| Conditions | 50 |
| Paths | > 20000 |
| Total Lines | 242 |
| Lines | 7 |
| Ratio | 2.89 % |
| Changes | 0 | ||
Small methods make your code easier to understand, in particular if combined with a good name. Besides, if your method is small, finding a good name is usually much easier.
For example, if you find yourself adding comments to a method's body, this is usually a good sign to extract the commented part to a new method, and use the comment as a starting point when coming up with a good name for this new method.
Commonly applied refactorings include:
If many parameters/temporary variables are present:
| 1 | <?php |
||
| 58 | public function request($url, $headers = array(), $data = array(), $options = array()) { |
||
| 59 | $options['hooks']->dispatch('fsockopen.before_request'); |
||
| 60 | |||
| 61 | $url_parts = parse_url($url); |
||
| 62 | if (empty($url_parts)) { |
||
| 63 | throw new Requests_Exception('Invalid URL.', 'invalidurl', $url); |
||
| 64 | } |
||
| 65 | $host = $url_parts['host']; |
||
| 66 | $context = stream_context_create(); |
||
| 67 | $verifyname = false; |
||
| 68 | $case_insensitive_headers = new Requests_Utility_CaseInsensitiveDictionary($headers); |
||
| 69 | |||
| 70 | // HTTPS support |
||
| 71 | if (isset($url_parts['scheme']) && strtolower($url_parts['scheme']) === 'https') { |
||
| 72 | $remote_socket = 'ssl://' . $host; |
||
| 73 | if (!isset($url_parts['port'])) { |
||
| 74 | $url_parts['port'] = 443; |
||
| 75 | } |
||
| 76 | |||
| 77 | $context_options = array( |
||
| 78 | 'verify_peer' => true, |
||
| 79 | 'capture_peer_cert' => true, |
||
| 80 | ); |
||
| 81 | $verifyname = true; |
||
| 82 | |||
| 83 | // SNI, if enabled (OpenSSL >=0.9.8j) |
||
| 84 | // phpcs:ignore PHPCompatibility.Constants.NewConstants.openssl_tlsext_server_nameFound |
||
| 85 | if (defined('OPENSSL_TLSEXT_SERVER_NAME') && OPENSSL_TLSEXT_SERVER_NAME) { |
||
| 86 | $context_options['SNI_enabled'] = true; |
||
| 87 | View Code Duplication | if (isset($options['verifyname']) && $options['verifyname'] === false) { |
|
| 88 | $context_options['SNI_enabled'] = false; |
||
| 89 | } |
||
| 90 | } |
||
| 91 | |||
| 92 | if (isset($options['verify'])) { |
||
| 93 | if ($options['verify'] === false) { |
||
| 94 | $context_options['verify_peer'] = false; |
||
| 95 | $context_options['verify_peer_name'] = false; |
||
| 96 | $verifyname = false; |
||
| 97 | } |
||
| 98 | elseif (is_string($options['verify'])) { |
||
| 99 | $context_options['cafile'] = $options['verify']; |
||
| 100 | } |
||
| 101 | } |
||
| 102 | |||
| 103 | View Code Duplication | if (isset($options['verifyname']) && $options['verifyname'] === false) { |
|
| 104 | $context_options['verify_peer_name'] = false; |
||
| 105 | $verifyname = false; |
||
| 106 | } |
||
| 107 | |||
| 108 | stream_context_set_option($context, array('ssl' => $context_options)); |
||
| 109 | } |
||
| 110 | else { |
||
| 111 | $remote_socket = 'tcp://' . $host; |
||
| 112 | } |
||
| 113 | |||
| 114 | $this->max_bytes = $options['max_bytes']; |
||
| 115 | |||
| 116 | if (!isset($url_parts['port'])) { |
||
| 117 | $url_parts['port'] = 80; |
||
| 118 | } |
||
| 119 | $remote_socket .= ':' . $url_parts['port']; |
||
| 120 | |||
| 121 | // phpcs:ignore WordPress.PHP.DevelopmentFunctions.error_log_set_error_handler |
||
| 122 | set_error_handler(array($this, 'connect_error_handler'), E_WARNING | E_NOTICE); |
||
| 123 | |||
| 124 | $options['hooks']->dispatch('fsockopen.remote_socket', array(&$remote_socket)); |
||
| 125 | |||
| 126 | $socket = stream_socket_client($remote_socket, $errno, $errstr, ceil($options['connect_timeout']), STREAM_CLIENT_CONNECT, $context); |
||
| 127 | |||
| 128 | restore_error_handler(); |
||
| 129 | |||
| 130 | if ($verifyname && !$this->verify_certificate_from_context($host, $context)) { |
||
| 131 | throw new Requests_Exception('SSL certificate did not match the requested domain name', 'ssl.no_match'); |
||
| 132 | } |
||
| 133 | |||
| 134 | if (!$socket) { |
||
| 135 | if ($errno === 0) { |
||
| 136 | // Connection issue |
||
| 137 | throw new Requests_Exception(rtrim($this->connect_error), 'fsockopen.connect_error'); |
||
| 138 | } |
||
| 139 | |||
| 140 | throw new Requests_Exception($errstr, 'fsockopenerror', null, $errno); |
||
| 141 | } |
||
| 142 | |||
| 143 | $data_format = $options['data_format']; |
||
| 144 | |||
| 145 | if ($data_format === 'query') { |
||
| 146 | $path = self::format_get($url_parts, $data); |
||
|
|
|||
| 147 | $data = ''; |
||
| 148 | } |
||
| 149 | else { |
||
| 150 | $path = self::format_get($url_parts, array()); |
||
| 151 | } |
||
| 152 | |||
| 153 | $options['hooks']->dispatch('fsockopen.remote_host_path', array(&$path, $url)); |
||
| 154 | |||
| 155 | $request_body = ''; |
||
| 156 | $out = sprintf("%s %s HTTP/%.1F\r\n", $options['type'], $path, $options['protocol_version']); |
||
| 157 | |||
| 158 | if ($options['type'] !== Requests::TRACE) { |
||
| 159 | if (is_array($data)) { |
||
| 160 | $request_body = http_build_query($data, '', '&'); |
||
| 161 | } |
||
| 162 | else { |
||
| 163 | $request_body = $data; |
||
| 164 | } |
||
| 165 | |||
| 166 | // Always include Content-length on POST requests to prevent |
||
| 167 | // 411 errors from some servers when the body is empty. |
||
| 168 | if (!empty($data) || $options['type'] === Requests::POST) { |
||
| 169 | if (!isset($case_insensitive_headers['Content-Length'])) { |
||
| 170 | $headers['Content-Length'] = strlen($request_body); |
||
| 171 | } |
||
| 172 | |||
| 173 | if (!isset($case_insensitive_headers['Content-Type'])) { |
||
| 174 | $headers['Content-Type'] = 'application/x-www-form-urlencoded; charset=UTF-8'; |
||
| 175 | } |
||
| 176 | } |
||
| 177 | } |
||
| 178 | |||
| 179 | if (!isset($case_insensitive_headers['Host'])) { |
||
| 180 | $out .= sprintf('Host: %s', $url_parts['host']); |
||
| 181 | |||
| 182 | if ((strtolower($url_parts['scheme']) === 'http' && $url_parts['port'] !== 80) || (strtolower($url_parts['scheme']) === 'https' && $url_parts['port'] !== 443)) { |
||
| 183 | $out .= ':' . $url_parts['port']; |
||
| 184 | } |
||
| 185 | $out .= "\r\n"; |
||
| 186 | } |
||
| 187 | |||
| 188 | if (!isset($case_insensitive_headers['User-Agent'])) { |
||
| 189 | $out .= sprintf("User-Agent: %s\r\n", $options['useragent']); |
||
| 190 | } |
||
| 191 | |||
| 192 | $accept_encoding = $this->accept_encoding(); |
||
| 193 | if (!isset($case_insensitive_headers['Accept-Encoding']) && !empty($accept_encoding)) { |
||
| 194 | $out .= sprintf("Accept-Encoding: %s\r\n", $accept_encoding); |
||
| 195 | } |
||
| 196 | |||
| 197 | $headers = Requests::flatten($headers); |
||
| 198 | |||
| 199 | if (!empty($headers)) { |
||
| 200 | $out .= implode("\r\n", $headers) . "\r\n"; |
||
| 201 | } |
||
| 202 | |||
| 203 | $options['hooks']->dispatch('fsockopen.after_headers', array(&$out)); |
||
| 204 | |||
| 205 | if (substr($out, -2) !== "\r\n") { |
||
| 206 | $out .= "\r\n"; |
||
| 207 | } |
||
| 208 | |||
| 209 | if (!isset($case_insensitive_headers['Connection'])) { |
||
| 210 | $out .= "Connection: Close\r\n"; |
||
| 211 | } |
||
| 212 | |||
| 213 | $out .= "\r\n" . $request_body; |
||
| 214 | |||
| 215 | $options['hooks']->dispatch('fsockopen.before_send', array(&$out)); |
||
| 216 | |||
| 217 | fwrite($socket, $out); |
||
| 218 | $options['hooks']->dispatch('fsockopen.after_send', array($out)); |
||
| 219 | |||
| 220 | if (!$options['blocking']) { |
||
| 221 | fclose($socket); |
||
| 222 | $fake_headers = ''; |
||
| 223 | $options['hooks']->dispatch('fsockopen.after_request', array(&$fake_headers)); |
||
| 224 | return ''; |
||
| 225 | } |
||
| 226 | |||
| 227 | $timeout_sec = (int) floor($options['timeout']); |
||
| 228 | if ($timeout_sec === $options['timeout']) { |
||
| 229 | $timeout_msec = 0; |
||
| 230 | } |
||
| 231 | else { |
||
| 232 | $timeout_msec = self::SECOND_IN_MICROSECONDS * $options['timeout'] % self::SECOND_IN_MICROSECONDS; |
||
| 233 | } |
||
| 234 | stream_set_timeout($socket, $timeout_sec, $timeout_msec); |
||
| 235 | |||
| 236 | $response = ''; |
||
| 237 | $body = ''; |
||
| 238 | $headers = ''; |
||
| 239 | $this->info = stream_get_meta_data($socket); |
||
| 240 | $size = 0; |
||
| 241 | $doingbody = false; |
||
| 242 | $download = false; |
||
| 243 | if ($options['filename']) { |
||
| 244 | $download = fopen($options['filename'], 'wb'); |
||
| 245 | } |
||
| 246 | |||
| 247 | while (!feof($socket)) { |
||
| 248 | $this->info = stream_get_meta_data($socket); |
||
| 249 | if ($this->info['timed_out']) { |
||
| 250 | throw new Requests_Exception('fsocket timed out', 'timeout'); |
||
| 251 | } |
||
| 252 | |||
| 253 | $block = fread($socket, Requests::BUFFER_SIZE); |
||
| 254 | if (!$doingbody) { |
||
| 255 | $response .= $block; |
||
| 256 | if (strpos($response, "\r\n\r\n")) { |
||
| 257 | list($headers, $block) = explode("\r\n\r\n", $response, 2); |
||
| 258 | $doingbody = true; |
||
| 259 | } |
||
| 260 | } |
||
| 261 | |||
| 262 | // Are we in body mode now? |
||
| 263 | if ($doingbody) { |
||
| 264 | $options['hooks']->dispatch('request.progress', array($block, $size, $this->max_bytes)); |
||
| 265 | $data_length = strlen($block); |
||
| 266 | if ($this->max_bytes) { |
||
| 267 | // Have we already hit a limit? |
||
| 268 | if ($size === $this->max_bytes) { |
||
| 269 | continue; |
||
| 270 | } |
||
| 271 | if (($size + $data_length) > $this->max_bytes) { |
||
| 272 | // Limit the length |
||
| 273 | $limited_length = ($this->max_bytes - $size); |
||
| 274 | $block = substr($block, 0, $limited_length); |
||
| 275 | } |
||
| 276 | } |
||
| 277 | |||
| 278 | $size += strlen($block); |
||
| 279 | if ($download) { |
||
| 280 | fwrite($download, $block); |
||
| 281 | } |
||
| 282 | else { |
||
| 283 | $body .= $block; |
||
| 284 | } |
||
| 285 | } |
||
| 286 | } |
||
| 287 | $this->headers = $headers; |
||
| 288 | |||
| 289 | if ($download) { |
||
| 290 | fclose($download); |
||
| 291 | } |
||
| 292 | else { |
||
| 293 | $this->headers .= "\r\n\r\n" . $body; |
||
| 294 | } |
||
| 295 | fclose($socket); |
||
| 296 | |||
| 297 | $options['hooks']->dispatch('fsockopen.after_request', array(&$this->headers, &$this->info)); |
||
| 298 | return $this->headers; |
||
| 299 | } |
||
| 300 | |||
| 452 |
This check looks at variables that have been passed in as parameters and are passed out again to other methods.
If the outgoing method call has stricter type requirements than the method itself, an issue is raised.
An additional type check may prevent trouble.