@@ -66,7 +66,7 @@ discard block |
||
66 | 66 | public function xmlrpc_se($parser, $name, $attrs, $acceptSingleVals = false) |
67 | 67 | { |
68 | 68 | // if invalid xmlrpc already detected, skip all processing |
69 | - if ($this->_xh['isf'] < 2) { |
|
69 | + if ($this->_xh['isf']<2) { |
|
70 | 70 | // check for correct element nesting |
71 | 71 | // top level element can only be of 2 types |
72 | 72 | /// @todo optimization creep: save this check into a bool variable, instead of using count() every time: |
@@ -171,7 +171,7 @@ discard block |
||
171 | 171 | $this->_xh['isf'] = 1; |
172 | 172 | break; |
173 | 173 | case 'MEMBER': |
174 | - $this->_xh['valuestack'][count($this->_xh['valuestack']) - 1]['name'] = ''; // set member name to null, in case we do not find in the xml later on |
|
174 | + $this->_xh['valuestack'][count($this->_xh['valuestack'])-1]['name'] = ''; // set member name to null, in case we do not find in the xml later on |
|
175 | 175 | //$this->_xh['ac']=''; |
176 | 176 | // Drop trough intentionally |
177 | 177 | case 'PARAM': |
@@ -223,7 +223,7 @@ discard block |
||
223 | 223 | */ |
224 | 224 | public function xmlrpc_ee($parser, $name, $rebuildXmlrpcvals = true) |
225 | 225 | { |
226 | - if ($this->_xh['isf'] < 2) { |
|
226 | + if ($this->_xh['isf']<2) { |
|
227 | 227 | // push this element name from stack |
228 | 228 | // NB: if XML validates, correct opening/closing is guaranteed and |
229 | 229 | // we do not have to check for $name == $currElem. |
@@ -249,8 +249,8 @@ discard block |
||
249 | 249 | // check if we are inside an array or struct: |
250 | 250 | // if value just built is inside an array, let's move it into array on the stack |
251 | 251 | $vscount = count($this->_xh['valuestack']); |
252 | - if ($vscount && $this->_xh['valuestack'][$vscount - 1]['type'] == 'ARRAY') { |
|
253 | - $this->_xh['valuestack'][$vscount - 1]['values'][] = $temp; |
|
252 | + if ($vscount && $this->_xh['valuestack'][$vscount-1]['type'] == 'ARRAY') { |
|
253 | + $this->_xh['valuestack'][$vscount-1]['values'][] = $temp; |
|
254 | 254 | } else { |
255 | 255 | $this->_xh['value'] = $temp; |
256 | 256 | } |
@@ -264,8 +264,8 @@ discard block |
||
264 | 264 | // check if we are inside an array or struct: |
265 | 265 | // if value just built is inside an array, let's move it into array on the stack |
266 | 266 | $vscount = count($this->_xh['valuestack']); |
267 | - if ($vscount && $this->_xh['valuestack'][$vscount - 1]['type'] == 'ARRAY') { |
|
268 | - $this->_xh['valuestack'][$vscount - 1]['values'][] = $this->_xh['value']; |
|
267 | + if ($vscount && $this->_xh['valuestack'][$vscount-1]['type'] == 'ARRAY') { |
|
268 | + $this->_xh['valuestack'][$vscount-1]['values'][] = $this->_xh['value']; |
|
269 | 269 | } |
270 | 270 | } |
271 | 271 | break; |
@@ -285,7 +285,7 @@ discard block |
||
285 | 285 | $this->_xh['value'] = $this->_xh['ac']; |
286 | 286 | } elseif ($name == 'DATETIME.ISO8601') { |
287 | 287 | if (!preg_match('/^[0-9]{8}T[0-9]{2}:[0-9]{2}:[0-9]{2}$/', $this->_xh['ac'])) { |
288 | - error_log('XML-RPC: ' . __METHOD__ . ': invalid value received in DATETIME: ' . $this->_xh['ac']); |
|
288 | + error_log('XML-RPC: '.__METHOD__.': invalid value received in DATETIME: '.$this->_xh['ac']); |
|
289 | 289 | } |
290 | 290 | $this->_xh['vt'] = Value::$xmlrpcDateTime; |
291 | 291 | $this->_xh['value'] = $this->_xh['ac']; |
@@ -304,7 +304,7 @@ discard block |
||
304 | 304 | } else { |
305 | 305 | // log if receiving something strange, even though we set the value to false anyway |
306 | 306 | if ($this->_xh['ac'] != '0' && strcasecmp($this->_xh['ac'], 'false') != 0) { |
307 | - error_log('XML-RPC: ' . __METHOD__ . ': invalid value received in BOOLEAN: ' . $this->_xh['ac']); |
|
307 | + error_log('XML-RPC: '.__METHOD__.': invalid value received in BOOLEAN: '.$this->_xh['ac']); |
|
308 | 308 | } |
309 | 309 | $this->_xh['value'] = false; |
310 | 310 | } |
@@ -314,37 +314,37 @@ discard block |
||
314 | 314 | // NOTE: regexp could be much stricter than this... |
315 | 315 | if (!preg_match('/^[+-eE0123456789 \t.]+$/', $this->_xh['ac'])) { |
316 | 316 | /// @todo: find a better way of throwing an error than this! |
317 | - error_log('XML-RPC: ' . __METHOD__ . ': non numeric value received in DOUBLE: ' . $this->_xh['ac']); |
|
317 | + error_log('XML-RPC: '.__METHOD__.': non numeric value received in DOUBLE: '.$this->_xh['ac']); |
|
318 | 318 | $this->_xh['value'] = 'ERROR_NON_NUMERIC_FOUND'; |
319 | 319 | } else { |
320 | 320 | // it's ok, add it on |
321 | - $this->_xh['value'] = (double)$this->_xh['ac']; |
|
321 | + $this->_xh['value'] = (double) $this->_xh['ac']; |
|
322 | 322 | } |
323 | 323 | } else { |
324 | 324 | // we have an I4/I8/INT |
325 | 325 | // we must check that only 0123456789-<space> are characters here |
326 | 326 | if (!preg_match('/^[+-]?[0123456789 \t]+$/', $this->_xh['ac'])) { |
327 | 327 | /// @todo find a better way of throwing an error than this! |
328 | - error_log('XML-RPC: ' . __METHOD__ . ': non numeric value received in INT: ' . $this->_xh['ac']); |
|
328 | + error_log('XML-RPC: '.__METHOD__.': non numeric value received in INT: '.$this->_xh['ac']); |
|
329 | 329 | $this->_xh['value'] = 'ERROR_NON_NUMERIC_FOUND'; |
330 | 330 | } else { |
331 | 331 | // it's ok, add it on |
332 | - $this->_xh['value'] = (int)$this->_xh['ac']; |
|
332 | + $this->_xh['value'] = (int) $this->_xh['ac']; |
|
333 | 333 | } |
334 | 334 | } |
335 | 335 | $this->_xh['lv'] = 3; // indicate we've found a value |
336 | 336 | break; |
337 | 337 | case 'NAME': |
338 | - $this->_xh['valuestack'][count($this->_xh['valuestack']) - 1]['name'] = $this->_xh['ac']; |
|
338 | + $this->_xh['valuestack'][count($this->_xh['valuestack'])-1]['name'] = $this->_xh['ac']; |
|
339 | 339 | break; |
340 | 340 | case 'MEMBER': |
341 | 341 | // add to array in the stack the last element built, |
342 | 342 | // unless no VALUE was found |
343 | 343 | if ($this->_xh['vt']) { |
344 | 344 | $vscount = count($this->_xh['valuestack']); |
345 | - $this->_xh['valuestack'][$vscount - 1]['values'][$this->_xh['valuestack'][$vscount - 1]['name']] = $this->_xh['value']; |
|
345 | + $this->_xh['valuestack'][$vscount-1]['values'][$this->_xh['valuestack'][$vscount-1]['name']] = $this->_xh['value']; |
|
346 | 346 | } else { |
347 | - error_log('XML-RPC: ' . __METHOD__ . ': missing VALUE inside STRUCT in received xml'); |
|
347 | + error_log('XML-RPC: '.__METHOD__.': missing VALUE inside STRUCT in received xml'); |
|
348 | 348 | } |
349 | 349 | break; |
350 | 350 | case 'DATA': |
@@ -367,7 +367,7 @@ discard block |
||
367 | 367 | $this->_xh['params'][] = $this->_xh['value']; |
368 | 368 | $this->_xh['pt'][] = $this->_xh['vt']; |
369 | 369 | } else { |
370 | - error_log('XML-RPC: ' . __METHOD__ . ': missing VALUE inside PARAM in received xml'); |
|
370 | + error_log('XML-RPC: '.__METHOD__.': missing VALUE inside PARAM in received xml'); |
|
371 | 371 | } |
372 | 372 | break; |
373 | 373 | case 'METHODNAME': |
@@ -409,7 +409,7 @@ discard block |
||
409 | 409 | public function xmlrpc_cd($parser, $data) |
410 | 410 | { |
411 | 411 | // skip processing if xml fault already detected |
412 | - if ($this->_xh['isf'] < 2) { |
|
412 | + if ($this->_xh['isf']<2) { |
|
413 | 413 | // "lookforvalue==3" means that we've found an entire value |
414 | 414 | // and should discard any further character data |
415 | 415 | if ($this->_xh['lv'] != 3) { |
@@ -425,7 +425,7 @@ discard block |
||
425 | 425 | public function xmlrpc_dh($parser, $data) |
426 | 426 | { |
427 | 427 | // skip processing if xml fault already detected |
428 | - if ($this->_xh['isf'] < 2) { |
|
428 | + if ($this->_xh['isf']<2) { |
|
429 | 429 | if (substr($data, 0, 1) == '&' && substr($data, -1, 1) == ';') { |
430 | 430 | $this->_xh['ac'] .= $data; |
431 | 431 | } |
@@ -496,8 +496,8 @@ discard block |
||
496 | 496 | // Details: |
497 | 497 | // SPACE: (#x20 | #x9 | #xD | #xA)+ === [ \x9\xD\xA]+ |
498 | 498 | // EQ: SPACE?=SPACE? === [ \x9\xD\xA]*=[ \x9\xD\xA]* |
499 | - if (preg_match('/^<\?xml\s+version\s*=\s*' . "((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))" . |
|
500 | - '\s+encoding\s*=\s*' . "((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
499 | + if (preg_match('/^<\?xml\s+version\s*=\s*'."((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))". |
|
500 | + '\s+encoding\s*=\s*'."((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
501 | 501 | $xmlChunk, $matches)) { |
502 | 502 | return strtoupper(substr($matches[2], 1, -1)); |
503 | 503 | } |
@@ -515,7 +515,7 @@ discard block |
||
515 | 515 | // NB: mb_detect likes to call it ascii, xml parser likes to call it US_ASCII... |
516 | 516 | // IANA also likes better US-ASCII, so go with it |
517 | 517 | if ($enc == 'ASCII') { |
518 | - $enc = 'US-' . $enc; |
|
518 | + $enc = 'US-'.$enc; |
|
519 | 519 | } |
520 | 520 | |
521 | 521 | return $enc; |
@@ -550,8 +550,8 @@ discard block |
||
550 | 550 | // Details: |
551 | 551 | // SPACE: (#x20 | #x9 | #xD | #xA)+ === [ \x9\xD\xA]+ |
552 | 552 | // EQ: SPACE?=SPACE? === [ \x9\xD\xA]*=[ \x9\xD\xA]* |
553 | - if (preg_match('/^<\?xml\s+version\s*=\s*' . "((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))" . |
|
554 | - '\s+encoding\s*=\s*' . "((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
553 | + if (preg_match('/^<\?xml\s+version\s*=\s*'."((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))". |
|
554 | + '\s+encoding\s*=\s*'."((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
555 | 555 | $xmlChunk, $matches)) { |
556 | 556 | return true; |
557 | 557 | } |
@@ -75,7 +75,7 @@ discard block |
||
75 | 75 | return $xmlrpcVal->scalarval(); |
76 | 76 | case 'array': |
77 | 77 | $arr = array(); |
78 | - foreach($xmlrpcVal as $value) { |
|
78 | + foreach ($xmlrpcVal as $value) { |
|
79 | 79 | $arr[] = $this->decode($value, $options); |
80 | 80 | } |
81 | 81 | |
@@ -105,7 +105,7 @@ discard block |
||
105 | 105 | case 'msg': |
106 | 106 | $paramCount = $xmlrpcVal->getNumParams(); |
107 | 107 | $arr = array(); |
108 | - for ($i = 0; $i < $paramCount; $i++) { |
|
108 | + for ($i = 0; $i<$paramCount; $i++) { |
|
109 | 109 | $arr[] = $this->decode($xmlrpcVal->getParam($i), $options); |
110 | 110 | } |
111 | 111 | |
@@ -183,7 +183,7 @@ discard block |
||
183 | 183 | $xmlrpcVal = new Value($phpVal->format('Ymd\TH:i:s'), Value::$xmlrpcStruct); |
184 | 184 | } else { |
185 | 185 | $arr = array(); |
186 | - foreach($phpVal as $k => $v) { |
|
186 | + foreach ($phpVal as $k => $v) { |
|
187 | 187 | $arr[$k] = $this->encode($v, $options); |
188 | 188 | } |
189 | 189 | $xmlrpcVal = new Value($arr, Value::$xmlrpcStruct); |
@@ -205,7 +205,7 @@ discard block |
||
205 | 205 | break; |
206 | 206 | case 'resource': |
207 | 207 | if (in_array('extension_api', $options)) { |
208 | - $xmlrpcVal = new Value((int)$phpVal, Value::$xmlrpcInt); |
|
208 | + $xmlrpcVal = new Value((int) $phpVal, Value::$xmlrpcInt); |
|
209 | 209 | } else { |
210 | 210 | $xmlrpcVal = new Value(); |
211 | 211 | } |
@@ -248,7 +248,7 @@ discard block |
||
248 | 248 | if (extension_loaded('mbstring')) { |
249 | 249 | $xmlVal = mb_convert_encoding($xmlVal, 'UTF-8', $valEncoding); |
250 | 250 | } else { |
251 | - error_log('XML-RPC: ' . __METHOD__ . ': invalid charset encoding of xml text: ' . $valEncoding); |
|
251 | + error_log('XML-RPC: '.__METHOD__.': invalid charset encoding of xml text: '.$valEncoding); |
|
252 | 252 | } |
253 | 253 | } |
254 | 254 | } |
@@ -280,7 +280,7 @@ discard block |
||
280 | 280 | return false; |
281 | 281 | } |
282 | 282 | xml_parser_free($parser); |
283 | - if ($xmlRpcParser->_xh['isf'] > 1) { |
|
283 | + if ($xmlRpcParser->_xh['isf']>1) { |
|
284 | 284 | // test that $xmlrpc->_xh['value'] is an obj, too??? |
285 | 285 | |
286 | 286 | error_log($xmlRpcParser->_xh['isf_reason']); |
@@ -301,7 +301,7 @@ discard block |
||
301 | 301 | return $r; |
302 | 302 | case 'methodcall': |
303 | 303 | $req = new Request($xmlRpcParser->_xh['method']); |
304 | - for ($i = 0; $i < count($xmlRpcParser->_xh['params']); $i++) { |
|
304 | + for ($i = 0; $i<count($xmlRpcParser->_xh['params']); $i++) { |
|
305 | 305 | $req->addParam($xmlRpcParser->_xh['params'][$i]); |
306 | 306 | } |
307 | 307 |
@@ -22,12 +22,12 @@ discard block |
||
22 | 22 | |
23 | 23 | // read chunk-size, chunk-extension (if any) and crlf |
24 | 24 | // get the position of the linebreak |
25 | - $chunkEnd = strpos($buffer, "\r\n") + 2; |
|
25 | + $chunkEnd = strpos($buffer, "\r\n")+2; |
|
26 | 26 | $temp = substr($buffer, 0, $chunkEnd); |
27 | 27 | $chunkSize = hexdec(trim($temp)); |
28 | 28 | $chunkStart = $chunkEnd; |
29 | - while ($chunkSize > 0) { |
|
30 | - $chunkEnd = strpos($buffer, "\r\n", $chunkStart + $chunkSize); |
|
29 | + while ($chunkSize>0) { |
|
30 | + $chunkEnd = strpos($buffer, "\r\n", $chunkStart+$chunkSize); |
|
31 | 31 | |
32 | 32 | // just in case we got a broken connection |
33 | 33 | if ($chunkEnd == false) { |
@@ -39,19 +39,19 @@ discard block |
||
39 | 39 | } |
40 | 40 | |
41 | 41 | // read chunk-data and crlf |
42 | - $chunk = substr($buffer, $chunkStart, $chunkEnd - $chunkStart); |
|
42 | + $chunk = substr($buffer, $chunkStart, $chunkEnd-$chunkStart); |
|
43 | 43 | // append chunk-data to entity-body |
44 | 44 | $new .= $chunk; |
45 | 45 | // length := length + chunk-size |
46 | 46 | $length += strlen($chunk); |
47 | 47 | // read chunk-size and crlf |
48 | - $chunkStart = $chunkEnd + 2; |
|
48 | + $chunkStart = $chunkEnd+2; |
|
49 | 49 | |
50 | - $chunkEnd = strpos($buffer, "\r\n", $chunkStart) + 2; |
|
50 | + $chunkEnd = strpos($buffer, "\r\n", $chunkStart)+2; |
|
51 | 51 | if ($chunkEnd == false) { |
52 | 52 | break; //just in case we got a broken connection |
53 | 53 | } |
54 | - $temp = substr($buffer, $chunkStart, $chunkEnd - $chunkStart); |
|
54 | + $temp = substr($buffer, $chunkStart, $chunkEnd-$chunkStart); |
|
55 | 55 | $chunkSize = hexdec(trim($temp)); |
56 | 56 | $chunkStart = $chunkEnd; |
57 | 57 | } |
@@ -68,7 +68,7 @@ discard block |
||
68 | 68 | * @return array with keys 'headers' and 'cookies' |
69 | 69 | * @throws \Exception |
70 | 70 | */ |
71 | - public function parseResponseHeaders(&$data, $headersProcessed = false, $debug=0) |
|
71 | + public function parseResponseHeaders(&$data, $headersProcessed = false, $debug = 0) |
|
72 | 72 | { |
73 | 73 | $httpResponse = array('raw_data' => $data, 'headers'=> array(), 'cookies' => array()); |
74 | 74 | |
@@ -78,11 +78,11 @@ discard block |
||
78 | 78 | // (even though it is not valid http) |
79 | 79 | $pos = strpos($data, "\r\n\r\n"); |
80 | 80 | if ($pos || is_int($pos)) { |
81 | - $bd = $pos + 4; |
|
81 | + $bd = $pos+4; |
|
82 | 82 | } else { |
83 | 83 | $pos = strpos($data, "\n\n"); |
84 | 84 | if ($pos || is_int($pos)) { |
85 | - $bd = $pos + 2; |
|
85 | + $bd = $pos+2; |
|
86 | 86 | } else { |
87 | 87 | // No separation between response headers and body: fault? |
88 | 88 | $bd = 0; |
@@ -93,8 +93,8 @@ discard block |
||
93 | 93 | // maybe we could take them into account, too? |
94 | 94 | $data = substr($data, $bd); |
95 | 95 | } else { |
96 | - error_log('XML-RPC: ' . __METHOD__ . ': HTTPS via proxy error, tunnel connection possibly failed'); |
|
97 | - throw new \Exception(PhpXmlRpc::$xmlrpcstr['http_error'] . ' (HTTPS via proxy error, tunnel connection possibly failed)', PhpXmlRpc::$xmlrpcerr['http_error']); |
|
96 | + error_log('XML-RPC: '.__METHOD__.': HTTPS via proxy error, tunnel connection possibly failed'); |
|
97 | + throw new \Exception(PhpXmlRpc::$xmlrpcstr['http_error'].' (HTTPS via proxy error, tunnel connection possibly failed)', PhpXmlRpc::$xmlrpcerr['http_error']); |
|
98 | 98 | } |
99 | 99 | } |
100 | 100 | |
@@ -120,20 +120,20 @@ discard block |
||
120 | 120 | } |
121 | 121 | |
122 | 122 | if (!preg_match('/^HTTP\/[0-9.]+ 200 /', $data)) { |
123 | - $errstr = substr($data, 0, strpos($data, "\n") - 1); |
|
124 | - error_log('XML-RPC: ' . __METHOD__ . ': HTTP error, got response: ' . $errstr); |
|
125 | - throw new \Exception(PhpXmlRpc::$xmlrpcstr['http_error'] . ' (' . $errstr . ')', PhpXmlRpc::$xmlrpcerr['http_error']); |
|
123 | + $errstr = substr($data, 0, strpos($data, "\n")-1); |
|
124 | + error_log('XML-RPC: '.__METHOD__.': HTTP error, got response: '.$errstr); |
|
125 | + throw new \Exception(PhpXmlRpc::$xmlrpcstr['http_error'].' ('.$errstr.')', PhpXmlRpc::$xmlrpcerr['http_error']); |
|
126 | 126 | } |
127 | 127 | |
128 | 128 | // be tolerant to usage of \n instead of \r\n to separate headers and data |
129 | 129 | // (even though it is not valid http) |
130 | 130 | $pos = strpos($data, "\r\n\r\n"); |
131 | 131 | if ($pos || is_int($pos)) { |
132 | - $bd = $pos + 4; |
|
132 | + $bd = $pos+4; |
|
133 | 133 | } else { |
134 | 134 | $pos = strpos($data, "\n\n"); |
135 | 135 | if ($pos || is_int($pos)) { |
136 | - $bd = $pos + 2; |
|
136 | + $bd = $pos+2; |
|
137 | 137 | } else { |
138 | 138 | // No separation between response headers and body: fault? |
139 | 139 | // we could take some action here instead of going on... |
@@ -144,10 +144,10 @@ discard block |
||
144 | 144 | // be tolerant to line endings, and extra empty lines |
145 | 145 | $ar = preg_split("/\r?\n/", trim(substr($data, 0, $pos))); |
146 | 146 | |
147 | - foreach($ar as $line) { |
|
147 | + foreach ($ar as $line) { |
|
148 | 148 | // take care of multi-line headers and cookies |
149 | 149 | $arr = explode(':', $line, 2); |
150 | - if (count($arr) > 1) { |
|
150 | + if (count($arr)>1) { |
|
151 | 151 | $headerName = strtolower(trim($arr[0])); |
152 | 152 | /// @todo some other headers (the ones that allow a CSV list of values) |
153 | 153 | /// do allow many values to be passed using multiple header lines. |
@@ -165,7 +165,7 @@ discard block |
||
165 | 165 | // glue together all received cookies, using a comma to separate them |
166 | 166 | // (same as php does with getallheaders()) |
167 | 167 | if (isset($httpResponse['headers'][$headerName])) { |
168 | - $httpResponse['headers'][$headerName] .= ', ' . trim($cookie); |
|
168 | + $httpResponse['headers'][$headerName] .= ', '.trim($cookie); |
|
169 | 169 | } else { |
170 | 170 | $httpResponse['headers'][$headerName] = trim($cookie); |
171 | 171 | } |
@@ -194,7 +194,7 @@ discard block |
||
194 | 194 | } |
195 | 195 | } elseif (isset($headerName)) { |
196 | 196 | /// @todo version1 cookies might span multiple lines, thus breaking the parsing above |
197 | - $httpResponse['headers'][$headerName] .= ' ' . trim($line); |
|
197 | + $httpResponse['headers'][$headerName] .= ' '.trim($line); |
|
198 | 198 | } |
199 | 199 | } |
200 | 200 | |
@@ -218,7 +218,7 @@ discard block |
||
218 | 218 | // Decode chunked encoding sent by http 1.1 servers |
219 | 219 | if (isset($httpResponse['headers']['transfer-encoding']) && $httpResponse['headers']['transfer-encoding'] == 'chunked') { |
220 | 220 | if (!$data = Http::decodeChunked($data)) { |
221 | - error_log('XML-RPC: ' . __METHOD__ . ': errors occurred when trying to rebuild the chunked data received from server'); |
|
221 | + error_log('XML-RPC: '.__METHOD__.': errors occurred when trying to rebuild the chunked data received from server'); |
|
222 | 222 | throw new \Exception(PhpXmlRpc::$xmlrpcstr['dechunk_fail'], PhpXmlRpc::$xmlrpcerr['dechunk_fail']); |
223 | 223 | } |
224 | 224 | } |
@@ -233,19 +233,19 @@ discard block |
||
233 | 233 | if ($httpResponse['headers']['content-encoding'] == 'deflate' && $degzdata = @gzuncompress($data)) { |
234 | 234 | $data = $degzdata; |
235 | 235 | if ($debug) { |
236 | - Logger::instance()->debugMessage("---INFLATED RESPONSE---[" . strlen($data) . " chars]---\n$data\n---END---"); |
|
236 | + Logger::instance()->debugMessage("---INFLATED RESPONSE---[".strlen($data)." chars]---\n$data\n---END---"); |
|
237 | 237 | } |
238 | 238 | } elseif ($httpResponse['headers']['content-encoding'] == 'gzip' && $degzdata = @gzinflate(substr($data, 10))) { |
239 | 239 | $data = $degzdata; |
240 | 240 | if ($debug) { |
241 | - Logger::instance()->debugMessage("---INFLATED RESPONSE---[" . strlen($data) . " chars]---\n$data\n---END---"); |
|
241 | + Logger::instance()->debugMessage("---INFLATED RESPONSE---[".strlen($data)." chars]---\n$data\n---END---"); |
|
242 | 242 | } |
243 | 243 | } else { |
244 | - error_log('XML-RPC: ' . __METHOD__ . ': errors occurred when trying to decode the deflated data received from server'); |
|
244 | + error_log('XML-RPC: '.__METHOD__.': errors occurred when trying to decode the deflated data received from server'); |
|
245 | 245 | throw new \Exception(PhpXmlRpc::$xmlrpcstr['decompress_fail'], PhpXmlRpc::$xmlrpcerr['decompress_fail']); |
246 | 246 | } |
247 | 247 | } else { |
248 | - error_log('XML-RPC: ' . __METHOD__ . ': the server sent deflated data. Your php install must have the Zlib extension compiled in to support this.'); |
|
248 | + error_log('XML-RPC: '.__METHOD__.': the server sent deflated data. Your php install must have the Zlib extension compiled in to support this.'); |
|
249 | 249 | throw new \Exception(PhpXmlRpc::$xmlrpcstr['cannot_decompress'], PhpXmlRpc::$xmlrpcerr['cannot_decompress']); |
250 | 250 | } |
251 | 251 | } |
@@ -182,8 +182,7 @@ discard block |
||
182 | 182 | { |
183 | 183 | $this->markTestSkipped('CURL missing: cannot test http 1.1 w. proxy'); |
184 | 184 | return; |
185 | - } |
|
186 | - else if ($this->args['PROXYSERVER'] == '') |
|
185 | + } else if ($this->args['PROXYSERVER'] == '') |
|
187 | 186 | { |
188 | 187 | $this->markTestSkipped('PROXY definition missing: cannot test proxy w. http 1.1'); |
189 | 188 | return; |
@@ -207,8 +206,7 @@ discard block |
||
207 | 206 | { |
208 | 207 | $this->markTestSkipped('CURL missing: cannot test https functionality'); |
209 | 208 | return; |
210 | - } |
|
211 | - else if ($this->args['HTTPSSERVER'] == '') |
|
209 | + } else if ($this->args['HTTPSSERVER'] == '') |
|
212 | 210 | { |
213 | 211 | $this->markTestSkipped('HTTPS SERVER definition missing: cannot test https'); |
214 | 212 | return; |
@@ -235,13 +233,11 @@ discard block |
||
235 | 233 | { |
236 | 234 | $this->markTestSkipped('CURL missing: cannot test https w. proxy'); |
237 | 235 | return; |
238 | - } |
|
239 | - else if ($this->args['PROXYSERVER'] == '') |
|
236 | + } else if ($this->args['PROXYSERVER'] == '') |
|
240 | 237 | { |
241 | 238 | $this->markTestSkipped('PROXY definition missing: cannot test proxy w. https'); |
242 | 239 | return; |
243 | - } |
|
244 | - else if ($this->args['HTTPSSERVER'] == '') |
|
240 | + } else if ($this->args['HTTPSSERVER'] == '') |
|
245 | 241 | { |
246 | 242 | $this->markTestSkipped('HTTPS SERVER definition missing: cannot test https w. proxy'); |
247 | 243 | return; |
@@ -1,11 +1,11 @@ discard block |
||
1 | 1 | <?php |
2 | 2 | |
3 | -include_once __DIR__ . '/../lib/xmlrpc.inc'; |
|
4 | -include_once __DIR__ . '/../lib/xmlrpc_wrappers.inc'; |
|
3 | +include_once __DIR__.'/../lib/xmlrpc.inc'; |
|
4 | +include_once __DIR__.'/../lib/xmlrpc_wrappers.inc'; |
|
5 | 5 | |
6 | -include_once __DIR__ . '/parse_args.php'; |
|
6 | +include_once __DIR__.'/parse_args.php'; |
|
7 | 7 | |
8 | -include_once __DIR__ . '/3LocalhostTest.php'; |
|
8 | +include_once __DIR__.'/3LocalhostTest.php'; |
|
9 | 9 | |
10 | 10 | /** |
11 | 11 | * Tests which stress http features of the library. |
@@ -27,9 +27,9 @@ discard block |
||
27 | 27 | ); |
28 | 28 | |
29 | 29 | $methods = array(); |
30 | - foreach(get_class_methods('LocalhostTest') as $method) |
|
30 | + foreach (get_class_methods('LocalhostTest') as $method) |
|
31 | 31 | { |
32 | - if(strpos($method, 'test') === 0 && !in_array($method, $unsafeMethods)) |
|
32 | + if (strpos($method, 'test') === 0 && !in_array($method, $unsafeMethods)) |
|
33 | 33 | { |
34 | 34 | if (!isset(self::$failed_tests[$method])) { |
35 | 35 | $methods[$method] = array($method); |
@@ -46,7 +46,7 @@ discard block |
||
46 | 46 | */ |
47 | 47 | public function testDeflate($method) |
48 | 48 | { |
49 | - if(!function_exists('gzdeflate')) |
|
49 | + if (!function_exists('gzdeflate')) |
|
50 | 50 | { |
51 | 51 | $this->markTestSkipped('Zlib missing: cannot test deflate functionality'); |
52 | 52 | return; |
@@ -64,7 +64,7 @@ discard block |
||
64 | 64 | */ |
65 | 65 | public function testGzip($method) |
66 | 66 | { |
67 | - if(!function_exists('gzdeflate')) |
|
67 | + if (!function_exists('gzdeflate')) |
|
68 | 68 | { |
69 | 69 | $this->markTestSkipped('Zlib missing: cannot test gzip functionality'); |
70 | 70 | return; |
@@ -78,7 +78,7 @@ discard block |
||
78 | 78 | |
79 | 79 | public function testKeepAlives() |
80 | 80 | { |
81 | - if(!function_exists('curl_init')) |
|
81 | + if (!function_exists('curl_init')) |
|
82 | 82 | { |
83 | 83 | $this->markTestSkipped('CURL missing: cannot test http 1.1'); |
84 | 84 | return; |
@@ -118,7 +118,7 @@ discard block |
||
118 | 118 | */ |
119 | 119 | public function testHttp11($method) |
120 | 120 | { |
121 | - if(!function_exists('curl_init')) |
|
121 | + if (!function_exists('curl_init')) |
|
122 | 122 | { |
123 | 123 | $this->markTestSkipped('CURL missing: cannot test http 1.1'); |
124 | 124 | return; |
@@ -137,7 +137,7 @@ discard block |
||
137 | 137 | */ |
138 | 138 | public function testHttp10Curl($method) |
139 | 139 | { |
140 | - if(!function_exists('curl_init')) |
|
140 | + if (!function_exists('curl_init')) |
|
141 | 141 | { |
142 | 142 | $this->markTestSkipped('CURL missing: cannot test http 1.1'); |
143 | 143 | return; |
@@ -157,7 +157,7 @@ discard block |
||
157 | 157 | */ |
158 | 158 | public function testHttp11Gzip($method) |
159 | 159 | { |
160 | - if(!function_exists('curl_init')) |
|
160 | + if (!function_exists('curl_init')) |
|
161 | 161 | { |
162 | 162 | $this->markTestSkipped('CURL missing: cannot test http 1.1'); |
163 | 163 | return; |
@@ -177,7 +177,7 @@ discard block |
||
177 | 177 | */ |
178 | 178 | public function testHttp11Deflate($method) |
179 | 179 | { |
180 | - if(!function_exists('curl_init')) |
|
180 | + if (!function_exists('curl_init')) |
|
181 | 181 | { |
182 | 182 | $this->markTestSkipped('CURL missing: cannot test http 1.1'); |
183 | 183 | return; |
@@ -197,7 +197,7 @@ discard block |
||
197 | 197 | */ |
198 | 198 | public function testHttp11Proxy($method) |
199 | 199 | { |
200 | - if(!function_exists('curl_init')) |
|
200 | + if (!function_exists('curl_init')) |
|
201 | 201 | { |
202 | 202 | $this->markTestSkipped('CURL missing: cannot test http 1.1 w. proxy'); |
203 | 203 | return; |
@@ -222,7 +222,7 @@ discard block |
||
222 | 222 | */ |
223 | 223 | public function testHttps($method) |
224 | 224 | { |
225 | - if(!function_exists('curl_init')) |
|
225 | + if (!function_exists('curl_init')) |
|
226 | 226 | { |
227 | 227 | $this->markTestSkipped('CURL missing: cannot test https functionality'); |
228 | 228 | return; |
@@ -274,7 +274,7 @@ discard block |
||
274 | 274 | */ |
275 | 275 | public function testHttpsProxy($method) |
276 | 276 | { |
277 | - if(!function_exists('curl_init')) |
|
277 | + if (!function_exists('curl_init')) |
|
278 | 278 | { |
279 | 279 | $this->markTestSkipped('CURL missing: cannot test https w. proxy'); |
280 | 280 | return; |
@@ -136,10 +136,10 @@ discard block |
||
136 | 136 | $server = $parts['host']; |
137 | 137 | $path = isset($parts['path']) ? $parts['path'] : ''; |
138 | 138 | if (isset($parts['query'])) { |
139 | - $path .= '?' . $parts['query']; |
|
139 | + $path .= '?'.$parts['query']; |
|
140 | 140 | } |
141 | 141 | if (isset($parts['fragment'])) { |
142 | - $path .= '#' . $parts['fragment']; |
|
142 | + $path .= '#'.$parts['fragment']; |
|
143 | 143 | } |
144 | 144 | if (isset($parts['port'])) { |
145 | 145 | $port = $parts['port']; |
@@ -155,7 +155,7 @@ discard block |
||
155 | 155 | } |
156 | 156 | } |
157 | 157 | if ($path == '' || $path[0] != '/') { |
158 | - $this->path = '/' . $path; |
|
158 | + $this->path = '/'.$path; |
|
159 | 159 | } else { |
160 | 160 | $this->path = $path; |
161 | 161 | } |
@@ -193,7 +193,7 @@ discard block |
||
193 | 193 | }*/ |
194 | 194 | |
195 | 195 | // initialize user_agent string |
196 | - $this->user_agent = PhpXmlRpc::$xmlrpcName . ' ' . PhpXmlRpc::$xmlrpcVersion; |
|
196 | + $this->user_agent = PhpXmlRpc::$xmlrpcName.' '.PhpXmlRpc::$xmlrpcVersion; |
|
197 | 197 | } |
198 | 198 | |
199 | 199 | /** |
@@ -566,7 +566,7 @@ discard block |
||
566 | 566 | */ |
567 | 567 | protected function sendPayloadHTTP10($req, $server, $port, $timeout = 0, $username = '', $password = '', |
568 | 568 | $authType = 1, $proxyHost = '', $proxyPort = 0, $proxyUsername = '', $proxyPassword = '', $proxyAuthType = 1, |
569 | - $method='http') |
|
569 | + $method = 'http') |
|
570 | 570 | { |
571 | 571 | return $this->sendPayloadSocket($req, $server, $port, $timeout, $username, $password, $authType, null, null, |
572 | 572 | null, null, $proxyHost, $proxyPort, $proxyUsername, $proxyPassword, $proxyAuthType); |
@@ -596,7 +596,7 @@ discard block |
||
596 | 596 | * @param int $sslVersion |
597 | 597 | * @return Response |
598 | 598 | */ |
599 | - protected function sendPayloadHTTPS($req, $server, $port, $timeout = 0, $username = '', $password = '', |
|
599 | + protected function sendPayloadHTTPS($req, $server, $port, $timeout = 0, $username = '', $password = '', |
|
600 | 600 | $authType = 1, $cert = '', $certPass = '', $caCert = '', $caCertDir = '', $proxyHost = '', $proxyPort = 0, |
601 | 601 | $proxyUsername = '', $proxyPassword = '', $proxyAuthType = 1, $keepAlive = false, $key = '', $keyPass = '', |
602 | 602 | $sslVersion = 0) |
@@ -631,11 +631,11 @@ discard block |
||
631 | 631 | */ |
632 | 632 | protected function sendPayloadSocket($req, $server, $port, $timeout = 0, $username = '', $password = '', |
633 | 633 | $authType = 1, $cert = '', $certPass = '', $caCert = '', $caCertDir = '', $proxyHost = '', $proxyPort = 0, |
634 | - $proxyUsername = '', $proxyPassword = '', $proxyAuthType = 1, $method='http', $key = '', $keyPass = '', |
|
634 | + $proxyUsername = '', $proxyPassword = '', $proxyAuthType = 1, $method = 'http', $key = '', $keyPass = '', |
|
635 | 635 | $sslVersion = 0) |
636 | 636 | { |
637 | 637 | if ($port == 0) { |
638 | - $port = ( $method === 'https' ) ? 443 : 80; |
|
638 | + $port = ($method === 'https') ? 443 : 80; |
|
639 | 639 | } |
640 | 640 | |
641 | 641 | // Only create the payload if it was not created previously |
@@ -666,15 +666,15 @@ discard block |
||
666 | 666 | // thanks to Grant Rauscher <[email protected]> for this |
667 | 667 | $credentials = ''; |
668 | 668 | if ($username != '') { |
669 | - $credentials = 'Authorization: Basic ' . base64_encode($username . ':' . $password) . "\r\n"; |
|
669 | + $credentials = 'Authorization: Basic '.base64_encode($username.':'.$password)."\r\n"; |
|
670 | 670 | if ($authType != 1) { |
671 | - error_log('XML-RPC: ' . __METHOD__ . ': warning. Only Basic auth is supported with HTTP 1.0'); |
|
671 | + error_log('XML-RPC: '.__METHOD__.': warning. Only Basic auth is supported with HTTP 1.0'); |
|
672 | 672 | } |
673 | 673 | } |
674 | 674 | |
675 | 675 | $acceptedEncoding = ''; |
676 | 676 | if (is_array($this->accepted_compression) && count($this->accepted_compression)) { |
677 | - $acceptedEncoding = 'Accept-Encoding: ' . implode(', ', $this->accepted_compression) . "\r\n"; |
|
677 | + $acceptedEncoding = 'Accept-Encoding: '.implode(', ', $this->accepted_compression)."\r\n"; |
|
678 | 678 | } |
679 | 679 | |
680 | 680 | $proxyCredentials = ''; |
@@ -685,17 +685,17 @@ discard block |
||
685 | 685 | $connectServer = $proxyHost; |
686 | 686 | $connectPort = $proxyPort; |
687 | 687 | $transport = 'tcp'; |
688 | - $uri = 'http://' . $server . ':' . $port . $this->path; |
|
688 | + $uri = 'http://'.$server.':'.$port.$this->path; |
|
689 | 689 | if ($proxyUsername != '') { |
690 | 690 | if ($proxyAuthType != 1) { |
691 | - error_log('XML-RPC: ' . __METHOD__ . ': warning. Only Basic auth to proxy is supported with HTTP 1.0'); |
|
691 | + error_log('XML-RPC: '.__METHOD__.': warning. Only Basic auth to proxy is supported with HTTP 1.0'); |
|
692 | 692 | } |
693 | - $proxyCredentials = 'Proxy-Authorization: Basic ' . base64_encode($proxyUsername . ':' . $proxyPassword) . "\r\n"; |
|
693 | + $proxyCredentials = 'Proxy-Authorization: Basic '.base64_encode($proxyUsername.':'.$proxyPassword)."\r\n"; |
|
694 | 694 | } |
695 | 695 | } else { |
696 | 696 | $connectServer = $server; |
697 | 697 | $connectPort = $port; |
698 | - $transport = ( $method === 'https' ) ? 'tls' : 'tcp'; |
|
698 | + $transport = ($method === 'https') ? 'tls' : 'tcp'; |
|
699 | 699 | $uri = $this->path; |
700 | 700 | } |
701 | 701 | |
@@ -706,45 +706,45 @@ discard block |
||
706 | 706 | $version = ''; |
707 | 707 | foreach ($this->cookies as $name => $cookie) { |
708 | 708 | if ($cookie['version']) { |
709 | - $version = ' $Version="' . $cookie['version'] . '";'; |
|
710 | - $cookieHeader .= ' ' . $name . '="' . $cookie['value'] . '";'; |
|
709 | + $version = ' $Version="'.$cookie['version'].'";'; |
|
710 | + $cookieHeader .= ' '.$name.'="'.$cookie['value'].'";'; |
|
711 | 711 | if ($cookie['path']) { |
712 | - $cookieHeader .= ' $Path="' . $cookie['path'] . '";'; |
|
712 | + $cookieHeader .= ' $Path="'.$cookie['path'].'";'; |
|
713 | 713 | } |
714 | 714 | if ($cookie['domain']) { |
715 | - $cookieHeader .= ' $Domain="' . $cookie['domain'] . '";'; |
|
715 | + $cookieHeader .= ' $Domain="'.$cookie['domain'].'";'; |
|
716 | 716 | } |
717 | 717 | if ($cookie['port']) { |
718 | - $cookieHeader .= ' $Port="' . $cookie['port'] . '";'; |
|
718 | + $cookieHeader .= ' $Port="'.$cookie['port'].'";'; |
|
719 | 719 | } |
720 | 720 | } else { |
721 | - $cookieHeader .= ' ' . $name . '=' . $cookie['value'] . ";"; |
|
721 | + $cookieHeader .= ' '.$name.'='.$cookie['value'].";"; |
|
722 | 722 | } |
723 | 723 | } |
724 | - $cookieHeader = 'Cookie:' . $version . substr($cookieHeader, 0, -1) . "\r\n"; |
|
724 | + $cookieHeader = 'Cookie:'.$version.substr($cookieHeader, 0, -1)."\r\n"; |
|
725 | 725 | } |
726 | 726 | |
727 | 727 | // omit port if default |
728 | 728 | if (($port == 80 && in_array($method, array('http', 'http10'))) || ($port == 443 && $method == 'https')) { |
729 | - $port = ''; |
|
729 | + $port = ''; |
|
730 | 730 | } else { |
731 | - $port = ':' . $port; |
|
731 | + $port = ':'.$port; |
|
732 | 732 | } |
733 | 733 | |
734 | - $op = 'POST ' . $uri . " HTTP/1.0\r\n" . |
|
735 | - 'User-Agent: ' . $this->user_agent . "\r\n" . |
|
736 | - 'Host: ' . $server . $port . "\r\n" . |
|
737 | - $credentials . |
|
738 | - $proxyCredentials . |
|
739 | - $acceptedEncoding . |
|
740 | - $encodingHdr . |
|
741 | - 'Accept-Charset: ' . implode(',', $this->accepted_charset_encodings) . "\r\n" . |
|
742 | - $cookieHeader . |
|
743 | - 'Content-Type: ' . $req->content_type . "\r\nContent-Length: " . |
|
744 | - strlen($payload) . "\r\n\r\n" . |
|
734 | + $op = 'POST '.$uri." HTTP/1.0\r\n". |
|
735 | + 'User-Agent: '.$this->user_agent."\r\n". |
|
736 | + 'Host: '.$server.$port."\r\n". |
|
737 | + $credentials. |
|
738 | + $proxyCredentials. |
|
739 | + $acceptedEncoding. |
|
740 | + $encodingHdr. |
|
741 | + 'Accept-Charset: '.implode(',', $this->accepted_charset_encodings)."\r\n". |
|
742 | + $cookieHeader. |
|
743 | + 'Content-Type: '.$req->content_type."\r\nContent-Length: ". |
|
744 | + strlen($payload)."\r\n\r\n". |
|
745 | 745 | $payload; |
746 | 746 | |
747 | - if ($this->debug > 1) { |
|
747 | + if ($this->debug>1) { |
|
748 | 748 | Logger::instance()->debugMessage("---SENDING---\n$op\n---END---"); |
749 | 749 | } |
750 | 750 | |
@@ -770,7 +770,7 @@ discard block |
||
770 | 770 | } |
771 | 771 | $context = stream_context_create($contextOptions); |
772 | 772 | |
773 | - if ($timeout <= 0) { |
|
773 | + if ($timeout<=0) { |
|
774 | 774 | $connectTimeout = ini_get('default_socket_timeout'); |
775 | 775 | } else { |
776 | 776 | $connectTimeout = $timeout; |
@@ -779,12 +779,12 @@ discard block |
||
779 | 779 | $fp = @stream_socket_client("$transport://$connectServer:$connectPort", $this->errno, $this->errstr, $connectTimeout, |
780 | 780 | STREAM_CLIENT_CONNECT, $context); |
781 | 781 | if ($fp) { |
782 | - if ($timeout > 0) { |
|
782 | + if ($timeout>0) { |
|
783 | 783 | stream_set_timeout($fp, $timeout); |
784 | 784 | } |
785 | 785 | } else { |
786 | - $this->errstr = 'Connect error: ' . $this->errstr; |
|
787 | - $r = new Response(0, PhpXmlRpc::$xmlrpcerr['http_error'], $this->errstr . ' (' . $this->errno . ')'); |
|
786 | + $this->errstr = 'Connect error: '.$this->errstr; |
|
787 | + $r = new Response(0, PhpXmlRpc::$xmlrpcerr['http_error'], $this->errstr.' ('.$this->errno.')'); |
|
788 | 788 | |
789 | 789 | return $r; |
790 | 790 | } |
@@ -892,7 +892,7 @@ discard block |
||
892 | 892 | $encodingHdr = ''; |
893 | 893 | } |
894 | 894 | |
895 | - if ($this->debug > 1) { |
|
895 | + if ($this->debug>1) { |
|
896 | 896 | Logger::instance()->debugMessage("---SENDING---\n$payload\n---END---"); |
897 | 897 | } |
898 | 898 | |
@@ -902,7 +902,7 @@ discard block |
||
902 | 902 | } else { |
903 | 903 | $protocol = $method; |
904 | 904 | } |
905 | - $curl = curl_init($protocol . '://' . $server . ':' . $port . $this->path); |
|
905 | + $curl = curl_init($protocol.'://'.$server.':'.$port.$this->path); |
|
906 | 906 | if ($keepAlive) { |
907 | 907 | $this->xmlrpc_curl_handle = $curl; |
908 | 908 | } |
@@ -913,7 +913,7 @@ discard block |
||
913 | 913 | // results into variable |
914 | 914 | curl_setopt($curl, CURLOPT_RETURNTRANSFER, true); |
915 | 915 | |
916 | - if ($this->debug > 1) { |
|
916 | + if ($this->debug>1) { |
|
917 | 917 | curl_setopt($curl, CURLOPT_VERBOSE, true); |
918 | 918 | /// @todo allow callers to redirect curlopt_stderr to some stream which can be buffered |
919 | 919 | } |
@@ -939,7 +939,7 @@ discard block |
||
939 | 939 | } |
940 | 940 | } |
941 | 941 | // extra headers |
942 | - $headers = array('Content-Type: ' . $req->content_type, 'Accept-Charset: ' . implode(',', $this->accepted_charset_encodings)); |
|
942 | + $headers = array('Content-Type: '.$req->content_type, 'Accept-Charset: '.implode(',', $this->accepted_charset_encodings)); |
|
943 | 943 | // if no keepalive is wanted, let the server know it in advance |
944 | 944 | if (!$keepAlive) { |
945 | 945 | $headers[] = 'Connection: close'; |
@@ -956,7 +956,7 @@ discard block |
||
956 | 956 | curl_setopt($curl, CURLOPT_HTTPHEADER, $headers); |
957 | 957 | // timeout is borked |
958 | 958 | if ($timeout) { |
959 | - curl_setopt($curl, CURLOPT_TIMEOUT, $timeout == 1 ? 1 : $timeout - 1); |
|
959 | + curl_setopt($curl, CURLOPT_TIMEOUT, $timeout == 1 ? 1 : $timeout-1); |
|
960 | 960 | } |
961 | 961 | |
962 | 962 | if ($method == 'http10') { |
@@ -966,11 +966,11 @@ discard block |
||
966 | 966 | } |
967 | 967 | |
968 | 968 | if ($username && $password) { |
969 | - curl_setopt($curl, CURLOPT_USERPWD, $username . ':' . $password); |
|
969 | + curl_setopt($curl, CURLOPT_USERPWD, $username.':'.$password); |
|
970 | 970 | if (defined('CURLOPT_HTTPAUTH')) { |
971 | 971 | curl_setopt($curl, CURLOPT_HTTPAUTH, $authType); |
972 | 972 | } elseif ($authType != 1) { |
973 | - error_log('XML-RPC: ' . __METHOD__ . ': warning. Only Basic auth is supported by the current PHP/curl install'); |
|
973 | + error_log('XML-RPC: '.__METHOD__.': warning. Only Basic auth is supported by the current PHP/curl install'); |
|
974 | 974 | } |
975 | 975 | } |
976 | 976 | |
@@ -1011,13 +1011,13 @@ discard block |
||
1011 | 1011 | if ($proxyPort == 0) { |
1012 | 1012 | $proxyPort = 8080; // NB: even for HTTPS, local connection is on port 8080 |
1013 | 1013 | } |
1014 | - curl_setopt($curl, CURLOPT_PROXY, $proxyHost . ':' . $proxyPort); |
|
1014 | + curl_setopt($curl, CURLOPT_PROXY, $proxyHost.':'.$proxyPort); |
|
1015 | 1015 | if ($proxyUsername) { |
1016 | - curl_setopt($curl, CURLOPT_PROXYUSERPWD, $proxyUsername . ':' . $proxyPassword); |
|
1016 | + curl_setopt($curl, CURLOPT_PROXYUSERPWD, $proxyUsername.':'.$proxyPassword); |
|
1017 | 1017 | if (defined('CURLOPT_PROXYAUTH')) { |
1018 | 1018 | curl_setopt($curl, CURLOPT_PROXYAUTH, $proxyAuthType); |
1019 | 1019 | } elseif ($proxyAuthType != 1) { |
1020 | - error_log('XML-RPC: ' . __METHOD__ . ': warning. Only Basic auth to proxy is supported by the current PHP/curl install'); |
|
1020 | + error_log('XML-RPC: '.__METHOD__.': warning. Only Basic auth to proxy is supported by the current PHP/curl install'); |
|
1021 | 1021 | } |
1022 | 1022 | } |
1023 | 1023 | } |
@@ -1028,7 +1028,7 @@ discard block |
||
1028 | 1028 | if (count($this->cookies)) { |
1029 | 1029 | $cookieHeader = ''; |
1030 | 1030 | foreach ($this->cookies as $name => $cookie) { |
1031 | - $cookieHeader .= $name . '=' . $cookie['value'] . '; '; |
|
1031 | + $cookieHeader .= $name.'='.$cookie['value'].'; '; |
|
1032 | 1032 | } |
1033 | 1033 | curl_setopt($curl, CURLOPT_COOKIE, substr($cookieHeader, 0, -2)); |
1034 | 1034 | } |
@@ -1039,13 +1039,13 @@ discard block |
||
1039 | 1039 | |
1040 | 1040 | $result = curl_exec($curl); |
1041 | 1041 | |
1042 | - if ($this->debug > 1) { |
|
1042 | + if ($this->debug>1) { |
|
1043 | 1043 | $message = "---CURL INFO---\n"; |
1044 | 1044 | foreach (curl_getinfo($curl) as $name => $val) { |
1045 | 1045 | if (is_array($val)) { |
1046 | 1046 | $val = implode("\n", $val); |
1047 | 1047 | } |
1048 | - $message .= $name . ': ' . $val . "\n"; |
|
1048 | + $message .= $name.': '.$val."\n"; |
|
1049 | 1049 | } |
1050 | 1050 | $message .= '---END---'; |
1051 | 1051 | Logger::instance()->debugMessage($message); |
@@ -1055,7 +1055,7 @@ discard block |
||
1055 | 1055 | /// @todo we should use a better check here - what if we get back '' or '0'? |
1056 | 1056 | |
1057 | 1057 | $this->errstr = 'no response'; |
1058 | - $resp = new Response(0, PhpXmlRpc::$xmlrpcerr['curl_fail'], PhpXmlRpc::$xmlrpcstr['curl_fail'] . ': ' . curl_error($curl)); |
|
1058 | + $resp = new Response(0, PhpXmlRpc::$xmlrpcerr['curl_fail'], PhpXmlRpc::$xmlrpcstr['curl_fail'].': '.curl_error($curl)); |
|
1059 | 1059 | curl_close($curl); |
1060 | 1060 | if ($keepAlive) { |
1061 | 1061 | $this->xmlrpc_curl_handle = null; |
@@ -1165,7 +1165,7 @@ discard block |
||
1165 | 1165 | $call['methodName'] = new Value($req->method(), 'string'); |
1166 | 1166 | $numParams = $req->getNumParams(); |
1167 | 1167 | $params = array(); |
1168 | - for ($i = 0; $i < $numParams; $i++) { |
|
1168 | + for ($i = 0; $i<$numParams; $i++) { |
|
1169 | 1169 | $params[$i] = $req->getParam($i); |
1170 | 1170 | } |
1171 | 1171 | $call['params'] = new Value($params, 'array'); |
@@ -1191,15 +1191,15 @@ discard block |
||
1191 | 1191 | /// @todo test this code branch... |
1192 | 1192 | $rets = $result->value(); |
1193 | 1193 | if (!is_array($rets)) { |
1194 | - return false; // bad return type from system.multicall |
|
1194 | + return false; // bad return type from system.multicall |
|
1195 | 1195 | } |
1196 | 1196 | $numRets = count($rets); |
1197 | 1197 | if ($numRets != count($reqs)) { |
1198 | - return false; // wrong number of return values. |
|
1198 | + return false; // wrong number of return values. |
|
1199 | 1199 | } |
1200 | 1200 | |
1201 | 1201 | $response = array(); |
1202 | - for ($i = 0; $i < $numRets; $i++) { |
|
1202 | + for ($i = 0; $i<$numRets; $i++) { |
|
1203 | 1203 | $val = $rets[$i]; |
1204 | 1204 | if (!is_array($val)) { |
1205 | 1205 | return false; |
@@ -1207,7 +1207,7 @@ discard block |
||
1207 | 1207 | switch (count($val)) { |
1208 | 1208 | case 1: |
1209 | 1209 | if (!isset($val[0])) { |
1210 | - return false; // Bad value |
|
1210 | + return false; // Bad value |
|
1211 | 1211 | } |
1212 | 1212 | // Normal return value |
1213 | 1213 | $response[$i] = new Response($val[0], 0, '', 'phpvals'); |
@@ -1235,19 +1235,19 @@ discard block |
||
1235 | 1235 | |
1236 | 1236 | $rets = $result->value(); |
1237 | 1237 | if ($rets->kindOf() != 'array') { |
1238 | - return false; // bad return type from system.multicall |
|
1238 | + return false; // bad return type from system.multicall |
|
1239 | 1239 | } |
1240 | 1240 | $numRets = $rets->count(); |
1241 | 1241 | if ($numRets != count($reqs)) { |
1242 | - return false; // wrong number of return values. |
|
1242 | + return false; // wrong number of return values. |
|
1243 | 1243 | } |
1244 | 1244 | |
1245 | 1245 | $response = array(); |
1246 | - foreach($rets as $val) { |
|
1246 | + foreach ($rets as $val) { |
|
1247 | 1247 | switch ($val->kindOf()) { |
1248 | 1248 | case 'array': |
1249 | 1249 | if ($val->count() != 1) { |
1250 | - return false; // Bad value |
|
1250 | + return false; // Bad value |
|
1251 | 1251 | } |
1252 | 1252 | // Normal return value |
1253 | 1253 | $response[] = new Response($val[0]); |