@@ -7,7 +7,7 @@ discard block |
||
7 | 7 | // In case this file is made available on an open-access server, avoid it being useable by anyone who can not also |
8 | 8 | // write a specific file to disk. |
9 | 9 | // NB: keep filename, cookie name in sync with the code within the TestCase classes sending http requests to this file |
10 | -$idFile = sys_get_temp_dir() . '/phpunit_rand_id.txt'; |
|
10 | +$idFile = sys_get_temp_dir().'/phpunit_rand_id.txt'; |
|
11 | 11 | $randId = isset($_COOKIE['PHPUNIT_RANDOM_TEST_ID']) ? $_COOKIE['PHPUNIT_RANDOM_TEST_ID'] : ''; |
12 | 12 | $fileId = file_exists($idFile) ? file_get_contents($idFile) : ''; |
13 | 13 | if ($randId == '' || $fileId == '' || $fileId !== $randId) { |
@@ -31,7 +31,7 @@ discard block |
||
31 | 31 | chmod($GLOBALS['PHPUNIT_COVERAGE_DATA_DIRECTORY'], 0777); |
32 | 32 | } |
33 | 33 | |
34 | - include_once __DIR__ . "/../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/prepend.php"; |
|
34 | + include_once __DIR__."/../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/prepend.php"; |
|
35 | 35 | } |
36 | 36 | |
37 | 37 | $targetFile = null; |
@@ -54,5 +54,5 @@ discard block |
||
54 | 54 | } |
55 | 55 | |
56 | 56 | if (isset($_COOKIE['PHPUNIT_SELENIUM_TEST_ID']) && extension_loaded('xdebug')) { |
57 | - include_once __DIR__ . "/../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/append.php"; |
|
57 | + include_once __DIR__."/../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/append.php"; |
|
58 | 58 | } |
@@ -46,7 +46,7 @@ discard block |
||
46 | 46 | // check for command line params (passed as env vars) vs. web page input params (passed as GET/POST) |
47 | 47 | // Note that the only use-case for web-page mode is when this is used by benchmark.php |
48 | 48 | if (!isset($_SERVER['REQUEST_METHOD'])) { |
49 | - foreach($_SERVER as $key => $val) { |
|
49 | + foreach ($_SERVER as $key => $val) { |
|
50 | 50 | if (array_key_exists($key, $args)) { |
51 | 51 | $$key = $val; |
52 | 52 | } |
@@ -91,7 +91,7 @@ discard block |
||
91 | 91 | //} |
92 | 92 | } |
93 | 93 | if ($HTTPURI[0] != '/') { |
94 | - $HTTPURI = '/' . $HTTPURI; |
|
94 | + $HTTPURI = '/'.$HTTPURI; |
|
95 | 95 | } |
96 | 96 | $args['HTTPURI'] = $HTTPURI; |
97 | 97 | |
@@ -105,21 +105,21 @@ discard block |
||
105 | 105 | } |
106 | 106 | |
107 | 107 | if (isset($HTTPSIGNOREPEER)) { |
108 | - $args['HTTPSIGNOREPEER'] = (bool)$HTTPSIGNOREPEER; |
|
108 | + $args['HTTPSIGNOREPEER'] = (bool) $HTTPSIGNOREPEER; |
|
109 | 109 | } |
110 | 110 | |
111 | 111 | if (isset($HTTPSVERIFYHOST)) { |
112 | - $args['HTTPSVERIFYHOST'] = (int)$HTTPSVERIFYHOST; |
|
112 | + $args['HTTPSVERIFYHOST'] = (int) $HTTPSVERIFYHOST; |
|
113 | 113 | } |
114 | 114 | |
115 | 115 | if (isset($SSLVERSION)) { |
116 | - $args['SSLVERSION'] = (int)$SSLVERSION; |
|
116 | + $args['SSLVERSION'] = (int) $SSLVERSION; |
|
117 | 117 | } |
118 | 118 | |
119 | 119 | if (isset($PROXYSERVER)) { |
120 | 120 | $arr = explode(':', $PROXYSERVER); |
121 | 121 | $args['PROXYSERVER'] = $arr[0]; |
122 | - if (count($arr) > 1) { |
|
122 | + if (count($arr)>1) { |
|
123 | 123 | $args['PROXYPORT'] = $arr[1]; |
124 | 124 | } else { |
125 | 125 | $args['PROXYPORT'] = 8080; |
@@ -5,8 +5,8 @@ |
||
5 | 5 | * It mimics server.php, but does not rely on other autoload mechanisms than the loading of xmlrpc.inc and xmlrpcs.inc |
6 | 6 | */ |
7 | 7 | |
8 | -require_once __DIR__ . "/../../lib/xmlrpc.inc"; |
|
9 | -require_once __DIR__ . "/../../lib/xmlrpcs.inc"; |
|
8 | +require_once __DIR__."/../../lib/xmlrpc.inc"; |
|
9 | +require_once __DIR__."/../../lib/xmlrpcs.inc"; |
|
10 | 10 | |
11 | 11 | $signatures1 = include(__DIR__.'/methodProviders/functions.php'); |
12 | 12 | $signatures2 = include(__DIR__.'/methodProviders/interop.php'); |
@@ -4,15 +4,15 @@ discard block |
||
4 | 4 | * A test file designed to test the legacy API class-loading mechanism, ie. not using phpunit/composer's autoload_ |
5 | 5 | */ |
6 | 6 | |
7 | -include_once __DIR__ . '/../lib/xmlrpc.inc'; |
|
7 | +include_once __DIR__.'/../lib/xmlrpc.inc'; |
|
8 | 8 | |
9 | -include_once __DIR__ . '/parse_args.php'; |
|
9 | +include_once __DIR__.'/parse_args.php'; |
|
10 | 10 | |
11 | 11 | $args = argParser::getArgs(); |
12 | -$baseurl = 'http://' . $args['HTTPSERVER'] . str_replace('/server.php', '/legacy.php', $args['HTTPURI']); |
|
12 | +$baseurl = 'http://'.$args['HTTPSERVER'].str_replace('/server.php', '/legacy.php', $args['HTTPURI']); |
|
13 | 13 | |
14 | 14 | $randId = uniqid(); |
15 | -file_put_contents(sys_get_temp_dir() . '/phpunit_rand_id.txt', $randId); |
|
15 | +file_put_contents(sys_get_temp_dir().'/phpunit_rand_id.txt', $randId); |
|
16 | 16 | |
17 | 17 | $client = new xmlrpc_client($baseurl); |
18 | 18 | $client->setCookie('PHPUNIT_RANDOM_TEST_ID', $randId); |
@@ -20,7 +20,7 @@ discard block |
||
20 | 20 | $req = new xmlrpcmsg('system.listMethods', array()); |
21 | 21 | $resp = $client->send($req); |
22 | 22 | if ($resp->faultCode() !== 0) { |
23 | - throw new \Exception("system.listMethods returned fault " . $resp->faultCode()); |
|
23 | + throw new \Exception("system.listMethods returned fault ".$resp->faultCode()); |
|
24 | 24 | } |
25 | 25 | |
26 | -unlink(sys_get_temp_dir() . '/phpunit_rand_id.txt'); |
|
26 | +unlink(sys_get_temp_dir().'/phpunit_rand_id.txt'); |
@@ -1,6 +1,6 @@ discard block |
||
1 | 1 | <?php |
2 | 2 | |
3 | -include_once __DIR__ . '/ServerAwareTestCase.php'; |
|
3 | +include_once __DIR__.'/ServerAwareTestCase.php'; |
|
4 | 4 | |
5 | 5 | /** |
6 | 6 | * Long-term, this should replace all testing of the legacy API done via the main test-suite... |
@@ -11,7 +11,7 @@ discard block |
||
11 | 11 | { |
12 | 12 | /// @todo pass on as cli args for the executed script all the args that are already parsed by now, plus $this->testId |
13 | 13 | |
14 | - exec('php ' . __DIR__ . '/legacy_loader_test.php', $out, $result); |
|
14 | + exec('php '.__DIR__.'/legacy_loader_test.php', $out, $result); |
|
15 | 15 | |
16 | 16 | /// @todo dump output if in debug mode or if test fails |
17 | 17 |
@@ -251,7 +251,7 @@ discard block |
||
251 | 251 | public function getOptions() |
252 | 252 | { |
253 | 253 | $values = array(); |
254 | - foreach(static::$options as $opt) { |
|
254 | + foreach (static::$options as $opt) { |
|
255 | 255 | $values[$opt] = $this->getOption($opt); |
256 | 256 | } |
257 | 257 | return $values; |
@@ -264,7 +264,7 @@ discard block |
||
264 | 264 | */ |
265 | 265 | public function setOptions($options) |
266 | 266 | { |
267 | - foreach($options as $name => $value) { |
|
267 | + foreach ($options as $name => $value) { |
|
268 | 268 | $this->setOption($name, $value); |
269 | 269 | } |
270 | 270 | |
@@ -302,7 +302,7 @@ discard block |
||
302 | 302 | */ |
303 | 303 | public static function xmlrpc_debugmsg($msg) |
304 | 304 | { |
305 | - static::$_xmlrpc_debuginfo .= $msg . "\n"; |
|
305 | + static::$_xmlrpc_debuginfo .= $msg."\n"; |
|
306 | 306 | } |
307 | 307 | |
308 | 308 | /** |
@@ -314,7 +314,7 @@ discard block |
||
314 | 314 | */ |
315 | 315 | public static function error_occurred($msg) |
316 | 316 | { |
317 | - static::$_xmlrpcs_occurred_errors .= $msg . "\n"; |
|
317 | + static::$_xmlrpcs_occurred_errors .= $msg."\n"; |
|
318 | 318 | } |
319 | 319 | |
320 | 320 | /** |
@@ -335,10 +335,10 @@ discard block |
||
335 | 335 | // user debug info should be encoded by the end user using the INTERNAL_ENCODING |
336 | 336 | $out = ''; |
337 | 337 | if ($this->debug_info != '') { |
338 | - $out .= "<!-- SERVER DEBUG INFO (BASE64 ENCODED):\n" . base64_encode($this->debug_info) . "\n-->\n"; |
|
338 | + $out .= "<!-- SERVER DEBUG INFO (BASE64 ENCODED):\n".base64_encode($this->debug_info)."\n-->\n"; |
|
339 | 339 | } |
340 | 340 | if (static::$_xmlrpc_debuginfo != '') { |
341 | - $out .= "<!-- DEBUG INFO:\n" . $this->getCharsetEncoder()->encodeEntities(str_replace('--', '_-', static::$_xmlrpc_debuginfo), PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding) . "\n-->\n"; |
|
341 | + $out .= "<!-- DEBUG INFO:\n".$this->getCharsetEncoder()->encodeEntities(str_replace('--', '_-', static::$_xmlrpc_debuginfo), PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding)."\n-->\n"; |
|
342 | 342 | // NB: a better solution MIGHT be to use CDATA, but we need to insert it |
343 | 343 | // into return payload AFTER the beginning tag |
344 | 344 | //$out .= "<![CDATA[ DEBUG INFO:\n\n" . str_replace(']]>', ']_]_>', static::$_xmlrpc_debuginfo) . "\n]]>\n"; |
@@ -367,8 +367,8 @@ discard block |
||
367 | 367 | $this->debug_info = ''; |
368 | 368 | |
369 | 369 | // Save what we received, before parsing it |
370 | - if ($this->debug > 1) { |
|
371 | - $this->debugMsg("+++GOT+++\n" . $data . "\n+++END+++"); |
|
370 | + if ($this->debug>1) { |
|
371 | + $this->debugMsg("+++GOT+++\n".$data."\n+++END+++"); |
|
372 | 372 | } |
373 | 373 | |
374 | 374 | $resp = $this->parseRequestHeaders($data, $reqCharset, $respCharset, $respEncoding); |
@@ -385,13 +385,13 @@ discard block |
||
385 | 385 | $resp->raw_data = $rawData; |
386 | 386 | } |
387 | 387 | |
388 | - if ($this->debug > 2 && static::$_xmlrpcs_occurred_errors != '') { |
|
389 | - $this->debugMsg("+++PROCESSING ERRORS AND WARNINGS+++\n" . |
|
390 | - static::$_xmlrpcs_occurred_errors . "+++END+++"); |
|
388 | + if ($this->debug>2 && static::$_xmlrpcs_occurred_errors != '') { |
|
389 | + $this->debugMsg("+++PROCESSING ERRORS AND WARNINGS+++\n". |
|
390 | + static::$_xmlrpcs_occurred_errors."+++END+++"); |
|
391 | 391 | } |
392 | 392 | |
393 | 393 | $header = $resp->xml_header($respCharset); |
394 | - if ($this->debug > 0) { |
|
394 | + if ($this->debug>0) { |
|
395 | 395 | $header .= $this->serializeDebug($respCharset); |
396 | 396 | } |
397 | 397 | |
@@ -402,7 +402,7 @@ discard block |
||
402 | 402 | if (empty($payload)) { |
403 | 403 | $payload = $resp->serialize($respCharset); |
404 | 404 | } |
405 | - $payload = $header . $payload; |
|
405 | + $payload = $header.$payload; |
|
406 | 406 | |
407 | 407 | if ($returnPayload) { |
408 | 408 | return $payload; |
@@ -411,7 +411,7 @@ discard block |
||
411 | 411 | // if we get a warning/error that has output some text before here, then we cannot |
412 | 412 | // add a new header. We cannot say we are sending xml, either... |
413 | 413 | if (!headers_sent()) { |
414 | - header('Content-Type: ' . $resp->getContentType()); |
|
414 | + header('Content-Type: '.$resp->getContentType()); |
|
415 | 415 | // we do not know if client actually told us an accepted charset, but if it did we have to tell it what we did |
416 | 416 | header("Vary: Accept-Charset"); |
417 | 417 | |
@@ -434,10 +434,10 @@ discard block |
||
434 | 434 | // Note that Apache/mod_php will add (and even alter!) the Content-Length header on its own, but only for |
435 | 435 | // responses up to 8000 bytes |
436 | 436 | if ($phpNoSelfCompress) { |
437 | - header('Content-Length: ' . (int)strlen($payload)); |
|
437 | + header('Content-Length: '.(int) strlen($payload)); |
|
438 | 438 | } |
439 | 439 | } else { |
440 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': http headers already sent before response is fully generated. Check for php warning or error messages'); |
|
440 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.': http headers already sent before response is fully generated. Check for php warning or error messages'); |
|
441 | 441 | } |
442 | 442 | |
443 | 443 | print $payload; |
@@ -526,9 +526,9 @@ discard block |
||
526 | 526 | $numParams = count($in); |
527 | 527 | } |
528 | 528 | foreach ($sigs as $curSig) { |
529 | - if (count($curSig) == $numParams + 1) { |
|
529 | + if (count($curSig) == $numParams+1) { |
|
530 | 530 | $itsOK = 1; |
531 | - for ($n = 0; $n < $numParams; $n++) { |
|
531 | + for ($n = 0; $n<$numParams; $n++) { |
|
532 | 532 | if (is_object($in)) { |
533 | 533 | $p = $in->getParam($n); |
534 | 534 | if ($p->kindOf() == 'scalar') { |
@@ -541,10 +541,10 @@ discard block |
||
541 | 541 | } |
542 | 542 | |
543 | 543 | // param index is $n+1, as first member of sig is return type |
544 | - if ($pt != $curSig[$n + 1] && $curSig[$n + 1] != Value::$xmlrpcValue) { |
|
544 | + if ($pt != $curSig[$n+1] && $curSig[$n+1] != Value::$xmlrpcValue) { |
|
545 | 545 | $itsOK = 0; |
546 | - $pno = $n + 1; |
|
547 | - $wanted = $curSig[$n + 1]; |
|
546 | + $pno = $n+1; |
|
547 | + $wanted = $curSig[$n+1]; |
|
548 | 548 | $got = $pt; |
549 | 549 | break; |
550 | 550 | } |
@@ -571,10 +571,10 @@ discard block |
||
571 | 571 | // check if $_SERVER is populated: it might have been disabled via ini file |
572 | 572 | // (this is true even when in CLI mode) |
573 | 573 | if (count($_SERVER) == 0) { |
574 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': cannot parse request headers as $_SERVER is not populated'); |
|
574 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.': cannot parse request headers as $_SERVER is not populated'); |
|
575 | 575 | } |
576 | 576 | |
577 | - if ($this->debug > 1) { |
|
577 | + if ($this->debug>1) { |
|
578 | 578 | if (function_exists('getallheaders')) { |
579 | 579 | $this->debugMsg(''); // empty line |
580 | 580 | foreach (getallheaders() as $name => $val) { |
@@ -599,13 +599,13 @@ discard block |
||
599 | 599 | if (function_exists('gzinflate') && in_array($contentEncoding, $this->accepted_compression)) { |
600 | 600 | if ($contentEncoding == 'deflate' && $degzdata = @gzuncompress($data)) { |
601 | 601 | $data = $degzdata; |
602 | - if ($this->debug > 1) { |
|
603 | - $this->debugMsg("\n+++INFLATED REQUEST+++[" . strlen($data) . " chars]+++\n" . $data . "\n+++END+++"); |
|
602 | + if ($this->debug>1) { |
|
603 | + $this->debugMsg("\n+++INFLATED REQUEST+++[".strlen($data)." chars]+++\n".$data."\n+++END+++"); |
|
604 | 604 | } |
605 | 605 | } elseif ($contentEncoding == 'gzip' && $degzdata = @gzinflate(substr($data, 10))) { |
606 | 606 | $data = $degzdata; |
607 | - if ($this->debug > 1) { |
|
608 | - $this->debugMsg("+++INFLATED REQUEST+++[" . strlen($data) . " chars]+++\n" . $data . "\n+++END+++"); |
|
607 | + if ($this->debug>1) { |
|
608 | + $this->debugMsg("+++INFLATED REQUEST+++[".strlen($data)." chars]+++\n".$data."\n+++END+++"); |
|
609 | 609 | } |
610 | 610 | } else { |
611 | 611 | $r = new static::$responseClass(0, PhpXmlRpc::$xmlrpcerr['server_decompress_fail'], |
@@ -693,7 +693,7 @@ discard block |
||
693 | 693 | if ($reqEncoding == 'ISO-8859-1') { |
694 | 694 | $data = utf8_encode($data); |
695 | 695 | } else { |
696 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': unsupported charset encoding of received request: ' . $reqEncoding); |
|
696 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.': unsupported charset encoding of received request: '.$reqEncoding); |
|
697 | 697 | } |
698 | 698 | } |
699 | 699 | } |
@@ -724,7 +724,7 @@ discard block |
||
724 | 724 | preg_match('/^XML error ([0-9]+)/', $_xh['isf_reason'], $matches); |
725 | 725 | return new static::$responseClass( |
726 | 726 | 0, |
727 | - PhpXmlRpc::$xmlrpcerrxml + (int)$matches[1], |
|
727 | + PhpXmlRpc::$xmlrpcerrxml+(int) $matches[1], |
|
728 | 728 | $_xh['isf_reason']); |
729 | 729 | } elseif ($_xh['isf']) { |
730 | 730 | /// @todo separate better the various cases, as we have done in Request::parseResponse: invalid xml-rpc vs. |
@@ -732,7 +732,7 @@ discard block |
||
732 | 732 | return new static::$responseClass( |
733 | 733 | 0, |
734 | 734 | PhpXmlRpc::$xmlrpcerr['invalid_request'], |
735 | - PhpXmlRpc::$xmlrpcstr['invalid_request'] . ' ' . $_xh['isf_reason']); |
|
735 | + PhpXmlRpc::$xmlrpcstr['invalid_request'].' '.$_xh['isf_reason']); |
|
736 | 736 | } else { |
737 | 737 | // small layering violation in favor of speed and memory usage: we should allow the 'execute' method handle |
738 | 738 | // this, but in the most common scenario (xml-rpc values type server with some methods registered as phpvals) |
@@ -742,8 +742,8 @@ discard block |
||
742 | 742 | ($this->dmap[$_xh['method']]['parameters_type'] != 'xmlrpcvals') |
743 | 743 | ) |
744 | 744 | ) { |
745 | - if ($this->debug > 1) { |
|
746 | - $this->debugMsg("\n+++PARSED+++\n" . var_export($_xh['params'], true) . "\n+++END+++"); |
|
745 | + if ($this->debug>1) { |
|
746 | + $this->debugMsg("\n+++PARSED+++\n".var_export($_xh['params'], true)."\n+++END+++"); |
|
747 | 747 | } |
748 | 748 | |
749 | 749 | return $this->execute($_xh['method'], $_xh['params'], $_xh['pt']); |
@@ -751,12 +751,12 @@ discard block |
||
751 | 751 | // build a Request object with data parsed from xml and add parameters in |
752 | 752 | $req = new Request($_xh['method']); |
753 | 753 | /// @todo for more speed, we could just pass in the array to the constructor (and loose the type validation)... |
754 | - for ($i = 0; $i < count($_xh['params']); $i++) { |
|
754 | + for ($i = 0; $i<count($_xh['params']); $i++) { |
|
755 | 755 | $req->addParam($_xh['params'][$i]); |
756 | 756 | } |
757 | 757 | |
758 | - if ($this->debug > 1) { |
|
759 | - $this->debugMsg("\n+++PARSED+++\n" . var_export($req, true) . "\n+++END+++"); |
|
758 | + if ($this->debug>1) { |
|
759 | + $this->debugMsg("\n+++PARSED+++\n".var_export($req, true)."\n+++END+++"); |
|
760 | 760 | } |
761 | 761 | |
762 | 762 | return $this->execute($req); |
@@ -806,7 +806,7 @@ discard block |
||
806 | 806 | return new static::$responseClass( |
807 | 807 | 0, |
808 | 808 | PhpXmlRpc::$xmlrpcerr['incorrect_params'], |
809 | - PhpXmlRpc::$xmlrpcstr['incorrect_params'] . ": {$errStr}" |
|
809 | + PhpXmlRpc::$xmlrpcstr['incorrect_params'].": {$errStr}" |
|
810 | 810 | ); |
811 | 811 | } |
812 | 812 | } |
@@ -821,7 +821,7 @@ discard block |
||
821 | 821 | // build string representation of function 'name' |
822 | 822 | if (is_array($func)) { |
823 | 823 | if (is_object($func[0])) { |
824 | - $funcName = get_class($func[0]) . '->' . $func[1]; |
|
824 | + $funcName = get_class($func[0]).'->'.$func[1]; |
|
825 | 825 | } else { |
826 | 826 | $funcName = implode('::', $func); |
827 | 827 | } |
@@ -833,16 +833,16 @@ discard block |
||
833 | 833 | |
834 | 834 | // verify that function to be invoked is in fact callable |
835 | 835 | if (!is_callable($func)) { |
836 | - $this->getLogger()->error("XML-RPC: " . __METHOD__ . ": function '$funcName' registered as method handler is not callable"); |
|
836 | + $this->getLogger()->error("XML-RPC: ".__METHOD__.": function '$funcName' registered as method handler is not callable"); |
|
837 | 837 | return new static::$responseClass( |
838 | 838 | 0, |
839 | 839 | PhpXmlRpc::$xmlrpcerr['server_error'], |
840 | - PhpXmlRpc::$xmlrpcstr['server_error'] . ": no function matches method" |
|
840 | + PhpXmlRpc::$xmlrpcstr['server_error'].": no function matches method" |
|
841 | 841 | ); |
842 | 842 | } |
843 | 843 | |
844 | 844 | if (isset($dmap[$methodName]['exception_handling'])) { |
845 | - $exception_handling = (int)$dmap[$methodName]['exception_handling']; |
|
845 | + $exception_handling = (int) $dmap[$methodName]['exception_handling']; |
|
846 | 846 | } else { |
847 | 847 | $exception_handling = $this->exception_handling; |
848 | 848 | } |
@@ -863,14 +863,14 @@ discard block |
||
863 | 863 | $r = call_user_func($func, $req); |
864 | 864 | } |
865 | 865 | if (!is_a($r, 'PhpXmlRpc\Response')) { |
866 | - $this->getLogger()->error("XML-RPC: " . __METHOD__ . ": function '$funcName' registered as method handler does not return an xmlrpc response object but a " . gettype($r)); |
|
866 | + $this->getLogger()->error("XML-RPC: ".__METHOD__.": function '$funcName' registered as method handler does not return an xmlrpc response object but a ".gettype($r)); |
|
867 | 867 | if (is_a($r, 'PhpXmlRpc\Value')) { |
868 | 868 | $r = new static::$responseClass($r); |
869 | 869 | } else { |
870 | 870 | $r = new static::$responseClass( |
871 | 871 | 0, |
872 | 872 | PhpXmlRpc::$xmlrpcerr['server_error'], |
873 | - PhpXmlRpc::$xmlrpcstr['server_error'] . ": function does not return xmlrpc response object" |
|
873 | + PhpXmlRpc::$xmlrpcstr['server_error'].": function does not return xmlrpc response object" |
|
874 | 874 | ); |
875 | 875 | } |
876 | 876 | } |
@@ -885,7 +885,7 @@ discard block |
||
885 | 885 | $r = call_user_func_array($func, array($methodName, $params, $this->user_data)); |
886 | 886 | // mimic EPI behaviour: if we get an array that looks like an error, make it an error response |
887 | 887 | if (is_array($r) && array_key_exists('faultCode', $r) && array_key_exists('faultString', $r)) { |
888 | - $r = new static::$responseClass(0, (integer)$r['faultCode'], (string)$r['faultString']); |
|
888 | + $r = new static::$responseClass(0, (integer) $r['faultCode'], (string) $r['faultString']); |
|
889 | 889 | } else { |
890 | 890 | // functions using EPI api should NOT return resp objects, so make sure we encode the |
891 | 891 | // return type correctly |
@@ -1016,7 +1016,7 @@ discard block |
||
1016 | 1016 | */ |
1017 | 1017 | protected function debugMsg($string) |
1018 | 1018 | { |
1019 | - $this->debug_info .= $string . "\n"; |
|
1019 | + $this->debug_info .= $string."\n"; |
|
1020 | 1020 | } |
1021 | 1021 | |
1022 | 1022 | /** |
@@ -1307,7 +1307,7 @@ discard block |
||
1307 | 1307 | $i++; // for error message, we count params from 1 |
1308 | 1308 | return static::_xmlrpcs_multicall_error(new static::$responseClass(0, |
1309 | 1309 | PhpXmlRpc::$xmlrpcerr['incorrect_params'], |
1310 | - PhpXmlRpc::$xmlrpcstr['incorrect_params'] . ": probable xml error in param " . $i)); |
|
1310 | + PhpXmlRpc::$xmlrpcstr['incorrect_params'].": probable xml error in param ".$i)); |
|
1311 | 1311 | } |
1312 | 1312 | } |
1313 | 1313 | |
@@ -1388,7 +1388,7 @@ discard block |
||
1388 | 1388 | } |
1389 | 1389 | } else { |
1390 | 1390 | $numCalls = count($req); |
1391 | - for ($i = 0; $i < $numCalls; $i++) { |
|
1391 | + for ($i = 0; $i<$numCalls; $i++) { |
|
1392 | 1392 | $result[$i] = static::_xmlrpcs_multicall_do_call_phpvals($server, $req[$i]); |
1393 | 1393 | } |
1394 | 1394 | } |
@@ -1453,12 +1453,12 @@ discard block |
||
1453 | 1453 | */ |
1454 | 1454 | protected function xml_header($charsetEncoding = '') |
1455 | 1455 | { |
1456 | - $this->logDeprecation('Method ' . __METHOD__ . ' is deprecated'); |
|
1456 | + $this->logDeprecation('Method '.__METHOD__.' is deprecated'); |
|
1457 | 1457 | |
1458 | 1458 | if ($charsetEncoding != '') { |
1459 | - return "<?xml version=\"1.0\" encoding=\"$charsetEncoding\"?" . ">\n"; |
|
1459 | + return "<?xml version=\"1.0\" encoding=\"$charsetEncoding\"?".">\n"; |
|
1460 | 1460 | } else { |
1461 | - return "<?xml version=\"1.0\"?" . ">\n"; |
|
1461 | + return "<?xml version=\"1.0\"?".">\n"; |
|
1462 | 1462 | } |
1463 | 1463 | } |
1464 | 1464 | |
@@ -1474,7 +1474,7 @@ discard block |
||
1474 | 1474 | case self::OPT_FUNCTIONS_PARAMETERS_TYPE: |
1475 | 1475 | case self::OPT_PHPVALS_ENCODING_OPTIONS: |
1476 | 1476 | case self::OPT_RESPONSE_CHARSET_ENCODING: |
1477 | - $this->logDeprecation('Getting property Request::' . $name . ' is deprecated'); |
|
1477 | + $this->logDeprecation('Getting property Request::'.$name.' is deprecated'); |
|
1478 | 1478 | return $this->$name; |
1479 | 1479 | case 'accepted_charset_encodings': |
1480 | 1480 | // manually implement the 'protected property' behaviour |
@@ -1486,16 +1486,16 @@ discard block |
||
1486 | 1486 | } |
1487 | 1487 | } |
1488 | 1488 | if ($canAccess) { |
1489 | - $this->logDeprecation('Getting property Request::' . $name . ' is deprecated'); |
|
1489 | + $this->logDeprecation('Getting property Request::'.$name.' is deprecated'); |
|
1490 | 1490 | return $this->accepted_compression; |
1491 | 1491 | } else { |
1492 | - trigger_error("Cannot access protected property Server::accepted_charset_encodings in " . __FILE__, E_USER_ERROR); |
|
1492 | + trigger_error("Cannot access protected property Server::accepted_charset_encodings in ".__FILE__, E_USER_ERROR); |
|
1493 | 1493 | } |
1494 | 1494 | break; |
1495 | 1495 | default: |
1496 | 1496 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
1497 | 1497 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
1498 | - trigger_error('Undefined property via __get(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
1498 | + trigger_error('Undefined property via __get(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
1499 | 1499 | $result = null; |
1500 | 1500 | return $result; |
1501 | 1501 | } |
@@ -1512,7 +1512,7 @@ discard block |
||
1512 | 1512 | case self::OPT_FUNCTIONS_PARAMETERS_TYPE: |
1513 | 1513 | case self::OPT_PHPVALS_ENCODING_OPTIONS: |
1514 | 1514 | case self::OPT_RESPONSE_CHARSET_ENCODING: |
1515 | - $this->logDeprecation('Setting property Request::' . $name . ' is deprecated'); |
|
1515 | + $this->logDeprecation('Setting property Request::'.$name.' is deprecated'); |
|
1516 | 1516 | $this->$name = $value; |
1517 | 1517 | break; |
1518 | 1518 | case 'accepted_charset_encodings': |
@@ -1525,16 +1525,16 @@ discard block |
||
1525 | 1525 | } |
1526 | 1526 | } |
1527 | 1527 | if ($canAccess) { |
1528 | - $this->logDeprecation('Setting property Request::' . $name . ' is deprecated'); |
|
1528 | + $this->logDeprecation('Setting property Request::'.$name.' is deprecated'); |
|
1529 | 1529 | $this->accepted_compression = $value; |
1530 | 1530 | } else { |
1531 | - trigger_error("Cannot access protected property Server::accepted_charset_encodings in " . __FILE__, E_USER_ERROR); |
|
1531 | + trigger_error("Cannot access protected property Server::accepted_charset_encodings in ".__FILE__, E_USER_ERROR); |
|
1532 | 1532 | } |
1533 | 1533 | break; |
1534 | 1534 | default: |
1535 | 1535 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
1536 | 1536 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
1537 | - trigger_error('Undefined property via __set(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
1537 | + trigger_error('Undefined property via __set(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
1538 | 1538 | } |
1539 | 1539 | } |
1540 | 1540 | |
@@ -1549,7 +1549,7 @@ discard block |
||
1549 | 1549 | case self::OPT_FUNCTIONS_PARAMETERS_TYPE: |
1550 | 1550 | case self::OPT_PHPVALS_ENCODING_OPTIONS: |
1551 | 1551 | case self::OPT_RESPONSE_CHARSET_ENCODING: |
1552 | - $this->logDeprecation('Checking property Request::' . $name . ' is deprecated'); |
|
1552 | + $this->logDeprecation('Checking property Request::'.$name.' is deprecated'); |
|
1553 | 1553 | return isset($this->$name); |
1554 | 1554 | case 'accepted_charset_encodings': |
1555 | 1555 | // manually implement the 'protected property' behaviour |
@@ -1561,7 +1561,7 @@ discard block |
||
1561 | 1561 | } |
1562 | 1562 | } |
1563 | 1563 | if ($canAccess) { |
1564 | - $this->logDeprecation('Checking property Request::' . $name . ' is deprecated'); |
|
1564 | + $this->logDeprecation('Checking property Request::'.$name.' is deprecated'); |
|
1565 | 1565 | return isset($this->accepted_compression); |
1566 | 1566 | } |
1567 | 1567 | // break through voluntarily |
@@ -1581,7 +1581,7 @@ discard block |
||
1581 | 1581 | case self::OPT_FUNCTIONS_PARAMETERS_TYPE: |
1582 | 1582 | case self::OPT_PHPVALS_ENCODING_OPTIONS: |
1583 | 1583 | case self::OPT_RESPONSE_CHARSET_ENCODING: |
1584 | - $this->logDeprecation('Unsetting property Request::' . $name . ' is deprecated'); |
|
1584 | + $this->logDeprecation('Unsetting property Request::'.$name.' is deprecated'); |
|
1585 | 1585 | unset($this->$name); |
1586 | 1586 | break; |
1587 | 1587 | case 'accepted_charset_encodings': |
@@ -1594,16 +1594,16 @@ discard block |
||
1594 | 1594 | } |
1595 | 1595 | } |
1596 | 1596 | if ($canAccess) { |
1597 | - $this->logDeprecation('Unsetting property Request::' . $name . ' is deprecated'); |
|
1597 | + $this->logDeprecation('Unsetting property Request::'.$name.' is deprecated'); |
|
1598 | 1598 | unset($this->accepted_compression); |
1599 | 1599 | } else { |
1600 | - trigger_error("Cannot access protected property Server::accepted_charset_encodings in " . __FILE__, E_USER_ERROR); |
|
1600 | + trigger_error("Cannot access protected property Server::accepted_charset_encodings in ".__FILE__, E_USER_ERROR); |
|
1601 | 1601 | } |
1602 | 1602 | break; |
1603 | 1603 | default: |
1604 | 1604 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
1605 | 1605 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
1606 | - trigger_error('Undefined property via __unset(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
1606 | + trigger_error('Undefined property via __unset(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
1607 | 1607 | } |
1608 | 1608 | } |
1609 | 1609 | } |
@@ -1,6 +1,6 @@ discard block |
||
1 | 1 | <?php |
2 | 2 | |
3 | -include_once __DIR__ . '/08ServerTest.php'; |
|
3 | +include_once __DIR__.'/08ServerTest.php'; |
|
4 | 4 | |
5 | 5 | /** |
6 | 6 | * Tests which stress http features of the library. |
@@ -25,7 +25,7 @@ discard block |
||
25 | 25 | ); |
26 | 26 | |
27 | 27 | $methods = array(); |
28 | - foreach(get_class_methods('ServerTest') as $method) |
|
28 | + foreach (get_class_methods('ServerTest') as $method) |
|
29 | 29 | { |
30 | 30 | if (strpos($method, 'test') === 0 && !in_array($method, $unsafeMethods)) |
31 | 31 | { |
@@ -295,7 +295,7 @@ discard block |
||
295 | 295 | if (version_compare(PHP_VERSION, '8.0', '>=') && $this->args['SSLVERSION'] == 0) |
296 | 296 | { |
297 | 297 | $version = explode('.', PHP_VERSION); |
298 | - $this->client->setSSLVersion(min(4 + $version[1], 7)); |
|
298 | + $this->client->setSSLVersion(min(4+$version[1], 7)); |
|
299 | 299 | } |
300 | 300 | |
301 | 301 | $this->$method(); |
@@ -325,7 +325,7 @@ discard block |
||
325 | 325 | preg_match('/ubunutu([0-9]+)/', $output[0], $matches); |
326 | 326 | $ubuntuVersion = @$matches[1]; |
327 | 327 | } |
328 | - if ($ubuntuVersion >= 20) { |
|
328 | + if ($ubuntuVersion>=20) { |
|
329 | 329 | $this->markTestSkipped('HTTPS via Socket known to fail on php less than 7.2 on Ubuntu 20 and higher'); |
330 | 330 | return; |
331 | 331 | } |
@@ -345,11 +345,11 @@ discard block |
||
345 | 345 | { |
346 | 346 | $version = explode('.', PHP_VERSION); |
347 | 347 | $this->client->setOption(\PhpXmlRpc\Client::OPT_EXTRA_SOCKET_OPTS, |
348 | - array('ssl' => array('security_level' => 2 + $version[1]))); |
|
348 | + array('ssl' => array('security_level' => 2+$version[1]))); |
|
349 | 349 | /// @todo we should probably look deeper into the Apache config / ssl version in use to find out why this |
350 | 350 | /// does not work well with TLS < 1.2 |
351 | 351 | if ($this->args['SSLVERSION'] == 0) { |
352 | - $this->client->setSSLVersion(min(5 + $version[1], 7)); |
|
352 | + $this->client->setSSLVersion(min(5+$version[1], 7)); |
|
353 | 353 | } |
354 | 354 | } |
355 | 355 | $this->$method(); |
@@ -389,7 +389,7 @@ discard block |
||
389 | 389 | if (version_compare(PHP_VERSION, '8.0', '>=') && $this->args['SSLVERSION'] == 0) |
390 | 390 | { |
391 | 391 | $version = explode('.', PHP_VERSION); |
392 | - $this->client->setSSLVersion(min(4 + $version[1], 7)); |
|
392 | + $this->client->setSSLVersion(min(4+$version[1], 7)); |
|
393 | 393 | } |
394 | 394 | |
395 | 395 | $this->$method(); |
@@ -1,6 +1,6 @@ discard block |
||
1 | 1 | <?php |
2 | 2 | |
3 | -include_once __DIR__ . '/ServerAwareTestCase.php'; |
|
3 | +include_once __DIR__.'/ServerAwareTestCase.php'; |
|
4 | 4 | |
5 | 5 | abstract class PhpXmlRpc_WebTestCase extends PhpXmlRpc_ServerAwareTestCase |
6 | 6 | { |
@@ -15,7 +15,7 @@ discard block |
||
15 | 15 | */ |
16 | 16 | protected function request($path, $method = 'GET', $payload = '', $emptyPageOk = false) |
17 | 17 | { |
18 | - $url = $this->baseUrl . $path; |
|
18 | + $url = $this->baseUrl.$path; |
|
19 | 19 | |
20 | 20 | $ch = curl_init($url); |
21 | 21 | curl_setopt_array($ch, array( |
@@ -29,21 +29,21 @@ discard block |
||
29 | 29 | CURLOPT_POSTFIELDS => $payload |
30 | 30 | )); |
31 | 31 | } |
32 | - $cookie = 'PHPUNIT_RANDOM_TEST_ID=' . static::$randId; |
|
32 | + $cookie = 'PHPUNIT_RANDOM_TEST_ID='.static::$randId; |
|
33 | 33 | if ($this->collectCodeCoverageInformation) |
34 | 34 | { |
35 | - $cookie .= '; PHPUNIT_SELENIUM_TEST_ID=' . $this->testId; |
|
35 | + $cookie .= '; PHPUNIT_SELENIUM_TEST_ID='.$this->testId; |
|
36 | 36 | } |
37 | 37 | curl_setopt($ch, CURLOPT_COOKIE, $cookie); |
38 | 38 | |
39 | - if ($this->args['DEBUG'] > 0) { |
|
39 | + if ($this->args['DEBUG']>0) { |
|
40 | 40 | curl_setopt($ch, CURLOPT_VERBOSE, 1); |
41 | 41 | } |
42 | 42 | $page = curl_exec($ch); |
43 | 43 | $info = curl_getinfo($ch); |
44 | 44 | curl_close($ch); |
45 | 45 | |
46 | - $this->assertNotFalse($page, 'Curl request should not fail. Url: ' . @$info['url'] . ', Http code: ' . @$info['http_code']); |
|
46 | + $this->assertNotFalse($page, 'Curl request should not fail. Url: '.@$info['url'].', Http code: '.@$info['http_code']); |
|
47 | 47 | if (!$emptyPageOk) { |
48 | 48 | $this->assertNotEquals('', $page, 'Retrieved web page should not be empty'); |
49 | 49 | } |
@@ -62,7 +62,7 @@ discard block |
||
62 | 62 | */ |
63 | 63 | protected function newClient($path) |
64 | 64 | { |
65 | - $client = new \PhpXmlRpc\Client($this->baseUrl . $path); |
|
65 | + $client = new \PhpXmlRpc\Client($this->baseUrl.$path); |
|
66 | 66 | $client->setCookie('PHPUNIT_RANDOM_TEST_ID', static::$randId); |
67 | 67 | if ($this->collectCodeCoverageInformation) { |
68 | 68 | $client->setCookie('PHPUNIT_SELENIUM_TEST_ID', $this->testId); |
@@ -187,12 +187,12 @@ discard block |
||
187 | 187 | // q: can php be built without ctype? should we use a regexp? |
188 | 188 | if (is_string($key) && !ctype_digit($key)) { |
189 | 189 | /// @todo on invalid options, throw/error-out instead of logging an error message? |
190 | - switch($key) { |
|
190 | + switch ($key) { |
|
191 | 191 | case 'target_charset': |
192 | 192 | if (function_exists('mb_convert_encoding')) { |
193 | 193 | $this->current_parsing_options['target_charset'] = $val; |
194 | 194 | } else { |
195 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ": 'target_charset' option is unsupported without mbstring"); |
|
195 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.": 'target_charset' option is unsupported without mbstring"); |
|
196 | 196 | } |
197 | 197 | break; |
198 | 198 | |
@@ -200,7 +200,7 @@ discard block |
||
200 | 200 | if (is_callable($val)) { |
201 | 201 | $this->current_parsing_options['methodname_callback'] = $val; |
202 | 202 | } else { |
203 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ": Callback passed as 'methodname_callback' is not callable"); |
|
203 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.": Callback passed as 'methodname_callback' is not callable"); |
|
204 | 204 | } |
205 | 205 | break; |
206 | 206 | |
@@ -211,7 +211,7 @@ discard block |
||
211 | 211 | break; |
212 | 212 | |
213 | 213 | default: |
214 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ": unsupported option: $key"); |
|
214 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.": unsupported option: $key"); |
|
215 | 215 | } |
216 | 216 | unset($mergedOptions[$key]); |
217 | 217 | } |
@@ -257,10 +257,10 @@ discard block |
||
257 | 257 | |
258 | 258 | try { |
259 | 259 | // @see ticket #70 - we have to parse big xml docs in chunks to avoid errors |
260 | - for ($offset = 0; $offset < $len; $offset += $this->maxChunkLength) { |
|
260 | + for ($offset = 0; $offset<$len; $offset += $this->maxChunkLength) { |
|
261 | 261 | $chunk = substr($data, $offset, $this->maxChunkLength); |
262 | 262 | // error handling: xml not well formed |
263 | - if (!@xml_parse($parser, $chunk, $offset + $this->maxChunkLength >= $len)) { |
|
263 | + if (!@xml_parse($parser, $chunk, $offset+$this->maxChunkLength>=$len)) { |
|
264 | 264 | $errCode = xml_get_error_code($parser); |
265 | 265 | $errStr = sprintf('XML error %s: %s at line %d, column %d', $errCode, xml_error_string($errCode), |
266 | 266 | xml_get_current_line_number($parser), xml_get_current_column_number($parser)); |
@@ -268,7 +268,7 @@ discard block |
||
268 | 268 | $this->_xh['isf_reason'] = $errStr; |
269 | 269 | } |
270 | 270 | // no need to parse further if we already have a fatal error |
271 | - if ($this->_xh['isf'] >= 2) { |
|
271 | + if ($this->_xh['isf']>=2) { |
|
272 | 272 | break; |
273 | 273 | } |
274 | 274 | } |
@@ -313,7 +313,7 @@ discard block |
||
313 | 313 | public function xmlrpc_se($parser, $name, $attrs, $acceptSingleVals = false) |
314 | 314 | { |
315 | 315 | // if invalid xml-rpc already detected, skip all processing |
316 | - if ($this->_xh['isf'] >= 2) { |
|
316 | + if ($this->_xh['isf']>=2) { |
|
317 | 317 | return; |
318 | 318 | } |
319 | 319 | |
@@ -327,7 +327,7 @@ discard block |
||
327 | 327 | if ($acceptSingleVals === false) { |
328 | 328 | $accept = $this->current_parsing_options['accept']; |
329 | 329 | } else { |
330 | - $this->logDeprecation('Using argument $acceptSingleVals for method ' . __METHOD__ . ' is deprecated'); |
|
330 | + $this->logDeprecation('Using argument $acceptSingleVals for method '.__METHOD__.' is deprecated'); |
|
331 | 331 | $accept = self::ACCEPT_REQUEST | self::ACCEPT_RESPONSE | self::ACCEPT_VALUE; |
332 | 332 | } |
333 | 333 | if (($name == 'METHODCALL' && ($accept & self::ACCEPT_REQUEST)) || |
@@ -337,7 +337,7 @@ discard block |
||
337 | 337 | $this->_xh['rt'] = strtolower($name); |
338 | 338 | } else { |
339 | 339 | $this->_xh['isf'] = 2; |
340 | - $this->_xh['isf_reason'] = 'missing top level xmlrpc element. Found: ' . $name; |
|
340 | + $this->_xh['isf_reason'] = 'missing top level xmlrpc element. Found: '.$name; |
|
341 | 341 | |
342 | 342 | return; |
343 | 343 | } |
@@ -442,7 +442,7 @@ discard block |
||
442 | 442 | |
443 | 443 | case 'MEMBER': |
444 | 444 | // set member name to null, in case we do not find in the xml later on |
445 | - $this->_xh['valuestack'][count($this->_xh['valuestack']) - 1]['name'] = null; |
|
445 | + $this->_xh['valuestack'][count($this->_xh['valuestack'])-1]['name'] = null; |
|
446 | 446 | //$this->_xh['ac']=''; |
447 | 447 | // Drop trough intentionally |
448 | 448 | |
@@ -505,7 +505,7 @@ discard block |
||
505 | 505 | */ |
506 | 506 | public function xmlrpc_ee($parser, $name, $rebuildXmlrpcvals = 1) |
507 | 507 | { |
508 | - if ($this->_xh['isf'] >= 2) { |
|
508 | + if ($this->_xh['isf']>=2) { |
|
509 | 509 | return; |
510 | 510 | } |
511 | 511 | |
@@ -527,7 +527,7 @@ discard block |
||
527 | 527 | $this->_xh['value'] = mb_convert_encoding($this->_xh['value'], $this->current_parsing_options['target_charset'], 'UTF-8'); |
528 | 528 | } |
529 | 529 | |
530 | - if ($rebuildXmlrpcvals > 0) { |
|
530 | + if ($rebuildXmlrpcvals>0) { |
|
531 | 531 | // build the xml-rpc val out of the data received, and substitute it |
532 | 532 | $temp = new Value($this->_xh['value'], $this->_xh['vt']); |
533 | 533 | // in case we got info about underlying php class, save it in the object we're rebuilding |
@@ -535,15 +535,15 @@ discard block |
||
535 | 535 | $temp->_php_class = $this->_xh['php_class']; |
536 | 536 | } |
537 | 537 | $this->_xh['value'] = $temp; |
538 | - } elseif ($rebuildXmlrpcvals < 0) { |
|
538 | + } elseif ($rebuildXmlrpcvals<0) { |
|
539 | 539 | if ($this->_xh['vt'] == Value::$xmlrpcDateTime) { |
540 | - $this->_xh['value'] = (object)array( |
|
540 | + $this->_xh['value'] = (object) array( |
|
541 | 541 | 'xmlrpc_type' => 'datetime', |
542 | 542 | 'scalar' => $this->_xh['value'], |
543 | 543 | 'timestamp' => \PhpXmlRpc\Helper\Date::iso8601Decode($this->_xh['value']) |
544 | 544 | ); |
545 | 545 | } elseif ($this->_xh['vt'] == Value::$xmlrpcBase64) { |
546 | - $this->_xh['value'] = (object)array( |
|
546 | + $this->_xh['value'] = (object) array( |
|
547 | 547 | 'xmlrpc_type' => 'base64', |
548 | 548 | 'scalar' => $this->_xh['value'] |
549 | 549 | ); |
@@ -558,8 +558,8 @@ discard block |
||
558 | 558 | // check if we are inside an array or struct: |
559 | 559 | // if value just built is inside an array, let's move it into array on the stack |
560 | 560 | $vscount = count($this->_xh['valuestack']); |
561 | - if ($vscount && $this->_xh['valuestack'][$vscount - 1]['type'] == 'ARRAY') { |
|
562 | - $this->_xh['valuestack'][$vscount - 1]['values'][] = $this->_xh['value']; |
|
561 | + if ($vscount && $this->_xh['valuestack'][$vscount-1]['type'] == 'ARRAY') { |
|
562 | + $this->_xh['valuestack'][$vscount-1]['values'][] = $this->_xh['value']; |
|
563 | 563 | } |
564 | 564 | break; |
565 | 565 | |
@@ -586,7 +586,7 @@ discard block |
||
586 | 586 | // log if receiving something strange, even though we set the value to false anyway |
587 | 587 | /// @todo to be consistent with the other types, we should return a value outside the good-value domain, e.g. NULL |
588 | 588 | if ($this->_xh['ac'] != '0' && strcasecmp($this->_xh['ac'], 'false') !== 0) { |
589 | - if (!$this->handleParsingError('invalid data received in BOOLEAN value: ' . |
|
589 | + if (!$this->handleParsingError('invalid data received in BOOLEAN value: '. |
|
590 | 590 | $this->truncateValueForLog($this->_xh['ac']), __METHOD__)) { |
591 | 591 | return; |
592 | 592 | } |
@@ -606,7 +606,7 @@ discard block |
||
606 | 606 | $this->_xh['vt'] = strtolower($name); |
607 | 607 | $this->_xh['lv'] = 3; // indicate we've found a value |
608 | 608 | if (!preg_match(PhpXmlRpc::$xmlrpc_int_format, $this->_xh['ac'])) { |
609 | - if (!$this->handleParsingError('non numeric data received in INT value: ' . |
|
609 | + if (!$this->handleParsingError('non numeric data received in INT value: '. |
|
610 | 610 | $this->truncateValueForLog($this->_xh['ac']), __METHOD__)) { |
611 | 611 | return; |
612 | 612 | } |
@@ -614,7 +614,7 @@ discard block |
||
614 | 614 | $this->_xh['value'] = 'ERROR_NON_NUMERIC_FOUND'; |
615 | 615 | } else { |
616 | 616 | // it's ok, add it on |
617 | - $this->_xh['value'] = (int)$this->_xh['ac']; |
|
617 | + $this->_xh['value'] = (int) $this->_xh['ac']; |
|
618 | 618 | } |
619 | 619 | break; |
620 | 620 | |
@@ -622,7 +622,7 @@ discard block |
||
622 | 622 | $this->_xh['vt'] = Value::$xmlrpcDouble; |
623 | 623 | $this->_xh['lv'] = 3; // indicate we've found a value |
624 | 624 | if (!preg_match(PhpXmlRpc::$xmlrpc_double_format, $this->_xh['ac'])) { |
625 | - if (!$this->handleParsingError('non numeric data received in DOUBLE value: ' . |
|
625 | + if (!$this->handleParsingError('non numeric data received in DOUBLE value: '. |
|
626 | 626 | $this->truncateValueForLog($this->_xh['ac']), __METHOD__)) { |
627 | 627 | return; |
628 | 628 | } |
@@ -630,7 +630,7 @@ discard block |
||
630 | 630 | $this->_xh['value'] = 'ERROR_NON_NUMERIC_FOUND'; |
631 | 631 | } else { |
632 | 632 | // it's ok, add it on |
633 | - $this->_xh['value'] = (double)$this->_xh['ac']; |
|
633 | + $this->_xh['value'] = (double) $this->_xh['ac']; |
|
634 | 634 | } |
635 | 635 | break; |
636 | 636 | |
@@ -638,7 +638,7 @@ discard block |
||
638 | 638 | $this->_xh['vt'] = Value::$xmlrpcDateTime; |
639 | 639 | $this->_xh['lv'] = 3; // indicate we've found a value |
640 | 640 | if (!preg_match(PhpXmlRpc::$xmlrpc_datetime_format, $this->_xh['ac'])) { |
641 | - if (!$this->handleParsingError('invalid data received in DATETIME value: ' . |
|
641 | + if (!$this->handleParsingError('invalid data received in DATETIME value: '. |
|
642 | 642 | $this->truncateValueForLog($this->_xh['ac']), __METHOD__)) { |
643 | 643 | return; |
644 | 644 | } |
@@ -649,9 +649,9 @@ discard block |
||
649 | 649 | |
650 | 650 | // the default regex used to validate the date string a few lines above should make this case impossible, |
651 | 651 | // but one never knows... |
652 | - } catch(\Exception $e) { |
|
652 | + } catch (\Exception $e) { |
|
653 | 653 | // what to do? We can not guarantee that a valid date can be created. We return null... |
654 | - if (!$this->handleParsingError('invalid data received in DATETIME value. Error ' . |
|
654 | + if (!$this->handleParsingError('invalid data received in DATETIME value. Error '. |
|
655 | 655 | $e->getMessage(), __METHOD__)) { |
656 | 656 | return; |
657 | 657 | } |
@@ -668,14 +668,14 @@ discard block |
||
668 | 668 | $v = base64_decode($this->_xh['ac'], true); |
669 | 669 | if ($v === false) { |
670 | 670 | $this->_xh['isf'] = 2; |
671 | - $this->_xh['isf_reason'] = 'Invalid data received in BASE64 value: '. $this->truncateValueForLog($this->_xh['ac']); |
|
671 | + $this->_xh['isf_reason'] = 'Invalid data received in BASE64 value: '.$this->truncateValueForLog($this->_xh['ac']); |
|
672 | 672 | return; |
673 | 673 | } |
674 | 674 | } else { |
675 | 675 | $v = base64_decode($this->_xh['ac']); |
676 | 676 | if ($v === '' && $this->_xh['ac'] !== '') { |
677 | 677 | // only the empty string should decode to the empty string |
678 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': invalid data received in BASE64 value: ' . |
|
678 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.': invalid data received in BASE64 value: '. |
|
679 | 679 | $this->truncateValueForLog($this->_xh['ac'])); |
680 | 680 | } |
681 | 681 | } |
@@ -683,20 +683,20 @@ discard block |
||
683 | 683 | break; |
684 | 684 | |
685 | 685 | case 'NAME': |
686 | - $this->_xh['valuestack'][count($this->_xh['valuestack']) - 1]['name'] = $this->_xh['ac']; |
|
686 | + $this->_xh['valuestack'][count($this->_xh['valuestack'])-1]['name'] = $this->_xh['ac']; |
|
687 | 687 | break; |
688 | 688 | |
689 | 689 | case 'MEMBER': |
690 | 690 | // add to array in the stack the last element built, unless no VALUE or no NAME were found |
691 | 691 | if ($this->_xh['vt']) { |
692 | 692 | $vscount = count($this->_xh['valuestack']); |
693 | - if ($this->_xh['valuestack'][$vscount - 1]['name'] === null) { |
|
693 | + if ($this->_xh['valuestack'][$vscount-1]['name'] === null) { |
|
694 | 694 | if (!$this->handleParsingError('missing NAME inside STRUCT in received xml', __METHOD__)) { |
695 | 695 | return; |
696 | 696 | } |
697 | - $this->_xh['valuestack'][$vscount - 1]['name'] = ''; |
|
697 | + $this->_xh['valuestack'][$vscount-1]['name'] = ''; |
|
698 | 698 | } |
699 | - $this->_xh['valuestack'][$vscount - 1]['values'][$this->_xh['valuestack'][$vscount - 1]['name']] = $this->_xh['value']; |
|
699 | + $this->_xh['valuestack'][$vscount-1]['values'][$this->_xh['valuestack'][$vscount-1]['name']] = $this->_xh['value']; |
|
700 | 700 | } else { |
701 | 701 | if (!$this->handleParsingError('missing VALUE inside STRUCT in received xml', __METHOD__)) { |
702 | 702 | return; |
@@ -830,7 +830,7 @@ discard block |
||
830 | 830 | public function xmlrpc_cd($parser, $data) |
831 | 831 | { |
832 | 832 | // skip processing if xml fault already detected |
833 | - if ($this->_xh['isf'] >= 2) { |
|
833 | + if ($this->_xh['isf']>=2) { |
|
834 | 834 | return; |
835 | 835 | } |
836 | 836 | |
@@ -852,7 +852,7 @@ discard block |
||
852 | 852 | public function xmlrpc_dh($parser, $data) |
853 | 853 | { |
854 | 854 | // skip processing if xml fault already detected |
855 | - if ($this->_xh['isf'] >= 2) { |
|
855 | + if ($this->_xh['isf']>=2) { |
|
856 | 856 | return; |
857 | 857 | } |
858 | 858 | |
@@ -932,8 +932,8 @@ discard block |
||
932 | 932 | // SPACE: (#x20 | #x9 | #xD | #xA)+ === [ \x9\xD\xA]+ |
933 | 933 | // EQ: SPACE?=SPACE? === [ \x9\xD\xA]*=[ \x9\xD\xA]* |
934 | 934 | // We could be stricter on version number: VersionNum ::= '1.' [0-9]+ |
935 | - if (preg_match('/^<\?xml\s+version\s*=\s*' . "((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))" . |
|
936 | - '\s+encoding\s*=\s*' . "((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
935 | + if (preg_match('/^<\?xml\s+version\s*=\s*'."((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))". |
|
936 | + '\s+encoding\s*=\s*'."((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
937 | 937 | $xmlChunk, $matches)) { |
938 | 938 | return strtoupper(substr($matches[2], 1, -1)); |
939 | 939 | } |
@@ -951,7 +951,7 @@ discard block |
||
951 | 951 | // NB: mb_detect likes to call it ascii, xml parser likes to call it US_ASCII... |
952 | 952 | // IANA also likes better US-ASCII, so go with it |
953 | 953 | if ($enc == 'ASCII') { |
954 | - $enc = 'US-' . $enc; |
|
954 | + $enc = 'US-'.$enc; |
|
955 | 955 | } |
956 | 956 | |
957 | 957 | return $enc; |
@@ -992,8 +992,8 @@ discard block |
||
992 | 992 | // SPACE: (#x20 | #x9 | #xD | #xA)+ === [ \x9\xD\xA]+ |
993 | 993 | // EQ: SPACE?=SPACE? === [ \x9\xD\xA]*=[ \x9\xD\xA]* |
994 | 994 | // We could be stricter on version number: VersionNum ::= '1.' [0-9]+ |
995 | - if (preg_match('/^<\?xml\s+version\s*=\s*' . "((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))" . |
|
996 | - '\s+encoding\s*=\s*' . "((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
995 | + if (preg_match('/^<\?xml\s+version\s*=\s*'."((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))". |
|
996 | + '\s+encoding\s*=\s*'."((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
997 | 997 | $xmlChunk)) { |
998 | 998 | return true; |
999 | 999 | } |
@@ -1013,7 +1013,7 @@ discard block |
||
1013 | 1013 | $this->_xh['isf_reason'] = ucfirst($message); |
1014 | 1014 | return false; |
1015 | 1015 | } else { |
1016 | - $this->getLogger()->error('XML-RPC: ' . ($method != '' ? $method . ': ' : '') . $message); |
|
1016 | + $this->getLogger()->error('XML-RPC: '.($method != '' ? $method.': ' : '').$message); |
|
1017 | 1017 | return true; |
1018 | 1018 | } |
1019 | 1019 | } |
@@ -1025,8 +1025,8 @@ discard block |
||
1025 | 1025 | */ |
1026 | 1026 | protected function truncateValueForLog($data) |
1027 | 1027 | { |
1028 | - if (strlen($data) > $this->maxLogValueLength) { |
|
1029 | - return substr($data, 0, $this->maxLogValueLength - 3) . '...'; |
|
1028 | + if (strlen($data)>$this->maxLogValueLength) { |
|
1029 | + return substr($data, 0, $this->maxLogValueLength-3).'...'; |
|
1030 | 1030 | } |
1031 | 1031 | |
1032 | 1032 | return $data; |
@@ -1047,7 +1047,7 @@ discard block |
||
1047 | 1047 | public function xmlrpc_se_any($parser, $name, $attrs) |
1048 | 1048 | { |
1049 | 1049 | // this will be spamming the log if this method is in use... |
1050 | - $this->logDeprecation('Method ' . __METHOD__ . ' is deprecated'); |
|
1050 | + $this->logDeprecation('Method '.__METHOD__.' is deprecated'); |
|
1051 | 1051 | |
1052 | 1052 | $this->xmlrpc_se($parser, $name, $attrs, true); |
1053 | 1053 | } |
@@ -1057,12 +1057,12 @@ discard block |
||
1057 | 1057 | switch ($name) { |
1058 | 1058 | case '_xh': |
1059 | 1059 | case 'xmlrpc_valid_parents': |
1060 | - $this->logDeprecation('Getting property XMLParser::' . $name . ' is deprecated'); |
|
1060 | + $this->logDeprecation('Getting property XMLParser::'.$name.' is deprecated'); |
|
1061 | 1061 | return $this->$name; |
1062 | 1062 | default: |
1063 | 1063 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
1064 | 1064 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
1065 | - trigger_error('Undefined property via __get(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
1065 | + trigger_error('Undefined property via __get(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
1066 | 1066 | $result = null; |
1067 | 1067 | return $result; |
1068 | 1068 | } |
@@ -1073,18 +1073,18 @@ discard block |
||
1073 | 1073 | switch ($name) { |
1074 | 1074 | // this should only ever be called by subclasses which overtook `parse()` |
1075 | 1075 | case 'accept': |
1076 | - $this->logDeprecation('Setting property XMLParser::' . $name . ' is deprecated'); |
|
1076 | + $this->logDeprecation('Setting property XMLParser::'.$name.' is deprecated'); |
|
1077 | 1077 | $this->current_parsing_options['accept'] = $value; |
1078 | 1078 | break; |
1079 | 1079 | case '_xh': |
1080 | 1080 | case 'xmlrpc_valid_parents': |
1081 | - $this->logDeprecation('Setting property XMLParser::' . $name . ' is deprecated'); |
|
1081 | + $this->logDeprecation('Setting property XMLParser::'.$name.' is deprecated'); |
|
1082 | 1082 | $this->$name = $value; |
1083 | 1083 | break; |
1084 | 1084 | default: |
1085 | 1085 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
1086 | 1086 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
1087 | - trigger_error('Undefined property via __set(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
1087 | + trigger_error('Undefined property via __set(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
1088 | 1088 | } |
1089 | 1089 | } |
1090 | 1090 | |
@@ -1092,11 +1092,11 @@ discard block |
||
1092 | 1092 | { |
1093 | 1093 | switch ($name) { |
1094 | 1094 | case 'accept': |
1095 | - $this->logDeprecation('Checking property XMLParser::' . $name . ' is deprecated'); |
|
1095 | + $this->logDeprecation('Checking property XMLParser::'.$name.' is deprecated'); |
|
1096 | 1096 | return isset($this->current_parsing_options['accept']); |
1097 | 1097 | case '_xh': |
1098 | 1098 | case 'xmlrpc_valid_parents': |
1099 | - $this->logDeprecation('Checking property XMLParser::' . $name . ' is deprecated'); |
|
1099 | + $this->logDeprecation('Checking property XMLParser::'.$name.' is deprecated'); |
|
1100 | 1100 | return isset($this->$name); |
1101 | 1101 | default: |
1102 | 1102 | return false; |
@@ -1108,18 +1108,18 @@ discard block |
||
1108 | 1108 | switch ($name) { |
1109 | 1109 | // q: does this make sense at all? |
1110 | 1110 | case 'accept': |
1111 | - $this->logDeprecation('Unsetting property XMLParser::' . $name . ' is deprecated'); |
|
1111 | + $this->logDeprecation('Unsetting property XMLParser::'.$name.' is deprecated'); |
|
1112 | 1112 | unset($this->current_parsing_options['accept']); |
1113 | 1113 | break; |
1114 | 1114 | case '_xh': |
1115 | 1115 | case 'xmlrpc_valid_parents': |
1116 | - $this->logDeprecation('Unsetting property XMLParser::' . $name . ' is deprecated'); |
|
1116 | + $this->logDeprecation('Unsetting property XMLParser::'.$name.' is deprecated'); |
|
1117 | 1117 | unset($this->$name); |
1118 | 1118 | break; |
1119 | 1119 | default: |
1120 | 1120 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
1121 | 1121 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
1122 | - trigger_error('Undefined property via __unset(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
1122 | + trigger_error('Undefined property via __unset(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
1123 | 1123 | } |
1124 | 1124 | } |
1125 | 1125 | } |