ID: 44882 User updated by: mike at silverorange dot com Reported By: mike at silverorange dot com Status: Open Bug Type: SOAP related Operating System: * PHP Version: 5.2.5 New Comment:
I've moved the test provided by anomie into a phpt file at http://labs.silverorange.com/files/php-bug44882/. The WSDL file is not included locally as it is the copyrighted work of PayPal. The test passes using the associated patch but fails against the latest snapshot (5.2-200810011830). What else is needed to get this bug fixed? Previous Comments: ------------------------------------------------------------------------ [2008-09-08 14:55:29] mike at silverorange dot com Reopening bug since feedback indicates the bug still exists in the posted snapshot. ------------------------------------------------------------------------ [2008-08-19 02:02:22] michael dot tibben at stomp dot com dot au The above testcase fails in the 6 Aug 08 snapshot, but works correctly in php 5.2.20 Please reopen this bug. ------------------------------------------------------------------------ [2008-07-29 01:00:01] php-bugs at lists dot php dot net No feedback was provided for this bug for over a week, so it is being suspended automatically. If you are able to provide the information that was originally requested, please do so and change the status of the bug back to "Open". ------------------------------------------------------------------------ [2008-07-21 20:37:47] [EMAIL PROTECTED] Please try using this CVS snapshot: http://snaps.php.net/php5.2-latest.tar.gz For Windows (zip): http://snaps.php.net/win32/php5.2-win32-latest.zip For Windows (installer): http://snaps.php.net/win32/php5.2-win32-installer-latest.msi ------------------------------------------------------------------------ [2008-06-23 15:23:14] anomie at users dot sf dot net Here is a test case that illustrates the bug, using the same technique the ext/soap test cases in the PHP distribution use. Please excuse the big block-o-base64, the namespace URIs in the XML were apparently triggering your spam filter. <?php class TestSoapClient extends SoapClient { public function __doRequest($req, $loc, $act, $ver, $oneway){ $data=<<<EOF nZdbd9o4EIDf8ys49BlkQ7IBH0KXOOluzoaEU0i33Zc9ij0k2tgWleQA++s7snzBlxQ3vCRIM99c NRKTj7sw6LyCkIxHF127b3U7EHncZ9HTRfdh9ak36n6cnkyW97NF7/rui3MdvULAN9BBvUg62fpF 91mpjUOI9J4hpLKP25LTTZ+LJ6L/IZAqkm5Z1W2jahzKVXeS5Vrb7ba/HSbCA8uyydf57TIB9Vgk FY08KLT841qFcHtZz7voxiJy4JHuHbph0nG5AJeHGx5BpFb7DchMdivjnwa8ldrIgFjnJFYsYGqf aUoaBsYOpxJtRDQE6SjPWc7mtw5WzqFSglBYyEzFfysIi1hjgjK+ZE8fMumQihdQ1VDmyWomQ2NP JZ1SFpqZ5dxV9j/IZ7YpizkLul/QYLa4IZlAH2uSK9UUzFq+/4J5rAnoxSK3Elol1x4QCR7s8rDg MaiS4fL2ksqiinkFI/lWWN3pSadTHJU/gfog9JpeBS8WWE0D+WUvJXNUEr6O0clgurO6JLXwGb7H IBUIV4CPDjMayMzaG/4ecDEDjhtLxcMMbtxPTBgLaOMIujlrJRsP2KI3/gJbdcuFX6IjX+/qvj5Q 2mGRlcDTnwWaCGaAo4LL+PE/8NTP5SbkILA0naQpn0mBSUOFi6pfcn/fYThp/rXSyCZ/gLrebQRI 6T6D98JjdQWKskB+BolpknCkTLmbK4ZHXtFw0zb5U2ykUc/6rTcYruxT58x2rNE/E5JzpicZeua9 tIYuY8/DYCYElYrW4EJAQPUYuLlqjaJg2UNqeZ6/todYhkNIjv5irqfW0DOrbyWfCUlVc9RlzAK/ PWg0Gp4iJdHKGUfLmX595wlpi6+enRV/gajCqoASEaN37fZs+9v5mT08Xw2G4/H4bOBiY2iB0jHb 43GN1rzCzdcrTmQqVTdCdHjm+9oXowE77L4Afk//9j0eTkiiWofpdqrPkCsDmj+MBn/PToffvs7H boooWqeALBVVsayHgUdM48y2y30wWHwRsTUDPyWa7Tr1rjyrEiZ2HI/0Ri03ekzQIFZJf7ftDlIh fGJCKmO3ZRdfmxxPSK6aH/uUOWe+H8CvQKte3dL3OpVpVhMVr9ds9y530ppVoaZiLo8jJfbVm8+s FvV/WKaUdKcOuowli7Cfj91Aeraazq/YLJ2HcvB3b12BWdo6efqayrlUAkDZzQR7MMy0O0uFl5kR njYhBseD05MfHwtHPcbZnorVLFEF92Ih+CvDx3ozZPaXdrQkWHWifV0bSloAEg8fIqbA7yQWZa7Q lOoFx3s00Pxmx8f6g62Ui1Wspk1wv41qQ/NwqwjAjCy8eg92m5mNE6+0V1BdHq2ZCPW8K0mUj1W6 dXA/kPwiKJ5Sbe+v7J11VD7J+cGrS7+w8Ccpqf0mnZ78AA== EOF; return gzinflate(base64_decode($data)); } } $client=new TestSoapClient("https://www.paypal.com/wsdl/PayPalSvc.wsdl"); var_dump($client->GetExpressCheckoutDetails(array('GetExpressCheckoutDetailsRequest'=>array('Version'=>50.0,'Token'=>'dummy')))); ?> ------------------------------------------------------------------------ The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at http://bugs.php.net/44882 -- Edit this bug report at http://bugs.php.net/?id=44882&edit=1
