https://bugzilla.wikimedia.org/show_bug.cgi?id=27924

--- Comment #1 from Reedy <[email protected]> 2011-03-15 21:37:46 UTC ---
I'm struggling to reproduce this.

<?php
header( "ERROR: I'm a teapot!", true, 418 );
echo 'teapot!';

See below. Output from execute is hacked in on the read....


> $req = MWHttpRequest::factory( "http://192.168.0.195/teapot.php";, $options );

> $status = $req->execute();
teapot!
> var_dump( $status );
object(Status)#14 (7) {
  ["ok"]=>
  bool(false)
  ["value"]=>
  int(100)
  ["successCount"]=>
  int(0)
  ["failCount"]=>
  int(0)
  ["success"]=>
  array(0) {
  }
  ["errors"]=>
  array(1) {
    [0]=>
    array(3) {
      ["type"]=>
      string(5) "error"
      ["message"]=>
      string(15) "http-bad-status"
      ["params"]=>
      array(2) {
        [0]=>
        string(3) "418"
        [1]=>
        string(6) "unused"
      }
    }
  }
  ["cleanCallback"]=>
  bool(false)
}

> var_dump( $req->getContent() );
string(7) "teapot!"

-- 
Configure bugmail: https://bugzilla.wikimedia.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.
You are on the CC list for the bug.

_______________________________________________
Wikibugs-l mailing list
[email protected]
https://lists.wikimedia.org/mailman/listinfo/wikibugs-l

Reply via email to