@@ -46,7 +46,7 @@ discard block |
||
46 | 46 | // check for command line params (passed as env vars) vs. web page input params (passed as GET/POST) |
47 | 47 | // Note that the only use-case for web-page mode is when this is used by benchmark.php |
48 | 48 | if (!isset($_SERVER['REQUEST_METHOD'])) { |
49 | - foreach($_SERVER as $key => $val) { |
|
49 | + foreach ($_SERVER as $key => $val) { |
|
50 | 50 | if (array_key_exists($key, $args)) { |
51 | 51 | $$key = $val; |
52 | 52 | } |
@@ -91,7 +91,7 @@ discard block |
||
91 | 91 | //} |
92 | 92 | } |
93 | 93 | if ($HTTPURI[0] != '/') { |
94 | - $HTTPURI = '/' . $HTTPURI; |
|
94 | + $HTTPURI = '/'.$HTTPURI; |
|
95 | 95 | } |
96 | 96 | $args['HTTPURI'] = $HTTPURI; |
97 | 97 | |
@@ -105,21 +105,21 @@ discard block |
||
105 | 105 | } |
106 | 106 | |
107 | 107 | if (isset($HTTPSIGNOREPEER)) { |
108 | - $args['HTTPSIGNOREPEER'] = (bool)$HTTPSIGNOREPEER; |
|
108 | + $args['HTTPSIGNOREPEER'] = (bool) $HTTPSIGNOREPEER; |
|
109 | 109 | } |
110 | 110 | |
111 | 111 | if (isset($HTTPSVERIFYHOST)) { |
112 | - $args['HTTPSVERIFYHOST'] = (int)$HTTPSVERIFYHOST; |
|
112 | + $args['HTTPSVERIFYHOST'] = (int) $HTTPSVERIFYHOST; |
|
113 | 113 | } |
114 | 114 | |
115 | 115 | if (isset($SSLVERSION)) { |
116 | - $args['SSLVERSION'] = (int)$SSLVERSION; |
|
116 | + $args['SSLVERSION'] = (int) $SSLVERSION; |
|
117 | 117 | } |
118 | 118 | |
119 | 119 | if (isset($PROXYSERVER)) { |
120 | 120 | $arr = explode(':', $PROXYSERVER); |
121 | 121 | $args['PROXYSERVER'] = $arr[0]; |
122 | - if (count($arr) > 1) { |
|
122 | + if (count($arr)>1) { |
|
123 | 123 | $args['PROXYPORT'] = $arr[1]; |
124 | 124 | } else { |
125 | 125 | $args['PROXYPORT'] = 8080; |
@@ -84,7 +84,7 @@ discard block |
||
84 | 84 | |
85 | 85 | return true; |
86 | 86 | } else { |
87 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': value passed in must be a PhpXmlRpc\Value'); |
|
87 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.': value passed in must be a PhpXmlRpc\Value'); |
|
88 | 88 | return false; |
89 | 89 | } |
90 | 90 | } |
@@ -134,17 +134,17 @@ discard block |
||
134 | 134 | $this->logDeprecationUnlessCalledBy('serialize'); |
135 | 135 | |
136 | 136 | if ($charsetEncoding != '') { |
137 | - $this->content_type = 'text/xml; charset=' . $charsetEncoding; |
|
137 | + $this->content_type = 'text/xml; charset='.$charsetEncoding; |
|
138 | 138 | } else { |
139 | 139 | $this->content_type = 'text/xml'; |
140 | 140 | } |
141 | 141 | |
142 | 142 | $result = $this->xml_header($charsetEncoding); |
143 | - $result .= '<methodName>' . $this->getCharsetEncoder()->encodeEntities( |
|
144 | - $this->methodname, PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding) . "</methodName>\n"; |
|
143 | + $result .= '<methodName>'.$this->getCharsetEncoder()->encodeEntities( |
|
144 | + $this->methodname, PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding)."</methodName>\n"; |
|
145 | 145 | $result .= "<params>\n"; |
146 | 146 | foreach ($this->params as $p) { |
147 | - $result .= "<param>\n" . $p->serialize($charsetEncoding) . |
|
147 | + $result .= "<param>\n".$p->serialize($charsetEncoding). |
|
148 | 148 | "</param>\n"; |
149 | 149 | } |
150 | 150 | $result .= "</params>\n"; |
@@ -164,9 +164,9 @@ discard block |
||
164 | 164 | $this->logDeprecationUnlessCalledBy('createPayload'); |
165 | 165 | |
166 | 166 | if ($charsetEncoding != '') { |
167 | - return "<?xml version=\"1.0\" encoding=\"$charsetEncoding\" ?" . ">\n<methodCall>\n"; |
|
167 | + return "<?xml version=\"1.0\" encoding=\"$charsetEncoding\" ?".">\n<methodCall>\n"; |
|
168 | 168 | } else { |
169 | - return "<?xml version=\"1.0\"?" . ">\n<methodCall>\n"; |
|
169 | + return "<?xml version=\"1.0\"?".">\n<methodCall>\n"; |
|
170 | 170 | } |
171 | 171 | } |
172 | 172 | |
@@ -228,14 +228,14 @@ discard block |
||
228 | 228 | */ |
229 | 229 | public function parseResponse($data = '', $headersProcessed = false, $returnType = XMLParser::RETURN_XMLRPCVALS) |
230 | 230 | { |
231 | - if ($this->debug > 0) { |
|
231 | + if ($this->debug>0) { |
|
232 | 232 | $this->getLogger()->debug("---GOT---\n$data\n---END---"); |
233 | 233 | } |
234 | 234 | |
235 | 235 | $this->httpResponse = array('raw_data' => $data, 'headers' => array(), 'cookies' => array()); |
236 | 236 | |
237 | 237 | if ($data == '') { |
238 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': no response received from server.'); |
|
238 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.': no response received from server.'); |
|
239 | 239 | return new Response(0, PhpXmlRpc::$xmlrpcerr['no_data'], PhpXmlRpc::$xmlrpcstr['no_data']); |
240 | 240 | } |
241 | 241 | |
@@ -243,12 +243,12 @@ discard block |
||
243 | 243 | if (substr($data, 0, 4) == 'HTTP') { |
244 | 244 | $httpParser = new Http(); |
245 | 245 | try { |
246 | - $httpResponse = $httpParser->parseResponseHeaders($data, $headersProcessed, $this->debug > 0); |
|
246 | + $httpResponse = $httpParser->parseResponseHeaders($data, $headersProcessed, $this->debug>0); |
|
247 | 247 | } catch (HttpException $e) { |
248 | 248 | // failed processing of HTTP response headers |
249 | 249 | // save into response obj the full payload received, for debugging |
250 | 250 | return new Response(0, $e->getCode(), $e->getMessage(), '', array('raw_data' => $data, 'status_code' => $e->statusCode())); |
251 | - } catch(\Exception $e) { |
|
251 | + } catch (\Exception $e) { |
|
252 | 252 | return new Response(0, $e->getCode(), $e->getMessage(), '', array('raw_data' => $data)); |
253 | 253 | } |
254 | 254 | } else { |
@@ -264,7 +264,7 @@ discard block |
||
264 | 264 | // idea from Luca Mariano, originally in PEARified version of the lib |
265 | 265 | $pos = strrpos($data, '</methodResponse>'); |
266 | 266 | if ($pos !== false) { |
267 | - $data = substr($data, 0, $pos + 17); |
|
267 | + $data = substr($data, 0, $pos+17); |
|
268 | 268 | } |
269 | 269 | |
270 | 270 | // try to 'guestimate' the character encoding of the received response |
@@ -273,21 +273,21 @@ discard block |
||
273 | 273 | $data |
274 | 274 | ); |
275 | 275 | |
276 | - if ($this->debug >= 0) { |
|
276 | + if ($this->debug>=0) { |
|
277 | 277 | $this->httpResponse = $httpResponse; |
278 | 278 | } else { |
279 | 279 | $httpResponse = null; |
280 | 280 | } |
281 | 281 | |
282 | - if ($this->debug > 0) { |
|
282 | + if ($this->debug>0) { |
|
283 | 283 | $start = strpos($data, '<!-- SERVER DEBUG INFO (BASE64 ENCODED):'); |
284 | 284 | if ($start) { |
285 | 285 | $start += strlen('<!-- SERVER DEBUG INFO (BASE64 ENCODED):'); |
286 | 286 | /// @todo what if there is no end tag? |
287 | 287 | $end = strpos($data, '-->', $start); |
288 | - $comments = substr($data, $start, $end - $start); |
|
289 | - $this->getLogger()->debug("---SERVER DEBUG INFO (DECODED)---\n\t" . |
|
290 | - str_replace("\n", "\n\t", base64_decode($comments)) . "\n---END---", array('encoding' => $respEncoding)); |
|
288 | + $comments = substr($data, $start, $end-$start); |
|
289 | + $this->getLogger()->debug("---SERVER DEBUG INFO (DECODED)---\n\t". |
|
290 | + str_replace("\n", "\n\t", base64_decode($comments))."\n---END---", array('encoding' => $respEncoding)); |
|
291 | 291 | } |
292 | 292 | } |
293 | 293 | |
@@ -309,7 +309,7 @@ discard block |
||
309 | 309 | if ($respEncoding == 'ISO-8859-1') { |
310 | 310 | $data = utf8_encode($data); |
311 | 311 | } else { |
312 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': unsupported charset encoding of received response: ' . $respEncoding); |
|
312 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.': unsupported charset encoding of received response: '.$respEncoding); |
|
313 | 313 | } |
314 | 314 | } |
315 | 315 | } |
@@ -339,16 +339,16 @@ discard block |
||
339 | 339 | // there could be proxies meddling with the request, or network data corruption... |
340 | 340 | |
341 | 341 | $r = new Response(0, PhpXmlRpc::$xmlrpcerr['invalid_xml'], |
342 | - PhpXmlRpc::$xmlrpcstr['invalid_xml'] . ' ' . $_xh['isf_reason'], '', $httpResponse); |
|
342 | + PhpXmlRpc::$xmlrpcstr['invalid_xml'].' '.$_xh['isf_reason'], '', $httpResponse); |
|
343 | 343 | |
344 | - if ($this->debug > 0) { |
|
344 | + if ($this->debug>0) { |
|
345 | 345 | $this->getLogger()->debug($_xh['isf_reason']); |
346 | 346 | } |
347 | 347 | } |
348 | 348 | // second error check: xml well-formed but not xml-rpc compliant |
349 | 349 | elseif ($_xh['isf'] == 2) { |
350 | 350 | $r = new Response(0, PhpXmlRpc::$xmlrpcerr['xml_not_compliant'], |
351 | - PhpXmlRpc::$xmlrpcstr['xml_not_compliant'] . ' ' . $_xh['isf_reason'], '', $httpResponse); |
|
351 | + PhpXmlRpc::$xmlrpcstr['xml_not_compliant'].' '.$_xh['isf_reason'], '', $httpResponse); |
|
352 | 352 | |
353 | 353 | /// @todo echo something for the user? check if it was already done by the parser... |
354 | 354 | //if ($this->debug > 0) { |
@@ -358,7 +358,7 @@ discard block |
||
358 | 358 | // third error check: parsing of the response has somehow gone boink. |
359 | 359 | /// @todo shall we omit the 2nd part of this check, since we trust the parsing code? |
360 | 360 | /// Either that, or check the fault results too... |
361 | - elseif ($_xh['isf'] > 3 || ($returnType == XMLParser::RETURN_XMLRPCVALS && !$_xh['isf'] && !is_object($_xh['value']))) { |
|
361 | + elseif ($_xh['isf']>3 || ($returnType == XMLParser::RETURN_XMLRPCVALS && !$_xh['isf'] && !is_object($_xh['value']))) { |
|
362 | 362 | // something odd has happened and it's time to generate a client side error indicating something odd went on |
363 | 363 | $r = new Response(0, PhpXmlRpc::$xmlrpcerr['xml_parsing_error'], PhpXmlRpc::$xmlrpcstr['xml_parsing_error'], |
364 | 364 | '', $httpResponse |
@@ -366,7 +366,7 @@ discard block |
||
366 | 366 | |
367 | 367 | /// @todo echo something for the user? |
368 | 368 | } else { |
369 | - if ($this->debug > 1) { |
|
369 | + if ($this->debug>1) { |
|
370 | 370 | $this->getLogger()->debug( |
371 | 371 | "---PARSED---\n".var_export($_xh['value'], true)."\n---END---" |
372 | 372 | ); |
@@ -390,7 +390,7 @@ discard block |
||
390 | 390 | if ($errNo == 0) { |
391 | 391 | // FAULT returned, errno needs to reflect that |
392 | 392 | /// @todo feature creep - add this code to PhpXmlRpc::$xmlrpcerr |
393 | - $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': fault response received with faultCode 0 or null. Converted it to -1'); |
|
393 | + $this->getLogger()->error('XML-RPC: '.__METHOD__.': fault response received with faultCode 0 or null. Converted it to -1'); |
|
394 | 394 | /// @todo in Encoder::decodeXML, we use PhpXmlRpc::$xmlrpcerr['invalid_return'] for this case (see |
395 | 395 | /// also the todo 17 lines above) |
396 | 396 | $errNo = -1; |
@@ -438,7 +438,7 @@ discard block |
||
438 | 438 | case '_php_class': |
439 | 439 | case 'payload': |
440 | 440 | case 'content_type': |
441 | - $this->logDeprecation('Getting property Request::' . $name . ' is deprecated'); |
|
441 | + $this->logDeprecation('Getting property Request::'.$name.' is deprecated'); |
|
442 | 442 | return $this->$name; |
443 | 443 | case 'httpResponse': |
444 | 444 | // manually implement the 'protected property' behaviour |
@@ -450,16 +450,16 @@ discard block |
||
450 | 450 | } |
451 | 451 | } |
452 | 452 | if ($canAccess) { |
453 | - $this->logDeprecation('Getting property Request::' . $name . ' is deprecated'); |
|
453 | + $this->logDeprecation('Getting property Request::'.$name.' is deprecated'); |
|
454 | 454 | return $this->httpResponse; |
455 | 455 | } else { |
456 | - trigger_error("Cannot access protected property Request::httpResponse in " . __FILE__, E_USER_ERROR); |
|
456 | + trigger_error("Cannot access protected property Request::httpResponse in ".__FILE__, E_USER_ERROR); |
|
457 | 457 | } |
458 | 458 | break; |
459 | 459 | default: |
460 | 460 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
461 | 461 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
462 | - trigger_error('Undefined property via __get(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
462 | + trigger_error('Undefined property via __get(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
463 | 463 | $result = null; |
464 | 464 | return $result; |
465 | 465 | } |
@@ -473,7 +473,7 @@ discard block |
||
473 | 473 | case 'debug': |
474 | 474 | case 'payload': |
475 | 475 | case 'content_type': |
476 | - $this->logDeprecation('Setting property Request::' . $name . ' is deprecated'); |
|
476 | + $this->logDeprecation('Setting property Request::'.$name.' is deprecated'); |
|
477 | 477 | $this->$name = $value; |
478 | 478 | break; |
479 | 479 | case 'httpResponse': |
@@ -486,16 +486,16 @@ discard block |
||
486 | 486 | } |
487 | 487 | } |
488 | 488 | if ($canAccess) { |
489 | - $this->logDeprecation('Setting property Request::' . $name . ' is deprecated'); |
|
489 | + $this->logDeprecation('Setting property Request::'.$name.' is deprecated'); |
|
490 | 490 | $this->httpResponse = $value; |
491 | 491 | } else { |
492 | - trigger_error("Cannot access protected property Request::httpResponse in " . __FILE__, E_USER_ERROR); |
|
492 | + trigger_error("Cannot access protected property Request::httpResponse in ".__FILE__, E_USER_ERROR); |
|
493 | 493 | } |
494 | 494 | break; |
495 | 495 | default: |
496 | 496 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
497 | 497 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
498 | - trigger_error('Undefined property via __set(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
498 | + trigger_error('Undefined property via __set(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
499 | 499 | } |
500 | 500 | } |
501 | 501 | |
@@ -507,7 +507,7 @@ discard block |
||
507 | 507 | case 'debug': |
508 | 508 | case 'payload': |
509 | 509 | case 'content_type': |
510 | - $this->logDeprecation('Checking property Request::' . $name . ' is deprecated'); |
|
510 | + $this->logDeprecation('Checking property Request::'.$name.' is deprecated'); |
|
511 | 511 | return isset($this->$name); |
512 | 512 | case 'httpResponse': |
513 | 513 | // manually implement the 'protected property' behaviour |
@@ -519,7 +519,7 @@ discard block |
||
519 | 519 | } |
520 | 520 | } |
521 | 521 | if ($canAccess) { |
522 | - $this->logDeprecation('Checking property Request::' . $name . ' is deprecated'); |
|
522 | + $this->logDeprecation('Checking property Request::'.$name.' is deprecated'); |
|
523 | 523 | return isset($this->httpResponse); |
524 | 524 | } |
525 | 525 | // break through voluntarily |
@@ -536,7 +536,7 @@ discard block |
||
536 | 536 | case 'debug': |
537 | 537 | case 'payload': |
538 | 538 | case 'content_type': |
539 | - $this->logDeprecation('Unsetting property Request::' . $name . ' is deprecated'); |
|
539 | + $this->logDeprecation('Unsetting property Request::'.$name.' is deprecated'); |
|
540 | 540 | unset($this->$name); |
541 | 541 | break; |
542 | 542 | case 'httpResponse': |
@@ -549,16 +549,16 @@ discard block |
||
549 | 549 | } |
550 | 550 | } |
551 | 551 | if ($canAccess) { |
552 | - $this->logDeprecation('Unsetting property Request::' . $name . ' is deprecated'); |
|
552 | + $this->logDeprecation('Unsetting property Request::'.$name.' is deprecated'); |
|
553 | 553 | unset($this->httpResponse); |
554 | 554 | } else { |
555 | - trigger_error("Cannot access protected property Request::httpResponse in " . __FILE__, E_USER_ERROR); |
|
555 | + trigger_error("Cannot access protected property Request::httpResponse in ".__FILE__, E_USER_ERROR); |
|
556 | 556 | } |
557 | 557 | break; |
558 | 558 | default: |
559 | 559 | /// @todo throw instead? There are very few other places where the lib trigger errors which can potentially reach stdout... |
560 | 560 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS, 1); |
561 | - trigger_error('Undefined property via __unset(): ' . $name . ' in ' . $trace[0]['file'] . ' on line ' . $trace[0]['line'], E_USER_WARNING); |
|
561 | + trigger_error('Undefined property via __unset(): '.$name.' in '.$trace[0]['file'].' on line '.$trace[0]['line'], E_USER_WARNING); |
|
562 | 562 | } |
563 | 563 | } |
564 | 564 | } |
@@ -24,7 +24,7 @@ |
||
24 | 24 | } |
25 | 25 | } |
26 | 26 | |
27 | -require_once __DIR__ . "/_prepend.php"; |
|
27 | +require_once __DIR__."/_prepend.php"; |
|
28 | 28 | |
29 | 29 | use PhpXmlRpc\PhpXmlRpc; |
30 | 30 | use PhpXmlRpc\Server; |
@@ -10,8 +10,8 @@ |
||
10 | 10 | // That is generally a good idea security-wise, but you might want to allow it in case of specific needs. |
11 | 11 | // Look at the code in demo/server.php for an example of how to enable that. |
12 | 12 | |
13 | -require_once __DIR__ . "/../../lib/xmlrpc.inc"; |
|
14 | -require_once __DIR__ . "/../../lib/xmlrpcs.inc"; |
|
13 | +require_once __DIR__."/../../lib/xmlrpc.inc"; |
|
14 | +require_once __DIR__."/../../lib/xmlrpcs.inc"; |
|
15 | 15 | |
16 | 16 | $signatures1 = include(__DIR__.'/methodProviders/functions.php'); |
17 | 17 | $signatures2 = include(__DIR__.'/methodProviders/interop.php'); |
@@ -88,11 +88,12 @@ |
||
88 | 88 | $a = $req->getParam(0); |
89 | 89 | $b = $req->getParam(1); |
90 | 90 | |
91 | - if ($a->scalarTyp() == Value::$xmlrpcNull) |
|
92 | - return new Response(new Value(plain_findstate($b->scalarVal()))); |
|
93 | - else |
|
94 | - return new Response(new Value(plain_findstate($a->scalarVal()))); |
|
95 | -} |
|
91 | + if ($a->scalarTyp() == Value::$xmlrpcNull) { |
|
92 | + return new Response(new Value(plain_findstate($b->scalarVal()))); |
|
93 | + } else { |
|
94 | + return new Response(new Value(plain_findstate($a->scalarVal()))); |
|
95 | + } |
|
96 | + } |
|
96 | 97 | |
97 | 98 | $sleep_sig = array(array(Value::$xmlrpcInt, Value::$xmlrpcInt)); |
98 | 99 | $sleep_doc = 'Sleeps for the requested number of seconds (between 1 and 60), before sending back the response'; |
@@ -43,7 +43,7 @@ discard block |
||
43 | 43 | $headers['Authorization'] = $_SERVER['REDIRECT_HTTP_AUTHORIZATION']; |
44 | 44 | } elseif (isset($_SERVER['PHP_AUTH_USER'])) { |
45 | 45 | $basic_pass = isset($_SERVER['PHP_AUTH_PW']) ? $_SERVER['PHP_AUTH_PW'] : ''; |
46 | - $headers['Authorization'] = 'Basic ' . base64_encode($_SERVER['PHP_AUTH_USER'] . ':' . $basic_pass); |
|
46 | + $headers['Authorization'] = 'Basic '.base64_encode($_SERVER['PHP_AUTH_USER'].':'.$basic_pass); |
|
47 | 47 | } elseif (isset($_SERVER['PHP_AUTH_DIGEST'])) { |
48 | 48 | $headers['Authorization'] = $_SERVER['PHP_AUTH_DIGEST']; |
49 | 49 | } |
@@ -62,12 +62,12 @@ discard block |
||
62 | 62 | foreach ($cookies as $name => $cookieDesc) { |
63 | 63 | if (is_array($cookieDesc)) { |
64 | 64 | setcookie($name, |
65 | - isset($cookieDesc['value']) ? (string)$cookieDesc['value'] : '', |
|
65 | + isset($cookieDesc['value']) ? (string) $cookieDesc['value'] : '', |
|
66 | 66 | isset($cookieDesc['expires']) ? $cookieDesc['expires'] : 0, |
67 | - isset($cookieDesc['path']) ? (string)$cookieDesc['path'] : '', |
|
68 | - isset($cookieDesc['domain']) ? (string)$cookieDesc['domain'] : '', |
|
69 | - isset($cookieDesc['secure']) ? (bool)$cookieDesc['secure'] : false, |
|
70 | - isset($cookieDesc['httponly']) ? (bool)$cookieDesc['httponly'] : false |
|
67 | + isset($cookieDesc['path']) ? (string) $cookieDesc['path'] : '', |
|
68 | + isset($cookieDesc['domain']) ? (string) $cookieDesc['domain'] : '', |
|
69 | + isset($cookieDesc['secure']) ? (bool) $cookieDesc['secure'] : false, |
|
70 | + isset($cookieDesc['httponly']) ? (bool) $cookieDesc['httponly'] : false |
|
71 | 71 | ); |
72 | 72 | } else { |
73 | 73 | /// @todo what to do? |
@@ -104,7 +104,7 @@ discard block |
||
104 | 104 | $sleep_sig = array(array(Value::$xmlrpcInt, Value::$xmlrpcInt)); |
105 | 105 | $sleep_doc = 'Sleeps for the requested number of seconds (between 1 and 60), before sending back the response'; |
106 | 106 | function sleepSeconds($secs) { |
107 | - if ($secs > 0 && $secs < 61) { |
|
107 | + if ($secs>0 && $secs<61) { |
|
108 | 108 | sleep($secs); |
109 | 109 | } |
110 | 110 | return $secs; |
@@ -137,7 +137,7 @@ discard block |
||
137 | 137 | |
138 | 138 | // Greek word 'kosme'. NB: NOT a valid ISO8859 string! |
139 | 139 | // NB: we can only register this when setting internal encoding to UTF-8, or it will break system.listMethods |
140 | - "tests.utf8methodname." . 'κόσμε' => array( |
|
140 | + "tests.utf8methodname.".'κόσμε' => array( |
|
141 | 141 | "function" => "exampleMethods::stringEcho", |
142 | 142 | "signature" => exampleMethods::$stringecho_sig, |
143 | 143 | "docstring" => exampleMethods::$stringecho_doc, |
@@ -1,8 +1,8 @@ discard block |
||
1 | 1 | <?php |
2 | 2 | |
3 | -include_once __DIR__ . '/../lib/xmlrpc_wrappers.inc'; |
|
3 | +include_once __DIR__.'/../lib/xmlrpc_wrappers.inc'; |
|
4 | 4 | |
5 | -include_once __DIR__ . '/ServerAwareTestCase.php'; |
|
5 | +include_once __DIR__.'/ServerAwareTestCase.php'; |
|
6 | 6 | |
7 | 7 | /** |
8 | 8 | * Tests which involve interaction with the server - carried out via the client. |
@@ -30,7 +30,7 @@ discard block |
||
30 | 30 | // (but only if not called from subclass objects / multitests) |
31 | 31 | if (function_exists('debug_backtrace') && strtolower(get_called_class()) == 'servertest') { |
32 | 32 | $trace = debug_backtrace(DEBUG_BACKTRACE_IGNORE_ARGS); |
33 | - for ($i = 0; $i < count($trace); $i++) { |
|
33 | + for ($i = 0; $i<count($trace); $i++) { |
|
34 | 34 | if (strpos($trace[$i]['function'], 'test') === 0) { |
35 | 35 | self::$failed_tests[$trace[$i]['function']] = true; |
36 | 36 | break; |
@@ -79,9 +79,9 @@ discard block |
||
79 | 79 | } |
80 | 80 | $this->validateResponse($r); |
81 | 81 | if (is_array($errorCode)) { |
82 | - $this->assertContains($r->faultCode(), $errorCode, 'Error ' . $r->faultCode() . ' connecting to server: ' . $r->faultString()); |
|
82 | + $this->assertContains($r->faultCode(), $errorCode, 'Error '.$r->faultCode().' connecting to server: '.$r->faultString()); |
|
83 | 83 | } else { |
84 | - $this->assertEquals($errorCode, $r->faultCode(), 'Error ' . $r->faultCode() . ' connecting to server: ' . $r->faultString()); |
|
84 | + $this->assertEquals($errorCode, $r->faultCode(), 'Error '.$r->faultCode().' connecting to server: '.$r->faultString()); |
|
85 | 85 | } |
86 | 86 | if (!$r->faultCode()) { |
87 | 87 | if ($returnResponse) { |
@@ -108,20 +108,20 @@ discard block |
||
108 | 108 | $query = parse_url($this->client->path, PHP_URL_QUERY); |
109 | 109 | parse_str($query, $vars); |
110 | 110 | $query = http_build_query(array_merge($vars, $data)); |
111 | - $this->client->path = parse_url($this->client->path, PHP_URL_PATH) . '?' . $query; |
|
111 | + $this->client->path = parse_url($this->client->path, PHP_URL_PATH).'?'.$query; |
|
112 | 112 | } |
113 | 113 | |
114 | 114 | public function testString() |
115 | 115 | { |
116 | - $sendString = "here are 3 \"entities\": < > & " . |
|
117 | - "and here's a dollar sign: \$pretendvarname and a backslash too: " . chr(92) . |
|
118 | - " - isn't that great? \\\"hackery\\\" at it's best " . |
|
119 | - " also don't want to miss out on \$item[0]. " . |
|
120 | - "The real weird stuff follows: CRLF here" . chr(13) . chr(10) . |
|
121 | - "a simple CR here" . chr(13) . |
|
122 | - "a simple LF here" . chr(10) . |
|
123 | - "and then LFCR" . chr(10) . chr(13) . |
|
124 | - "last but not least weird names: G" . chr(252) . "nter, El" . chr(232) . "ne, and an xml comment closing tag: -->"; |
|
116 | + $sendString = "here are 3 \"entities\": < > & ". |
|
117 | + "and here's a dollar sign: \$pretendvarname and a backslash too: ".chr(92). |
|
118 | + " - isn't that great? \\\"hackery\\\" at it's best ". |
|
119 | + " also don't want to miss out on \$item[0]. ". |
|
120 | + "The real weird stuff follows: CRLF here".chr(13).chr(10). |
|
121 | + "a simple CR here".chr(13). |
|
122 | + "a simple LF here".chr(10). |
|
123 | + "and then LFCR".chr(10).chr(13). |
|
124 | + "last but not least weird names: G".chr(252)."nter, El".chr(232)."ne, and an xml comment closing tag: -->"; |
|
125 | 125 | $m = new xmlrpcmsg('examples.stringecho', array( |
126 | 126 | new xmlrpcval($sendString, 'string'), |
127 | 127 | )); |
@@ -142,7 +142,7 @@ discard block |
||
142 | 142 | public function testLatin1String() |
143 | 143 | { |
144 | 144 | $sendString = |
145 | - "last but not least weird names: G" . chr(252) . "nter, El" . chr(232) . "ne"; |
|
145 | + "last but not least weird names: G".chr(252)."nter, El".chr(232)."ne"; |
|
146 | 146 | $x = '<?xml version="1.0" encoding="ISO-8859-1"?><methodCall><methodName>examples.stringecho</methodName><params><param><value>'. |
147 | 147 | $sendString. |
148 | 148 | '</value></param></params></methodCall>'; |
@@ -251,7 +251,7 @@ discard block |
||
251 | 251 | public function testUtf8Method() |
252 | 252 | { |
253 | 253 | PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding = 'UTF-8'; |
254 | - $m = new xmlrpcmsg("tests.utf8methodname." . 'κόσμε', array( |
|
254 | + $m = new xmlrpcmsg("tests.utf8methodname.".'κόσμε', array( |
|
255 | 255 | new xmlrpcval('hello') |
256 | 256 | )); |
257 | 257 | $v = $this->send($m); |
@@ -272,7 +272,7 @@ discard block |
||
272 | 272 | )); |
273 | 273 | $v = $this->send($m); |
274 | 274 | if ($v) { |
275 | - $this->assertEquals($a + $b, $v->scalarval()); |
|
275 | + $this->assertEquals($a+$b, $v->scalarval()); |
|
276 | 276 | } |
277 | 277 | } |
278 | 278 | |
@@ -284,7 +284,7 @@ discard block |
||
284 | 284 | )); |
285 | 285 | $v = $this->send($m); |
286 | 286 | if ($v) { |
287 | - $this->assertEquals(12 - 23, $v->scalarval()); |
|
287 | + $this->assertEquals(12-23, $v->scalarval()); |
|
288 | 288 | } |
289 | 289 | } |
290 | 290 | |
@@ -323,7 +323,7 @@ discard block |
||
323 | 323 | if ($v) { |
324 | 324 | $sz = $v->arraysize(); |
325 | 325 | $got = ''; |
326 | - for ($i = 0; $i < $sz; $i++) { |
|
326 | + for ($i = 0; $i<$sz; $i++) { |
|
327 | 327 | $b = $v->arraymem($i); |
328 | 328 | if ($b->scalarval()) { |
329 | 329 | $got .= '1'; |
@@ -370,7 +370,7 @@ discard block |
||
370 | 370 | $got = ''; |
371 | 371 | $expected = '37210'; |
372 | 372 | $expect_array = array('ctLeftAngleBrackets', 'ctRightAngleBrackets', 'ctAmpersands', 'ctApostrophes', 'ctQuotes'); |
373 | - foreach($expect_array as $val) { |
|
373 | + foreach ($expect_array as $val) { |
|
374 | 374 | $b = $v->structmem($val); |
375 | 375 | $got .= $b->scalarVal(); |
376 | 376 | } |
@@ -873,7 +873,7 @@ discard block |
||
873 | 873 | { |
874 | 874 | // make a 'deep client copy' as the original one might have many properties set |
875 | 875 | // also for speed only wrap one method of the whole server |
876 | - $class = wrap_xmlrpc_server($this->client, array('simple_client_copy' => 0, 'method_filter' => '/examples\.getStateName/' )); |
|
876 | + $class = wrap_xmlrpc_server($this->client, array('simple_client_copy' => 0, 'method_filter' => '/examples\.getStateName/')); |
|
877 | 877 | if ($class == '') { |
878 | 878 | $this->fail('Registration of remote server failed'); |
879 | 879 | } else { |
@@ -912,9 +912,9 @@ discard block |
||
912 | 912 | $cookies = array( |
913 | 913 | //'c1' => array(), |
914 | 914 | 'c2' => array('value' => 'c2'), |
915 | - 'c3' => array('value' => 'c3', 'expires' => time() + 60 * 60 * 24 * 30), |
|
916 | - 'c4' => array('value' => 'c4', 'expires' => time() + 60 * 60 * 24 * 30, 'path' => '/'), |
|
917 | - 'c5' => array('value' => 'c5', 'expires' => time() + 60 * 60 * 24 * 30, 'path' => '/', 'domain' => 'localhost'), |
|
915 | + 'c3' => array('value' => 'c3', 'expires' => time()+60 * 60 * 24 * 30), |
|
916 | + 'c4' => array('value' => 'c4', 'expires' => time()+60 * 60 * 24 * 30, 'path' => '/'), |
|
917 | + 'c5' => array('value' => 'c5', 'expires' => time()+60 * 60 * 24 * 30, 'path' => '/', 'domain' => 'localhost'), |
|
918 | 918 | ); |
919 | 919 | $cookiesval = php_xmlrpc_encode($cookies); |
920 | 920 | $m = new xmlrpcmsg('tests.setcookies', array($cookiesval)); |
@@ -962,10 +962,10 @@ discard block |
||
962 | 962 | $m = new xmlrpcmsg('tests.getcookies', array()); |
963 | 963 | foreach ($cookies as $cookie => $val) { |
964 | 964 | $this->client->setCookie($cookie, $val); |
965 | - $cookies[$cookie] = (string)$cookies[$cookie]; |
|
965 | + $cookies[$cookie] = (string) $cookies[$cookie]; |
|
966 | 966 | } |
967 | 967 | $r = $this->client->send($m, $this->timeout, $this->method); |
968 | - $this->assertEquals(0, $r->faultCode(), 'Error ' . $r->faultCode() . ' connecting to server: ' . $r->faultString()); |
|
968 | + $this->assertEquals(0, $r->faultCode(), 'Error '.$r->faultCode().' connecting to server: '.$r->faultString()); |
|
969 | 969 | if (!$r->faultCode()) { |
970 | 970 | $v = $r->value(); |
971 | 971 | $v = php_xmlrpc_decode($v); |
@@ -7,7 +7,7 @@ discard block |
||
7 | 7 | // In case this file is made available on an open-access server, avoid it being useable by anyone who can not also |
8 | 8 | // write a specific file to disk. |
9 | 9 | // NB: keep filename, cookie name in sync with the code within the TestCase classes sending http requests to this file |
10 | -$idFile = sys_get_temp_dir() . '/phpunit_rand_id.txt'; |
|
10 | +$idFile = sys_get_temp_dir().'/phpunit_rand_id.txt'; |
|
11 | 11 | $randId = isset($_COOKIE['PHPUNIT_RANDOM_TEST_ID']) ? $_COOKIE['PHPUNIT_RANDOM_TEST_ID'] : ''; |
12 | 12 | $fileId = file_exists($idFile) ? file_get_contents($idFile) : ''; |
13 | 13 | if ($randId == '' || $fileId == '' || $fileId !== $randId) { |
@@ -31,7 +31,7 @@ discard block |
||
31 | 31 | chmod($GLOBALS['PHPUNIT_COVERAGE_DATA_DIRECTORY'], 0777); |
32 | 32 | } |
33 | 33 | |
34 | - include_once __DIR__ . "/../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/prepend.php"; |
|
34 | + include_once __DIR__."/../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/prepend.php"; |
|
35 | 35 | } |
36 | 36 | |
37 | 37 | $targetFile = null; |
@@ -54,7 +54,7 @@ discard block |
||
54 | 54 | } |
55 | 55 | |
56 | 56 | if (isset($_COOKIE['PHPUNIT_SELENIUM_TEST_ID']) && extension_loaded('xdebug')) { |
57 | - include_once __DIR__ . "/../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/append.php"; |
|
57 | + include_once __DIR__."/../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/append.php"; |
|
58 | 58 | } |
59 | 59 | |
60 | 60 | /** |
@@ -87,7 +87,7 @@ discard block |
||
87 | 87 | } elseif ($_GET['FORCE_AUTH'] == 'Digest') { |
88 | 88 | if (empty($_SERVER['PHP_AUTH_DIGEST'])) { |
89 | 89 | header('HTTP/1.1 401 Unauthorized'); |
90 | - header('WWW-Authenticate: Digest realm="Phpxmlrpc Digest Realm",qop="auth",nonce="' . uniqid() . '",opaque="' . md5('Phpxmlrpc Digest Realm') . '"'); |
|
90 | + header('WWW-Authenticate: Digest realm="Phpxmlrpc Digest Realm",qop="auth",nonce="'.uniqid().'",opaque="'.md5('Phpxmlrpc Digest Realm').'"'); |
|
91 | 91 | die('Text visible if user hits Cancel button'); |
92 | 92 | } |
93 | 93 | } |
@@ -95,11 +95,11 @@ discard block |
||
95 | 95 | if (isset($_GET['FORCE_REDIRECT'])) { |
96 | 96 | header('HTTP/1.0 302 Found'); |
97 | 97 | unset($_GET['FORCE_REDIRECT']); |
98 | - header('Location: ' . $_SERVER['REQUEST_URI'] . (count($_GET) ? '?' . http_build_query($_GET) : '')); |
|
98 | + header('Location: '.$_SERVER['REQUEST_URI'].(count($_GET) ? '?'.http_build_query($_GET) : '')); |
|
99 | 99 | die(); |
100 | 100 | } |
101 | - if (isset($_GET['SLOW_LORIS']) && $_GET['SLOW_LORIS'] > 0) { |
|
102 | - slowLoris((int)$_GET['SLOW_LORIS'], $s); |
|
101 | + if (isset($_GET['SLOW_LORIS']) && $_GET['SLOW_LORIS']>0) { |
|
102 | + slowLoris((int) $_GET['SLOW_LORIS'], $s); |
|
103 | 103 | die(); |
104 | 104 | } |
105 | 105 | } |
@@ -113,13 +113,13 @@ discard block |
||
113 | 113 | { |
114 | 114 | /// @todo as is, this method can not be used by eg. jsonrpc servers. We could look at the value $s::$responseClass |
115 | 115 | /// to improve that |
116 | - $strings = array('<?xml version="1.0"?>','<methodResponse>','<params>','<param>','<value>','<string></string>','</value>','</param>','</params>','</methodResponse>'); |
|
116 | + $strings = array('<?xml version="1.0"?>', '<methodResponse>', '<params>', '<param>', '<value>', '<string></string>', '</value>', '</param>', '</params>', '</methodResponse>'); |
|
117 | 117 | |
118 | 118 | header('Content-type: xml; charset=utf-8'); |
119 | - foreach($strings as $i => $string) { |
|
119 | + foreach ($strings as $i => $string) { |
|
120 | 120 | echo $string; |
121 | 121 | flush(); |
122 | - if ($i < count($strings) && $secs > 0 && $secs <= 60) { |
|
122 | + if ($i<count($strings) && $secs>0 && $secs<=60) { |
|
123 | 123 | sleep($secs); |
124 | 124 | } |
125 | 125 | } |
@@ -1,6 +1,6 @@ discard block |
||
1 | 1 | <?php |
2 | 2 | |
3 | -include_once __DIR__ . '/LoggerAwareTestCase.php'; |
|
3 | +include_once __DIR__.'/LoggerAwareTestCase.php'; |
|
4 | 4 | |
5 | 5 | /** |
6 | 6 | * Tests involving the Value class. |
@@ -138,7 +138,7 @@ discard block |
||
138 | 138 | if (version_compare(PHP_VERSION, '8.0', '>=')) { |
139 | 139 | $str = sprintf("%f", $v->scalarval()); |
140 | 140 | } else { |
141 | - $str = (string)$v->scalarval(); |
|
141 | + $str = (string) $v->scalarval(); |
|
142 | 142 | } |
143 | 143 | if (strpos($str, ',') == 1) { |
144 | 144 | $r = $v->serialize(); |
@@ -159,7 +159,7 @@ discard block |
||
159 | 159 | $this->assertequals(1, count($v1)); |
160 | 160 | $out = array('me' => array(), 'mytype' => 2, '_php_class' => null); |
161 | 161 | |
162 | - foreach($v1 as $key => $val) |
|
162 | + foreach ($v1 as $key => $val) |
|
163 | 163 | { |
164 | 164 | $this->assertArrayHasKey($key, $out); |
165 | 165 | $expected = $out[$key]; |
@@ -174,7 +174,7 @@ discard block |
||
174 | 174 | $this->assertequals(2, count($v2)); |
175 | 175 | $out = array(array('key' => 0, 'value' => 'object'), array('key' => 1, 'value' => 'object')); |
176 | 176 | $i = 0; |
177 | - foreach($v2 as $key => $val) |
|
177 | + foreach ($v2 as $key => $val) |
|
178 | 178 | { |
179 | 179 | $expected = $out[$i]; |
180 | 180 | $this->assertequals($expected['key'], $key); |
@@ -201,7 +201,7 @@ discard block |
||
201 | 201 | { |
202 | 202 | // nb: make sure that the serialized xml corresponding to this is > 10MB in size |
203 | 203 | $data = array(); |
204 | - for ($i = 0; $i < 500000; $i++ ) { |
|
204 | + for ($i = 0; $i<500000; $i++) { |
|
205 | 205 | $data[] = 'hello world'; |
206 | 206 | } |
207 | 207 |
@@ -6,15 +6,15 @@ discard block |
||
6 | 6 | |
7 | 7 | echo "Legacy Loader Test\n\n"; |
8 | 8 | |
9 | -include_once __DIR__ . '/../lib/xmlrpc.inc'; |
|
9 | +include_once __DIR__.'/../lib/xmlrpc.inc'; |
|
10 | 10 | |
11 | -include_once __DIR__ . '/parse_args.php'; |
|
11 | +include_once __DIR__.'/parse_args.php'; |
|
12 | 12 | |
13 | 13 | $args = argParser::getArgs(); |
14 | -$baseurl = 'http://' . $args['HTTPSERVER'] . str_replace('/server.php', '/legacy.php', $args['HTTPURI']); |
|
14 | +$baseurl = 'http://'.$args['HTTPSERVER'].str_replace('/server.php', '/legacy.php', $args['HTTPURI']); |
|
15 | 15 | |
16 | 16 | $randId = uniqid(); |
17 | -file_put_contents(sys_get_temp_dir() . '/phpunit_rand_id.txt', $randId); |
|
17 | +file_put_contents(sys_get_temp_dir().'/phpunit_rand_id.txt', $randId); |
|
18 | 18 | |
19 | 19 | $client = new xmlrpc_client($baseurl); |
20 | 20 | $client->setCookie('PHPUNIT_RANDOM_TEST_ID', $randId); |
@@ -22,11 +22,11 @@ discard block |
||
22 | 22 | $req = new xmlrpcmsg('system.listMethods', array()); |
23 | 23 | $resp = $client->send($req); |
24 | 24 | if ($resp->faultCode() !== 0) { |
25 | - unlink(sys_get_temp_dir() . '/phpunit_rand_id.txt'); |
|
26 | - throw new \Exception("system.listMethods returned fault " . $resp->faultCode()); |
|
25 | + unlink(sys_get_temp_dir().'/phpunit_rand_id.txt'); |
|
26 | + throw new \Exception("system.listMethods returned fault ".$resp->faultCode()); |
|
27 | 27 | } |
28 | 28 | echo ". 1/1 (100%)\n\n"; |
29 | 29 | |
30 | 30 | echo "OK (1 test, 1 assertion)\n"; |
31 | 31 | |
32 | -unlink(sys_get_temp_dir() . '/phpunit_rand_id.txt'); |
|
32 | +unlink(sys_get_temp_dir().'/phpunit_rand_id.txt'); |