https://bugzilla.wikimedia.org/show_bug.cgi?id=27924
--- Comment #1 from Reedy <[email protected]> 2011-03-15 21:37:46 UTC --- I'm struggling to reproduce this. <?php header( "ERROR: I'm a teapot!", true, 418 ); echo 'teapot!'; See below. Output from execute is hacked in on the read.... > $req = MWHttpRequest::factory( "http://192.168.0.195/teapot.php", $options ); > $status = $req->execute(); teapot! > var_dump( $status ); object(Status)#14 (7) { ["ok"]=> bool(false) ["value"]=> int(100) ["successCount"]=> int(0) ["failCount"]=> int(0) ["success"]=> array(0) { } ["errors"]=> array(1) { [0]=> array(3) { ["type"]=> string(5) "error" ["message"]=> string(15) "http-bad-status" ["params"]=> array(2) { [0]=> string(3) "418" [1]=> string(6) "unused" } } } ["cleanCallback"]=> bool(false) } > var_dump( $req->getContent() ); string(7) "teapot!" -- Configure bugmail: https://bugzilla.wikimedia.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. You are on the CC list for the bug. _______________________________________________ Wikibugs-l mailing list [email protected] https://lists.wikimedia.org/mailman/listinfo/wikibugs-l
