
86 | 86 | } else { |
87 | 87 | // No separation between response headers and body: fault? |
88 | 88 | $bd = 0; |
@@ -93,8 +93,8 @@ discard block |
||
93 | 93 | // maybe we could take them into account, too? |
94 | 94 | $data = substr($data, $bd); |
95 | 95 | } else { |
96 | - error_log('XML-RPC: ' . __METHOD__ . ': HTTPS via proxy error, tunnel connection possibly failed'); |
|
97 | - throw new \Exception(PhpXmlRpc::$xmlrpcstr['http_error'] . ' (HTTPS via proxy error, tunnel connection possibly failed)', PhpXmlRpc::$xmlrpcerr['http_error']); |
|
96 | + error_log('XML-RPC: '.__METHOD__.': HTTPS via proxy error, tunnel connection possibly failed'); |
|
97 | + throw new \Exception(PhpXmlRpc::$xmlrpcstr['http_error'].' (HTTPS via proxy error, tunnel connection possibly failed)', PhpXmlRpc::$xmlrpcerr['http_error']); |
|
98 | 98 | } |
99 | 99 | } |
100 | 100 | |
@@ -120,20 +120,20 @@ discard block |
||
120 | 120 | } |
121 | 121 | |
122 | 122 | if (!preg_match('/^HTTP\/[0-9.]+ 200 /', $data)) { |
123 | - $errstr = substr($data, 0, strpos($data, "\n") - 1); |
|
124 | - error_log('XML-RPC: ' . __METHOD__ . ': HTTP error, got response: ' . $errstr); |
|
125 | - throw new \Exception(PhpXmlRpc::$xmlrpcstr['http_error'] . ' (' . $errstr . ')', PhpXmlRpc::$xmlrpcerr['http_error']); |
|
123 | + $errstr = substr($data, 0, strpos($data, "\n")-1); |
|
124 | + error_log('XML-RPC: '.__METHOD__.': HTTP error, got response: '.$errstr); |
|
125 | + throw new \Exception(PhpXmlRpc::$xmlrpcstr['http_error'].' ('.$errstr.')', PhpXmlRpc::$xmlrpcerr['http_error']); |
|
126 | 126 | } |
127 | 127 | |
128 | 128 | // be tolerant to usage of \n instead of \r\n to separate headers and data |
129 | 129 | // (even though it is not valid http) |
130 | 130 | $pos = strpos($data, "\r\n\r\n"); |
131 | 131 | if ($pos || is_int($pos)) { |
132 | - $bd = $pos + 4; |
|
132 | + $bd = $pos+4; |
|
133 | 133 | } else { |
134 | 134 | $pos = strpos($data, "\n\n"); |
135 | 135 | if ($pos || is_int($pos)) { |
136 | - $bd = $pos + 2; |
|
136 | + $bd = $pos+2; |
|
137 | 137 | } else { |
138 | 138 | // No separation between response headers and body: fault? |
139 | 139 | // we could take some action here instead of going on... |
@@ -144,10 +144,10 @@ discard block |
||
144 | 144 | // be tolerant to line endings, and extra empty lines |
145 | 145 | $ar = preg_split("/\r?\n/", trim(substr($data, 0, $pos))); |
146 | 146 | |
147 | - foreach($ar as $line) { |
|
147 | + foreach ($ar as $line) { |
|
148 | 148 | // take care of multi-line headers and cookies |
149 | 149 | $arr = explode(':', $line, 2); |
150 | - if (count($arr) > 1) { |
|
150 | + if (count($arr)>1) { |
|
151 | 151 | $headerName = strtolower(trim($arr[0])); |
152 | 152 | /// @todo some other headers (the ones that allow a CSV list of values) |
153 | 153 | /// do allow many values to be passed using multiple header lines. |
@@ -165,7 +165,7 @@ discard block |
||
165 | 165 | // glue together all received cookies, using a comma to separate them |
166 | 166 | // (same as php does with getallheaders()) |
167 | 167 | if (isset($httpResponse['headers'][$headerName])) { |
168 | - $httpResponse['headers'][$headerName] .= ', ' . trim($cookie); |
|
168 | + $httpResponse['headers'][$headerName] .= ', '.trim($cookie); |
|
169 | 169 | } else { |
170 | 170 | $httpResponse['headers'][$headerName] = trim($cookie); |
171 | 171 | } |
@@ -194,7 +194,7 @@ discard block |
||
194 | 194 | } |
195 | 195 | } elseif (isset($headerName)) { |
196 | 196 | /// @todo version1 cookies might span multiple lines, thus breaking the parsing above |
197 | - $httpResponse['headers'][$headerName] .= ' ' . trim($line); |
|
197 | + $httpResponse['headers'][$headerName] .= ' '.trim($line); |
|
198 | 198 | } |
199 | 199 | } |
200 | 200 | |
@@ -218,7 +218,7 @@ discard block |
||
218 | 218 | // Decode chunked encoding sent by http 1.1 servers |
219 | 219 | if (isset($httpResponse['headers']['transfer-encoding']) && $httpResponse['headers']['transfer-encoding'] == 'chunked') { |
220 | 220 | if (!$data = Http::decodeChunked($data)) { |
221 | - error_log('XML-RPC: ' . __METHOD__ . ': errors occurred when trying to rebuild the chunked data received from server'); |
|
221 | + error_log('XML-RPC: '.__METHOD__.': errors occurred when trying to rebuild the chunked data received from server'); |
|
222 | 222 | throw new \Exception(PhpXmlRpc::$xmlrpcstr['dechunk_fail'], PhpXmlRpc::$xmlrpcerr['dechunk_fail']); |
223 | 223 | } |
224 | 224 | } |
@@ -233,19 +233,19 @@ discard block |
||
233 | 233 | if ($httpResponse['headers']['content-encoding'] == 'deflate' && $degzdata = @gzuncompress($data)) { |
234 | 234 | $data = $degzdata; |
235 | 235 | if ($debug) { |
236 | - Logger::instance()->debugMessage("---INFLATED RESPONSE---[" . strlen($data) . " chars]---\n$data\n---END---"); |
|
236 | + Logger::instance()->debugMessage("---INFLATED RESPONSE---[".strlen($data)." chars]---\n$data\n---END---"); |
|
237 | 237 | } |
238 | 238 | } elseif ($httpResponse['headers']['content-encoding'] == 'gzip' && $degzdata = @gzinflate(substr($data, 10))) { |
239 | 239 | $data = $degzdata; |
240 | 240 | if ($debug) { |
241 | - Logger::instance()->debugMessage("---INFLATED RESPONSE---[" . strlen($data) . " chars]---\n$data\n---END---"); |
|
241 | + Logger::instance()->debugMessage("---INFLATED RESPONSE---[".strlen($data)." chars]---\n$data\n---END---"); |
|
242 | 242 | } |
243 | 243 | } else { |
244 | - error_log('XML-RPC: ' . __METHOD__ . ': errors occurred when trying to decode the deflated data received from server'); |
|
244 | + error_log('XML-RPC: '.__METHOD__.': errors occurred when trying to decode the deflated data received from server'); |
|
245 | 245 | throw new \Exception(PhpXmlRpc::$xmlrpcstr['decompress_fail'], PhpXmlRpc::$xmlrpcerr['decompress_fail']); |
246 | 246 | } |
247 | 247 | } else { |
248 | - error_log('XML-RPC: ' . __METHOD__ . ': the server sent deflated data. Your php install must have the Zlib extension compiled in to support this.'); |
|
248 | + error_log('XML-RPC: '.__METHOD__.': the server sent deflated data. Your php install must have the Zlib extension compiled in to support this.'); |
|
249 | 249 | throw new \Exception(PhpXmlRpc::$xmlrpcstr['cannot_decompress'], PhpXmlRpc::$xmlrpcerr['cannot_decompress']); |
250 | 250 | } |
251 | 251 | } |
@@ -182,8 +182,7 @@ discard block |
||
182 | 182 | { |
183 | 183 | $this->markTestSkipped('CURL missing: cannot test http 1.1 w. proxy'); |
184 | 184 | return; |
185 | - } |
|
186 | - else if ($this->args['PROXYSERVER'] == '') |
|
185 | + } else if ($this->args['PROXYSERVER'] == '') |
|
187 | 186 | { |
188 | 187 | $this->markTestSkipped('PROXY definition missing: cannot test proxy w. http 1.1'); |
189 | 188 | return; |
@@ -207,8 +206,7 @@ discard block |
||
207 | 206 | { |
208 | 207 | $this->markTestSkipped('CURL missing: cannot test https functionality'); |
209 | 208 | return; |
210 | - } |
|
211 | - else if ($this->args['HTTPSSERVER'] == '') |
|
209 | + } else if ($this->args['HTTPSSERVER'] == '') |
|
212 | 210 | { |
213 | 211 | $this->markTestSkipped('HTTPS SERVER definition missing: cannot test https'); |
214 | 212 | return; |
@@ -235,13 +233,11 @@ discard block |
||
235 | 233 | { |
236 | 234 | $this->markTestSkipped('CURL missing: cannot test https w. proxy'); |
237 | 235 | return; |
238 | - } |
|
239 | - else if ($this->args['PROXYSERVER'] == '') |
|
236 | + } else if ($this->args['PROXYSERVER'] == '') |
|
240 | 237 | { |
241 | 238 | $this->markTestSkipped('PROXY definition missing: cannot test proxy w. https'); |
242 | 239 | return; |
243 | - } |
|
244 | - else if ($this->args['HTTPSSERVER'] == '') |
|
240 | + } else if ($this->args['HTTPSSERVER'] == '') |
|
245 | 241 | { |
246 | 242 | $this->markTestSkipped('HTTPS SERVER definition missing: cannot test https w. proxy'); |
247 | 243 | return; |
@@ -1,11 +1,11 @@ discard block |
||
1 | 1 | <?php |
2 | 2 | |
3 | -include_once __DIR__ . '/../lib/xmlrpc.inc'; |
|
4 | -include_once __DIR__ . '/../lib/xmlrpc_wrappers.inc'; |
|
3 | +include_once __DIR__.'/../lib/xmlrpc.inc'; |
|
4 | +include_once __DIR__.'/../lib/xmlrpc_wrappers.inc'; |
|
5 | 5 | |
6 | -include_once __DIR__ . '/parse_args.php'; |
|
6 | +include_once __DIR__.'/parse_args.php'; |
|
7 | 7 | |
8 | -include_once __DIR__ . '/3LocalhostTest.php'; |
|
8 | +include_once __DIR__.'/3LocalhostTest.php'; |
|
9 | 9 | |
10 | 10 | /** |
11 | 11 | * Tests which stress http features of the library. |
@@ -27,9 +27,9 @@ discard block |
||
27 | 27 | ); |
28 | 28 | |
29 | 29 | $methods = array(); |
30 | - foreach(get_class_methods('LocalhostTest') as $method) |
|
30 | + foreach (get_class_methods('LocalhostTest') as $method) |
|
31 | 31 | { |
32 | - if(strpos($method, 'test') === 0 && !in_array($method, $unsafeMethods)) |
|
32 | + if (strpos($method, 'test') === 0 && !in_array($method, $unsafeMethods)) |
|
33 | 33 | { |
34 | 34 | if (!isset(self::$failed_tests[$method])) { |
35 | 35 | $methods[$method] = array($method); |
@@ -46,7 +46,7 @@ discard block |
||
46 | 46 | */ |
47 | 47 | public function testDeflate($method) |
48 | 48 | { |
49 | - if(!function_exists('gzdeflate')) |
|
49 | + if (!function_exists('gzdeflate')) |
|
50 | 50 | { |
51 | 51 | $this->markTestSkipped('Zlib missing: cannot test deflate functionality'); |
52 | 52 | return; |
@@ -64,7 +64,7 @@ discard block |
||
64 | 64 | */ |
65 | 65 | public function testGzip($method) |
66 | 66 | { |
67 | - if(!function_exists('gzdeflate')) |
|
67 | + if (!function_exists('gzdeflate')) |
|
68 | 68 | { |
69 | 69 | $this->markTestSkipped('Zlib missing: cannot test gzip functionality'); |
70 | 70 | return; |
@@ -78,7 +78,7 @@ discard block |
||
78 | 78 | |
79 | 79 | public function testKeepAlives() |
80 | 80 | { |
81 | - if(!function_exists('curl_init')) |
|
81 | + if (!function_exists('curl_init')) |
|
82 | 82 | { |
83 | 83 | $this->markTestSkipped('CURL missing: cannot test http 1.1'); |
84 | 84 | return; |
@@ -118,7 +118,7 @@ discard block |
||
118 | 118 | */ |
119 | 119 | public function testHttp11($method) |
120 | 120 | { |
121 | - if(!function_exists('curl_init')) |
|
121 | + if (!function_exists('curl_init')) |
|
122 | 122 | { |
123 | 123 | $this->markTestSkipped('CURL missing: cannot test http 1.1'); |
124 | 124 | return; |
@@ -137,7 +137,7 @@ discard block |
||
137 | 137 | */ |
138 | 138 | public function testHttp10Curl($method) |
139 | 139 | { |
140 | - if(!function_exists('curl_init')) |
|
140 | + if (!function_exists('curl_init')) |
|
141 | 141 | { |
142 | 142 | $this->markTestSkipped('CURL missing: cannot test http 1.1'); |
143 | 143 | return; |
@@ -157,7 +157,7 @@ discard block |
||
157 | 157 | */ |
158 | 158 | public function testHttp11Gzip($method) |
159 | 159 | { |
160 | - if(!function_exists('curl_init')) |
|
160 | + if (!function_exists('curl_init')) |
|
161 | 161 | { |
162 | 162 | $this->markTestSkipped('CURL missing: cannot test http 1.1'); |
163 | 163 | return; |
@@ -177,7 +177,7 @@ discard block |
||
177 | 177 | */ |
178 | 178 | public function testHttp11Deflate($method) |
179 | 179 | { |
180 | - if(!function_exists('curl_init')) |
|
180 | + if (!function_exists('curl_init')) |
|
181 | 181 | { |
182 | 182 | $this->markTestSkipped('CURL missing: cannot test http 1.1'); |
183 | 183 | return; |
@@ -197,7 +197,7 @@ discard block |
||
197 | 197 | */ |
198 | 198 | public function testHttp11Proxy($method) |
199 | 199 | { |
200 | - if(!function_exists('curl_init')) |
|
200 | + if (!function_exists('curl_init')) |
|
201 | 201 | { |
202 | 202 | $this->markTestSkipped('CURL missing: cannot test http 1.1 w. proxy'); |
203 | 203 | return; |
@@ -222,7 +222,7 @@ discard block |
||
222 | 222 | */ |
223 | 223 | public function testHttps($method) |
224 | 224 | { |
225 | - if(!function_exists('curl_init')) |
|
225 | + if (!function_exists('curl_init')) |
|
226 | 226 | { |
227 | 227 | $this->markTestSkipped('CURL missing: cannot test https functionality'); |
228 | 228 | return; |
@@ -274,7 +274,7 @@ discard block |
||
274 | 274 | */ |
275 | 275 | public function testHttpsProxy($method) |
276 | 276 | { |
277 | - if(!function_exists('curl_init')) |
|
277 | + if (!function_exists('curl_init')) |
|
278 | 278 | { |
279 | 279 | $this->markTestSkipped('CURL missing: cannot test https w. proxy'); |
280 | 280 | return; |