@@ -17,224 +17,224 @@ |
||
17 | 17 | trait WSClientTrait |
18 | 18 | { |
19 | 19 | |
20 | - /** |
|
21 | - * Validates whether server sent valid upgrade response |
|
22 | - * |
|
23 | - * @param WSConfig $config |
|
24 | - * @param string $pathWithQuery |
|
25 | - * @param string $key |
|
26 | - * @throws ConnectionException |
|
27 | - */ |
|
28 | - private function validateResponse(WSConfig $config, string $pathWithQuery, string $key): void |
|
29 | - { |
|
30 | - $response = stream_get_line($this->socket, self::DEFAULT_RESPONSE_HEADER, "\r\n\r\n"); |
|
31 | - if (!preg_match(self::SEC_WEBSOCKET_ACCEPT_PTTRN, $response, $matches)) { |
|
32 | - $address = $config->getScheme() . '://' . $config->getHost() . ':' . $config->getPort() . $pathWithQuery; |
|
33 | - throw new ConnectionException( |
|
34 | - "Connection to '{$address}' failed: Server sent invalid upgrade response:\n" |
|
35 | - . $response, CommonsContract::CLIENT_INVALID_UPGRADE_RESPONSE |
|
36 | - ); |
|
37 | - } |
|
38 | - |
|
39 | - $keyAccept = trim($matches[1]); |
|
40 | - $expectedResponse = base64_encode(pack('H*', sha1($key . self::SERVER_KEY_ACCEPT))); |
|
41 | - if ($keyAccept !== $expectedResponse) { |
|
42 | - throw new ConnectionException('Server sent bad upgrade response.', |
|
43 | - CommonsContract::CLIENT_INVALID_UPGRADE_RESPONSE); |
|
44 | - } |
|
45 | - } |
|
46 | - |
|
47 | - /** |
|
48 | - * Gets host uri based on protocol |
|
49 | - * |
|
50 | - * @param WSConfig $config |
|
51 | - * @return string |
|
52 | - * @throws BadUriException |
|
53 | - */ |
|
54 | - private function getHostUri(WSConfig $config): string |
|
55 | - { |
|
56 | - if (in_array($config->getScheme(), ['ws', 'wss'], true) === false) { |
|
57 | - throw new BadUriException( |
|
58 | - "Url should have scheme ws or wss, not '{$config->getScheme()}' from URI '$this->socketUrl' .", |
|
59 | - CommonsContract::CLIENT_INCORRECT_SCHEME |
|
60 | - ); |
|
61 | - } |
|
62 | - |
|
63 | - return ($config->getScheme() === 'wss' ? 'ssl' : 'tcp') . '://' . $config->getHost(); |
|
64 | - } |
|
65 | - |
|
66 | - /** |
|
67 | - * @param string $data |
|
68 | - * @return float|int |
|
69 | - * @throws ConnectionException |
|
70 | - */ |
|
71 | - private function getPayloadLength(string $data): float|int |
|
72 | - { |
|
73 | - $payloadLength = (int)ord($data[1]) & self::MASK_127; // Bits 1-7 in byte 1 |
|
74 | - if ($payloadLength > self::MASK_125) { |
|
75 | - if ($payloadLength === self::MASK_126) { |
|
76 | - $data = $this->read(2); // 126: Payload is a 16-bit unsigned int |
|
77 | - } else { |
|
78 | - $data = $this->read(8); // 127: Payload is a 64-bit unsigned int |
|
79 | - } |
|
80 | - $payloadLength = bindec(self::sprintB($data)); |
|
81 | - } |
|
82 | - |
|
83 | - return $payloadLength; |
|
84 | - } |
|
85 | - |
|
86 | - /** |
|
87 | - * @param string $data |
|
88 | - * @param int $payloadLength |
|
89 | - * @return string |
|
90 | - * @throws ConnectionException |
|
91 | - */ |
|
92 | - private function getPayloadData(string $data, int $payloadLength): string |
|
93 | - { |
|
94 | - // Masking? |
|
95 | - $mask = (bool)(ord($data[1]) >> 7); // Bit 0 in byte 1 |
|
96 | - $payload = ''; |
|
97 | - $maskingKey = ''; |
|
98 | - |
|
99 | - // Get masking key. |
|
100 | - if ($mask) { |
|
101 | - $maskingKey = $this->read(4); |
|
102 | - } |
|
103 | - |
|
104 | - // Get the actual payload, if any (might not be for e.g. close frames. |
|
105 | - if ($payloadLength > 0) { |
|
106 | - $data = $this->read($payloadLength); |
|
107 | - |
|
108 | - if ($mask) { |
|
109 | - // Unmask payload. |
|
110 | - for ($i = 0; $i < $payloadLength; $i++) { |
|
111 | - $payload .= ($data[$i] ^ $maskingKey[$i % 4]); |
|
112 | - } |
|
113 | - } else { |
|
114 | - $payload = $data; |
|
115 | - } |
|
116 | - } |
|
117 | - |
|
118 | - return $payload; |
|
119 | - } |
|
120 | - |
|
121 | - /** |
|
122 | - * @return null|string |
|
123 | - * @throws \Exception |
|
124 | - */ |
|
125 | - protected function receiveFragment(): ?string |
|
126 | - { |
|
127 | - $data = $this->read(2); |
|
128 | - |
|
129 | - $final = (bool)(ord($data[0]) & 1 << 7); |
|
130 | - |
|
131 | - $opcodeInt = ord($data[0]) & 31; |
|
132 | - $opcodeInts = array_flip(self::$opcodes); |
|
133 | - if (!array_key_exists($opcodeInt, $opcodeInts)) { |
|
134 | - throw new ConnectionException( |
|
135 | - "Bad opcode in websocket frame: $opcodeInt", |
|
136 | - CommonsContract::CLIENT_BAD_OPCODE |
|
137 | - ); |
|
138 | - } |
|
139 | - |
|
140 | - $opcode = $opcodeInts[$opcodeInt]; |
|
141 | - |
|
142 | - if ($opcode !== 'continuation') { |
|
143 | - $this->lastOpcode = $opcode; |
|
144 | - } |
|
145 | - |
|
146 | - $payloadLength = $this->getPayloadLength($data); |
|
147 | - $payload = $this->getPayloadData($data, $payloadLength); |
|
148 | - |
|
149 | - if ($opcode === CommonsContract::EVENT_TYPE_CLOSE) { |
|
150 | - if ($payloadLength >= 2) { |
|
151 | - $statusBin = $payload[0] . $payload[1]; |
|
152 | - $status = bindec(sprintf('%08b%08b', ord($payload[0]), ord($payload[1]))); |
|
153 | - $this->closeStatus = $status; |
|
154 | - $payload = substr($payload, 2); |
|
155 | - |
|
156 | - if (!$this->isClosing) { |
|
157 | - $this->send($statusBin . 'Close acknowledged: ' . $status, |
|
158 | - CommonsContract::EVENT_TYPE_CLOSE); // Respond. |
|
159 | - } |
|
160 | - } |
|
161 | - |
|
162 | - if ($this->isClosing) { |
|
163 | - $this->isClosing = false; // A close response, all done. |
|
164 | - } |
|
165 | - |
|
166 | - fclose($this->socket); |
|
167 | - $this->isConnected = false; |
|
168 | - } |
|
169 | - |
|
170 | - if (!$final) { |
|
171 | - $this->hugePayload .= $payload; |
|
172 | - |
|
173 | - return NULL; |
|
174 | - } |
|
175 | - |
|
176 | - if ($this->hugePayload) { |
|
177 | - $payload = $this->hugePayload .= $payload; |
|
178 | - $this->hugePayload = NULL; |
|
179 | - } |
|
180 | - |
|
181 | - return $payload; |
|
182 | - } |
|
183 | - |
|
184 | - /** |
|
185 | - * @param $final |
|
186 | - * @param $payload |
|
187 | - * @param $opcode |
|
188 | - * @param $masked |
|
189 | - * @throws \Exception |
|
190 | - */ |
|
191 | - protected function sendFragment($final, $payload, $opcode, $masked): void |
|
192 | - { |
|
193 | - // Binary string for header. |
|
194 | - $frameHeadBin = ''; |
|
195 | - // Write FIN, final fragment bit. |
|
196 | - $frameHeadBin .= (bool)$final ? '1' : '0'; |
|
197 | - // RSV 1, 2, & 3 false and unused. |
|
198 | - $frameHeadBin .= '000'; |
|
199 | - // Opcode rest of the byte. |
|
200 | - $frameHeadBin .= sprintf('%04b', self::$opcodes[$opcode]); |
|
201 | - // Use masking? |
|
202 | - $frameHeadBin .= $masked ? '1' : '0'; |
|
203 | - |
|
204 | - // 7 bits of payload length... |
|
205 | - $payloadLen = strlen($payload); |
|
206 | - if ($payloadLen > self::MAX_BYTES_READ) { |
|
207 | - $frameHeadBin .= decbin(self::MASK_127); |
|
208 | - $frameHeadBin .= sprintf('%064b', $payloadLen); |
|
209 | - } else if ($payloadLen > self::MASK_125) { |
|
210 | - $frameHeadBin .= decbin(self::MASK_126); |
|
211 | - $frameHeadBin .= sprintf('%016b', $payloadLen); |
|
212 | - } else { |
|
213 | - $frameHeadBin .= sprintf('%07b', $payloadLen); |
|
214 | - } |
|
215 | - |
|
216 | - $frame = ''; |
|
217 | - |
|
218 | - // Write frame head to frame. |
|
219 | - foreach (str_split($frameHeadBin, 8) as $binstr) { |
|
220 | - $frame .= chr(bindec($binstr)); |
|
221 | - } |
|
222 | - // Handle masking |
|
223 | - if ($masked) { |
|
224 | - // generate a random mask: |
|
225 | - $mask = ''; |
|
226 | - for ($i = 0; $i < 4; $i++) { |
|
227 | - $mask .= chr(random_int(0, 255)); |
|
228 | - } |
|
229 | - $frame .= $mask; |
|
230 | - } |
|
231 | - |
|
232 | - // Append payload to frame: |
|
233 | - for ($i = 0; $i < $payloadLen; $i++) { |
|
234 | - $frame .= ($masked === true) ? $payload[$i] ^ $mask[$i % 4] : $payload[$i]; |
|
235 | - } |
|
236 | - |
|
237 | - $this->write($frame); |
|
238 | - } |
|
20 | + /** |
|
21 | + * Validates whether server sent valid upgrade response |
|
22 | + * |
|
23 | + * @param WSConfig $config |
|
24 | + * @param string $pathWithQuery |
|
25 | + * @param string $key |
|
26 | + * @throws ConnectionException |
|
27 | + */ |
|
28 | + private function validateResponse(WSConfig $config, string $pathWithQuery, string $key): void |
|
29 | + { |
|
30 | + $response = stream_get_line($this->socket, self::DEFAULT_RESPONSE_HEADER, "\r\n\r\n"); |
|
31 | + if (!preg_match(self::SEC_WEBSOCKET_ACCEPT_PTTRN, $response, $matches)) { |
|
32 | + $address = $config->getScheme() . '://' . $config->getHost() . ':' . $config->getPort() . $pathWithQuery; |
|
33 | + throw new ConnectionException( |
|
34 | + "Connection to '{$address}' failed: Server sent invalid upgrade response:\n" |
|
35 | + . $response, CommonsContract::CLIENT_INVALID_UPGRADE_RESPONSE |
|
36 | + ); |
|
37 | + } |
|
38 | + |
|
39 | + $keyAccept = trim($matches[1]); |
|
40 | + $expectedResponse = base64_encode(pack('H*', sha1($key . self::SERVER_KEY_ACCEPT))); |
|
41 | + if ($keyAccept !== $expectedResponse) { |
|
42 | + throw new ConnectionException('Server sent bad upgrade response.', |
|
43 | + CommonsContract::CLIENT_INVALID_UPGRADE_RESPONSE); |
|
44 | + } |
|
45 | + } |
|
46 | + |
|
47 | + /** |
|
48 | + * Gets host uri based on protocol |
|
49 | + * |
|
50 | + * @param WSConfig $config |
|
51 | + * @return string |
|
52 | + * @throws BadUriException |
|
53 | + */ |
|
54 | + private function getHostUri(WSConfig $config): string |
|
55 | + { |
|
56 | + if (in_array($config->getScheme(), ['ws', 'wss'], true) === false) { |
|
57 | + throw new BadUriException( |
|
58 | + "Url should have scheme ws or wss, not '{$config->getScheme()}' from URI '$this->socketUrl' .", |
|
59 | + CommonsContract::CLIENT_INCORRECT_SCHEME |
|
60 | + ); |
|
61 | + } |
|
62 | + |
|
63 | + return ($config->getScheme() === 'wss' ? 'ssl' : 'tcp') . '://' . $config->getHost(); |
|
64 | + } |
|
65 | + |
|
66 | + /** |
|
67 | + * @param string $data |
|
68 | + * @return float|int |
|
69 | + * @throws ConnectionException |
|
70 | + */ |
|
71 | + private function getPayloadLength(string $data): float|int |
|
72 | + { |
|
73 | + $payloadLength = (int)ord($data[1]) & self::MASK_127; // Bits 1-7 in byte 1 |
|
74 | + if ($payloadLength > self::MASK_125) { |
|
75 | + if ($payloadLength === self::MASK_126) { |
|
76 | + $data = $this->read(2); // 126: Payload is a 16-bit unsigned int |
|
77 | + } else { |
|
78 | + $data = $this->read(8); // 127: Payload is a 64-bit unsigned int |
|
79 | + } |
|
80 | + $payloadLength = bindec(self::sprintB($data)); |
|
81 | + } |
|
82 | + |
|
83 | + return $payloadLength; |
|
84 | + } |
|
85 | + |
|
86 | + /** |
|
87 | + * @param string $data |
|
88 | + * @param int $payloadLength |
|
89 | + * @return string |
|
90 | + * @throws ConnectionException |
|
91 | + */ |
|
92 | + private function getPayloadData(string $data, int $payloadLength): string |
|
93 | + { |
|
94 | + // Masking? |
|
95 | + $mask = (bool)(ord($data[1]) >> 7); // Bit 0 in byte 1 |
|
96 | + $payload = ''; |
|
97 | + $maskingKey = ''; |
|
98 | + |
|
99 | + // Get masking key. |
|
100 | + if ($mask) { |
|
101 | + $maskingKey = $this->read(4); |
|
102 | + } |
|
103 | + |
|
104 | + // Get the actual payload, if any (might not be for e.g. close frames. |
|
105 | + if ($payloadLength > 0) { |
|
106 | + $data = $this->read($payloadLength); |
|
107 | + |
|
108 | + if ($mask) { |
|
109 | + // Unmask payload. |
|
110 | + for ($i = 0; $i < $payloadLength; $i++) { |
|
111 | + $payload .= ($data[$i] ^ $maskingKey[$i % 4]); |
|
112 | + } |
|
113 | + } else { |
|
114 | + $payload = $data; |
|
115 | + } |
|
116 | + } |
|
117 | + |
|
118 | + return $payload; |
|
119 | + } |
|
120 | + |
|
121 | + /** |
|
122 | + * @return null|string |
|
123 | + * @throws \Exception |
|
124 | + */ |
|
125 | + protected function receiveFragment(): ?string |
|
126 | + { |
|
127 | + $data = $this->read(2); |
|
128 | + |
|
129 | + $final = (bool)(ord($data[0]) & 1 << 7); |
|
130 | + |
|
131 | + $opcodeInt = ord($data[0]) & 31; |
|
132 | + $opcodeInts = array_flip(self::$opcodes); |
|
133 | + if (!array_key_exists($opcodeInt, $opcodeInts)) { |
|
134 | + throw new ConnectionException( |
|
135 | + "Bad opcode in websocket frame: $opcodeInt", |
|
136 | + CommonsContract::CLIENT_BAD_OPCODE |
|
137 | + ); |
|
138 | + } |
|
139 | + |
|
140 | + $opcode = $opcodeInts[$opcodeInt]; |
|
141 | + |
|
142 | + if ($opcode !== 'continuation') { |
|
143 | + $this->lastOpcode = $opcode; |
|
144 | + } |
|
145 | + |
|
146 | + $payloadLength = $this->getPayloadLength($data); |
|
147 | + $payload = $this->getPayloadData($data, $payloadLength); |
|
148 | + |
|
149 | + if ($opcode === CommonsContract::EVENT_TYPE_CLOSE) { |
|
150 | + if ($payloadLength >= 2) { |
|
151 | + $statusBin = $payload[0] . $payload[1]; |
|
152 | + $status = bindec(sprintf('%08b%08b', ord($payload[0]), ord($payload[1]))); |
|
153 | + $this->closeStatus = $status; |
|
154 | + $payload = substr($payload, 2); |
|
155 | + |
|
156 | + if (!$this->isClosing) { |
|
157 | + $this->send($statusBin . 'Close acknowledged: ' . $status, |
|
158 | + CommonsContract::EVENT_TYPE_CLOSE); // Respond. |
|
159 | + } |
|
160 | + } |
|
161 | + |
|
162 | + if ($this->isClosing) { |
|
163 | + $this->isClosing = false; // A close response, all done. |
|
164 | + } |
|
165 | + |
|
166 | + fclose($this->socket); |
|
167 | + $this->isConnected = false; |
|
168 | + } |
|
169 | + |
|
170 | + if (!$final) { |
|
171 | + $this->hugePayload .= $payload; |
|
172 | + |
|
173 | + return NULL; |
|
174 | + } |
|
175 | + |
|
176 | + if ($this->hugePayload) { |
|
177 | + $payload = $this->hugePayload .= $payload; |
|
178 | + $this->hugePayload = NULL; |
|
179 | + } |
|
180 | + |
|
181 | + return $payload; |
|
182 | + } |
|
183 | + |
|
184 | + /** |
|
185 | + * @param $final |
|
186 | + * @param $payload |
|
187 | + * @param $opcode |
|
188 | + * @param $masked |
|
189 | + * @throws \Exception |
|
190 | + */ |
|
191 | + protected function sendFragment($final, $payload, $opcode, $masked): void |
|
192 | + { |
|
193 | + // Binary string for header. |
|
194 | + $frameHeadBin = ''; |
|
195 | + // Write FIN, final fragment bit. |
|
196 | + $frameHeadBin .= (bool)$final ? '1' : '0'; |
|
197 | + // RSV 1, 2, & 3 false and unused. |
|
198 | + $frameHeadBin .= '000'; |
|
199 | + // Opcode rest of the byte. |
|
200 | + $frameHeadBin .= sprintf('%04b', self::$opcodes[$opcode]); |
|
201 | + // Use masking? |
|
202 | + $frameHeadBin .= $masked ? '1' : '0'; |
|
203 | + |
|
204 | + // 7 bits of payload length... |
|
205 | + $payloadLen = strlen($payload); |
|
206 | + if ($payloadLen > self::MAX_BYTES_READ) { |
|
207 | + $frameHeadBin .= decbin(self::MASK_127); |
|
208 | + $frameHeadBin .= sprintf('%064b', $payloadLen); |
|
209 | + } else if ($payloadLen > self::MASK_125) { |
|
210 | + $frameHeadBin .= decbin(self::MASK_126); |
|
211 | + $frameHeadBin .= sprintf('%016b', $payloadLen); |
|
212 | + } else { |
|
213 | + $frameHeadBin .= sprintf('%07b', $payloadLen); |
|
214 | + } |
|
215 | + |
|
216 | + $frame = ''; |
|
217 | + |
|
218 | + // Write frame head to frame. |
|
219 | + foreach (str_split($frameHeadBin, 8) as $binstr) { |
|
220 | + $frame .= chr(bindec($binstr)); |
|
221 | + } |
|
222 | + // Handle masking |
|
223 | + if ($masked) { |
|
224 | + // generate a random mask: |
|
225 | + $mask = ''; |
|
226 | + for ($i = 0; $i < 4; $i++) { |
|
227 | + $mask .= chr(random_int(0, 255)); |
|
228 | + } |
|
229 | + $frame .= $mask; |
|
230 | + } |
|
231 | + |
|
232 | + // Append payload to frame: |
|
233 | + for ($i = 0; $i < $payloadLen; $i++) { |
|
234 | + $frame .= ($masked === true) ? $payload[$i] ^ $mask[$i % 4] : $payload[$i]; |
|
235 | + } |
|
236 | + |
|
237 | + $this->write($frame); |
|
238 | + } |
|
239 | 239 | |
240 | 240 | } |
241 | 241 | \ No newline at end of file |
@@ -70,7 +70,7 @@ discard block |
||
70 | 70 | */ |
71 | 71 | private function getPayloadLength(string $data): float|int |
72 | 72 | { |
73 | - $payloadLength = (int)ord($data[1]) & self::MASK_127; // Bits 1-7 in byte 1 |
|
73 | + $payloadLength = (int) ord($data[1]) & self::MASK_127; // Bits 1-7 in byte 1 |
|
74 | 74 | if ($payloadLength > self::MASK_125) { |
75 | 75 | if ($payloadLength === self::MASK_126) { |
76 | 76 | $data = $this->read(2); // 126: Payload is a 16-bit unsigned int |
@@ -92,7 +92,7 @@ discard block |
||
92 | 92 | private function getPayloadData(string $data, int $payloadLength): string |
93 | 93 | { |
94 | 94 | // Masking? |
95 | - $mask = (bool)(ord($data[1]) >> 7); // Bit 0 in byte 1 |
|
95 | + $mask = (bool) (ord($data[1]) >> 7); // Bit 0 in byte 1 |
|
96 | 96 | $payload = ''; |
97 | 97 | $maskingKey = ''; |
98 | 98 | |
@@ -108,7 +108,7 @@ discard block |
||
108 | 108 | if ($mask) { |
109 | 109 | // Unmask payload. |
110 | 110 | for ($i = 0; $i < $payloadLength; $i++) { |
111 | - $payload .= ($data[$i] ^ $maskingKey[$i % 4]); |
|
111 | + $payload .= ($data[$i]^$maskingKey[$i % 4]); |
|
112 | 112 | } |
113 | 113 | } else { |
114 | 114 | $payload = $data; |
@@ -126,7 +126,7 @@ discard block |
||
126 | 126 | { |
127 | 127 | $data = $this->read(2); |
128 | 128 | |
129 | - $final = (bool)(ord($data[0]) & 1 << 7); |
|
129 | + $final = (bool) (ord($data[0]) & 1 << 7); |
|
130 | 130 | |
131 | 131 | $opcodeInt = ord($data[0]) & 31; |
132 | 132 | $opcodeInts = array_flip(self::$opcodes); |
@@ -193,7 +193,7 @@ discard block |
||
193 | 193 | // Binary string for header. |
194 | 194 | $frameHeadBin = ''; |
195 | 195 | // Write FIN, final fragment bit. |
196 | - $frameHeadBin .= (bool)$final ? '1' : '0'; |
|
196 | + $frameHeadBin .= (bool) $final ? '1' : '0'; |
|
197 | 197 | // RSV 1, 2, & 3 false and unused. |
198 | 198 | $frameHeadBin .= '000'; |
199 | 199 | // Opcode rest of the byte. |
@@ -231,7 +231,7 @@ discard block |
||
231 | 231 | |
232 | 232 | // Append payload to frame: |
233 | 233 | for ($i = 0; $i < $payloadLen; $i++) { |
234 | - $frame .= ($masked === true) ? $payload[$i] ^ $mask[$i % 4] : $payload[$i]; |
|
234 | + $frame .= ($masked === true) ? $payload[$i]^$mask[$i % 4] : $payload[$i]; |
|
235 | 235 | } |
236 | 236 | |
237 | 237 | $this->write($frame); |
@@ -17,25 +17,25 @@ |
||
17 | 17 | abstract class WebSocketClient implements WebSocketContract, MessageContract |
18 | 18 | { |
19 | 19 | |
20 | - /** |
|
21 | - * @var array |
|
22 | - */ |
|
23 | - public array $pathParams = []; |
|
20 | + /** |
|
21 | + * @var array |
|
22 | + */ |
|
23 | + public array $pathParams = []; |
|
24 | 24 | |
25 | - /** |
|
26 | - * You may want to implement these methods to bring ping/pong events |
|
27 | - * |
|
28 | - * @param ConnectionContract $conn |
|
29 | - * @param string $msg |
|
30 | - * @throws WebSocketException |
|
31 | - */ |
|
32 | - abstract public function onPing(ConnectionContract $conn, string $msg); |
|
25 | + /** |
|
26 | + * You may want to implement these methods to bring ping/pong events |
|
27 | + * |
|
28 | + * @param ConnectionContract $conn |
|
29 | + * @param string $msg |
|
30 | + * @throws WebSocketException |
|
31 | + */ |
|
32 | + abstract public function onPing(ConnectionContract $conn, string $msg); |
|
33 | 33 | |
34 | - /** |
|
35 | - * @param ConnectionContract $conn |
|
36 | - * @param mixed $msg |
|
37 | - * @throws WebSocketException |
|
38 | - */ |
|
39 | - abstract public function onPong(ConnectionContract $conn, mixed $msg); |
|
34 | + /** |
|
35 | + * @param ConnectionContract $conn |
|
36 | + * @param mixed $msg |
|
37 | + * @throws WebSocketException |
|
38 | + */ |
|
39 | + abstract public function onPong(ConnectionContract $conn, mixed $msg); |
|
40 | 40 | |
41 | 41 | } |