@@ -14,7 +14,7 @@ discard block |
||
14 | 14 | error_reporting(E_ALL); |
15 | 15 | |
16 | 16 | // Use the custom class autoloader. These two lines not needed when the phpxmlrpc library is installed using Composer |
17 | -include_once __DIR__ . '/../../src/Autoloader.php'; |
|
17 | +include_once __DIR__.'/../../src/Autoloader.php'; |
|
18 | 18 | PhpXmlRpc\Autoloader::register(); |
19 | 19 | |
20 | 20 | // Let unit tests run against localhost, 'plain' demos against a known public server |
@@ -33,5 +33,5 @@ discard block |
||
33 | 33 | chmod($GLOBALS['PHPUNIT_COVERAGE_DATA_DIRECTORY'], 0777); |
34 | 34 | } |
35 | 35 | |
36 | - include_once __DIR__ . "/../../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/prepend.php"; |
|
36 | + include_once __DIR__."/../../vendor/phpunit/phpunit-selenium/PHPUnit/Extensions/SeleniumCommon/prepend.php"; |
|
37 | 37 | } |
@@ -2,20 +2,20 @@ |
||
2 | 2 | |
3 | 3 | use PHPUnit\Runner\Version as PHPUnit_Version; |
4 | 4 | |
5 | -if ( class_exists( 'PHPUnit_Extensions_SeleniumCommon_RemoteCoverage' ) === true |
|
6 | - && class_exists( 'PHPUnit\Extensions\SeleniumCommon\RemoteCoverage' ) === false |
|
5 | +if (class_exists('PHPUnit_Extensions_SeleniumCommon_RemoteCoverage') === true |
|
6 | + && class_exists('PHPUnit\Extensions\SeleniumCommon\RemoteCoverage') === false |
|
7 | 7 | ) { |
8 | - class_alias( 'PHPUnit_Extensions_SeleniumCommon_RemoteCoverage', 'PHPUnit\Extensions\SeleniumCommon\RemoteCoverage' ); |
|
8 | + class_alias('PHPUnit_Extensions_SeleniumCommon_RemoteCoverage', 'PHPUnit\Extensions\SeleniumCommon\RemoteCoverage'); |
|
9 | 9 | } |
10 | 10 | |
11 | -if ( class_exists( 'PHPUnit_Runner_BaseTestRunner' ) === true |
|
12 | - && class_exists( 'PHPUnit\Runner\BaseTestRunner' ) === false |
|
11 | +if (class_exists('PHPUnit_Runner_BaseTestRunner') === true |
|
12 | + && class_exists('PHPUnit\Runner\BaseTestRunner') === false |
|
13 | 13 | ) { |
14 | - class_alias( 'PHPUnit_Runner_BaseTestRunner', 'PHPUnit\Runner\BaseTestRunner' ); |
|
14 | + class_alias('PHPUnit_Runner_BaseTestRunner', 'PHPUnit\Runner\BaseTestRunner'); |
|
15 | 15 | } |
16 | 16 | |
17 | 17 | if (class_exists(PHPUnit_Version::class) === false || version_compare(PHPUnit_Version::id(), '8.0.0', '<')) { |
18 | - include_once __DIR__ . '/PolyfillTestCase7.php'; |
|
18 | + include_once __DIR__.'/PolyfillTestCase7.php'; |
|
19 | 19 | } else { |
20 | - include_once __DIR__ . '/PolyfillTestCase8.php'; |
|
20 | + include_once __DIR__.'/PolyfillTestCase8.php'; |
|
21 | 21 | } |
@@ -87,7 +87,7 @@ discard block |
||
87 | 87 | $this->me['struct'] = $val; |
88 | 88 | break; |
89 | 89 | default: |
90 | - Logger::instance()->errorLog("XML-RPC: " . __METHOD__ . ": not a known type ($type)"); |
|
90 | + Logger::instance()->errorLog("XML-RPC: ".__METHOD__.": not a known type ($type)"); |
|
91 | 91 | } |
92 | 92 | } |
93 | 93 | } |
@@ -112,7 +112,7 @@ discard block |
||
112 | 112 | } |
113 | 113 | |
114 | 114 | if ($typeOf !== 1) { |
115 | - Logger::instance()->errorLog("XML-RPC: " . __METHOD__ . ": not a scalar type ($type)"); |
|
115 | + Logger::instance()->errorLog("XML-RPC: ".__METHOD__.": not a scalar type ($type)"); |
|
116 | 116 | return 0; |
117 | 117 | } |
118 | 118 | |
@@ -129,10 +129,10 @@ discard block |
||
129 | 129 | |
130 | 130 | switch ($this->mytype) { |
131 | 131 | case 1: |
132 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': scalar xmlrpc value can have only one value'); |
|
132 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': scalar xmlrpc value can have only one value'); |
|
133 | 133 | return 0; |
134 | 134 | case 3: |
135 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': cannot add anonymous scalar to struct xmlrpc value'); |
|
135 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': cannot add anonymous scalar to struct xmlrpc value'); |
|
136 | 136 | return 0; |
137 | 137 | case 2: |
138 | 138 | // we're adding a scalar value to an array here |
@@ -174,7 +174,7 @@ discard block |
||
174 | 174 | |
175 | 175 | return 1; |
176 | 176 | } else { |
177 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': already initialized as a [' . $this->kindOf() . ']'); |
|
177 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': already initialized as a ['.$this->kindOf().']'); |
|
178 | 178 | return 0; |
179 | 179 | } |
180 | 180 | } |
@@ -205,7 +205,7 @@ discard block |
||
205 | 205 | |
206 | 206 | return 1; |
207 | 207 | } else { |
208 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': already initialized as a [' . $this->kindOf() . ']'); |
|
208 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': already initialized as a ['.$this->kindOf().']'); |
|
209 | 209 | return 0; |
210 | 210 | } |
211 | 211 | } |
@@ -241,19 +241,19 @@ discard block |
||
241 | 241 | case 1: |
242 | 242 | switch ($typ) { |
243 | 243 | case static::$xmlrpcBase64: |
244 | - $rs .= "<${typ}>" . base64_encode($val) . "</${typ}>"; |
|
244 | + $rs .= "<${typ}>".base64_encode($val)."</${typ}>"; |
|
245 | 245 | break; |
246 | 246 | case static::$xmlrpcBoolean: |
247 | - $rs .= "<${typ}>" . ($val ? '1' : '0') . "</${typ}>"; |
|
247 | + $rs .= "<${typ}>".($val ? '1' : '0')."</${typ}>"; |
|
248 | 248 | break; |
249 | 249 | case static::$xmlrpcString: |
250 | 250 | // Do NOT use htmlentities, since it will produce named html entities, which are invalid xml |
251 | - $rs .= "<${typ}>" . Charset::instance()->encodeEntities($val, PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding) . "</${typ}>"; |
|
251 | + $rs .= "<${typ}>".Charset::instance()->encodeEntities($val, PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding)."</${typ}>"; |
|
252 | 252 | break; |
253 | 253 | case static::$xmlrpcInt: |
254 | 254 | case static::$xmlrpcI4: |
255 | 255 | case static::$xmlrpcI8: |
256 | - $rs .= "<${typ}>" . (int)$val . "</${typ}>"; |
|
256 | + $rs .= "<${typ}>".(int) $val."</${typ}>"; |
|
257 | 257 | break; |
258 | 258 | case static::$xmlrpcDouble: |
259 | 259 | // avoid using standard conversion of float to string because it is locale-dependent, |
@@ -261,15 +261,15 @@ discard block |
||
261 | 261 | // sprintf('%F') could be most likely ok but it fails eg. on 2e-14. |
262 | 262 | // The code below tries its best at keeping max precision while avoiding exp notation, |
263 | 263 | // but there is of course no limit in the number of decimal places to be used... |
264 | - $rs .= "<${typ}>" . preg_replace('/\\.?0+$/', '', number_format((double)$val, PhpXmlRpc::$xmlpc_double_precision, '.', '')) . "</${typ}>"; |
|
264 | + $rs .= "<${typ}>".preg_replace('/\\.?0+$/', '', number_format((double) $val, PhpXmlRpc::$xmlpc_double_precision, '.', ''))."</${typ}>"; |
|
265 | 265 | break; |
266 | 266 | case static::$xmlrpcDateTime: |
267 | 267 | if (is_string($val)) { |
268 | 268 | $rs .= "<${typ}>${val}</${typ}>"; |
269 | 269 | } elseif (is_a($val, 'DateTime')) { |
270 | - $rs .= "<${typ}>" . $val->format('Ymd\TH:i:s') . "</${typ}>"; |
|
270 | + $rs .= "<${typ}>".$val->format('Ymd\TH:i:s')."</${typ}>"; |
|
271 | 271 | } elseif (is_int($val)) { |
272 | - $rs .= "<${typ}>" . strftime("%Y%m%dT%H:%M:%S", $val) . "</${typ}>"; |
|
272 | + $rs .= "<${typ}>".strftime("%Y%m%dT%H:%M:%S", $val)."</${typ}>"; |
|
273 | 273 | } else { |
274 | 274 | // not really a good idea here: but what shall we output anyway? left for backward compat... |
275 | 275 | $rs .= "<${typ}>${val}</${typ}>"; |
@@ -291,14 +291,14 @@ discard block |
||
291 | 291 | case 3: |
292 | 292 | // struct |
293 | 293 | if ($this->_php_class) { |
294 | - $rs .= '<struct php_class="' . $this->_php_class . "\">\n"; |
|
294 | + $rs .= '<struct php_class="'.$this->_php_class."\">\n"; |
|
295 | 295 | } else { |
296 | 296 | $rs .= "<struct>\n"; |
297 | 297 | } |
298 | 298 | $charsetEncoder = Charset::instance(); |
299 | 299 | /** @var Value $val2 */ |
300 | 300 | foreach ($val as $key2 => $val2) { |
301 | - $rs .= '<member><name>' . $charsetEncoder->encodeEntities($key2, PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding) . "</name>\n"; |
|
301 | + $rs .= '<member><name>'.$charsetEncoder->encodeEntities($key2, PhpXmlRpc::$xmlrpc_internalencoding, $charsetEncoding)."</name>\n"; |
|
302 | 302 | //$rs.=$this->serializeval($val2); |
303 | 303 | $rs .= $val2->serialize($charsetEncoding); |
304 | 304 | $rs .= "</member>\n"; |
@@ -334,7 +334,7 @@ discard block |
||
334 | 334 | $val = reset($this->me); |
335 | 335 | $typ = key($this->me); |
336 | 336 | |
337 | - return '<value>' . $this->serializedata($typ, $val, $charsetEncoding) . "</value>\n"; |
|
337 | + return '<value>'.$this->serializedata($typ, $val, $charsetEncoding)."</value>\n"; |
|
338 | 338 | } |
339 | 339 | |
340 | 340 | /** |
@@ -123,7 +123,7 @@ discard block |
||
123 | 123 | |
124 | 124 | xml_set_object($parser, $this); |
125 | 125 | |
126 | - switch($returnType) { |
|
126 | + switch ($returnType) { |
|
127 | 127 | case self::RETURN_PHP: |
128 | 128 | xml_set_element_handler($parser, 'xmlrpc_se', 'xmlrpc_ee_fast'); |
129 | 129 | break; |
@@ -140,10 +140,10 @@ discard block |
||
140 | 140 | $this->accept = $accept; |
141 | 141 | |
142 | 142 | // @see ticket #70 - we have to parse big xml docks in chunks to avoid errors |
143 | - for ($offset = 0; $offset < $len; $offset += $this->maxChunkLength) { |
|
143 | + for ($offset = 0; $offset<$len; $offset += $this->maxChunkLength) { |
|
144 | 144 | $chunk = substr($data, $offset, $this->maxChunkLength); |
145 | 145 | // error handling: xml not well formed |
146 | - if (!xml_parse($parser, $chunk, $offset + $this->maxChunkLength >= $len)) { |
|
146 | + if (!xml_parse($parser, $chunk, $offset+$this->maxChunkLength>=$len)) { |
|
147 | 147 | $errCode = xml_get_error_code($parser); |
148 | 148 | $errStr = sprintf('XML error %s: %s at line %d, column %d', $errCode, xml_error_string($errCode), |
149 | 149 | xml_get_current_line_number($parser), xml_get_current_column_number($parser)); |
@@ -167,7 +167,7 @@ discard block |
||
167 | 167 | public function xmlrpc_se($parser, $name, $attrs, $acceptSingleVals = false) |
168 | 168 | { |
169 | 169 | // if invalid xmlrpc already detected, skip all processing |
170 | - if ($this->_xh['isf'] < 2) { |
|
170 | + if ($this->_xh['isf']<2) { |
|
171 | 171 | |
172 | 172 | // check for correct element nesting |
173 | 173 | if (count($this->_xh['stack']) == 0) { |
@@ -187,7 +187,7 @@ discard block |
||
187 | 187 | $this->_xh['rt'] = strtolower($name); |
188 | 188 | } else { |
189 | 189 | $this->_xh['isf'] = 2; |
190 | - $this->_xh['isf_reason'] = 'missing top level xmlrpc element. Found: ' . $name; |
|
190 | + $this->_xh['isf_reason'] = 'missing top level xmlrpc element. Found: '.$name; |
|
191 | 191 | |
192 | 192 | return; |
193 | 193 | } |
@@ -281,7 +281,7 @@ discard block |
||
281 | 281 | break; |
282 | 282 | case 'MEMBER': |
283 | 283 | // set member name to null, in case we do not find in the xml later on |
284 | - $this->_xh['valuestack'][count($this->_xh['valuestack']) - 1]['name'] = ''; |
|
284 | + $this->_xh['valuestack'][count($this->_xh['valuestack'])-1]['name'] = ''; |
|
285 | 285 | //$this->_xh['ac']=''; |
286 | 286 | // Drop trough intentionally |
287 | 287 | case 'PARAM': |
@@ -341,7 +341,7 @@ discard block |
||
341 | 341 | */ |
342 | 342 | public function xmlrpc_ee($parser, $name, $rebuildXmlrpcvals = 1) |
343 | 343 | { |
344 | - if ($this->_xh['isf'] < 2) { |
|
344 | + if ($this->_xh['isf']<2) { |
|
345 | 345 | // push this element name from stack |
346 | 346 | // NB: if XML validates, correct opening/closing is guaranteed and |
347 | 347 | // we do not have to check for $name == $currElem. |
@@ -356,7 +356,7 @@ discard block |
||
356 | 356 | $this->_xh['vt'] = Value::$xmlrpcString; |
357 | 357 | } |
358 | 358 | |
359 | - if ($rebuildXmlrpcvals > 0) { |
|
359 | + if ($rebuildXmlrpcvals>0) { |
|
360 | 360 | // build the xmlrpc val out of the data received, and substitute it |
361 | 361 | $temp = new Value($this->_xh['value'], $this->_xh['vt']); |
362 | 362 | // in case we got info about underlying php class, save it |
@@ -365,15 +365,15 @@ discard block |
||
365 | 365 | $temp->_php_class = $this->_xh['php_class']; |
366 | 366 | } |
367 | 367 | $this->_xh['value'] = $temp; |
368 | - } elseif ($rebuildXmlrpcvals < 0) { |
|
368 | + } elseif ($rebuildXmlrpcvals<0) { |
|
369 | 369 | if ($this->_xh['vt'] == Value::$xmlrpcDateTime) { |
370 | - $this->_xh['value'] = (object)array( |
|
370 | + $this->_xh['value'] = (object) array( |
|
371 | 371 | 'xmlrpc_type' => 'datetime', |
372 | 372 | 'scalar' => $this->_xh['value'], |
373 | 373 | 'timestamp' => \PhpXmlRpc\Helper\Date::iso8601Decode($this->_xh['value']) |
374 | 374 | ); |
375 | 375 | } elseif ($this->_xh['vt'] == Value::$xmlrpcBase64) { |
376 | - $this->_xh['value'] = (object)array( |
|
376 | + $this->_xh['value'] = (object) array( |
|
377 | 377 | 'xmlrpc_type' => 'base64', |
378 | 378 | 'scalar' => $this->_xh['value'] |
379 | 379 | ); |
@@ -389,8 +389,8 @@ discard block |
||
389 | 389 | // check if we are inside an array or struct: |
390 | 390 | // if value just built is inside an array, let's move it into array on the stack |
391 | 391 | $vscount = count($this->_xh['valuestack']); |
392 | - if ($vscount && $this->_xh['valuestack'][$vscount - 1]['type'] == 'ARRAY') { |
|
393 | - $this->_xh['valuestack'][$vscount - 1]['values'][] = $this->_xh['value']; |
|
392 | + if ($vscount && $this->_xh['valuestack'][$vscount-1]['type'] == 'ARRAY') { |
|
393 | + $this->_xh['valuestack'][$vscount-1]['values'][] = $this->_xh['value']; |
|
394 | 394 | } |
395 | 395 | break; |
396 | 396 | case 'BOOLEAN': |
@@ -409,7 +409,7 @@ discard block |
||
409 | 409 | $this->_xh['value'] = $this->_xh['ac']; |
410 | 410 | } elseif ($name == 'DATETIME.ISO8601') { |
411 | 411 | if (!preg_match('/^[0-9]{8}T[0-9]{2}:[0-9]{2}:[0-9]{2}$/', $this->_xh['ac'])) { |
412 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': invalid value received in DATETIME: ' . $this->_xh['ac']); |
|
412 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': invalid value received in DATETIME: '.$this->_xh['ac']); |
|
413 | 413 | } |
414 | 414 | $this->_xh['vt'] = Value::$xmlrpcDateTime; |
415 | 415 | $this->_xh['value'] = $this->_xh['ac']; |
@@ -428,7 +428,7 @@ discard block |
||
428 | 428 | } else { |
429 | 429 | // log if receiving something strange, even though we set the value to false anyway |
430 | 430 | if ($this->_xh['ac'] != '0' && strcasecmp($this->_xh['ac'], 'false') != 0) { |
431 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': invalid value received in BOOLEAN: ' . $this->_xh['ac']); |
|
431 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': invalid value received in BOOLEAN: '.$this->_xh['ac']); |
|
432 | 432 | } |
433 | 433 | $this->_xh['value'] = false; |
434 | 434 | } |
@@ -438,37 +438,37 @@ discard block |
||
438 | 438 | // NOTE: regexp could be much stricter than this... |
439 | 439 | if (!preg_match('/^[+-eE0123456789 \t.]+$/', $this->_xh['ac'])) { |
440 | 440 | /// @todo: find a better way of throwing an error than this! |
441 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': non numeric value received in DOUBLE: ' . $this->_xh['ac']); |
|
441 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': non numeric value received in DOUBLE: '.$this->_xh['ac']); |
|
442 | 442 | $this->_xh['value'] = 'ERROR_NON_NUMERIC_FOUND'; |
443 | 443 | } else { |
444 | 444 | // it's ok, add it on |
445 | - $this->_xh['value'] = (double)$this->_xh['ac']; |
|
445 | + $this->_xh['value'] = (double) $this->_xh['ac']; |
|
446 | 446 | } |
447 | 447 | } else { |
448 | 448 | // we have an I4/I8/INT |
449 | 449 | // we must check that only 0123456789-<space> are characters here |
450 | 450 | if (!preg_match('/^[+-]?[0123456789 \t]+$/', $this->_xh['ac'])) { |
451 | 451 | /// @todo find a better way of throwing an error than this! |
452 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': non numeric value received in INT: ' . $this->_xh['ac']); |
|
452 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': non numeric value received in INT: '.$this->_xh['ac']); |
|
453 | 453 | $this->_xh['value'] = 'ERROR_NON_NUMERIC_FOUND'; |
454 | 454 | } else { |
455 | 455 | // it's ok, add it on |
456 | - $this->_xh['value'] = (int)$this->_xh['ac']; |
|
456 | + $this->_xh['value'] = (int) $this->_xh['ac']; |
|
457 | 457 | } |
458 | 458 | } |
459 | 459 | $this->_xh['lv'] = 3; // indicate we've found a value |
460 | 460 | break; |
461 | 461 | case 'NAME': |
462 | - $this->_xh['valuestack'][count($this->_xh['valuestack']) - 1]['name'] = $this->_xh['ac']; |
|
462 | + $this->_xh['valuestack'][count($this->_xh['valuestack'])-1]['name'] = $this->_xh['ac']; |
|
463 | 463 | break; |
464 | 464 | case 'MEMBER': |
465 | 465 | // add to array in the stack the last element built, |
466 | 466 | // unless no VALUE was found |
467 | 467 | if ($this->_xh['vt']) { |
468 | 468 | $vscount = count($this->_xh['valuestack']); |
469 | - $this->_xh['valuestack'][$vscount - 1]['values'][$this->_xh['valuestack'][$vscount - 1]['name']] = $this->_xh['value']; |
|
469 | + $this->_xh['valuestack'][$vscount-1]['values'][$this->_xh['valuestack'][$vscount-1]['name']] = $this->_xh['value']; |
|
470 | 470 | } else { |
471 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': missing VALUE inside STRUCT in received xml'); |
|
471 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': missing VALUE inside STRUCT in received xml'); |
|
472 | 472 | } |
473 | 473 | break; |
474 | 474 | case 'DATA': |
@@ -491,7 +491,7 @@ discard block |
||
491 | 491 | $this->_xh['params'][] = $this->_xh['value']; |
492 | 492 | $this->_xh['pt'][] = $this->_xh['vt']; |
493 | 493 | } else { |
494 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': missing VALUE inside PARAM in received xml'); |
|
494 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': missing VALUE inside PARAM in received xml'); |
|
495 | 495 | } |
496 | 496 | break; |
497 | 497 | case 'METHODNAME': |
@@ -547,7 +547,7 @@ discard block |
||
547 | 547 | public function xmlrpc_cd($parser, $data) |
548 | 548 | { |
549 | 549 | // skip processing if xml fault already detected |
550 | - if ($this->_xh['isf'] < 2) { |
|
550 | + if ($this->_xh['isf']<2) { |
|
551 | 551 | // "lookforvalue==3" means that we've found an entire value |
552 | 552 | // and should discard any further character data |
553 | 553 | if ($this->_xh['lv'] != 3) { |
@@ -565,7 +565,7 @@ discard block |
||
565 | 565 | public function xmlrpc_dh($parser, $data) |
566 | 566 | { |
567 | 567 | // skip processing if xml fault already detected |
568 | - if ($this->_xh['isf'] < 2) { |
|
568 | + if ($this->_xh['isf']<2) { |
|
569 | 569 | if (substr($data, 0, 1) == '&' && substr($data, -1, 1) == ';') { |
570 | 570 | $this->_xh['ac'] .= $data; |
571 | 571 | } |
@@ -636,8 +636,8 @@ discard block |
||
636 | 636 | // Details: |
637 | 637 | // SPACE: (#x20 | #x9 | #xD | #xA)+ === [ \x9\xD\xA]+ |
638 | 638 | // EQ: SPACE?=SPACE? === [ \x9\xD\xA]*=[ \x9\xD\xA]* |
639 | - if (preg_match('/^<\?xml\s+version\s*=\s*' . "((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))" . |
|
640 | - '\s+encoding\s*=\s*' . "((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
639 | + if (preg_match('/^<\?xml\s+version\s*=\s*'."((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))". |
|
640 | + '\s+encoding\s*=\s*'."((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
641 | 641 | $xmlChunk, $matches)) { |
642 | 642 | return strtoupper(substr($matches[2], 1, -1)); |
643 | 643 | } |
@@ -655,7 +655,7 @@ discard block |
||
655 | 655 | // NB: mb_detect likes to call it ascii, xml parser likes to call it US_ASCII... |
656 | 656 | // IANA also likes better US-ASCII, so go with it |
657 | 657 | if ($enc == 'ASCII') { |
658 | - $enc = 'US-' . $enc; |
|
658 | + $enc = 'US-'.$enc; |
|
659 | 659 | } |
660 | 660 | |
661 | 661 | return $enc; |
@@ -690,8 +690,8 @@ discard block |
||
690 | 690 | // Details: |
691 | 691 | // SPACE: (#x20 | #x9 | #xD | #xA)+ === [ \x9\xD\xA]+ |
692 | 692 | // EQ: SPACE?=SPACE? === [ \x9\xD\xA]*=[ \x9\xD\xA]* |
693 | - if (preg_match('/^<\?xml\s+version\s*=\s*' . "((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))" . |
|
694 | - '\s+encoding\s*=\s*' . "((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
693 | + if (preg_match('/^<\?xml\s+version\s*=\s*'."((?:\"[a-zA-Z0-9_.:-]+\")|(?:'[a-zA-Z0-9_.:-]+'))". |
|
694 | + '\s+encoding\s*=\s*'."((?:\"[A-Za-z][A-Za-z0-9._-]*\")|(?:'[A-Za-z][A-Za-z0-9._-]*'))/", |
|
695 | 695 | $xmlChunk, $matches)) { |
696 | 696 | return true; |
697 | 697 | } |
@@ -23,12 +23,12 @@ discard block |
||
23 | 23 | |
24 | 24 | // read chunk-size, chunk-extension (if any) and crlf |
25 | 25 | // get the position of the linebreak |
26 | - $chunkEnd = strpos($buffer, "\r\n") + 2; |
|
26 | + $chunkEnd = strpos($buffer, "\r\n")+2; |
|
27 | 27 | $temp = substr($buffer, 0, $chunkEnd); |
28 | 28 | $chunkSize = hexdec(trim($temp)); |
29 | 29 | $chunkStart = $chunkEnd; |
30 | - while ($chunkSize > 0) { |
|
31 | - $chunkEnd = strpos($buffer, "\r\n", $chunkStart + $chunkSize); |
|
30 | + while ($chunkSize>0) { |
|
31 | + $chunkEnd = strpos($buffer, "\r\n", $chunkStart+$chunkSize); |
|
32 | 32 | |
33 | 33 | // just in case we got a broken connection |
34 | 34 | if ($chunkEnd == false) { |
@@ -40,19 +40,19 @@ discard block |
||
40 | 40 | } |
41 | 41 | |
42 | 42 | // read chunk-data and crlf |
43 | - $chunk = substr($buffer, $chunkStart, $chunkEnd - $chunkStart); |
|
43 | + $chunk = substr($buffer, $chunkStart, $chunkEnd-$chunkStart); |
|
44 | 44 | // append chunk-data to entity-body |
45 | 45 | $new .= $chunk; |
46 | 46 | // length := length + chunk-size |
47 | 47 | $length += strlen($chunk); |
48 | 48 | // read chunk-size and crlf |
49 | - $chunkStart = $chunkEnd + 2; |
|
49 | + $chunkStart = $chunkEnd+2; |
|
50 | 50 | |
51 | - $chunkEnd = strpos($buffer, "\r\n", $chunkStart) + 2; |
|
51 | + $chunkEnd = strpos($buffer, "\r\n", $chunkStart)+2; |
|
52 | 52 | if ($chunkEnd == false) { |
53 | 53 | break; //just in case we got a broken connection |
54 | 54 | } |
55 | - $temp = substr($buffer, $chunkStart, $chunkEnd - $chunkStart); |
|
55 | + $temp = substr($buffer, $chunkStart, $chunkEnd-$chunkStart); |
|
56 | 56 | $chunkSize = hexdec(trim($temp)); |
57 | 57 | $chunkStart = $chunkEnd; |
58 | 58 | } |
@@ -69,7 +69,7 @@ discard block |
||
69 | 69 | * @return array with keys 'headers' and 'cookies' |
70 | 70 | * @throws \Exception |
71 | 71 | */ |
72 | - public function parseResponseHeaders(&$data, $headersProcessed = false, $debug=0) |
|
72 | + public function parseResponseHeaders(&$data, $headersProcessed = false, $debug = 0) |
|
73 | 73 | { |
74 | 74 | $httpResponse = array('raw_data' => $data, 'headers'=> array(), 'cookies' => array()); |
75 | 75 | |
@@ -79,11 +79,11 @@ discard block |
||
79 | 79 | // (even though it is not valid http) |
80 | 80 | $pos = strpos($data, "\r\n\r\n"); |
81 | 81 | if ($pos || is_int($pos)) { |
82 | - $bd = $pos + 4; |
|
82 | + $bd = $pos+4; |
|
83 | 83 | } else { |
84 | 84 | $pos = strpos($data, "\n\n"); |
85 | 85 | if ($pos || is_int($pos)) { |
86 | - $bd = $pos + 2; |
|
86 | + $bd = $pos+2; |
|
87 | 87 | } else { |
88 | 88 | // No separation between response headers and body: fault? |
89 | 89 | $bd = 0; |
@@ -94,8 +94,8 @@ discard block |
||
94 | 94 | // maybe we could take them into account, too? |
95 | 95 | $data = substr($data, $bd); |
96 | 96 | } else { |
97 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': HTTPS via proxy error, tunnel connection possibly failed'); |
|
98 | - throw new \Exception(PhpXmlRpc::$xmlrpcstr['http_error'] . ' (HTTPS via proxy error, tunnel connection possibly failed)', PhpXmlRpc::$xmlrpcerr['http_error']); |
|
97 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': HTTPS via proxy error, tunnel connection possibly failed'); |
|
98 | + throw new \Exception(PhpXmlRpc::$xmlrpcstr['http_error'].' (HTTPS via proxy error, tunnel connection possibly failed)', PhpXmlRpc::$xmlrpcerr['http_error']); |
|
99 | 99 | } |
100 | 100 | } |
101 | 101 | |
@@ -121,20 +121,20 @@ discard block |
||
121 | 121 | } |
122 | 122 | |
123 | 123 | if (!preg_match('/^HTTP\/[0-9.]+ 200 /', $data)) { |
124 | - $errstr = substr($data, 0, strpos($data, "\n") - 1); |
|
125 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': HTTP error, got response: ' . $errstr); |
|
126 | - throw new \Exception(PhpXmlRpc::$xmlrpcstr['http_error'] . ' (' . $errstr . ')', PhpXmlRpc::$xmlrpcerr['http_error']); |
|
124 | + $errstr = substr($data, 0, strpos($data, "\n")-1); |
|
125 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': HTTP error, got response: '.$errstr); |
|
126 | + throw new \Exception(PhpXmlRpc::$xmlrpcstr['http_error'].' ('.$errstr.')', PhpXmlRpc::$xmlrpcerr['http_error']); |
|
127 | 127 | } |
128 | 128 | |
129 | 129 | // be tolerant to usage of \n instead of \r\n to separate headers and data |
130 | 130 | // (even though it is not valid http) |
131 | 131 | $pos = strpos($data, "\r\n\r\n"); |
132 | 132 | if ($pos || is_int($pos)) { |
133 | - $bd = $pos + 4; |
|
133 | + $bd = $pos+4; |
|
134 | 134 | } else { |
135 | 135 | $pos = strpos($data, "\n\n"); |
136 | 136 | if ($pos || is_int($pos)) { |
137 | - $bd = $pos + 2; |
|
137 | + $bd = $pos+2; |
|
138 | 138 | } else { |
139 | 139 | // No separation between response headers and body: fault? |
140 | 140 | // we could take some action here instead of going on... |
@@ -145,10 +145,10 @@ discard block |
||
145 | 145 | // be tolerant to line endings, and extra empty lines |
146 | 146 | $ar = preg_split("/\r?\n/", trim(substr($data, 0, $pos))); |
147 | 147 | |
148 | - foreach($ar as $line) { |
|
148 | + foreach ($ar as $line) { |
|
149 | 149 | // take care of multi-line headers and cookies |
150 | 150 | $arr = explode(':', $line, 2); |
151 | - if (count($arr) > 1) { |
|
151 | + if (count($arr)>1) { |
|
152 | 152 | $headerName = strtolower(trim($arr[0])); |
153 | 153 | /// @todo some other headers (the ones that allow a CSV list of values) |
154 | 154 | /// do allow many values to be passed using multiple header lines. |
@@ -166,7 +166,7 @@ discard block |
||
166 | 166 | // glue together all received cookies, using a comma to separate them |
167 | 167 | // (same as php does with getallheaders()) |
168 | 168 | if (isset($httpResponse['headers'][$headerName])) { |
169 | - $httpResponse['headers'][$headerName] .= ', ' . trim($cookie); |
|
169 | + $httpResponse['headers'][$headerName] .= ', '.trim($cookie); |
|
170 | 170 | } else { |
171 | 171 | $httpResponse['headers'][$headerName] = trim($cookie); |
172 | 172 | } |
@@ -195,7 +195,7 @@ discard block |
||
195 | 195 | } |
196 | 196 | } elseif (isset($headerName)) { |
197 | 197 | /// @todo version1 cookies might span multiple lines, thus breaking the parsing above |
198 | - $httpResponse['headers'][$headerName] .= ' ' . trim($line); |
|
198 | + $httpResponse['headers'][$headerName] .= ' '.trim($line); |
|
199 | 199 | } |
200 | 200 | } |
201 | 201 | |
@@ -219,7 +219,7 @@ discard block |
||
219 | 219 | // Decode chunked encoding sent by http 1.1 servers |
220 | 220 | if (isset($httpResponse['headers']['transfer-encoding']) && $httpResponse['headers']['transfer-encoding'] == 'chunked') { |
221 | 221 | if (!$data = static::decodeChunked($data)) { |
222 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': errors occurred when trying to rebuild the chunked data received from server'); |
|
222 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': errors occurred when trying to rebuild the chunked data received from server'); |
|
223 | 223 | throw new \Exception(PhpXmlRpc::$xmlrpcstr['dechunk_fail'], PhpXmlRpc::$xmlrpcerr['dechunk_fail']); |
224 | 224 | } |
225 | 225 | } |
@@ -234,19 +234,19 @@ discard block |
||
234 | 234 | if ($httpResponse['headers']['content-encoding'] == 'deflate' && $degzdata = @gzuncompress($data)) { |
235 | 235 | $data = $degzdata; |
236 | 236 | if ($debug) { |
237 | - Logger::instance()->debugMessage("---INFLATED RESPONSE---[" . strlen($data) . " chars]---\n$data\n---END---"); |
|
237 | + Logger::instance()->debugMessage("---INFLATED RESPONSE---[".strlen($data)." chars]---\n$data\n---END---"); |
|
238 | 238 | } |
239 | 239 | } elseif ($httpResponse['headers']['content-encoding'] == 'gzip' && $degzdata = @gzinflate(substr($data, 10))) { |
240 | 240 | $data = $degzdata; |
241 | 241 | if ($debug) { |
242 | - Logger::instance()->debugMessage("---INFLATED RESPONSE---[" . strlen($data) . " chars]---\n$data\n---END---"); |
|
242 | + Logger::instance()->debugMessage("---INFLATED RESPONSE---[".strlen($data)." chars]---\n$data\n---END---"); |
|
243 | 243 | } |
244 | 244 | } else { |
245 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': errors occurred when trying to decode the deflated data received from server'); |
|
245 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': errors occurred when trying to decode the deflated data received from server'); |
|
246 | 246 | throw new \Exception(PhpXmlRpc::$xmlrpcstr['decompress_fail'], PhpXmlRpc::$xmlrpcerr['decompress_fail']); |
247 | 247 | } |
248 | 248 | } else { |
249 | - Logger::instance()->errorLog('XML-RPC: ' . __METHOD__ . ': the server sent deflated data. Your php install must have the Zlib extension compiled in to support this.'); |
|
249 | + Logger::instance()->errorLog('XML-RPC: '.__METHOD__.': the server sent deflated data. Your php install must have the Zlib extension compiled in to support this.'); |
|
250 | 250 | throw new \Exception(PhpXmlRpc::$xmlrpcstr['cannot_decompress'], PhpXmlRpc::$xmlrpcerr['cannot_decompress']); |
251 | 251 | } |
252 | 252 | } |
@@ -91,13 +91,13 @@ discard block |
||
91 | 91 | <body> |
92 | 92 | <?php |
93 | 93 | |
94 | -include __DIR__ . '/common.php'; |
|
94 | +include __DIR__.'/common.php'; |
|
95 | 95 | |
96 | 96 | if ($action) { |
97 | 97 | |
98 | 98 | // make sure the script waits long enough for the call to complete... |
99 | 99 | if ($timeout) { |
100 | - set_time_limit($timeout + 10); |
|
100 | + set_time_limit($timeout+10); |
|
101 | 101 | } |
102 | 102 | |
103 | 103 | if ($wstype == 1) { |
@@ -122,13 +122,13 @@ discard block |
||
122 | 122 | $server = "$host$path"; |
123 | 123 | } |
124 | 124 | if ($protocol == 2) { |
125 | - $server = 'https://' . $server; |
|
125 | + $server = 'https://'.$server; |
|
126 | 126 | } else { |
127 | - $server = 'http://' . $server; |
|
127 | + $server = 'http://'.$server; |
|
128 | 128 | } |
129 | 129 | if ($proxy != '') { |
130 | 130 | $pproxy = explode(':', $proxy); |
131 | - if (count($pproxy) > 1) { |
|
131 | + if (count($pproxy)>1) { |
|
132 | 132 | $pport = $pproxy[1]; |
133 | 133 | } else { |
134 | 134 | $pport = 8080; |
@@ -197,9 +197,9 @@ discard block |
||
197 | 197 | case 'wrap': |
198 | 198 | $msg[0] = new $requestClass('system.methodHelp', array(), $id); |
199 | 199 | $msg[0]->addparam(new PhpXmlRpc\Value($method)); |
200 | - $msg[1] = new $requestClass('system.methodSignature', array(), (int)$id + 1); |
|
200 | + $msg[1] = new $requestClass('system.methodSignature', array(), (int) $id+1); |
|
201 | 201 | $msg[1]->addparam(new PhpXmlRpc\Value($method)); |
202 | - $actionname = 'Description of method "' . $method . '"'; |
|
202 | + $actionname = 'Description of method "'.$method.'"'; |
|
203 | 203 | break; |
204 | 204 | case 'list': |
205 | 205 | $msg[0] = new $requestClass('system.listMethods', array(), $id); |
@@ -212,9 +212,9 @@ discard block |
||
212 | 212 | $msg[0] = new $requestClass($method, array(), $id); |
213 | 213 | // hack! build xml payload by hand |
214 | 214 | if ($wstype == 1) { |
215 | - $msg[0]->payload = "{\n" . |
|
216 | - '"method": "' . $method . "\",\n\"params\": [" . |
|
217 | - $payload . |
|
215 | + $msg[0]->payload = "{\n". |
|
216 | + '"method": "'.$method."\",\n\"params\": [". |
|
217 | + $payload. |
|
218 | 218 | "\n],\n\"id\": "; |
219 | 219 | // fix: if user gave an empty string, use NULL, or we'll break json syntax |
220 | 220 | if ($id == "") { |
@@ -227,20 +227,20 @@ discard block |
||
227 | 227 | } |
228 | 228 | } |
229 | 229 | } else { |
230 | - $msg[0]->payload = $msg[0]->xml_header($inputcharset) . |
|
231 | - '<methodName>' . $method . "</methodName>\n<params>" . |
|
232 | - $payload . |
|
233 | - "</params>\n" . $msg[0]->xml_footer(); |
|
230 | + $msg[0]->payload = $msg[0]->xml_header($inputcharset). |
|
231 | + '<methodName>'.$method."</methodName>\n<params>". |
|
232 | + $payload. |
|
233 | + "</params>\n".$msg[0]->xml_footer(); |
|
234 | 234 | } |
235 | - $actionname = 'Execution of method ' . $method; |
|
235 | + $actionname = 'Execution of method '.$method; |
|
236 | 236 | break; |
237 | 237 | default: // give a warning |
238 | - $actionname = '[ERROR: unknown action] "' . $action . '"'; |
|
238 | + $actionname = '[ERROR: unknown action] "'.$action.'"'; |
|
239 | 239 | } |
240 | 240 | |
241 | 241 | // Before calling execute, echo out brief description of action taken + date and time ??? |
242 | 242 | // this gives good user feedback for long-running methods... |
243 | - echo '<h2>' . htmlspecialchars($actionname, ENT_COMPAT, $inputcharset) . ' on server ' . htmlspecialchars($server, ENT_COMPAT, $inputcharset) . " ...</h2>\n"; |
|
243 | + echo '<h2>'.htmlspecialchars($actionname, ENT_COMPAT, $inputcharset).' on server '.htmlspecialchars($server, ENT_COMPAT, $inputcharset)." ...</h2>\n"; |
|
244 | 244 | flush(); |
245 | 245 | |
246 | 246 | $response = null; |
@@ -258,7 +258,7 @@ discard block |
||
258 | 258 | break; |
259 | 259 | } |
260 | 260 | } |
261 | - $time = microtime(true) - $time; |
|
261 | + $time = microtime(true)-$time; |
|
262 | 262 | if ($debug) { |
263 | 263 | echo "</div>\n"; |
264 | 264 | } |
@@ -268,8 +268,8 @@ discard block |
||
268 | 268 | // call failed! echo out error msg! |
269 | 269 | //echo '<h2>'.htmlspecialchars($actionname, ENT_COMPAT, $inputcharset).' on server '.htmlspecialchars($server, ENT_COMPAT, $inputcharset).'</h2>'; |
270 | 270 | echo "<h3>$protoName call FAILED!</h3>\n"; |
271 | - echo "<p>Fault code: [" . htmlspecialchars($response->faultCode(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding) . |
|
272 | - "] Reason: '" . htmlspecialchars($response->faultString(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding) . "'</p>\n"; |
|
271 | + echo "<p>Fault code: [".htmlspecialchars($response->faultCode(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding). |
|
272 | + "] Reason: '".htmlspecialchars($response->faultString(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding)."'</p>\n"; |
|
273 | 273 | echo(strftime("%d/%b/%Y:%H:%M:%S\n")); |
274 | 274 | } else { |
275 | 275 | // call succeeded: parse results |
@@ -285,36 +285,36 @@ discard block |
||
285 | 285 | $max = $v->count(); |
286 | 286 | echo "<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n"; |
287 | 287 | echo "<thead>\n<tr><th>Method ($max)</th><th>Description</th></tr>\n</thead>\n<tbody>\n"; |
288 | - foreach($v as $i => $rec) { |
|
288 | + foreach ($v as $i => $rec) { |
|
289 | 289 | if ($i % 2) { |
290 | 290 | $class = ' class="oddrow"'; |
291 | 291 | } else { |
292 | 292 | $class = ' class="evenrow"'; |
293 | 293 | } |
294 | - echo("<tr><td$class>" . htmlspecialchars($rec->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding) . "</td><td$class><form action=\"controller.php\" method=\"get\" target=\"frmcontroller\">" . |
|
295 | - "<input type=\"hidden\" name=\"host\" value=\"" . htmlspecialchars($host, ENT_COMPAT, $inputcharset) . "\" />" . |
|
296 | - "<input type=\"hidden\" name=\"port\" value=\"" . htmlspecialchars($port, ENT_COMPAT, $inputcharset) . "\" />" . |
|
297 | - "<input type=\"hidden\" name=\"path\" value=\"" . htmlspecialchars($path, ENT_COMPAT, $inputcharset) . "\" />" . |
|
298 | - "<input type=\"hidden\" name=\"id\" value=\"" . htmlspecialchars($id, ENT_COMPAT, $inputcharset) . "\" />" . |
|
299 | - "<input type=\"hidden\" name=\"debug\" value=\"$debug\" />" . |
|
300 | - "<input type=\"hidden\" name=\"username\" value=\"" . htmlspecialchars($username, ENT_COMPAT, $inputcharset) . "\" />" . |
|
301 | - "<input type=\"hidden\" name=\"password\" value=\"" . htmlspecialchars($password, ENT_COMPAT, $inputcharset) . "\" />" . |
|
302 | - "<input type=\"hidden\" name=\"authtype\" value=\"$authtype\" />" . |
|
303 | - "<input type=\"hidden\" name=\"verifyhost\" value=\"$verifyhost\" />" . |
|
304 | - "<input type=\"hidden\" name=\"verifypeer\" value=\"$verifypeer\" />" . |
|
305 | - "<input type=\"hidden\" name=\"cainfo\" value=\"" . htmlspecialchars($cainfo, ENT_COMPAT, $inputcharset) . "\" />" . |
|
306 | - "<input type=\"hidden\" name=\"proxy\" value=\"" . htmlspecialchars($proxy, ENT_COMPAT, $inputcharset) . "\" />" . |
|
307 | - "<input type=\"hidden\" name=\"proxyuser\" value=\"" . htmlspecialchars($proxyuser, ENT_COMPAT, $inputcharset) . "\" />" . |
|
308 | - "<input type=\"hidden\" name=\"proxypwd\" value=\"" . htmlspecialchars($proxypwd, ENT_COMPAT, $inputcharset) . "\" />" . |
|
309 | - "<input type=\"hidden\" name=\"responsecompression\" value=\"$responsecompression\" />" . |
|
310 | - "<input type=\"hidden\" name=\"requestcompression\" value=\"$requestcompression\" />" . |
|
311 | - "<input type=\"hidden\" name=\"clientcookies\" value=\"" . htmlspecialchars($clientcookies, ENT_COMPAT, $inputcharset) . "\" />" . |
|
312 | - "<input type=\"hidden\" name=\"protocol\" value=\"$protocol\" />" . |
|
313 | - "<input type=\"hidden\" name=\"timeout\" value=\"" . htmlspecialchars($timeout, ENT_COMPAT, $inputcharset) . "\" />" . |
|
314 | - "<input type=\"hidden\" name=\"method\" value=\"" . htmlspecialchars($rec->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding) . "\" />" . |
|
315 | - "<input type=\"hidden\" name=\"wstype\" value=\"$wstype\" />" . |
|
316 | - "<input type=\"hidden\" name=\"action\" value=\"describe\" />" . |
|
317 | - "<input type=\"hidden\" name=\"run\" value=\"now\" />" . |
|
294 | + echo("<tr><td$class>".htmlspecialchars($rec->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding)."</td><td$class><form action=\"controller.php\" method=\"get\" target=\"frmcontroller\">". |
|
295 | + "<input type=\"hidden\" name=\"host\" value=\"".htmlspecialchars($host, ENT_COMPAT, $inputcharset)."\" />". |
|
296 | + "<input type=\"hidden\" name=\"port\" value=\"".htmlspecialchars($port, ENT_COMPAT, $inputcharset)."\" />". |
|
297 | + "<input type=\"hidden\" name=\"path\" value=\"".htmlspecialchars($path, ENT_COMPAT, $inputcharset)."\" />". |
|
298 | + "<input type=\"hidden\" name=\"id\" value=\"".htmlspecialchars($id, ENT_COMPAT, $inputcharset)."\" />". |
|
299 | + "<input type=\"hidden\" name=\"debug\" value=\"$debug\" />". |
|
300 | + "<input type=\"hidden\" name=\"username\" value=\"".htmlspecialchars($username, ENT_COMPAT, $inputcharset)."\" />". |
|
301 | + "<input type=\"hidden\" name=\"password\" value=\"".htmlspecialchars($password, ENT_COMPAT, $inputcharset)."\" />". |
|
302 | + "<input type=\"hidden\" name=\"authtype\" value=\"$authtype\" />". |
|
303 | + "<input type=\"hidden\" name=\"verifyhost\" value=\"$verifyhost\" />". |
|
304 | + "<input type=\"hidden\" name=\"verifypeer\" value=\"$verifypeer\" />". |
|
305 | + "<input type=\"hidden\" name=\"cainfo\" value=\"".htmlspecialchars($cainfo, ENT_COMPAT, $inputcharset)."\" />". |
|
306 | + "<input type=\"hidden\" name=\"proxy\" value=\"".htmlspecialchars($proxy, ENT_COMPAT, $inputcharset)."\" />". |
|
307 | + "<input type=\"hidden\" name=\"proxyuser\" value=\"".htmlspecialchars($proxyuser, ENT_COMPAT, $inputcharset)."\" />". |
|
308 | + "<input type=\"hidden\" name=\"proxypwd\" value=\"".htmlspecialchars($proxypwd, ENT_COMPAT, $inputcharset)."\" />". |
|
309 | + "<input type=\"hidden\" name=\"responsecompression\" value=\"$responsecompression\" />". |
|
310 | + "<input type=\"hidden\" name=\"requestcompression\" value=\"$requestcompression\" />". |
|
311 | + "<input type=\"hidden\" name=\"clientcookies\" value=\"".htmlspecialchars($clientcookies, ENT_COMPAT, $inputcharset)."\" />". |
|
312 | + "<input type=\"hidden\" name=\"protocol\" value=\"$protocol\" />". |
|
313 | + "<input type=\"hidden\" name=\"timeout\" value=\"".htmlspecialchars($timeout, ENT_COMPAT, $inputcharset)."\" />". |
|
314 | + "<input type=\"hidden\" name=\"method\" value=\"".htmlspecialchars($rec->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding)."\" />". |
|
315 | + "<input type=\"hidden\" name=\"wstype\" value=\"$wstype\" />". |
|
316 | + "<input type=\"hidden\" name=\"action\" value=\"describe\" />". |
|
317 | + "<input type=\"hidden\" name=\"run\" value=\"now\" />". |
|
318 | 318 | "<input type=\"submit\" value=\"Describe\" /></form></td>"); |
319 | 319 | //echo("</tr>\n"); |
320 | 320 | |
@@ -341,7 +341,7 @@ discard block |
||
341 | 341 | $r2 = $resp[1]->value(); |
342 | 342 | |
343 | 343 | echo "<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n"; |
344 | - echo "<thead>\n<tr><th>Method</th><th>" . htmlspecialchars($method, ENT_COMPAT, $inputcharset) . "</th><th> </th><th> </th></tr>\n</thead>\n<tbody>\n"; |
|
344 | + echo "<thead>\n<tr><th>Method</th><th>".htmlspecialchars($method, ENT_COMPAT, $inputcharset)."</th><th> </th><th> </th></tr>\n</thead>\n<tbody>\n"; |
|
345 | 345 | $desc = htmlspecialchars($r1->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding); |
346 | 346 | if ($desc == "") { |
347 | 347 | $desc = "-"; |
@@ -351,41 +351,41 @@ discard block |
||
351 | 351 | if ($r2->kindOf() != "array") { |
352 | 352 | echo "<tr><td class=\"oddrow\">Signature</td><td class=\"oddrow\">Unknown</td><td class=\"oddrow\"> </td></tr>\n"; |
353 | 353 | } else { |
354 | - foreach($r2 as $i => $x) { |
|
354 | + foreach ($r2 as $i => $x) { |
|
355 | 355 | $payload = ""; |
356 | 356 | $alt_payload = ""; |
357 | - if ($i + 1 % 2) { |
|
357 | + if ($i+1 % 2) { |
|
358 | 358 | $class = ' class="oddrow"'; |
359 | 359 | } else { |
360 | 360 | $class = ' class="evenrow"'; |
361 | 361 | } |
362 | - echo "<tr><td$class>Signature " . ($i + 1) . "</td><td$class>"; |
|
362 | + echo "<tr><td$class>Signature ".($i+1)."</td><td$class>"; |
|
363 | 363 | if ($x->kindOf() == "array") { |
364 | 364 | $ret = $x[0]; |
365 | - echo "<code>OUT: " . htmlspecialchars($ret->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding) . "<br />IN: ("; |
|
366 | - if ($x->count() > 1) { |
|
367 | - foreach($x as $k => $y) { |
|
365 | + echo "<code>OUT: ".htmlspecialchars($ret->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding)."<br />IN: ("; |
|
366 | + if ($x->count()>1) { |
|
367 | + foreach ($x as $k => $y) { |
|
368 | 368 | if ($k == 0) continue; |
369 | 369 | echo htmlspecialchars($y->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding); |
370 | 370 | if ($wstype != 1) { |
371 | 371 | $type = $y->scalarval(); |
372 | 372 | $payload .= '<param><value>'; |
373 | - switch($type) { |
|
373 | + switch ($type) { |
|
374 | 374 | case 'undefined': |
375 | 375 | break; |
376 | 376 | case 'null'; |
377 | 377 | $type = 'nil'; |
378 | 378 | // fall thru intentionally |
379 | 379 | default: |
380 | - $payload .= '<' . |
|
381 | - htmlspecialchars($type, ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding) . |
|
382 | - '></' . htmlspecialchars($type, ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding) . |
|
380 | + $payload .= '<'. |
|
381 | + htmlspecialchars($type, ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding). |
|
382 | + '></'.htmlspecialchars($type, ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding). |
|
383 | 383 | '>'; |
384 | 384 | } |
385 | 385 | $payload .= "</value></param>\n"; |
386 | 386 | } |
387 | 387 | $alt_payload .= $y->scalarval(); |
388 | - if ($k < $x->count() - 1) { |
|
388 | + if ($k<$x->count()-1) { |
|
389 | 389 | $alt_payload .= ';'; |
390 | 390 | echo ", "; |
391 | 391 | } |
@@ -398,63 +398,63 @@ discard block |
||
398 | 398 | echo '</td>'; |
399 | 399 | // button to test this method |
400 | 400 | //$payload="<methodCall>\n<methodName>$method</methodName>\n<params>\n$payload</params>\n</methodCall>"; |
401 | - echo "<td$class><form action=\"controller.php\" target=\"frmcontroller\" method=\"get\">" . |
|
402 | - "<input type=\"hidden\" name=\"host\" value=\"" . htmlspecialchars($host, ENT_COMPAT, $inputcharset) . "\" />" . |
|
403 | - "<input type=\"hidden\" name=\"port\" value=\"" . htmlspecialchars($port, ENT_COMPAT, $inputcharset) . "\" />" . |
|
404 | - "<input type=\"hidden\" name=\"path\" value=\"" . htmlspecialchars($path, ENT_COMPAT, $inputcharset) . "\" />" . |
|
405 | - "<input type=\"hidden\" name=\"id\" value=\"" . htmlspecialchars($id, ENT_COMPAT, $inputcharset) . "\" />" . |
|
406 | - "<input type=\"hidden\" name=\"debug\" value=\"$debug\" />" . |
|
407 | - "<input type=\"hidden\" name=\"username\" value=\"" . htmlspecialchars($username, ENT_COMPAT, $inputcharset) . "\" />" . |
|
408 | - "<input type=\"hidden\" name=\"password\" value=\"" . htmlspecialchars($password, ENT_COMPAT, $inputcharset) . "\" />" . |
|
409 | - "<input type=\"hidden\" name=\"authtype\" value=\"$authtype\" />" . |
|
410 | - "<input type=\"hidden\" name=\"verifyhost\" value=\"$verifyhost\" />" . |
|
411 | - "<input type=\"hidden\" name=\"verifypeer\" value=\"$verifypeer\" />" . |
|
412 | - "<input type=\"hidden\" name=\"cainfo\" value=\"" . htmlspecialchars($cainfo, ENT_COMPAT, $inputcharset) . "\" />" . |
|
413 | - "<input type=\"hidden\" name=\"proxy\" value=\"" . htmlspecialchars($proxy, ENT_COMPAT, $inputcharset) . "\" />" . |
|
414 | - "<input type=\"hidden\" name=\"proxyuser\" value=\"" . htmlspecialchars($proxyuser, ENT_COMPAT, $inputcharset) . "\" />" . |
|
415 | - "<input type=\"hidden\" name=\"proxypwd\" value=\"" . htmlspecialchars($proxypwd, ENT_COMPAT, $inputcharset) . "\" />" . |
|
416 | - "<input type=\"hidden\" name=\"responsecompression\" value=\"$responsecompression\" />" . |
|
417 | - "<input type=\"hidden\" name=\"requestcompression\" value=\"$requestcompression\" />" . |
|
418 | - "<input type=\"hidden\" name=\"clientcookies\" value=\"" . htmlspecialchars($clientcookies, ENT_COMPAT, $inputcharset) . "\" />" . |
|
419 | - "<input type=\"hidden\" name=\"protocol\" value=\"$protocol\" />" . |
|
420 | - "<input type=\"hidden\" name=\"timeout\" value=\"" . htmlspecialchars($timeout, ENT_COMPAT, $inputcharset) . "\" />" . |
|
421 | - "<input type=\"hidden\" name=\"method\" value=\"" . htmlspecialchars($method, ENT_COMPAT, $inputcharset) . "\" />" . |
|
422 | - "<input type=\"hidden\" name=\"methodpayload\" value=\"" . htmlspecialchars($payload, ENT_COMPAT, $inputcharset) . "\" />" . |
|
423 | - "<input type=\"hidden\" name=\"altmethodpayload\" value=\"" . htmlspecialchars($alt_payload, ENT_COMPAT, $inputcharset) . "\" />" . |
|
424 | - "<input type=\"hidden\" name=\"wstype\" value=\"$wstype\" />" . |
|
401 | + echo "<td$class><form action=\"controller.php\" target=\"frmcontroller\" method=\"get\">". |
|
402 | + "<input type=\"hidden\" name=\"host\" value=\"".htmlspecialchars($host, ENT_COMPAT, $inputcharset)."\" />". |
|
403 | + "<input type=\"hidden\" name=\"port\" value=\"".htmlspecialchars($port, ENT_COMPAT, $inputcharset)."\" />". |
|
404 | + "<input type=\"hidden\" name=\"path\" value=\"".htmlspecialchars($path, ENT_COMPAT, $inputcharset)."\" />". |
|
405 | + "<input type=\"hidden\" name=\"id\" value=\"".htmlspecialchars($id, ENT_COMPAT, $inputcharset)."\" />". |
|
406 | + "<input type=\"hidden\" name=\"debug\" value=\"$debug\" />". |
|
407 | + "<input type=\"hidden\" name=\"username\" value=\"".htmlspecialchars($username, ENT_COMPAT, $inputcharset)."\" />". |
|
408 | + "<input type=\"hidden\" name=\"password\" value=\"".htmlspecialchars($password, ENT_COMPAT, $inputcharset)."\" />". |
|
409 | + "<input type=\"hidden\" name=\"authtype\" value=\"$authtype\" />". |
|
410 | + "<input type=\"hidden\" name=\"verifyhost\" value=\"$verifyhost\" />". |
|
411 | + "<input type=\"hidden\" name=\"verifypeer\" value=\"$verifypeer\" />". |
|
412 | + "<input type=\"hidden\" name=\"cainfo\" value=\"".htmlspecialchars($cainfo, ENT_COMPAT, $inputcharset)."\" />". |
|
413 | + "<input type=\"hidden\" name=\"proxy\" value=\"".htmlspecialchars($proxy, ENT_COMPAT, $inputcharset)."\" />". |
|
414 | + "<input type=\"hidden\" name=\"proxyuser\" value=\"".htmlspecialchars($proxyuser, ENT_COMPAT, $inputcharset)."\" />". |
|
415 | + "<input type=\"hidden\" name=\"proxypwd\" value=\"".htmlspecialchars($proxypwd, ENT_COMPAT, $inputcharset)."\" />". |
|
416 | + "<input type=\"hidden\" name=\"responsecompression\" value=\"$responsecompression\" />". |
|
417 | + "<input type=\"hidden\" name=\"requestcompression\" value=\"$requestcompression\" />". |
|
418 | + "<input type=\"hidden\" name=\"clientcookies\" value=\"".htmlspecialchars($clientcookies, ENT_COMPAT, $inputcharset)."\" />". |
|
419 | + "<input type=\"hidden\" name=\"protocol\" value=\"$protocol\" />". |
|
420 | + "<input type=\"hidden\" name=\"timeout\" value=\"".htmlspecialchars($timeout, ENT_COMPAT, $inputcharset)."\" />". |
|
421 | + "<input type=\"hidden\" name=\"method\" value=\"".htmlspecialchars($method, ENT_COMPAT, $inputcharset)."\" />". |
|
422 | + "<input type=\"hidden\" name=\"methodpayload\" value=\"".htmlspecialchars($payload, ENT_COMPAT, $inputcharset)."\" />". |
|
423 | + "<input type=\"hidden\" name=\"altmethodpayload\" value=\"".htmlspecialchars($alt_payload, ENT_COMPAT, $inputcharset)."\" />". |
|
424 | + "<input type=\"hidden\" name=\"wstype\" value=\"$wstype\" />". |
|
425 | 425 | "<input type=\"hidden\" name=\"action\" value=\"execute\" />"; |
426 | 426 | if ($wstype != 1) { |
427 | 427 | echo "<input type=\"submit\" value=\"Load method synopsis\" />"; |
428 | 428 | } |
429 | 429 | echo "</form></td>\n"; |
430 | 430 | |
431 | - echo "<td$class><form action=\"controller.php\" target=\"frmcontroller\" method=\"get\">" . |
|
432 | - "<input type=\"hidden\" name=\"host\" value=\"" . htmlspecialchars($host, ENT_COMPAT, $inputcharset) . "\" />" . |
|
433 | - "<input type=\"hidden\" name=\"port\" value=\"" . htmlspecialchars($port, ENT_COMPAT, $inputcharset) . "\" />" . |
|
434 | - "<input type=\"hidden\" name=\"path\" value=\"" . htmlspecialchars($path, ENT_COMPAT, $inputcharset) . "\" />" . |
|
435 | - "<input type=\"hidden\" name=\"id\" value=\"" . htmlspecialchars($id, ENT_COMPAT, $inputcharset) . "\" />" . |
|
436 | - "<input type=\"hidden\" name=\"debug\" value=\"$debug\" />" . |
|
437 | - "<input type=\"hidden\" name=\"username\" value=\"" . htmlspecialchars($username, ENT_COMPAT, $inputcharset) . "\" />" . |
|
438 | - "<input type=\"hidden\" name=\"password\" value=\"" . htmlspecialchars($password, ENT_COMPAT, $inputcharset) . "\" />" . |
|
439 | - "<input type=\"hidden\" name=\"authtype\" value=\"$authtype\" />" . |
|
440 | - "<input type=\"hidden\" name=\"verifyhost\" value=\"$verifyhost\" />" . |
|
441 | - "<input type=\"hidden\" name=\"verifypeer\" value=\"$verifypeer\" />" . |
|
442 | - "<input type=\"hidden\" name=\"cainfo\" value=\"" . htmlspecialchars($cainfo, ENT_COMPAT, $inputcharset) . "\" />" . |
|
443 | - "<input type=\"hidden\" name=\"proxy\" value=\"" . htmlspecialchars($proxy, ENT_COMPAT, $inputcharset) . "\" />" . |
|
444 | - "<input type=\"hidden\" name=\"proxyuser\" value=\"" . htmlspecialchars($proxyuser, ENT_COMPAT, $inputcharset) . "\" />" . |
|
445 | - "<input type=\"hidden\" name=\"proxypwd\" value=\"" . htmlspecialchars($proxypwd, ENT_COMPAT, $inputcharset) . "\" />" . |
|
446 | - "<input type=\"hidden\" name=\"responsecompression\" value=\"$responsecompression\" />" . |
|
447 | - "<input type=\"hidden\" name=\"requestcompression\" value=\"$requestcompression\" />" . |
|
448 | - "<input type=\"hidden\" name=\"clientcookies\" value=\"" . htmlspecialchars($clientcookies, ENT_COMPAT, $inputcharset) . "\" />" . |
|
449 | - "<input type=\"hidden\" name=\"protocol\" value=\"$protocol\" />" . |
|
450 | - "<input type=\"hidden\" name=\"timeout\" value=\"" . htmlspecialchars($timeout, ENT_COMPAT, $inputcharset) . "\" />" . |
|
451 | - "<input type=\"hidden\" name=\"method\" value=\"" . htmlspecialchars($method, ENT_COMPAT, $inputcharset) . "\" />" . |
|
452 | - "<input type=\"hidden\" name=\"methodsig\" value=\"" . $i . "\" />" . |
|
453 | - "<input type=\"hidden\" name=\"methodpayload\" value=\"" . htmlspecialchars($payload, ENT_COMPAT, $inputcharset) . "\" />" . |
|
454 | - "<input type=\"hidden\" name=\"altmethodpayload\" value=\"" . htmlspecialchars($alt_payload, ENT_COMPAT, $inputcharset) . "\" />" . |
|
455 | - "<input type=\"hidden\" name=\"wstype\" value=\"$wstype\" />" . |
|
456 | - "<input type=\"hidden\" name=\"run\" value=\"now\" />" . |
|
457 | - "<input type=\"hidden\" name=\"action\" value=\"wrap\" />" . |
|
431 | + echo "<td$class><form action=\"controller.php\" target=\"frmcontroller\" method=\"get\">". |
|
432 | + "<input type=\"hidden\" name=\"host\" value=\"".htmlspecialchars($host, ENT_COMPAT, $inputcharset)."\" />". |
|
433 | + "<input type=\"hidden\" name=\"port\" value=\"".htmlspecialchars($port, ENT_COMPAT, $inputcharset)."\" />". |
|
434 | + "<input type=\"hidden\" name=\"path\" value=\"".htmlspecialchars($path, ENT_COMPAT, $inputcharset)."\" />". |
|
435 | + "<input type=\"hidden\" name=\"id\" value=\"".htmlspecialchars($id, ENT_COMPAT, $inputcharset)."\" />". |
|
436 | + "<input type=\"hidden\" name=\"debug\" value=\"$debug\" />". |
|
437 | + "<input type=\"hidden\" name=\"username\" value=\"".htmlspecialchars($username, ENT_COMPAT, $inputcharset)."\" />". |
|
438 | + "<input type=\"hidden\" name=\"password\" value=\"".htmlspecialchars($password, ENT_COMPAT, $inputcharset)."\" />". |
|
439 | + "<input type=\"hidden\" name=\"authtype\" value=\"$authtype\" />". |
|
440 | + "<input type=\"hidden\" name=\"verifyhost\" value=\"$verifyhost\" />". |
|
441 | + "<input type=\"hidden\" name=\"verifypeer\" value=\"$verifypeer\" />". |
|
442 | + "<input type=\"hidden\" name=\"cainfo\" value=\"".htmlspecialchars($cainfo, ENT_COMPAT, $inputcharset)."\" />". |
|
443 | + "<input type=\"hidden\" name=\"proxy\" value=\"".htmlspecialchars($proxy, ENT_COMPAT, $inputcharset)."\" />". |
|
444 | + "<input type=\"hidden\" name=\"proxyuser\" value=\"".htmlspecialchars($proxyuser, ENT_COMPAT, $inputcharset)."\" />". |
|
445 | + "<input type=\"hidden\" name=\"proxypwd\" value=\"".htmlspecialchars($proxypwd, ENT_COMPAT, $inputcharset)."\" />". |
|
446 | + "<input type=\"hidden\" name=\"responsecompression\" value=\"$responsecompression\" />". |
|
447 | + "<input type=\"hidden\" name=\"requestcompression\" value=\"$requestcompression\" />". |
|
448 | + "<input type=\"hidden\" name=\"clientcookies\" value=\"".htmlspecialchars($clientcookies, ENT_COMPAT, $inputcharset)."\" />". |
|
449 | + "<input type=\"hidden\" name=\"protocol\" value=\"$protocol\" />". |
|
450 | + "<input type=\"hidden\" name=\"timeout\" value=\"".htmlspecialchars($timeout, ENT_COMPAT, $inputcharset)."\" />". |
|
451 | + "<input type=\"hidden\" name=\"method\" value=\"".htmlspecialchars($method, ENT_COMPAT, $inputcharset)."\" />". |
|
452 | + "<input type=\"hidden\" name=\"methodsig\" value=\"".$i."\" />". |
|
453 | + "<input type=\"hidden\" name=\"methodpayload\" value=\"".htmlspecialchars($payload, ENT_COMPAT, $inputcharset)."\" />". |
|
454 | + "<input type=\"hidden\" name=\"altmethodpayload\" value=\"".htmlspecialchars($alt_payload, ENT_COMPAT, $inputcharset)."\" />". |
|
455 | + "<input type=\"hidden\" name=\"wstype\" value=\"$wstype\" />". |
|
456 | + "<input type=\"hidden\" name=\"run\" value=\"now\" />". |
|
457 | + "<input type=\"hidden\" name=\"action\" value=\"wrap\" />". |
|
458 | 458 | "<input type=\"submit\" value=\"Generate method call stub code\" />"; |
459 | 459 | echo "</form></td></tr>\n"; |
460 | 460 | } |
@@ -466,14 +466,14 @@ discard block |
||
466 | 466 | case 'wrap': |
467 | 467 | $r1 = $resp[0]->value(); |
468 | 468 | $r2 = $resp[1]->value(); |
469 | - if ($r2->kindOf() != "array" || $r2->count() <= $methodsig) { |
|
469 | + if ($r2->kindOf() != "array" || $r2->count()<=$methodsig) { |
|
470 | 470 | echo "Error: signature unknown\n"; |
471 | 471 | } else { |
472 | 472 | $mdesc = $r1->scalarval(); |
473 | 473 | $encoder = new PhpXmlRpc\Encoder(); |
474 | 474 | $msig = $encoder->decode($r2); |
475 | 475 | $msig = $msig[$methodsig]; |
476 | - $proto = $protocol == 2 ? 'https' : ( $protocol == 1 ? 'http11' : '' ); |
|
476 | + $proto = $protocol == 2 ? 'https' : ($protocol == 1 ? 'http11' : ''); |
|
477 | 477 | if ($proxy == '' && $username == '' && !$requestcompression && !$responsecompression && |
478 | 478 | $clientcookies == '' |
479 | 479 | ) { |
@@ -487,11 +487,11 @@ discard block |
||
487 | 487 | $prefix = 'xmlrpc'; |
488 | 488 | } |
489 | 489 | $wrapper = new PhpXmlRpc\Wrapper(); |
490 | - $code = $wrapper->buildWrapMethodSource($client, $method, array('timeout' => $timeout, 'protocol' => $proto, 'simple_client_copy' => $opts, 'prefix' => $prefix), str_replace('.', '_', $prefix . '_' . $method), $msig, $mdesc); |
|
490 | + $code = $wrapper->buildWrapMethodSource($client, $method, array('timeout' => $timeout, 'protocol' => $proto, 'simple_client_copy' => $opts, 'prefix' => $prefix), str_replace('.', '_', $prefix.'_'.$method), $msig, $mdesc); |
|
491 | 491 | //if ($code) |
492 | 492 | //{ |
493 | 493 | echo "<div id=\"phpcode\">\n"; |
494 | - highlight_string("<?php\n" . $code['docstring'] . $code['source'] . '?>'); |
|
494 | + highlight_string("<?php\n".$code['docstring'].$code['source'].'?>'); |
|
495 | 495 | echo "\n</div>"; |
496 | 496 | //} |
497 | 497 | //else |
@@ -502,7 +502,7 @@ discard block |
||
502 | 502 | break; |
503 | 503 | |
504 | 504 | case 'execute': |
505 | - echo '<div id="response"><h2>Response:</h2>' . htmlspecialchars($response->serialize()) . '</div>'; |
|
505 | + echo '<div id="response"><h2>Response:</h2>'.htmlspecialchars($response->serialize()).'</div>'; |
|
506 | 506 | break; |
507 | 507 | |
508 | 508 | default: // give a warning |
@@ -17,7 +17,12 @@ discard block |
||
17 | 17 | <html xmlns="http://www.w3.org/1999/xhtml" lang="en"> |
18 | 18 | <head> |
19 | 19 | <link rel="icon" type="image/vnd.microsoft.icon" href="favicon.ico"> |
20 | - <title><?php if (defined('DEFAULT_WSTYPE') && DEFAULT_WSTYPE == 1) echo 'JSONRPC'; else echo 'XMLRPC'; ?> Debugger</title> |
|
20 | + <title><?php if (defined('DEFAULT_WSTYPE') && DEFAULT_WSTYPE == 1) { |
|
21 | + echo 'JSONRPC'; |
|
22 | +} else { |
|
23 | + echo 'XMLRPC'; |
|
24 | +} |
|
25 | +?> Debugger</title> |
|
21 | 26 | <meta name="robots" content="index,nofollow"/> |
22 | 27 | <style type="text/css"> |
23 | 28 | <!-- |
@@ -366,7 +371,9 @@ discard block |
||
366 | 371 | echo "<code>OUT: " . htmlspecialchars($ret->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding) . "<br />IN: ("; |
367 | 372 | if ($x->count() > 1) { |
368 | 373 | foreach($x as $k => $y) { |
369 | - if ($k == 0) continue; |
|
374 | + if ($k == 0) { |
|
375 | + continue; |
|
376 | + } |
|
370 | 377 | echo htmlspecialchars($y->scalarval(), ENT_COMPAT, \PhpXmlRpc\PhpXmlRpc::$xmlrpc_internalencoding); |
371 | 378 | if ($wstype != 1) { |
372 | 379 | $type = $y->scalarval(); |
@@ -19,7 +19,7 @@ discard block |
||
19 | 19 | // assume this is either a standalone install, or installed as Composer dependency |
20 | 20 | /// @todo if the latter is true, should we just not skip using the custom Autoloader, and let a top-level |
21 | 21 | /// debugger include this one, taking care of autoloading ? |
22 | - include_once __DIR__ . "/../src/Autoloader.php"; |
|
22 | + include_once __DIR__."/../src/Autoloader.php"; |
|
23 | 23 | PhpXmlRpc\Autoloader::register(); |
24 | 24 | } |
25 | 25 | |
@@ -33,7 +33,7 @@ discard block |
||
33 | 33 | } |
34 | 34 | |
35 | 35 | // Variables that shouldn't be unset |
36 | - $noUnset = array('GLOBALS', '_GET', '_POST', '_COOKIE', '_REQUEST', '_SERVER', '_ENV', '_FILES'); |
|
36 | + $noUnset = array('GLOBALS', '_GET', '_POST', '_COOKIE', '_REQUEST', '_SERVER', '_ENV', '_FILES'); |
|
37 | 37 | |
38 | 38 | $input = array_merge($_GET, $_POST, $_COOKIE, $_SERVER, $_ENV, $_FILES, |
39 | 39 | isset($_SESSION) && is_array($_SESSION) ? $_SESSION : array() |
@@ -53,8 +53,7 @@ discard block |
||
53 | 53 | function stripslashes_deep($value) |
54 | 54 | { |
55 | 55 | $value = is_array($value) ? |
56 | - array_map('stripslashes_deep', $value) : |
|
57 | - stripslashes($value); |
|
56 | + array_map('stripslashes_deep', $value) : stripslashes($value); |
|
58 | 57 | |
59 | 58 | return $value; |
60 | 59 | } |
@@ -99,7 +98,7 @@ discard block |
||
99 | 98 | $path = isset($_GET['path']) ? $_GET['path'] : ''; |
100 | 99 | // in case user forgot initial '/' in xmlrpc server path, add it back |
101 | 100 | if ($path && ($path[0]) != '/') { |
102 | - $path = '/' . $path; |
|
101 | + $path = '/'.$path; |
|
103 | 102 | } |
104 | 103 | |
105 | 104 | if (isset($_GET['debug']) && ($_GET['debug'] == '1' || $_GET['debug'] == '2')) { |
@@ -17,15 +17,15 @@ discard block |
||
17 | 17 | // Make sure we set the correct charset type for output, so that we can display all characters |
18 | 18 | header('Content-Type: text/html; charset=utf-8'); |
19 | 19 | |
20 | -include __DIR__ . '/common.php'; |
|
20 | +include __DIR__.'/common.php'; |
|
21 | 21 | if ($action == '') { |
22 | 22 | $action = 'list'; |
23 | 23 | } |
24 | 24 | |
25 | 25 | // Relative path to the visual xmlrpc editing dialog |
26 | 26 | // We allow to easily configure this path via defines |
27 | -$editorpath = (defined('JSXMLRPC_PATH') ? JSXMLRPC_PATH : '../..') . '/jsxmlrpc/debugger/'; |
|
28 | -$editorlibs = (defined('JSXMLRPC_PATH') ? JSXMLRPC_PATH : '../..') . '/jsxmlrpc/lib/'; |
|
27 | +$editorpath = (defined('JSXMLRPC_PATH') ? JSXMLRPC_PATH : '../..').'/jsxmlrpc/debugger/'; |
|
28 | +$editorlibs = (defined('JSXMLRPC_PATH') ? JSXMLRPC_PATH : '../..').'/jsxmlrpc/lib/'; |
|
29 | 29 | ?> |
30 | 30 | <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" |
31 | 31 | "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> |
@@ -230,9 +230,9 @@ discard block |
||
230 | 230 | echo ' document.forms[2].submit();'; |
231 | 231 | } ?>"> |
232 | 232 | <h1>XMLRPC |
233 | - <form name="frmxmlrpc" style="display: inline;" action="."><input name="yes" type="radio" onclick="switchtransport(0);" <?php if (!class_exists('\PhpXmlRpc\Client')) { echo 'disabled="disabled"';} ?>/></form> |
|
233 | + <form name="frmxmlrpc" style="display: inline;" action="."><input name="yes" type="radio" onclick="switchtransport(0);" <?php if (!class_exists('\PhpXmlRpc\Client')) { echo 'disabled="disabled"'; } ?>/></form> |
|
234 | 234 | / |
235 | - <form name="frmjsonrpc" style="display: inline;" action="."><input name="yes" type="radio" onclick="switchtransport(1);" <?php if (!class_exists('\PhpXmlRpc\JsonRpc\Client')) { echo 'disabled="disabled"';} ?>/></form> |
|
235 | + <form name="frmjsonrpc" style="display: inline;" action="."><input name="yes" type="radio" onclick="switchtransport(1);" <?php if (!class_exists('\PhpXmlRpc\JsonRpc\Client')) { echo 'disabled="disabled"'; } ?>/></form> |
|
236 | 236 | JSONRPC Debugger (based on the <a href="http://gggeek.github.io/phpxmlrpc/">PHP-XMLRPC</a> library) |
237 | 237 | </h1> |
238 | 238 | <form name="frmaction" method="get" action="action.php" target="frmaction" onSubmit="switchFormMethod();"> |
@@ -287,7 +287,7 @@ discard block |
||
287 | 287 | </select> |
288 | 288 | </td> |
289 | 289 | <td class="labelcell">Timeout:</td> |
290 | - <td><input type="text" name="timeout" size="3" value="<?php if ($timeout > 0) { echo $timeout; } ?>"/></td> |
|
290 | + <td><input type="text" name="timeout" size="3" value="<?php if ($timeout>0) { echo $timeout; } ?>"/></td> |
|
291 | 291 | <td class="labelcell">Protocol:</td> |
292 | 292 | <td><select name="protocol" onchange="switchssl(); switchauth(); swicthcainfo();"> |
293 | 293 | <option value="0"<?php if ($protocol == 0) { echo ' selected="selected"'; } ?>>HTTP 1.0</option> |
@@ -32,7 +32,12 @@ |
||
32 | 32 | <html xmlns="http://www.w3.org/1999/xhtml" lang="en"> |
33 | 33 | <head> |
34 | 34 | <link rel="icon" type="image/vnd.microsoft.icon" href="favicon.ico"> |
35 | - <title><?php if (defined('DEFAULT_WSTYPE') && DEFAULT_WSTYPE == 1) echo 'JSONRPC'; else echo 'XMLRPC'; ?> Debugger</title> |
|
35 | + <title><?php if (defined('DEFAULT_WSTYPE') && DEFAULT_WSTYPE == 1) { |
|
36 | + echo 'JSONRPC'; |
|
37 | +} else { |
|
38 | + echo 'XMLRPC'; |
|
39 | +} |
|
40 | +?> Debugger</title> |
|
36 | 41 | <meta name="robots" content="index,nofollow"/> |
37 | 42 | <script type="text/javascript" language="Javascript"> |
38 | 43 | if (window.name != 'frmcontroller') |
@@ -1,10 +1,10 @@ discard block |
||
1 | 1 | <?php |
2 | 2 | |
3 | -include_once __DIR__ . '/../lib/xmlrpc.inc'; |
|
3 | +include_once __DIR__.'/../lib/xmlrpc.inc'; |
|
4 | 4 | |
5 | -include_once __DIR__ . '/parse_args.php'; |
|
5 | +include_once __DIR__.'/parse_args.php'; |
|
6 | 6 | |
7 | -include_once __DIR__ . '/PolyfillTestCase.php'; |
|
7 | +include_once __DIR__.'/PolyfillTestCase.php'; |
|
8 | 8 | |
9 | 9 | use PHPUnit\Runner\BaseTestRunner; |
10 | 10 | |
@@ -58,7 +58,7 @@ discard block |
||
58 | 58 | $this->client->server .= 'XXX'; |
59 | 59 | $dnsinfo = @dns_get_record($this->client->server); |
60 | 60 | if ($dnsinfo) { |
61 | - $this->markTestSkipped('Seems like there is a catchall DNS in effect: host ' . $this->client->server . ' found'); |
|
61 | + $this->markTestSkipped('Seems like there is a catchall DNS in effect: host '.$this->client->server.' found'); |
|
62 | 62 | } else { |
63 | 63 | $r = $this->client->send($m, 5); |
64 | 64 | // make sure there's no freaking catchall DNS in effect |
@@ -85,7 +85,7 @@ discard block |
||
85 | 85 | |
86 | 86 | // now test a successful connection |
87 | 87 | $server = explode(':', $this->args['HTTPSERVER']); |
88 | - if (count($server) > 1) { |
|
88 | + if (count($server)>1) { |
|
89 | 89 | $this->client->port = $server[1]; |
90 | 90 | } |
91 | 91 | $this->client->server = $server[0]; |
@@ -24,14 +24,16 @@ |
||
24 | 24 | $this->client = new xmlrpc_client('/NOTEXIST.php', $this->args['HTTPSERVER'], 80); |
25 | 25 | $this->client->setDebug($this->args['DEBUG']); |
26 | 26 | |
27 | - if ($this->args['DEBUG'] == 1) |
|
28 | - ob_start(); |
|
27 | + if ($this->args['DEBUG'] == 1) { |
|
28 | + ob_start(); |
|
29 | + } |
|
29 | 30 | } |
30 | 31 | |
31 | 32 | protected function tear_down() |
32 | 33 | { |
33 | - if ($this->args['DEBUG'] != 1) |
|
34 | - return; |
|
34 | + if ($this->args['DEBUG'] != 1) { |
|
35 | + return; |
|
36 | + } |
|
35 | 37 | $out = ob_get_clean(); |
36 | 38 | $status = $this->getStatus(); |
37 | 39 | if ($status == BaseTestRunner::STATUS_ERROR |