diff --git a/code/web/Drivers/OCLCRSFGDriver.php b/code/web/Drivers/OCLCRSFGDriver.php
new file mode 100644
index 0000000000..41da5e1f81
--- /dev/null
+++ b/code/web/Drivers/OCLCRSFGDriver.php
@@ -0,0 +1,528 @@
+_registryId = $registryId;
+ return;
+ }
+ $homeLocation = Location::getUserHomeLocation();
+ $this->_registryId = $homeLocation ? $homeLocation->oclcRegistryId : "" ;
+ }
+
+ // Controllers
+
+ public function getAccountSummary(User $user): AccountSummary {
+ [
+ $existingId,
+ $summary,
+ ] = $user->getCachedAccountSummary('oclcRSFG');
+
+ if ($summary === null || isset($_REQUEST['reload'])) {
+ //Get account information from api
+ require_once ROOT_DIR . '/sys/User/AccountSummary.php';
+ $summary = new AccountSummary();
+ $summary->userId = $user->id;
+ $summary->source = 'oclcRSFG';
+ $summary->resetCounters();
+
+ $settings = new OCLCRSFGSetting();
+ $homeLibrary = Library::getPatronHomeLibrary();
+ $settings->whereAdd("id={$homeLibrary->oclcRSFGSettingsId}");
+ if($settings->find()) {
+ $settings->fetch();
+ }
+ $requests = $this->getRequests($user, $settings);
+ $summary->numUnavailableHolds = count($requests['unavailable']);
+ $summary->numAvailableHolds = count($requests['available']);
+ }
+
+ return $summary;
+ }
+
+ public function getRequestDetails(OCLCRSFGSetting $setting, string $oclcRequestId) {
+ if (empty($this->_registryId)) {
+ return [];
+ }
+ try {
+ if (empty($this->accessToken)) {
+ $this->setAccessToken($setting);
+ }
+ } catch (Exception $e) {
+ global $logger;
+ $logger->log("Exception conducting pre-submission checks for an ILL request to the Resource Sharing Requests API: $e", Logger::LOG_ERROR);
+ return [
+ 'title' => translate([
+ 'text' => 'Request Failed',
+ 'isPublicFacing' => true,
+ ]),
+ 'message' => translate([
+ 'text' => "Could not send request to the Resource Sharing For Groups system.",
+ 'isPublicFacing' => true,
+ ]),
+ 'success' => false,
+ ];
+ }
+ $requestInAspenDb = new OCLCRSFGRequest();
+ try {
+ $this->updateRequestInAspenDb($requestInAspenDb, $this->getRequestFromOCLCRSFGWithId($setting, $oclcRequestId));
+ } catch (Exception $e) {
+ global $logger;
+ $logger->log("Could not fetch data from OCLC Resource Sharing For Groups: $e", Logger::LOG_ERROR);
+ return [
+ 'title' => translate([
+ 'text' => 'Request Failed',
+ 'isPublicFacing' => true,
+ ]),
+ 'message' => translate([
+ 'text' => "Could not fetch data from OCLC Resource Sharing For Groups.",
+ 'isPublicFacing' => true,
+ ]),
+ 'success' => false,
+ ];
+
+ }
+ return $requestInAspenDb;
+ }
+
+ public function getRequests(User $patron, $setting): array {
+ if (empty($this->_registryId)) {
+ return [];
+ }
+ try {
+ if (empty($this->accessToken)) {
+ $this->setAccessToken($setting);
+ }
+ } catch (Exception $e) {
+ global $logger;
+ $logger->log("Exception conducting pre-submission checks for an ILL request to the Resource Sharing Requests API: $e", Logger::LOG_ERROR);
+ return [
+ 'title' => translate([
+ 'text' => 'Request Failed',
+ 'isPublicFacing' => true,
+ ]),
+ 'message' => translate([
+ 'text' => "Could not send request to the Resource Sharing For Groups system.",
+ 'isPublicFacing' => true,
+ ]),
+ 'success' => false,
+ ];
+ }
+ $requestsSent = $this->getAllRequestsFromAspenDbForPatron($patron->id);
+ $openRequests = [];
+ $processedRequests = [];
+ foreach ($requestsSent as $requestInAspenDb) {
+ if ($requestInAspenDb->oclcRequestId) {
+ $requestInOCLCRSFG = $this->getRequestFromOCLCRSFGWithId($setting, $requestInAspenDb->oclcRequestId);
+ }
+ if (!empty($requestInOCLCRSFG)) {
+ $requestInAspenDb->requestStatus = $requestInOCLCRSFG['illRequest']['requestStatus'];
+ $requestInAspenDb->update();
+ if(
+ $requestInAspenDb->requestStatus == "REVIEW" ||
+ $requestInAspenDb->requestStatus == "REVIEWING"
+ ){
+ $openRequests[] = $this->createTemporaryHold($patron->id, $requestInAspenDb);
+ }
+ if(
+ $requestInAspenDb->requestStatus == "RECEIVED"
+ ){
+ $processedRequests[] = $this->createTemporaryHold($patron->id, $requestInAspenDb);
+ }
+ }
+ }
+ return [
+ 'unavailable' => $openRequests,
+ 'available' => $processedRequests
+ ];
+ }
+
+ public function submitRequest(OCLCRSFGSetting $setting, User $patron, $requestFormData): array {
+ global $logger;
+ if (empty($this->_registryId)) {
+ $logger->log("Could not Authenticate: home location has not been assigned an OCLC Registry Id", Logger::LOG_ERROR);
+ throw new Exception("This library branch is not configured to send ILL requests. Please contact your library.");
+ }
+
+ try {
+ if (empty($this->accessToken) || time() > $this->accessToken->expires) {
+ $this->setAccessToken($setting);
+ }
+ } catch (Exception $e) {
+ global $logger;
+ $logger->log("Exception conducting pre-submission checks for an ILL request to the Resource Sharing Requests API: $e", Logger::LOG_DEBUG);
+ return [
+ 'title' => translate([
+ 'text' => 'Request Failed',
+ 'isPublicFacing' => true,
+ ]),
+ 'message' => translate([
+ 'text' => "Could not send request to the Resource Sharing For Groups system.",
+ 'isPublicFacing' => true,
+ ]),
+ 'success' => false,
+ ];
+ }
+
+ $requestInAspenDb = new OCLCRSFGRequest();
+ $this->populateNewRequest($requestInAspenDb, $requestFormData, $patron);
+
+ if ($this->isDuplicate($setting, $patron->id, $requestInAspenDb)) {
+ return [
+ 'title' => translate([
+ 'text' => 'Request Failed',
+ 'isPublicFacing' => true,
+ ]),
+ 'message' => translate([
+ 'text' => "This title has already been requested for you. You may only have one active request for a title.",
+ 'isPublicFacing' => true,
+ ]),
+ 'success' => false,
+ ];
+ }
+ $requestInAspenDb->insert();
+ try {
+ $IllRequestCreated = $this->postToOCLCRSFG($setting->serviceBaseUrl, $requestInAspenDb);
+ $requestInAspenDb->requestStatus = $IllRequestCreated['responses']['illRequest']['requestStatus'];
+ $requestInAspenDb->oclcRequestId = $IllRequestCreated['responses']['illRequest']['requestId'];
+ } catch (Exception $e) {
+ global $logger;
+ $logger->log("Exception submitting an ILL request to the Resource Sharing Requests API: $e", Logger::LOG_ERROR);
+ return [
+ 'title' => translate([
+ 'text' => 'Request Failed',
+ 'isPublicFacing' => true,
+ ]),
+ 'message' => translate([
+ 'text' => "Could not send request to the Resource Sharing For Groups system.",
+ 'isPublicFacing' => true,
+ ]),
+ 'success' => false,
+ ];
+ }
+ $requestInAspenDb->update();
+ return [
+ 'title' => translate([
+ 'text' => 'Request Sent',
+ 'isPublicFacing' => true,
+ ]),
+ 'message' => translate([
+ 'text' => "Your request has been submitted. You can check the status of your request within your account under Titles On Hold. Please allow for a few minutes before refreshing the page to see your new interlibrary loan request.",
+ 'isPublicFacing' => true,
+ ]),
+ 'success' => true,
+ ];
+ }
+
+ private function isDuplicate(OCLCRSFGSetting $setting, Int $patronId, OCLCRSFGRequest $requestInAspenDb): bool {
+ $this->updateRequestsInAspenDbForPatron($setting, $patronId);
+ $existingRequests = $this->getAllRequestsFromAspenDbForPatron($patronId);
+ foreach ($existingRequests as $existingRequest) {
+ if (!$existingRequest->catalogKey) {
+ return false;
+ }
+ if (
+ $requestInAspenDb->catalogKey == $existingRequest->catalogKey
+ && $existingRequest->requestStatus != "RETURNED"
+ && $existingRequest->requestStatus != "CLOSED"
+ ) {
+ return true;
+ }
+ }
+ return false;
+ }
+
+ public function updateRequestsInAspenDbForPatron(OCLCRSFGSetting $setting, int $patronId): array {
+ try {
+ if (empty($this->accessToken)) {
+ $this->setAccessToken($setting);
+ }
+ } catch (Exception $e) {
+ global $logger;
+ $logger->log("Exception conducting pre-submission checks for an ILL request to the Resource Sharing Requests API: $e", Logger::LOG_ERROR);
+ return [
+ 'title' => translate([
+ 'text' => 'Request Failed',
+ 'isPublicFacing' => true,
+ ]),
+ 'message' => translate([
+ 'text' => "Could not send request to the Resource Sharing For Groups system.",
+ 'isPublicFacing' => true,
+ ]),
+ 'success' => false,
+ ];
+ }
+
+ if (empty($this->_registryId)) {
+ global $logger;
+ $logger->log("Could not Authenticate: home location has not been assigned an OCLC Registry Id", Logger::LOG_ERROR);
+ throw new Exception("This library branch is not configured to send ILL requests. Please contact your library.");
+ }
+
+ $requests = $this->getAllRequestsFromOCLCRSFGForPatron($setting, $patronId);
+
+ foreach ($requests as $requestInOCLCRSFG) {
+ $requestInAspenDb = new OCLCRSFGRequest();
+ if (!empty($requestInOCLCRSFG)) {
+ $this->updateRequestInAspenDb($requestInAspenDb, $requestInOCLCRSFG);
+ }
+ }
+
+ return $requests;
+ }
+
+ // Services - interacts with Aspen DB
+
+ private function getAllRequestsFromAspenDbForPatron(Int $patronId): array {
+ $requestsToProcess = [];
+ $request = new OCLCRSFGRequest();
+ $request->userId = $patronId;
+ $request->find();
+ while ($request->fetch()) {
+ if (empty($request->vdxId) && ($request->status != 'Not found in OCLC Resource Sharing For Groups' && $request->status != 'CANCELLED')) {
+ $requestsToProcess[] = clone $request;
+ }
+ }
+ return $requestsToProcess;
+ }
+
+ private function updateRequestInAspenDb(OCLCRSFGRequest $requestInAspenDb, $request): void {
+ if (!isset($request['illRequest']['requestId'])) {
+ return;
+ }
+ $requestInAspenDb->oclcRequestId = $request['illRequest']['requestId'];
+ if (!$requestInAspenDb->find(true)) {
+ return;
+ }
+
+ // as of now, OCLC RS API will send back all requests, regardless of status.
+ if(isset($request['illRequest']['requestStatus']) && $request['illRequest']['requestStatus'] == "CLOSED") {
+ $requestInAspenDb->whereAdd('oclcRequestId=' . $request['illRequest']['requestId']);
+ $requestInAspenDb->delete(true);
+ return;
+ }
+
+ if (isset($request['illRequest']['requestStatus'])) {
+ $requestInAspenDb->requestStatus = $request['illRequest']['requestStatus'];
+ }
+ if (isset($request['illRequest']['requestStatusDescription'])) {
+ $requestInAspenDb->requestStatusDescription = $request['illRequest']['requestStatusDescription'];
+ }
+ if (isset($request['illRequest']['created'])) {
+ $requestInAspenDb->createdDate = date_format(date_create($request['illRequest']['created']), 'Y-m-d g:i:s.u');
+ }
+ if (isset($request['illRequest']['verification'])) {
+ $requestInAspenDb->verification = $request['illRequest']['verification'];
+ }
+ if (isset($request['illRequest']['needed'])) {
+ $requestInAspenDb->needed = date_format(date_create($request['illRequest']['needed']), 'Y-m-d g:i:s.u');
+ }
+ if (isset($request['illRequest']['requester']['serviceType'])) {
+ $requestInAspenDb->serviceType = $request['illRequest']['requester']['serviceType'];
+ }
+ if (isset($request['illRequest']['item']['userId'])) {
+ $requestInAspenDb->userId = $request['illRequest']['item']['userId'];
+ }
+ if (isset($request['illRequest']['item']['email'])) {
+ $requestInAspenDb->email = $request['illRequest']['item']['email'];
+ }
+ if (isset($request['illRequest']['item']['isbn'])) {
+ $requestInAspenDb->isbn = $request['illRequest']['item']['isbn'];
+ }
+ if (isset($request['illRequest']['item']['issn'])) {
+ $requestInAspenDb->issn = $request['illRequest']['item']['issn'];
+ }
+ if (isset($request['illRequest']['item']['oclcNumber'])) {
+ $requestInAspenDb->oclcNumber = $request['illRequest']['item']['oclcNumber'];
+ }
+ if (isset($request['illRequest']['item']['mediaType'])) {
+ $requestInAspenDb->mediaType = $request['illRequest']['item']['mediaType'];
+ }
+ if (isset($request['illRequest']['item']['title'])) {
+ $requestInAspenDb->title = $request['illRequest']['item']['title'];
+ }
+ if (isset($request['illRequest']['item']['author'])) {
+ $requestInAspenDb->author = $request['illRequest']['item']['author'];
+ }
+ if (isset($request['illRequest']['item']['edition']['editionSpecific'])) {
+ $requestInAspenDb->edition = $request['illRequest']['item']['edition']['editionSpecific'];
+ }
+ if (isset($request['illRequest']['item']['publisherName'])) {
+ $requestInAspenDb->publisher = $request['illRequest']['item']['publisherName'];
+ }
+ if (isset($request['illRequest']['item']['language'])) {
+ $requestInAspenDb->language = $request['illRequest']['item']['language'];
+ }
+ if (isset($request['illRequest']['feeAccepted'])) {
+ $requestInAspenDb->feeAccepted = $request['illRequest']['feeAccepted'];
+ }
+ if (isset($request['illRequest']['maximumFeeAmount'])) {
+ $requestInAspenDb->maximumFeeAmount = $request['illRequest']['maximumFeeAmount'];
+ }
+ if (isset($request['illRequest']['catalogKey'])) {
+ $requestInAspenDb->catalogKey = $request['illRequest']['catalogKey'];
+ }
+ if (isset($request['illRequest']['note'])) {
+ $requestInAspenDb->note = $request['illRequest']['note'];
+ }
+ if (isset($request['illRequest']['pickupLocation'])) {
+ $requestInAspenDb->pickupLocation = $request['illRequest']['pickupLocation'];
+ }
+
+ $requestInAspenDb->update();
+ }
+
+ // Services - interacts with the Resource Sharing Request API from OCLC
+
+ private function getAllRequestsFromOCLCRSFGForPatron(OCLCRSFGSetting $setting, Int $patronId): array {
+ require_once ROOT_DIR . '/sys/CurlWrapper.php';
+ $searchTerm = "searchTerm=patronID";
+ $searchValue = "searchValue=" . "$patronId";
+ $url = $setting->serviceBaseUrl . "/requests" . "?" . $searchTerm . "&" . $searchValue;
+ $curl = new CurlWrapper();
+ $customHeaders = [
+ "Authorization" => "Authorization: Bearer " . $this->accessToken->getToken(),
+ ];
+ $curl->addCustomHeaders($customHeaders, false);
+ $curl->curl_connect($url);
+ $response = $curl->curlGetPage($url);
+ return json_decode(json_encode(simplexml_load_string($response)), true)['responses'];
+ }
+
+ private function getRequestFromOCLCRSFGWithId(OCLCRSFGSetting $setting, string $oclcRequestId): array|null {
+ require_once ROOT_DIR . '/sys/CurlWrapper.php';
+ $url = $setting->serviceBaseUrl . "/requests" . "/" . $oclcRequestId;
+ $curl = new CurlWrapper();
+ $customHeaders = [
+ "Authorization" => "Authorization: Bearer " . $this->accessToken->getToken(),
+ ];
+ $curl->addCustomHeaders($customHeaders, false);
+ $curl->curl_connect($url);
+ $response = $curl->curlGetPage($url);
+ if (!$response) {
+ throw new Exception("No requests found with id $oclcRequestId");
+ }
+ return json_decode(json_encode(simplexml_load_string($response)), true)['responses'];
+ }
+
+ private function postToOCLCRSFG(string $serviceBaseUrl, OCLCRSFGRequest $newRequest): array {
+ require_once ROOT_DIR . '/sys/CurlWrapper.php';
+ $url = $serviceBaseUrl . "/requests";
+ $curl = new CurlWrapper();
+ $customHeaders = [
+ "Content-type" => "Content-type: application/json",
+ "Authorization" => "Authorization: Bearer " . $this->accessToken->getToken(),
+ ];
+ $curl->addCustomHeaders($customHeaders, false);
+ $curl->curl_connect($url);
+ $response = $curl->curlPostBodyData($url, $this->formatRequestBody($newRequest));
+ try {
+ $data = json_decode(json_encode(simplexml_load_string($response)), true);
+ } catch (Exception $e) {
+ throw new Exception($e->getMessage());
+ }
+ return $data;
+ }
+
+ private function setAccessToken(OCLCRSFGSetting $setting): void {
+ require_once 'oauth2_client_php_league/autoload.php';
+ $basicAuth_provider = new HttpBasicAuthOptionProvider();
+ $setup_options = [
+ 'clientId' => $setting->clientKey,
+ 'clientSecret' => $setting->clientSecret,
+ 'urlAuthorize' => $setting->authBaseUrl . "auth", // not used for this grant type yet field still required - could set to ''
+ 'urlAccessToken' => $setting->authBaseUrl . "token",
+ 'urlResourceOwnerDetails' => '',
+ 'redirectUri' => '',
+ ];
+ $provider = new GenericProvider($setup_options, ['optionProvider' => $basicAuth_provider]);
+ try {
+ $this->accessToken = $provider->getAccessToken('client_credentials', ['scope' => $setting->scopes . " context:" . $this->_registryId]);
+ return;
+ } catch (IdentityProviderException $e) {
+ throw new Exception($e->getMessage());
+ };
+ }
+
+ // Helpers
+
+ private function createTemporaryHold($patronId, $request): Hold {
+ require_once ROOT_DIR . '/sys/User/Hold.php';
+ $curRequest = new Hold();
+ $curRequest->userId = $patronId;
+ $curRequest->type = 'interlibrary_loan';
+ $curRequest->isIll = true;
+ $curRequest->source = 'oclcRSFG';
+ $curRequest->sourceId = $request->catalogKey;
+ $curRequest->recordId = $request->catalogKey;
+ $curRequest->title = $request->title;
+ $curRequest->author = $request->author;
+ $curRequest->status = $request->requestStatus;
+ $curRequest->pickupLocationName = $request->pickupLocation;
+ $curRequest->cancelId = $request->oclcRequestId;
+ $curRequest->cancelable = false;
+ if ($request->requestStatus == 'REVIEW' || $request->requestStatus == 'REVIEWING') {
+ $curRequest->cancelable = true;
+ }
+ return $curRequest;
+ }
+
+ private function formatRequestBody(OCLCRSFGRequest $newRequest): object {
+ $illRequest = [];
+ $illRequest["requestStatus"] = "PROFILING";
+ $illRequest["requester"] = [
+ "institution" => [
+ "institutionId" => $newRequest->oclcRequesterRegistryId
+ ],
+ "serviceType" => "LOAN",
+ ];
+ $illRequest["item"] = [
+ "verification" => "item discovered on Aspen Discovery"
+ ];
+ if (!empty($newRequest->isbn)) {
+ $illRequest["item"]["isbn"] = $newRequest->isbn;
+ }
+ if (!empty($newRequest->issn)) {
+ $illRequest["item"]["issn"] = $newRequest->issn;
+ }
+ if (!empty($newRequest->oclcNumber)) {
+ $illRequest["item"]["oclcNumber"] = $newRequest->oclcNumber;
+ }
+ $illRequest["patron"] = [
+ "patronApproved" => true,
+ "userId" => "{$newRequest->userId}"
+ ];
+ return (object)["illRequest" => $illRequest];
+ }
+
+ private function populateNewRequest(OCLCRSFGRequest $requestInAspenDb, &$requestFormData, User $patron): void {
+ $requestInAspenDb->title = isset($requestFormData["title"]) ? strip_tags($requestFormData["title"]) : "";
+ $requestInAspenDb->author = isset($requestFormData["author"]) ? strip_tags($requestFormData["author"]): "";
+ $requestInAspenDb->publisher = isset($requestFormData["publisher"]) ? strip_tags($requestFormData["publisher"]) : "";
+ $requestInAspenDb->isbn = isset($requestFormData["isbn"]) ? strip_tags($requestFormData["isbn"]) : "";
+ $requestInAspenDb->issn = isset($requestFormData["issn"]) ? strip_tags($requestFormData["issn"]) : "";
+ $requestInAspenDb->oclcNumber = isset($requestFormData["oclcNumber"]) ? strip_tags($requestFormData["oclcNumber"]) : "";
+ if (isset($requestFormData["uniqueIdentifierKey"]) && isset($requestFormData["uniqueIdentifierValue"])) {
+ $requestInAspenDb->{$requestFormData["uniqueIdentifierKey"]} = $requestFormData["uniqueIdentifierValue"];
+ }
+ $requestInAspenDb->feeAccepted = (isset($requestFormData['acceptFee']) && $requestFormData['acceptFee'] == 'true') ? 1 : 0;
+ $requestInAspenDb->maximumFeeAmount = isset($requestFormData["maximumFeeAmount"]) ? strip_tags($requestFormData["maximumFeeAmount"]) : "";
+ $requestInAspenDb->catalogKey = isset($requestFormData["catalogKey"]) ? strip_tags($requestFormData["catalogKey"]) : "";
+ $requestInAspenDb->requestStatus = "NEW";
+ $requestInAspenDb->note = isset($requestFormData["note"]) ? strip_tags($requestFormData["note"]) : "";
+ $requestInAspenDb->oclcRequesterRegistryId = $this->_registryId;
+ $requestInAspenDb->userId = $patron->id;
+ $patronHomeLocation = $patron->getHomeLocation();
+ $requestInAspenDb->pickupLocation = empty($patronHomeLocation->oclcRSFGLocation) ? $patronHomeLocation->code : $patronHomeLocation->oclcRSFGLocation;
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/autoload.php b/code/web/Drivers/oauth2_client_php_league/autoload.php
new file mode 100644
index 0000000000..3f780a4274
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/autoload.php
@@ -0,0 +1,25 @@
+
+ * Jordi Boggiano
+ *
+ * For the full copyright and license information, please view the LICENSE
+ * file that was distributed with this source code.
+ */
+
+namespace Composer\Autoload;
+
+/**
+ * ClassLoader implements a PSR-0, PSR-4 and classmap class loader.
+ *
+ * $loader = new \Composer\Autoload\ClassLoader();
+ *
+ * // register classes with namespaces
+ * $loader->add('Symfony\Component', __DIR__.'/component');
+ * $loader->add('Symfony', __DIR__.'/framework');
+ *
+ * // activate the autoloader
+ * $loader->register();
+ *
+ * // to enable searching the include path (eg. for PEAR packages)
+ * $loader->setUseIncludePath(true);
+ *
+ * In this example, if you try to use a class in the Symfony\Component
+ * namespace or one of its children (Symfony\Component\Console for instance),
+ * the autoloader will first look for the class under the component/
+ * directory, and it will then fallback to the framework/ directory if not
+ * found before giving up.
+ *
+ * This class is loosely based on the Symfony UniversalClassLoader.
+ *
+ * @author Fabien Potencier
+ * @author Jordi Boggiano
+ * @see https://www.php-fig.org/psr/psr-0/
+ * @see https://www.php-fig.org/psr/psr-4/
+ */
+class ClassLoader
+{
+ /** @var \Closure(string):void */
+ private static $includeFile;
+
+ /** @var string|null */
+ private $vendorDir;
+
+ // PSR-4
+ /**
+ * @var array>
+ */
+ private $prefixLengthsPsr4 = array();
+ /**
+ * @var array>
+ */
+ private $prefixDirsPsr4 = array();
+ /**
+ * @var list
+ */
+ private $fallbackDirsPsr4 = array();
+
+ // PSR-0
+ /**
+ * List of PSR-0 prefixes
+ *
+ * Structured as array('F (first letter)' => array('Foo\Bar (full prefix)' => array('path', 'path2')))
+ *
+ * @var array>>
+ */
+ private $prefixesPsr0 = array();
+ /**
+ * @var list
+ */
+ private $fallbackDirsPsr0 = array();
+
+ /** @var bool */
+ private $useIncludePath = false;
+
+ /**
+ * @var array
+ */
+ private $classMap = array();
+
+ /** @var bool */
+ private $classMapAuthoritative = false;
+
+ /**
+ * @var array
+ */
+ private $missingClasses = array();
+
+ /** @var string|null */
+ private $apcuPrefix;
+
+ /**
+ * @var array
+ */
+ private static $registeredLoaders = array();
+
+ /**
+ * @param string|null $vendorDir
+ */
+ public function __construct($vendorDir = null)
+ {
+ $this->vendorDir = $vendorDir;
+ self::initializeIncludeClosure();
+ }
+
+ /**
+ * @return array>
+ */
+ public function getPrefixes()
+ {
+ if (!empty($this->prefixesPsr0)) {
+ return call_user_func_array('array_merge', array_values($this->prefixesPsr0));
+ }
+
+ return array();
+ }
+
+ /**
+ * @return array>
+ */
+ public function getPrefixesPsr4()
+ {
+ return $this->prefixDirsPsr4;
+ }
+
+ /**
+ * @return list
+ */
+ public function getFallbackDirs()
+ {
+ return $this->fallbackDirsPsr0;
+ }
+
+ /**
+ * @return list
+ */
+ public function getFallbackDirsPsr4()
+ {
+ return $this->fallbackDirsPsr4;
+ }
+
+ /**
+ * @return array Array of classname => path
+ */
+ public function getClassMap()
+ {
+ return $this->classMap;
+ }
+
+ /**
+ * @param array $classMap Class to filename map
+ *
+ * @return void
+ */
+ public function addClassMap(array $classMap)
+ {
+ if ($this->classMap) {
+ $this->classMap = array_merge($this->classMap, $classMap);
+ } else {
+ $this->classMap = $classMap;
+ }
+ }
+
+ /**
+ * Registers a set of PSR-0 directories for a given prefix, either
+ * appending or prepending to the ones previously set for this prefix.
+ *
+ * @param string $prefix The prefix
+ * @param list|string $paths The PSR-0 root directories
+ * @param bool $prepend Whether to prepend the directories
+ *
+ * @return void
+ */
+ public function add($prefix, $paths, $prepend = false)
+ {
+ $paths = (array) $paths;
+ if (!$prefix) {
+ if ($prepend) {
+ $this->fallbackDirsPsr0 = array_merge(
+ $paths,
+ $this->fallbackDirsPsr0
+ );
+ } else {
+ $this->fallbackDirsPsr0 = array_merge(
+ $this->fallbackDirsPsr0,
+ $paths
+ );
+ }
+
+ return;
+ }
+
+ $first = $prefix[0];
+ if (!isset($this->prefixesPsr0[$first][$prefix])) {
+ $this->prefixesPsr0[$first][$prefix] = $paths;
+
+ return;
+ }
+ if ($prepend) {
+ $this->prefixesPsr0[$first][$prefix] = array_merge(
+ $paths,
+ $this->prefixesPsr0[$first][$prefix]
+ );
+ } else {
+ $this->prefixesPsr0[$first][$prefix] = array_merge(
+ $this->prefixesPsr0[$first][$prefix],
+ $paths
+ );
+ }
+ }
+
+ /**
+ * Registers a set of PSR-4 directories for a given namespace, either
+ * appending or prepending to the ones previously set for this namespace.
+ *
+ * @param string $prefix The prefix/namespace, with trailing '\\'
+ * @param list|string $paths The PSR-4 base directories
+ * @param bool $prepend Whether to prepend the directories
+ *
+ * @throws \InvalidArgumentException
+ *
+ * @return void
+ */
+ public function addPsr4($prefix, $paths, $prepend = false)
+ {
+ $paths = (array) $paths;
+ if (!$prefix) {
+ // Register directories for the root namespace.
+ if ($prepend) {
+ $this->fallbackDirsPsr4 = array_merge(
+ $paths,
+ $this->fallbackDirsPsr4
+ );
+ } else {
+ $this->fallbackDirsPsr4 = array_merge(
+ $this->fallbackDirsPsr4,
+ $paths
+ );
+ }
+ } elseif (!isset($this->prefixDirsPsr4[$prefix])) {
+ // Register directories for a new namespace.
+ $length = strlen($prefix);
+ if ('\\' !== $prefix[$length - 1]) {
+ throw new \InvalidArgumentException("A non-empty PSR-4 prefix must end with a namespace separator.");
+ }
+ $this->prefixLengthsPsr4[$prefix[0]][$prefix] = $length;
+ $this->prefixDirsPsr4[$prefix] = $paths;
+ } elseif ($prepend) {
+ // Prepend directories for an already registered namespace.
+ $this->prefixDirsPsr4[$prefix] = array_merge(
+ $paths,
+ $this->prefixDirsPsr4[$prefix]
+ );
+ } else {
+ // Append directories for an already registered namespace.
+ $this->prefixDirsPsr4[$prefix] = array_merge(
+ $this->prefixDirsPsr4[$prefix],
+ $paths
+ );
+ }
+ }
+
+ /**
+ * Registers a set of PSR-0 directories for a given prefix,
+ * replacing any others previously set for this prefix.
+ *
+ * @param string $prefix The prefix
+ * @param list|string $paths The PSR-0 base directories
+ *
+ * @return void
+ */
+ public function set($prefix, $paths)
+ {
+ if (!$prefix) {
+ $this->fallbackDirsPsr0 = (array) $paths;
+ } else {
+ $this->prefixesPsr0[$prefix[0]][$prefix] = (array) $paths;
+ }
+ }
+
+ /**
+ * Registers a set of PSR-4 directories for a given namespace,
+ * replacing any others previously set for this namespace.
+ *
+ * @param string $prefix The prefix/namespace, with trailing '\\'
+ * @param list|string $paths The PSR-4 base directories
+ *
+ * @throws \InvalidArgumentException
+ *
+ * @return void
+ */
+ public function setPsr4($prefix, $paths)
+ {
+ if (!$prefix) {
+ $this->fallbackDirsPsr4 = (array) $paths;
+ } else {
+ $length = strlen($prefix);
+ if ('\\' !== $prefix[$length - 1]) {
+ throw new \InvalidArgumentException("A non-empty PSR-4 prefix must end with a namespace separator.");
+ }
+ $this->prefixLengthsPsr4[$prefix[0]][$prefix] = $length;
+ $this->prefixDirsPsr4[$prefix] = (array) $paths;
+ }
+ }
+
+ /**
+ * Turns on searching the include path for class files.
+ *
+ * @param bool $useIncludePath
+ *
+ * @return void
+ */
+ public function setUseIncludePath($useIncludePath)
+ {
+ $this->useIncludePath = $useIncludePath;
+ }
+
+ /**
+ * Can be used to check if the autoloader uses the include path to check
+ * for classes.
+ *
+ * @return bool
+ */
+ public function getUseIncludePath()
+ {
+ return $this->useIncludePath;
+ }
+
+ /**
+ * Turns off searching the prefix and fallback directories for classes
+ * that have not been registered with the class map.
+ *
+ * @param bool $classMapAuthoritative
+ *
+ * @return void
+ */
+ public function setClassMapAuthoritative($classMapAuthoritative)
+ {
+ $this->classMapAuthoritative = $classMapAuthoritative;
+ }
+
+ /**
+ * Should class lookup fail if not found in the current class map?
+ *
+ * @return bool
+ */
+ public function isClassMapAuthoritative()
+ {
+ return $this->classMapAuthoritative;
+ }
+
+ /**
+ * APCu prefix to use to cache found/not-found classes, if the extension is enabled.
+ *
+ * @param string|null $apcuPrefix
+ *
+ * @return void
+ */
+ public function setApcuPrefix($apcuPrefix)
+ {
+ $this->apcuPrefix = function_exists('apcu_fetch') && filter_var(ini_get('apc.enabled'), FILTER_VALIDATE_BOOLEAN) ? $apcuPrefix : null;
+ }
+
+ /**
+ * The APCu prefix in use, or null if APCu caching is not enabled.
+ *
+ * @return string|null
+ */
+ public function getApcuPrefix()
+ {
+ return $this->apcuPrefix;
+ }
+
+ /**
+ * Registers this instance as an autoloader.
+ *
+ * @param bool $prepend Whether to prepend the autoloader or not
+ *
+ * @return void
+ */
+ public function register($prepend = false)
+ {
+ spl_autoload_register(array($this, 'loadClass'), true, $prepend);
+
+ if (null === $this->vendorDir) {
+ return;
+ }
+
+ if ($prepend) {
+ self::$registeredLoaders = array($this->vendorDir => $this) + self::$registeredLoaders;
+ } else {
+ unset(self::$registeredLoaders[$this->vendorDir]);
+ self::$registeredLoaders[$this->vendorDir] = $this;
+ }
+ }
+
+ /**
+ * Unregisters this instance as an autoloader.
+ *
+ * @return void
+ */
+ public function unregister()
+ {
+ spl_autoload_unregister(array($this, 'loadClass'));
+
+ if (null !== $this->vendorDir) {
+ unset(self::$registeredLoaders[$this->vendorDir]);
+ }
+ }
+
+ /**
+ * Loads the given class or interface.
+ *
+ * @param string $class The name of the class
+ * @return true|null True if loaded, null otherwise
+ */
+ public function loadClass($class)
+ {
+ if ($file = $this->findFile($class)) {
+ $includeFile = self::$includeFile;
+ $includeFile($file);
+
+ return true;
+ }
+
+ return null;
+ }
+
+ /**
+ * Finds the path to the file where the class is defined.
+ *
+ * @param string $class The name of the class
+ *
+ * @return string|false The path if found, false otherwise
+ */
+ public function findFile($class)
+ {
+ // class map lookup
+ if (isset($this->classMap[$class])) {
+ return $this->classMap[$class];
+ }
+ if ($this->classMapAuthoritative || isset($this->missingClasses[$class])) {
+ return false;
+ }
+ if (null !== $this->apcuPrefix) {
+ $file = apcu_fetch($this->apcuPrefix.$class, $hit);
+ if ($hit) {
+ return $file;
+ }
+ }
+
+ $file = $this->findFileWithExtension($class, '.php');
+
+ // Search for Hack files if we are running on HHVM
+ if (false === $file && defined('HHVM_VERSION')) {
+ $file = $this->findFileWithExtension($class, '.hh');
+ }
+
+ if (null !== $this->apcuPrefix) {
+ apcu_add($this->apcuPrefix.$class, $file);
+ }
+
+ if (false === $file) {
+ // Remember that this class does not exist.
+ $this->missingClasses[$class] = true;
+ }
+
+ return $file;
+ }
+
+ /**
+ * Returns the currently registered loaders keyed by their corresponding vendor directories.
+ *
+ * @return array
+ */
+ public static function getRegisteredLoaders()
+ {
+ return self::$registeredLoaders;
+ }
+
+ /**
+ * @param string $class
+ * @param string $ext
+ * @return string|false
+ */
+ private function findFileWithExtension($class, $ext)
+ {
+ // PSR-4 lookup
+ $logicalPathPsr4 = strtr($class, '\\', DIRECTORY_SEPARATOR) . $ext;
+
+ $first = $class[0];
+ if (isset($this->prefixLengthsPsr4[$first])) {
+ $subPath = $class;
+ while (false !== $lastPos = strrpos($subPath, '\\')) {
+ $subPath = substr($subPath, 0, $lastPos);
+ $search = $subPath . '\\';
+ if (isset($this->prefixDirsPsr4[$search])) {
+ $pathEnd = DIRECTORY_SEPARATOR . substr($logicalPathPsr4, $lastPos + 1);
+ foreach ($this->prefixDirsPsr4[$search] as $dir) {
+ if (file_exists($file = $dir . $pathEnd)) {
+ return $file;
+ }
+ }
+ }
+ }
+ }
+
+ // PSR-4 fallback dirs
+ foreach ($this->fallbackDirsPsr4 as $dir) {
+ if (file_exists($file = $dir . DIRECTORY_SEPARATOR . $logicalPathPsr4)) {
+ return $file;
+ }
+ }
+
+ // PSR-0 lookup
+ if (false !== $pos = strrpos($class, '\\')) {
+ // namespaced class name
+ $logicalPathPsr0 = substr($logicalPathPsr4, 0, $pos + 1)
+ . strtr(substr($logicalPathPsr4, $pos + 1), '_', DIRECTORY_SEPARATOR);
+ } else {
+ // PEAR-like class name
+ $logicalPathPsr0 = strtr($class, '_', DIRECTORY_SEPARATOR) . $ext;
+ }
+
+ if (isset($this->prefixesPsr0[$first])) {
+ foreach ($this->prefixesPsr0[$first] as $prefix => $dirs) {
+ if (0 === strpos($class, $prefix)) {
+ foreach ($dirs as $dir) {
+ if (file_exists($file = $dir . DIRECTORY_SEPARATOR . $logicalPathPsr0)) {
+ return $file;
+ }
+ }
+ }
+ }
+ }
+
+ // PSR-0 fallback dirs
+ foreach ($this->fallbackDirsPsr0 as $dir) {
+ if (file_exists($file = $dir . DIRECTORY_SEPARATOR . $logicalPathPsr0)) {
+ return $file;
+ }
+ }
+
+ // PSR-0 include paths.
+ if ($this->useIncludePath && $file = stream_resolve_include_path($logicalPathPsr0)) {
+ return $file;
+ }
+
+ return false;
+ }
+
+ /**
+ * @return void
+ */
+ private static function initializeIncludeClosure()
+ {
+ if (self::$includeFile !== null) {
+ return;
+ }
+
+ /**
+ * Scope isolated include.
+ *
+ * Prevents access to $this/self from included files.
+ *
+ * @param string $file
+ * @return void
+ */
+ self::$includeFile = \Closure::bind(static function($file) {
+ include $file;
+ }, null, null);
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/composer/InstalledVersions.php b/code/web/Drivers/oauth2_client_php_league/composer/InstalledVersions.php
new file mode 100644
index 0000000000..51e734a774
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/composer/InstalledVersions.php
@@ -0,0 +1,359 @@
+
+ * Jordi Boggiano
+ *
+ * For the full copyright and license information, please view the LICENSE
+ * file that was distributed with this source code.
+ */
+
+namespace Composer;
+
+use Composer\Autoload\ClassLoader;
+use Composer\Semver\VersionParser;
+
+/**
+ * This class is copied in every Composer installed project and available to all
+ *
+ * See also https://getcomposer.org/doc/07-runtime.md#installed-versions
+ *
+ * To require its presence, you can require `composer-runtime-api ^2.0`
+ *
+ * @final
+ */
+class InstalledVersions
+{
+ /**
+ * @var mixed[]|null
+ * @psalm-var array{root: array{name: string, pretty_version: string, version: string, reference: string|null, type: string, install_path: string, aliases: string[], dev: bool}, versions: array}|array{}|null
+ */
+ private static $installed;
+
+ /**
+ * @var bool|null
+ */
+ private static $canGetVendors;
+
+ /**
+ * @var array[]
+ * @psalm-var array}>
+ */
+ private static $installedByVendor = array();
+
+ /**
+ * Returns a list of all package names which are present, either by being installed, replaced or provided
+ *
+ * @return string[]
+ * @psalm-return list
+ */
+ public static function getInstalledPackages()
+ {
+ $packages = array();
+ foreach (self::getInstalled() as $installed) {
+ $packages[] = array_keys($installed['versions']);
+ }
+
+ if (1 === \count($packages)) {
+ return $packages[0];
+ }
+
+ return array_keys(array_flip(\call_user_func_array('array_merge', $packages)));
+ }
+
+ /**
+ * Returns a list of all package names with a specific type e.g. 'library'
+ *
+ * @param string $type
+ * @return string[]
+ * @psalm-return list
+ */
+ public static function getInstalledPackagesByType($type)
+ {
+ $packagesByType = array();
+
+ foreach (self::getInstalled() as $installed) {
+ foreach ($installed['versions'] as $name => $package) {
+ if (isset($package['type']) && $package['type'] === $type) {
+ $packagesByType[] = $name;
+ }
+ }
+ }
+
+ return $packagesByType;
+ }
+
+ /**
+ * Checks whether the given package is installed
+ *
+ * This also returns true if the package name is provided or replaced by another package
+ *
+ * @param string $packageName
+ * @param bool $includeDevRequirements
+ * @return bool
+ */
+ public static function isInstalled($packageName, $includeDevRequirements = true)
+ {
+ foreach (self::getInstalled() as $installed) {
+ if (isset($installed['versions'][$packageName])) {
+ return $includeDevRequirements || !isset($installed['versions'][$packageName]['dev_requirement']) || $installed['versions'][$packageName]['dev_requirement'] === false;
+ }
+ }
+
+ return false;
+ }
+
+ /**
+ * Checks whether the given package satisfies a version constraint
+ *
+ * e.g. If you want to know whether version 2.3+ of package foo/bar is installed, you would call:
+ *
+ * Composer\InstalledVersions::satisfies(new VersionParser, 'foo/bar', '^2.3')
+ *
+ * @param VersionParser $parser Install composer/semver to have access to this class and functionality
+ * @param string $packageName
+ * @param string|null $constraint A version constraint to check for, if you pass one you have to make sure composer/semver is required by your package
+ * @return bool
+ */
+ public static function satisfies(VersionParser $parser, $packageName, $constraint)
+ {
+ $constraint = $parser->parseConstraints((string) $constraint);
+ $provided = $parser->parseConstraints(self::getVersionRanges($packageName));
+
+ return $provided->matches($constraint);
+ }
+
+ /**
+ * Returns a version constraint representing all the range(s) which are installed for a given package
+ *
+ * It is easier to use this via isInstalled() with the $constraint argument if you need to check
+ * whether a given version of a package is installed, and not just whether it exists
+ *
+ * @param string $packageName
+ * @return string Version constraint usable with composer/semver
+ */
+ public static function getVersionRanges($packageName)
+ {
+ foreach (self::getInstalled() as $installed) {
+ if (!isset($installed['versions'][$packageName])) {
+ continue;
+ }
+
+ $ranges = array();
+ if (isset($installed['versions'][$packageName]['pretty_version'])) {
+ $ranges[] = $installed['versions'][$packageName]['pretty_version'];
+ }
+ if (array_key_exists('aliases', $installed['versions'][$packageName])) {
+ $ranges = array_merge($ranges, $installed['versions'][$packageName]['aliases']);
+ }
+ if (array_key_exists('replaced', $installed['versions'][$packageName])) {
+ $ranges = array_merge($ranges, $installed['versions'][$packageName]['replaced']);
+ }
+ if (array_key_exists('provided', $installed['versions'][$packageName])) {
+ $ranges = array_merge($ranges, $installed['versions'][$packageName]['provided']);
+ }
+
+ return implode(' || ', $ranges);
+ }
+
+ throw new \OutOfBoundsException('Package "' . $packageName . '" is not installed');
+ }
+
+ /**
+ * @param string $packageName
+ * @return string|null If the package is being replaced or provided but is not really installed, null will be returned as version, use satisfies or getVersionRanges if you need to know if a given version is present
+ */
+ public static function getVersion($packageName)
+ {
+ foreach (self::getInstalled() as $installed) {
+ if (!isset($installed['versions'][$packageName])) {
+ continue;
+ }
+
+ if (!isset($installed['versions'][$packageName]['version'])) {
+ return null;
+ }
+
+ return $installed['versions'][$packageName]['version'];
+ }
+
+ throw new \OutOfBoundsException('Package "' . $packageName . '" is not installed');
+ }
+
+ /**
+ * @param string $packageName
+ * @return string|null If the package is being replaced or provided but is not really installed, null will be returned as version, use satisfies or getVersionRanges if you need to know if a given version is present
+ */
+ public static function getPrettyVersion($packageName)
+ {
+ foreach (self::getInstalled() as $installed) {
+ if (!isset($installed['versions'][$packageName])) {
+ continue;
+ }
+
+ if (!isset($installed['versions'][$packageName]['pretty_version'])) {
+ return null;
+ }
+
+ return $installed['versions'][$packageName]['pretty_version'];
+ }
+
+ throw new \OutOfBoundsException('Package "' . $packageName . '" is not installed');
+ }
+
+ /**
+ * @param string $packageName
+ * @return string|null If the package is being replaced or provided but is not really installed, null will be returned as reference
+ */
+ public static function getReference($packageName)
+ {
+ foreach (self::getInstalled() as $installed) {
+ if (!isset($installed['versions'][$packageName])) {
+ continue;
+ }
+
+ if (!isset($installed['versions'][$packageName]['reference'])) {
+ return null;
+ }
+
+ return $installed['versions'][$packageName]['reference'];
+ }
+
+ throw new \OutOfBoundsException('Package "' . $packageName . '" is not installed');
+ }
+
+ /**
+ * @param string $packageName
+ * @return string|null If the package is being replaced or provided but is not really installed, null will be returned as install path. Packages of type metapackages also have a null install path.
+ */
+ public static function getInstallPath($packageName)
+ {
+ foreach (self::getInstalled() as $installed) {
+ if (!isset($installed['versions'][$packageName])) {
+ continue;
+ }
+
+ return isset($installed['versions'][$packageName]['install_path']) ? $installed['versions'][$packageName]['install_path'] : null;
+ }
+
+ throw new \OutOfBoundsException('Package "' . $packageName . '" is not installed');
+ }
+
+ /**
+ * @return array
+ * @psalm-return array{name: string, pretty_version: string, version: string, reference: string|null, type: string, install_path: string, aliases: string[], dev: bool}
+ */
+ public static function getRootPackage()
+ {
+ $installed = self::getInstalled();
+
+ return $installed[0]['root'];
+ }
+
+ /**
+ * Returns the raw installed.php data for custom implementations
+ *
+ * @deprecated Use getAllRawData() instead which returns all datasets for all autoloaders present in the process. getRawData only returns the first dataset loaded, which may not be what you expect.
+ * @return array[]
+ * @psalm-return array{root: array{name: string, pretty_version: string, version: string, reference: string|null, type: string, install_path: string, aliases: string[], dev: bool}, versions: array}
+ */
+ public static function getRawData()
+ {
+ @trigger_error('getRawData only returns the first dataset loaded, which may not be what you expect. Use getAllRawData() instead which returns all datasets for all autoloaders present in the process.', E_USER_DEPRECATED);
+
+ if (null === self::$installed) {
+ // only require the installed.php file if this file is loaded from its dumped location,
+ // and not from its source location in the composer/composer package, see https://github.com/composer/composer/issues/9937
+ if (substr(__DIR__, -8, 1) !== 'C') {
+ self::$installed = include __DIR__ . '/installed.php';
+ } else {
+ self::$installed = array();
+ }
+ }
+
+ return self::$installed;
+ }
+
+ /**
+ * Returns the raw data of all installed.php which are currently loaded for custom implementations
+ *
+ * @return array[]
+ * @psalm-return list}>
+ */
+ public static function getAllRawData()
+ {
+ return self::getInstalled();
+ }
+
+ /**
+ * Lets you reload the static array from another file
+ *
+ * This is only useful for complex integrations in which a project needs to use
+ * this class but then also needs to execute another project's autoloader in process,
+ * and wants to ensure both projects have access to their version of installed.php.
+ *
+ * A typical case would be PHPUnit, where it would need to make sure it reads all
+ * the data it needs from this class, then call reload() with
+ * `require $CWD/vendor/composer/installed.php` (or similar) as input to make sure
+ * the project in which it runs can then also use this class safely, without
+ * interference between PHPUnit's dependencies and the project's dependencies.
+ *
+ * @param array[] $data A vendor/composer/installed.php data set
+ * @return void
+ *
+ * @psalm-param array{root: array{name: string, pretty_version: string, version: string, reference: string|null, type: string, install_path: string, aliases: string[], dev: bool}, versions: array} $data
+ */
+ public static function reload($data)
+ {
+ self::$installed = $data;
+ self::$installedByVendor = array();
+ }
+
+ /**
+ * @return array[]
+ * @psalm-return list}>
+ */
+ private static function getInstalled()
+ {
+ if (null === self::$canGetVendors) {
+ self::$canGetVendors = method_exists('Composer\Autoload\ClassLoader', 'getRegisteredLoaders');
+ }
+
+ $installed = array();
+
+ if (self::$canGetVendors) {
+ foreach (ClassLoader::getRegisteredLoaders() as $vendorDir => $loader) {
+ if (isset(self::$installedByVendor[$vendorDir])) {
+ $installed[] = self::$installedByVendor[$vendorDir];
+ } elseif (is_file($vendorDir.'/composer/installed.php')) {
+ /** @var array{root: array{name: string, pretty_version: string, version: string, reference: string|null, type: string, install_path: string, aliases: string[], dev: bool}, versions: array} $required */
+ $required = require $vendorDir.'/composer/installed.php';
+ $installed[] = self::$installedByVendor[$vendorDir] = $required;
+ if (null === self::$installed && strtr($vendorDir.'/composer', '\\', '/') === strtr(__DIR__, '\\', '/')) {
+ self::$installed = $installed[count($installed) - 1];
+ }
+ }
+ }
+ }
+
+ if (null === self::$installed) {
+ // only require the installed.php file if this file is loaded from its dumped location,
+ // and not from its source location in the composer/composer package, see https://github.com/composer/composer/issues/9937
+ if (substr(__DIR__, -8, 1) !== 'C') {
+ /** @var array{root: array{name: string, pretty_version: string, version: string, reference: string|null, type: string, install_path: string, aliases: string[], dev: bool}, versions: array} $required */
+ $required = require __DIR__ . '/installed.php';
+ self::$installed = $required;
+ } else {
+ self::$installed = array();
+ }
+ }
+
+ if (self::$installed !== array()) {
+ $installed[] = self::$installed;
+ }
+
+ return $installed;
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/composer/LICENSE b/code/web/Drivers/oauth2_client_php_league/composer/LICENSE
new file mode 100644
index 0000000000..f27399a042
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/composer/LICENSE
@@ -0,0 +1,21 @@
+
+Copyright (c) Nils Adermann, Jordi Boggiano
+
+Permission is hereby granted, free of charge, to any person obtaining a copy
+of this software and associated documentation files (the "Software"), to deal
+in the Software without restriction, including without limitation the rights
+to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
+copies of the Software, and to permit persons to whom the Software is furnished
+to do so, subject to the following conditions:
+
+The above copyright notice and this permission notice shall be included in all
+copies or substantial portions of the Software.
+
+THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
+AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
+LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
+OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
+THE SOFTWARE.
+
diff --git a/code/web/Drivers/oauth2_client_php_league/composer/autoload_classmap.php b/code/web/Drivers/oauth2_client_php_league/composer/autoload_classmap.php
new file mode 100644
index 0000000000..0fb0a2c194
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/composer/autoload_classmap.php
@@ -0,0 +1,10 @@
+ $vendorDir . '/composer/InstalledVersions.php',
+);
diff --git a/code/web/Drivers/oauth2_client_php_league/composer/autoload_files.php b/code/web/Drivers/oauth2_client_php_league/composer/autoload_files.php
new file mode 100644
index 0000000000..ff3bac206e
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/composer/autoload_files.php
@@ -0,0 +1,12 @@
+ $vendorDir . '/ralouphie/getallheaders/src/getallheaders.php',
+ '6e3fae29631ef280660b3cdad06f25a8' => $vendorDir . '/symfony/deprecation-contracts/function.php',
+ '37a3dc5111fe8f707ab4c132ef1dbc62' => $vendorDir . '/guzzlehttp/guzzle/src/functions_include.php',
+);
diff --git a/code/web/Drivers/oauth2_client_php_league/composer/autoload_namespaces.php b/code/web/Drivers/oauth2_client_php_league/composer/autoload_namespaces.php
new file mode 100644
index 0000000000..15a2ff3ad6
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/composer/autoload_namespaces.php
@@ -0,0 +1,9 @@
+ array($vendorDir . '/psr/http-message/src', $vendorDir . '/psr/http-factory/src'),
+ 'Psr\\Http\\Client\\' => array($vendorDir . '/psr/http-client/src'),
+ 'League\\OAuth2\\Client\\' => array($vendorDir . '/league/oauth2-client/src'),
+ 'GuzzleHttp\\Psr7\\' => array($vendorDir . '/guzzlehttp/psr7/src'),
+ 'GuzzleHttp\\Promise\\' => array($vendorDir . '/guzzlehttp/promises/src'),
+ 'GuzzleHttp\\' => array($vendorDir . '/guzzlehttp/guzzle/src'),
+);
diff --git a/code/web/Drivers/oauth2_client_php_league/composer/autoload_real.php b/code/web/Drivers/oauth2_client_php_league/composer/autoload_real.php
new file mode 100644
index 0000000000..ead146d541
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/composer/autoload_real.php
@@ -0,0 +1,50 @@
+register(true);
+
+ $filesToLoad = \Composer\Autoload\ComposerStaticInit8485a5d903026c85001fed86e485bb8d::$files;
+ $requireFile = \Closure::bind(static function ($fileIdentifier, $file) {
+ if (empty($GLOBALS['__composer_autoload_files'][$fileIdentifier])) {
+ $GLOBALS['__composer_autoload_files'][$fileIdentifier] = true;
+
+ require $file;
+ }
+ }, null, null);
+ foreach ($filesToLoad as $fileIdentifier => $file) {
+ $requireFile($fileIdentifier, $file);
+ }
+
+ return $loader;
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/composer/autoload_static.php b/code/web/Drivers/oauth2_client_php_league/composer/autoload_static.php
new file mode 100644
index 0000000000..f0079dd3b2
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/composer/autoload_static.php
@@ -0,0 +1,74 @@
+ __DIR__ . '/..' . '/ralouphie/getallheaders/src/getallheaders.php',
+ '6e3fae29631ef280660b3cdad06f25a8' => __DIR__ . '/..' . '/symfony/deprecation-contracts/function.php',
+ '37a3dc5111fe8f707ab4c132ef1dbc62' => __DIR__ . '/..' . '/guzzlehttp/guzzle/src/functions_include.php',
+ );
+
+ public static $prefixLengthsPsr4 = array (
+ 'P' =>
+ array (
+ 'Psr\\Http\\Message\\' => 17,
+ 'Psr\\Http\\Client\\' => 16,
+ ),
+ 'L' =>
+ array (
+ 'League\\OAuth2\\Client\\' => 21,
+ ),
+ 'G' =>
+ array (
+ 'GuzzleHttp\\Psr7\\' => 16,
+ 'GuzzleHttp\\Promise\\' => 19,
+ 'GuzzleHttp\\' => 11,
+ ),
+ );
+
+ public static $prefixDirsPsr4 = array (
+ 'Psr\\Http\\Message\\' =>
+ array (
+ 0 => __DIR__ . '/..' . '/psr/http-message/src',
+ 1 => __DIR__ . '/..' . '/psr/http-factory/src',
+ ),
+ 'Psr\\Http\\Client\\' =>
+ array (
+ 0 => __DIR__ . '/..' . '/psr/http-client/src',
+ ),
+ 'League\\OAuth2\\Client\\' =>
+ array (
+ 0 => __DIR__ . '/..' . '/league/oauth2-client/src',
+ ),
+ 'GuzzleHttp\\Psr7\\' =>
+ array (
+ 0 => __DIR__ . '/..' . '/guzzlehttp/psr7/src',
+ ),
+ 'GuzzleHttp\\Promise\\' =>
+ array (
+ 0 => __DIR__ . '/..' . '/guzzlehttp/promises/src',
+ ),
+ 'GuzzleHttp\\' =>
+ array (
+ 0 => __DIR__ . '/..' . '/guzzlehttp/guzzle/src',
+ ),
+ );
+
+ public static $classMap = array (
+ 'Composer\\InstalledVersions' => __DIR__ . '/..' . '/composer/InstalledVersions.php',
+ );
+
+ public static function getInitializer(ClassLoader $loader)
+ {
+ return \Closure::bind(function () use ($loader) {
+ $loader->prefixLengthsPsr4 = ComposerStaticInit8485a5d903026c85001fed86e485bb8d::$prefixLengthsPsr4;
+ $loader->prefixDirsPsr4 = ComposerStaticInit8485a5d903026c85001fed86e485bb8d::$prefixDirsPsr4;
+ $loader->classMap = ComposerStaticInit8485a5d903026c85001fed86e485bb8d::$classMap;
+
+ }, null, ClassLoader::class);
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/composer/installed.json b/code/web/Drivers/oauth2_client_php_league/composer/installed.json
new file mode 100644
index 0000000000..3834e3e532
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/composer/installed.json
@@ -0,0 +1,752 @@
+{
+ "packages": [
+ {
+ "name": "guzzlehttp/guzzle",
+ "version": "7.9.2",
+ "version_normalized": "7.9.2.0",
+ "source": {
+ "type": "git",
+ "url": "https://github.com/guzzle/guzzle.git",
+ "reference": "d281ed313b989f213357e3be1a179f02196ac99b"
+ },
+ "dist": {
+ "type": "zip",
+ "url": "https://api.github.com/repos/guzzle/guzzle/zipball/d281ed313b989f213357e3be1a179f02196ac99b",
+ "reference": "d281ed313b989f213357e3be1a179f02196ac99b",
+ "shasum": ""
+ },
+ "require": {
+ "ext-json": "*",
+ "guzzlehttp/promises": "^1.5.3 || ^2.0.3",
+ "guzzlehttp/psr7": "^2.7.0",
+ "php": "^7.2.5 || ^8.0",
+ "psr/http-client": "^1.0",
+ "symfony/deprecation-contracts": "^2.2 || ^3.0"
+ },
+ "provide": {
+ "psr/http-client-implementation": "1.0"
+ },
+ "require-dev": {
+ "bamarni/composer-bin-plugin": "^1.8.2",
+ "ext-curl": "*",
+ "guzzle/client-integration-tests": "3.0.2",
+ "php-http/message-factory": "^1.1",
+ "phpunit/phpunit": "^8.5.39 || ^9.6.20",
+ "psr/log": "^1.1 || ^2.0 || ^3.0"
+ },
+ "suggest": {
+ "ext-curl": "Required for CURL handler support",
+ "ext-intl": "Required for Internationalized Domain Name (IDN) support",
+ "psr/log": "Required for using the Log middleware"
+ },
+ "time": "2024-07-24T11:22:20+00:00",
+ "type": "library",
+ "extra": {
+ "bamarni-bin": {
+ "bin-links": true,
+ "forward-command": false
+ }
+ },
+ "installation-source": "source",
+ "autoload": {
+ "files": [
+ "src/functions_include.php"
+ ],
+ "psr-4": {
+ "GuzzleHttp\\": "src/"
+ }
+ },
+ "notification-url": "https://packagist.org/downloads/",
+ "license": [
+ "MIT"
+ ],
+ "authors": [
+ {
+ "name": "Graham Campbell",
+ "email": "hello@gjcampbell.co.uk",
+ "homepage": "https://github.com/GrahamCampbell"
+ },
+ {
+ "name": "Michael Dowling",
+ "email": "mtdowling@gmail.com",
+ "homepage": "https://github.com/mtdowling"
+ },
+ {
+ "name": "Jeremy Lindblom",
+ "email": "jeremeamia@gmail.com",
+ "homepage": "https://github.com/jeremeamia"
+ },
+ {
+ "name": "George Mponos",
+ "email": "gmponos@gmail.com",
+ "homepage": "https://github.com/gmponos"
+ },
+ {
+ "name": "Tobias Nyholm",
+ "email": "tobias.nyholm@gmail.com",
+ "homepage": "https://github.com/Nyholm"
+ },
+ {
+ "name": "Márk Sági-Kazár",
+ "email": "mark.sagikazar@gmail.com",
+ "homepage": "https://github.com/sagikazarmark"
+ },
+ {
+ "name": "Tobias Schultze",
+ "email": "webmaster@tubo-world.de",
+ "homepage": "https://github.com/Tobion"
+ }
+ ],
+ "description": "Guzzle is a PHP HTTP client library",
+ "keywords": [
+ "client",
+ "curl",
+ "framework",
+ "http",
+ "http client",
+ "psr-18",
+ "psr-7",
+ "rest",
+ "web service"
+ ],
+ "support": {
+ "issues": "https://github.com/guzzle/guzzle/issues",
+ "source": "https://github.com/guzzle/guzzle/tree/7.9.2"
+ },
+ "funding": [
+ {
+ "url": "https://github.com/GrahamCampbell",
+ "type": "github"
+ },
+ {
+ "url": "https://github.com/Nyholm",
+ "type": "github"
+ },
+ {
+ "url": "https://tidelift.com/funding/github/packagist/guzzlehttp/guzzle",
+ "type": "tidelift"
+ }
+ ],
+ "install-path": "../guzzlehttp/guzzle"
+ },
+ {
+ "name": "guzzlehttp/promises",
+ "version": "2.0.3",
+ "version_normalized": "2.0.3.0",
+ "source": {
+ "type": "git",
+ "url": "https://github.com/guzzle/promises.git",
+ "reference": "6ea8dd08867a2a42619d65c3deb2c0fcbf81c8f8"
+ },
+ "dist": {
+ "type": "zip",
+ "url": "https://api.github.com/repos/guzzle/promises/zipball/6ea8dd08867a2a42619d65c3deb2c0fcbf81c8f8",
+ "reference": "6ea8dd08867a2a42619d65c3deb2c0fcbf81c8f8",
+ "shasum": ""
+ },
+ "require": {
+ "php": "^7.2.5 || ^8.0"
+ },
+ "require-dev": {
+ "bamarni/composer-bin-plugin": "^1.8.2",
+ "phpunit/phpunit": "^8.5.39 || ^9.6.20"
+ },
+ "time": "2024-07-18T10:29:17+00:00",
+ "type": "library",
+ "extra": {
+ "bamarni-bin": {
+ "bin-links": true,
+ "forward-command": false
+ }
+ },
+ "installation-source": "source",
+ "autoload": {
+ "psr-4": {
+ "GuzzleHttp\\Promise\\": "src/"
+ }
+ },
+ "notification-url": "https://packagist.org/downloads/",
+ "license": [
+ "MIT"
+ ],
+ "authors": [
+ {
+ "name": "Graham Campbell",
+ "email": "hello@gjcampbell.co.uk",
+ "homepage": "https://github.com/GrahamCampbell"
+ },
+ {
+ "name": "Michael Dowling",
+ "email": "mtdowling@gmail.com",
+ "homepage": "https://github.com/mtdowling"
+ },
+ {
+ "name": "Tobias Nyholm",
+ "email": "tobias.nyholm@gmail.com",
+ "homepage": "https://github.com/Nyholm"
+ },
+ {
+ "name": "Tobias Schultze",
+ "email": "webmaster@tubo-world.de",
+ "homepage": "https://github.com/Tobion"
+ }
+ ],
+ "description": "Guzzle promises library",
+ "keywords": [
+ "promise"
+ ],
+ "support": {
+ "issues": "https://github.com/guzzle/promises/issues",
+ "source": "https://github.com/guzzle/promises/tree/2.0.3"
+ },
+ "funding": [
+ {
+ "url": "https://github.com/GrahamCampbell",
+ "type": "github"
+ },
+ {
+ "url": "https://github.com/Nyholm",
+ "type": "github"
+ },
+ {
+ "url": "https://tidelift.com/funding/github/packagist/guzzlehttp/promises",
+ "type": "tidelift"
+ }
+ ],
+ "install-path": "../guzzlehttp/promises"
+ },
+ {
+ "name": "guzzlehttp/psr7",
+ "version": "2.7.0",
+ "version_normalized": "2.7.0.0",
+ "source": {
+ "type": "git",
+ "url": "https://github.com/guzzle/psr7.git",
+ "reference": "a70f5c95fb43bc83f07c9c948baa0dc1829bf201"
+ },
+ "dist": {
+ "type": "zip",
+ "url": "https://api.github.com/repos/guzzle/psr7/zipball/a70f5c95fb43bc83f07c9c948baa0dc1829bf201",
+ "reference": "a70f5c95fb43bc83f07c9c948baa0dc1829bf201",
+ "shasum": ""
+ },
+ "require": {
+ "php": "^7.2.5 || ^8.0",
+ "psr/http-factory": "^1.0",
+ "psr/http-message": "^1.1 || ^2.0",
+ "ralouphie/getallheaders": "^3.0"
+ },
+ "provide": {
+ "psr/http-factory-implementation": "1.0",
+ "psr/http-message-implementation": "1.0"
+ },
+ "require-dev": {
+ "bamarni/composer-bin-plugin": "^1.8.2",
+ "http-interop/http-factory-tests": "0.9.0",
+ "phpunit/phpunit": "^8.5.39 || ^9.6.20"
+ },
+ "suggest": {
+ "laminas/laminas-httphandlerrunner": "Emit PSR-7 responses"
+ },
+ "time": "2024-07-18T11:15:46+00:00",
+ "type": "library",
+ "extra": {
+ "bamarni-bin": {
+ "bin-links": true,
+ "forward-command": false
+ }
+ },
+ "installation-source": "source",
+ "autoload": {
+ "psr-4": {
+ "GuzzleHttp\\Psr7\\": "src/"
+ }
+ },
+ "notification-url": "https://packagist.org/downloads/",
+ "license": [
+ "MIT"
+ ],
+ "authors": [
+ {
+ "name": "Graham Campbell",
+ "email": "hello@gjcampbell.co.uk",
+ "homepage": "https://github.com/GrahamCampbell"
+ },
+ {
+ "name": "Michael Dowling",
+ "email": "mtdowling@gmail.com",
+ "homepage": "https://github.com/mtdowling"
+ },
+ {
+ "name": "George Mponos",
+ "email": "gmponos@gmail.com",
+ "homepage": "https://github.com/gmponos"
+ },
+ {
+ "name": "Tobias Nyholm",
+ "email": "tobias.nyholm@gmail.com",
+ "homepage": "https://github.com/Nyholm"
+ },
+ {
+ "name": "Márk Sági-Kazár",
+ "email": "mark.sagikazar@gmail.com",
+ "homepage": "https://github.com/sagikazarmark"
+ },
+ {
+ "name": "Tobias Schultze",
+ "email": "webmaster@tubo-world.de",
+ "homepage": "https://github.com/Tobion"
+ },
+ {
+ "name": "Márk Sági-Kazár",
+ "email": "mark.sagikazar@gmail.com",
+ "homepage": "https://sagikazarmark.hu"
+ }
+ ],
+ "description": "PSR-7 message implementation that also provides common utility methods",
+ "keywords": [
+ "http",
+ "message",
+ "psr-7",
+ "request",
+ "response",
+ "stream",
+ "uri",
+ "url"
+ ],
+ "support": {
+ "issues": "https://github.com/guzzle/psr7/issues",
+ "source": "https://github.com/guzzle/psr7/tree/2.7.0"
+ },
+ "funding": [
+ {
+ "url": "https://github.com/GrahamCampbell",
+ "type": "github"
+ },
+ {
+ "url": "https://github.com/Nyholm",
+ "type": "github"
+ },
+ {
+ "url": "https://tidelift.com/funding/github/packagist/guzzlehttp/psr7",
+ "type": "tidelift"
+ }
+ ],
+ "install-path": "../guzzlehttp/psr7"
+ },
+ {
+ "name": "league/oauth2-client",
+ "version": "2.7.0",
+ "version_normalized": "2.7.0.0",
+ "source": {
+ "type": "git",
+ "url": "https://github.com/thephpleague/oauth2-client.git",
+ "reference": "160d6274b03562ebeb55ed18399281d8118b76c8"
+ },
+ "dist": {
+ "type": "zip",
+ "url": "https://api.github.com/repos/thephpleague/oauth2-client/zipball/160d6274b03562ebeb55ed18399281d8118b76c8",
+ "reference": "160d6274b03562ebeb55ed18399281d8118b76c8",
+ "shasum": ""
+ },
+ "require": {
+ "guzzlehttp/guzzle": "^6.0 || ^7.0",
+ "paragonie/random_compat": "^1 || ^2 || ^9.99",
+ "php": "^5.6 || ^7.0 || ^8.0"
+ },
+ "require-dev": {
+ "mockery/mockery": "^1.3.5",
+ "php-parallel-lint/php-parallel-lint": "^1.3.1",
+ "phpunit/phpunit": "^5.7 || ^6.0 || ^9.5",
+ "squizlabs/php_codesniffer": "^2.3 || ^3.0"
+ },
+ "time": "2023-04-16T18:19:15+00:00",
+ "type": "library",
+ "extra": {
+ "branch-alias": {
+ "dev-2.x": "2.0.x-dev"
+ }
+ },
+ "installation-source": "source",
+ "autoload": {
+ "psr-4": {
+ "League\\OAuth2\\Client\\": "src/"
+ }
+ },
+ "notification-url": "https://packagist.org/downloads/",
+ "license": [
+ "MIT"
+ ],
+ "authors": [
+ {
+ "name": "Alex Bilbie",
+ "email": "hello@alexbilbie.com",
+ "homepage": "http://www.alexbilbie.com",
+ "role": "Developer"
+ },
+ {
+ "name": "Woody Gilk",
+ "homepage": "https://github.com/shadowhand",
+ "role": "Contributor"
+ }
+ ],
+ "description": "OAuth 2.0 Client Library",
+ "keywords": [
+ "Authentication",
+ "SSO",
+ "authorization",
+ "identity",
+ "idp",
+ "oauth",
+ "oauth2",
+ "single sign on"
+ ],
+ "support": {
+ "issues": "https://github.com/thephpleague/oauth2-client/issues",
+ "source": "https://github.com/thephpleague/oauth2-client/tree/2.7.0"
+ },
+ "install-path": "../league/oauth2-client"
+ },
+ {
+ "name": "paragonie/random_compat",
+ "version": "v9.99.100",
+ "version_normalized": "9.99.100.0",
+ "source": {
+ "type": "git",
+ "url": "https://github.com/paragonie/random_compat.git",
+ "reference": "996434e5492cb4c3edcb9168db6fbb1359ef965a"
+ },
+ "dist": {
+ "type": "zip",
+ "url": "https://api.github.com/repos/paragonie/random_compat/zipball/996434e5492cb4c3edcb9168db6fbb1359ef965a",
+ "reference": "996434e5492cb4c3edcb9168db6fbb1359ef965a",
+ "shasum": ""
+ },
+ "require": {
+ "php": ">= 7"
+ },
+ "require-dev": {
+ "phpunit/phpunit": "4.*|5.*",
+ "vimeo/psalm": "^1"
+ },
+ "suggest": {
+ "ext-libsodium": "Provides a modern crypto API that can be used to generate random bytes."
+ },
+ "time": "2020-10-15T08:29:30+00:00",
+ "type": "library",
+ "installation-source": "source",
+ "notification-url": "https://packagist.org/downloads/",
+ "license": [
+ "MIT"
+ ],
+ "authors": [
+ {
+ "name": "Paragon Initiative Enterprises",
+ "email": "security@paragonie.com",
+ "homepage": "https://paragonie.com"
+ }
+ ],
+ "description": "PHP 5.x polyfill for random_bytes() and random_int() from PHP 7",
+ "keywords": [
+ "csprng",
+ "polyfill",
+ "pseudorandom",
+ "random"
+ ],
+ "support": {
+ "email": "info@paragonie.com",
+ "issues": "https://github.com/paragonie/random_compat/issues",
+ "source": "https://github.com/paragonie/random_compat"
+ },
+ "install-path": "../paragonie/random_compat"
+ },
+ {
+ "name": "psr/http-client",
+ "version": "1.0.3",
+ "version_normalized": "1.0.3.0",
+ "source": {
+ "type": "git",
+ "url": "https://github.com/php-fig/http-client.git",
+ "reference": "bb5906edc1c324c9a05aa0873d40117941e5fa90"
+ },
+ "dist": {
+ "type": "zip",
+ "url": "https://api.github.com/repos/php-fig/http-client/zipball/bb5906edc1c324c9a05aa0873d40117941e5fa90",
+ "reference": "bb5906edc1c324c9a05aa0873d40117941e5fa90",
+ "shasum": ""
+ },
+ "require": {
+ "php": "^7.0 || ^8.0",
+ "psr/http-message": "^1.0 || ^2.0"
+ },
+ "time": "2023-09-23T14:17:50+00:00",
+ "type": "library",
+ "extra": {
+ "branch-alias": {
+ "dev-master": "1.0.x-dev"
+ }
+ },
+ "installation-source": "source",
+ "autoload": {
+ "psr-4": {
+ "Psr\\Http\\Client\\": "src/"
+ }
+ },
+ "notification-url": "https://packagist.org/downloads/",
+ "license": [
+ "MIT"
+ ],
+ "authors": [
+ {
+ "name": "PHP-FIG",
+ "homepage": "https://www.php-fig.org/"
+ }
+ ],
+ "description": "Common interface for HTTP clients",
+ "homepage": "https://github.com/php-fig/http-client",
+ "keywords": [
+ "http",
+ "http-client",
+ "psr",
+ "psr-18"
+ ],
+ "support": {
+ "source": "https://github.com/php-fig/http-client"
+ },
+ "install-path": "../psr/http-client"
+ },
+ {
+ "name": "psr/http-factory",
+ "version": "1.1.0",
+ "version_normalized": "1.1.0.0",
+ "source": {
+ "type": "git",
+ "url": "https://github.com/php-fig/http-factory.git",
+ "reference": "2b4765fddfe3b508ac62f829e852b1501d3f6e8a"
+ },
+ "dist": {
+ "type": "zip",
+ "url": "https://api.github.com/repos/php-fig/http-factory/zipball/2b4765fddfe3b508ac62f829e852b1501d3f6e8a",
+ "reference": "2b4765fddfe3b508ac62f829e852b1501d3f6e8a",
+ "shasum": ""
+ },
+ "require": {
+ "php": ">=7.1",
+ "psr/http-message": "^1.0 || ^2.0"
+ },
+ "time": "2024-04-15T12:06:14+00:00",
+ "type": "library",
+ "extra": {
+ "branch-alias": {
+ "dev-master": "1.0.x-dev"
+ }
+ },
+ "installation-source": "source",
+ "autoload": {
+ "psr-4": {
+ "Psr\\Http\\Message\\": "src/"
+ }
+ },
+ "notification-url": "https://packagist.org/downloads/",
+ "license": [
+ "MIT"
+ ],
+ "authors": [
+ {
+ "name": "PHP-FIG",
+ "homepage": "https://www.php-fig.org/"
+ }
+ ],
+ "description": "PSR-17: Common interfaces for PSR-7 HTTP message factories",
+ "keywords": [
+ "factory",
+ "http",
+ "message",
+ "psr",
+ "psr-17",
+ "psr-7",
+ "request",
+ "response"
+ ],
+ "support": {
+ "source": "https://github.com/php-fig/http-factory"
+ },
+ "install-path": "../psr/http-factory"
+ },
+ {
+ "name": "psr/http-message",
+ "version": "2.0",
+ "version_normalized": "2.0.0.0",
+ "source": {
+ "type": "git",
+ "url": "https://github.com/php-fig/http-message.git",
+ "reference": "402d35bcb92c70c026d1a6a9883f06b2ead23d71"
+ },
+ "dist": {
+ "type": "zip",
+ "url": "https://api.github.com/repos/php-fig/http-message/zipball/402d35bcb92c70c026d1a6a9883f06b2ead23d71",
+ "reference": "402d35bcb92c70c026d1a6a9883f06b2ead23d71",
+ "shasum": ""
+ },
+ "require": {
+ "php": "^7.2 || ^8.0"
+ },
+ "time": "2023-04-04T09:54:51+00:00",
+ "type": "library",
+ "extra": {
+ "branch-alias": {
+ "dev-master": "2.0.x-dev"
+ }
+ },
+ "installation-source": "source",
+ "autoload": {
+ "psr-4": {
+ "Psr\\Http\\Message\\": "src/"
+ }
+ },
+ "notification-url": "https://packagist.org/downloads/",
+ "license": [
+ "MIT"
+ ],
+ "authors": [
+ {
+ "name": "PHP-FIG",
+ "homepage": "https://www.php-fig.org/"
+ }
+ ],
+ "description": "Common interface for HTTP messages",
+ "homepage": "https://github.com/php-fig/http-message",
+ "keywords": [
+ "http",
+ "http-message",
+ "psr",
+ "psr-7",
+ "request",
+ "response"
+ ],
+ "support": {
+ "source": "https://github.com/php-fig/http-message/tree/2.0"
+ },
+ "install-path": "../psr/http-message"
+ },
+ {
+ "name": "ralouphie/getallheaders",
+ "version": "3.0.3",
+ "version_normalized": "3.0.3.0",
+ "source": {
+ "type": "git",
+ "url": "https://github.com/ralouphie/getallheaders.git",
+ "reference": "120b605dfeb996808c31b6477290a714d356e822"
+ },
+ "dist": {
+ "type": "zip",
+ "url": "https://api.github.com/repos/ralouphie/getallheaders/zipball/120b605dfeb996808c31b6477290a714d356e822",
+ "reference": "120b605dfeb996808c31b6477290a714d356e822",
+ "shasum": ""
+ },
+ "require": {
+ "php": ">=5.6"
+ },
+ "require-dev": {
+ "php-coveralls/php-coveralls": "^2.1",
+ "phpunit/phpunit": "^5 || ^6.5"
+ },
+ "time": "2019-03-08T08:55:37+00:00",
+ "type": "library",
+ "installation-source": "source",
+ "autoload": {
+ "files": [
+ "src/getallheaders.php"
+ ]
+ },
+ "notification-url": "https://packagist.org/downloads/",
+ "license": [
+ "MIT"
+ ],
+ "authors": [
+ {
+ "name": "Ralph Khattar",
+ "email": "ralph.khattar@gmail.com"
+ }
+ ],
+ "description": "A polyfill for getallheaders.",
+ "support": {
+ "issues": "https://github.com/ralouphie/getallheaders/issues",
+ "source": "https://github.com/ralouphie/getallheaders/tree/develop"
+ },
+ "install-path": "../ralouphie/getallheaders"
+ },
+ {
+ "name": "symfony/deprecation-contracts",
+ "version": "v3.5.0",
+ "version_normalized": "3.5.0.0",
+ "source": {
+ "type": "git",
+ "url": "https://github.com/symfony/deprecation-contracts.git",
+ "reference": "0e0d29ce1f20deffb4ab1b016a7257c4f1e789a1"
+ },
+ "dist": {
+ "type": "zip",
+ "url": "https://api.github.com/repos/symfony/deprecation-contracts/zipball/0e0d29ce1f20deffb4ab1b016a7257c4f1e789a1",
+ "reference": "0e0d29ce1f20deffb4ab1b016a7257c4f1e789a1",
+ "shasum": ""
+ },
+ "require": {
+ "php": ">=8.1"
+ },
+ "time": "2024-04-18T09:32:20+00:00",
+ "type": "library",
+ "extra": {
+ "branch-alias": {
+ "dev-main": "3.5-dev"
+ },
+ "thanks": {
+ "name": "symfony/contracts",
+ "url": "https://github.com/symfony/contracts"
+ }
+ },
+ "installation-source": "source",
+ "autoload": {
+ "files": [
+ "function.php"
+ ]
+ },
+ "notification-url": "https://packagist.org/downloads/",
+ "license": [
+ "MIT"
+ ],
+ "authors": [
+ {
+ "name": "Nicolas Grekas",
+ "email": "p@tchwork.com"
+ },
+ {
+ "name": "Symfony Community",
+ "homepage": "https://symfony.com/contributors"
+ }
+ ],
+ "description": "A generic function and convention to trigger deprecation notices",
+ "homepage": "https://symfony.com",
+ "support": {
+ "source": "https://github.com/symfony/deprecation-contracts/tree/v3.5.0"
+ },
+ "funding": [
+ {
+ "url": "https://symfony.com/sponsor",
+ "type": "custom"
+ },
+ {
+ "url": "https://github.com/fabpot",
+ "type": "github"
+ },
+ {
+ "url": "https://tidelift.com/funding/github/packagist/symfony/symfony",
+ "type": "tidelift"
+ }
+ ],
+ "install-path": "../symfony/deprecation-contracts"
+ }
+ ],
+ "dev": true,
+ "dev-package-names": []
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/composer/installed.php b/code/web/Drivers/oauth2_client_php_league/composer/installed.php
new file mode 100644
index 0000000000..4e4731af84
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/composer/installed.php
@@ -0,0 +1,131 @@
+ array(
+ 'name' => '__root__',
+ 'pretty_version' => '1.0.0+no-version-set',
+ 'version' => '1.0.0.0',
+ 'reference' => null,
+ 'type' => 'library',
+ 'install_path' => __DIR__ . '/../../',
+ 'aliases' => array(),
+ 'dev' => true,
+ ),
+ 'versions' => array(
+ '__root__' => array(
+ 'pretty_version' => '1.0.0+no-version-set',
+ 'version' => '1.0.0.0',
+ 'reference' => null,
+ 'type' => 'library',
+ 'install_path' => __DIR__ . '/../../',
+ 'aliases' => array(),
+ 'dev_requirement' => false,
+ ),
+ 'guzzlehttp/guzzle' => array(
+ 'pretty_version' => '7.9.2',
+ 'version' => '7.9.2.0',
+ 'reference' => 'd281ed313b989f213357e3be1a179f02196ac99b',
+ 'type' => 'library',
+ 'install_path' => __DIR__ . '/../guzzlehttp/guzzle',
+ 'aliases' => array(),
+ 'dev_requirement' => false,
+ ),
+ 'guzzlehttp/promises' => array(
+ 'pretty_version' => '2.0.3',
+ 'version' => '2.0.3.0',
+ 'reference' => '6ea8dd08867a2a42619d65c3deb2c0fcbf81c8f8',
+ 'type' => 'library',
+ 'install_path' => __DIR__ . '/../guzzlehttp/promises',
+ 'aliases' => array(),
+ 'dev_requirement' => false,
+ ),
+ 'guzzlehttp/psr7' => array(
+ 'pretty_version' => '2.7.0',
+ 'version' => '2.7.0.0',
+ 'reference' => 'a70f5c95fb43bc83f07c9c948baa0dc1829bf201',
+ 'type' => 'library',
+ 'install_path' => __DIR__ . '/../guzzlehttp/psr7',
+ 'aliases' => array(),
+ 'dev_requirement' => false,
+ ),
+ 'league/oauth2-client' => array(
+ 'pretty_version' => '2.7.0',
+ 'version' => '2.7.0.0',
+ 'reference' => '160d6274b03562ebeb55ed18399281d8118b76c8',
+ 'type' => 'library',
+ 'install_path' => __DIR__ . '/../league/oauth2-client',
+ 'aliases' => array(),
+ 'dev_requirement' => false,
+ ),
+ 'paragonie/random_compat' => array(
+ 'pretty_version' => 'v9.99.100',
+ 'version' => '9.99.100.0',
+ 'reference' => '996434e5492cb4c3edcb9168db6fbb1359ef965a',
+ 'type' => 'library',
+ 'install_path' => __DIR__ . '/../paragonie/random_compat',
+ 'aliases' => array(),
+ 'dev_requirement' => false,
+ ),
+ 'psr/http-client' => array(
+ 'pretty_version' => '1.0.3',
+ 'version' => '1.0.3.0',
+ 'reference' => 'bb5906edc1c324c9a05aa0873d40117941e5fa90',
+ 'type' => 'library',
+ 'install_path' => __DIR__ . '/../psr/http-client',
+ 'aliases' => array(),
+ 'dev_requirement' => false,
+ ),
+ 'psr/http-client-implementation' => array(
+ 'dev_requirement' => false,
+ 'provided' => array(
+ 0 => '1.0',
+ ),
+ ),
+ 'psr/http-factory' => array(
+ 'pretty_version' => '1.1.0',
+ 'version' => '1.1.0.0',
+ 'reference' => '2b4765fddfe3b508ac62f829e852b1501d3f6e8a',
+ 'type' => 'library',
+ 'install_path' => __DIR__ . '/../psr/http-factory',
+ 'aliases' => array(),
+ 'dev_requirement' => false,
+ ),
+ 'psr/http-factory-implementation' => array(
+ 'dev_requirement' => false,
+ 'provided' => array(
+ 0 => '1.0',
+ ),
+ ),
+ 'psr/http-message' => array(
+ 'pretty_version' => '2.0',
+ 'version' => '2.0.0.0',
+ 'reference' => '402d35bcb92c70c026d1a6a9883f06b2ead23d71',
+ 'type' => 'library',
+ 'install_path' => __DIR__ . '/../psr/http-message',
+ 'aliases' => array(),
+ 'dev_requirement' => false,
+ ),
+ 'psr/http-message-implementation' => array(
+ 'dev_requirement' => false,
+ 'provided' => array(
+ 0 => '1.0',
+ ),
+ ),
+ 'ralouphie/getallheaders' => array(
+ 'pretty_version' => '3.0.3',
+ 'version' => '3.0.3.0',
+ 'reference' => '120b605dfeb996808c31b6477290a714d356e822',
+ 'type' => 'library',
+ 'install_path' => __DIR__ . '/../ralouphie/getallheaders',
+ 'aliases' => array(),
+ 'dev_requirement' => false,
+ ),
+ 'symfony/deprecation-contracts' => array(
+ 'pretty_version' => 'v3.5.0',
+ 'version' => '3.5.0.0',
+ 'reference' => '0e0d29ce1f20deffb4ab1b016a7257c4f1e789a1',
+ 'type' => 'library',
+ 'install_path' => __DIR__ . '/../symfony/deprecation-contracts',
+ 'aliases' => array(),
+ 'dev_requirement' => false,
+ ),
+ ),
+);
diff --git a/code/web/Drivers/oauth2_client_php_league/composer/platform_check.php b/code/web/Drivers/oauth2_client_php_league/composer/platform_check.php
new file mode 100644
index 0000000000..4c3a5d68f1
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/composer/platform_check.php
@@ -0,0 +1,26 @@
+= 80100)) {
+ $issues[] = 'Your Composer dependencies require a PHP version ">= 8.1.0". You are running ' . PHP_VERSION . '.';
+}
+
+if ($issues) {
+ if (!headers_sent()) {
+ header('HTTP/1.1 500 Internal Server Error');
+ }
+ if (!ini_get('display_errors')) {
+ if (PHP_SAPI === 'cli' || PHP_SAPI === 'phpdbg') {
+ fwrite(STDERR, 'Composer detected issues in your platform:' . PHP_EOL.PHP_EOL . implode(PHP_EOL, $issues) . PHP_EOL.PHP_EOL);
+ } elseif (!headers_sent()) {
+ echo 'Composer detected issues in your platform:' . PHP_EOL.PHP_EOL . str_replace('You are running '.PHP_VERSION.'.', '', implode(PHP_EOL, $issues)) . PHP_EOL.PHP_EOL;
+ }
+ }
+ trigger_error(
+ 'Composer detected issues in your platform: ' . implode(' ', $issues),
+ E_USER_ERROR
+ );
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.editorconfig b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.editorconfig
new file mode 100644
index 0000000000..b76dad3171
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.editorconfig
@@ -0,0 +1,17 @@
+# EditorConfig is awesome: https://editorconfig.org/
+
+# top-most EditorConfig file
+root = true
+
+# Unix-style newlines with a newline ending for every file
+# Indent with 4 spaces
+[*]
+charset = utf-8
+end_of_line = lf
+indent_style = space
+indent_size = 4
+insert_final_newline = true
+trim_trailing_whitespace = true
+
+[Makefile]
+indent_style = tab
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.gitattributes b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.gitattributes
new file mode 100644
index 0000000000..030e6fe6d2
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.gitattributes
@@ -0,0 +1,15 @@
+.editorconfig export-ignore
+.gitattributes export-ignore
+/.github/ export-ignore
+.gitignore export-ignore
+.php-cs-fixer.dist.php export-ignore
+/docs/ export-ignore
+/Dockerfile export-ignore
+/Makefile export-ignore
+/phpstan-baseline.neon export-ignore
+/phpstan.neon.dist export-ignore
+/phpunit.xml.dist export-ignore
+/psalm-baseline.xml export-ignore
+/psalm.xml export-ignore
+/tests/ export-ignore
+/vendor-bin/ export-ignore
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/.editorconfig b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/.editorconfig
new file mode 100644
index 0000000000..7bd3346f26
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/.editorconfig
@@ -0,0 +1,2 @@
+[*.yml]
+indent_size = 2
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/FUNDING.yml b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/FUNDING.yml
new file mode 100644
index 0000000000..86ce6948a6
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/FUNDING.yml
@@ -0,0 +1,2 @@
+github: [Nyholm, GrahamCampbell]
+tidelift: "packagist/guzzlehttp/guzzle"
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/ISSUE_TEMPLATE/bug_report.md b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/ISSUE_TEMPLATE/bug_report.md
new file mode 100644
index 0000000000..d8fb54bc2f
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/ISSUE_TEMPLATE/bug_report.md
@@ -0,0 +1,20 @@
+---
+name: 🐛 Bug Report
+about: Report errors and problems
+---
+
+**Guzzle version(s) affected**: x.y.z
+**PHP version**: x.y.z (hint: `php --version`)
+**cURL version**: x.y.z (hint: `php -i | grep cURL`)
+
+**Description**
+
+
+**How to reproduce**
+
+
+**Possible Solution**
+
+
+**Additional context**
+
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/ISSUE_TEMPLATE/config.yml b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/ISSUE_TEMPLATE/config.yml
new file mode 100644
index 0000000000..4a85619264
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/ISSUE_TEMPLATE/config.yml
@@ -0,0 +1,9 @@
+blank_issues_enabled: false
+contact_links:
+ - name: 📚Documentation
+ url: https://docs.guzzlephp.org/en/stable/
+ about: Check the documentation before opening an issue.
+
+ - name: ❓Support
+ url: https://github.com/guzzle/.github/blob/master/.github/SUPPORT.md
+ about: We use GitHub issues only to discuss bugs and new features.
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/ISSUE_TEMPLATE/feature_request.md b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/ISSUE_TEMPLATE/feature_request.md
new file mode 100644
index 0000000000..f0cf15354a
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/ISSUE_TEMPLATE/feature_request.md
@@ -0,0 +1,14 @@
+---
+name: 🚀 Feature Request
+about: RFC and ideas for new features and improvements
+---
+
+**Description**
+
+
+**Example**
+
+
+**Additional context**
+
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/logo.png b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/logo.png
new file mode 100644
index 0000000000..117207ea87
Binary files /dev/null and b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/logo.png differ
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/stale.yml b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/stale.yml
new file mode 100644
index 0000000000..53faa71bd9
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/stale.yml
@@ -0,0 +1,14 @@
+daysUntilStale: 120
+daysUntilClose: 14
+exemptLabels:
+ - lifecycle/keep-open
+ - lifecycle/ready-for-merge
+# Label to use when marking an issue as stale
+staleLabel: lifecycle/stale
+# Comment to post when marking an issue as stale. Set to `false` to disable
+markComment: >
+ This issue has been automatically marked as stale because it has not had
+ recent activity. It will be closed after 2 weeks if no further activity occurs. Thank you
+ for your contributions.
+# Comment to post when closing a stale issue. Set to `false` to disable
+closeComment: false
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/workflows/checks.yml b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/workflows/checks.yml
new file mode 100644
index 0000000000..aa01ed09ca
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/workflows/checks.yml
@@ -0,0 +1,21 @@
+name: Checks
+
+on:
+ push:
+ branches:
+ pull_request:
+
+permissions:
+ contents: read
+
+jobs:
+ composer-normalize:
+ name: Composer Normalize
+ runs-on: ubuntu-22.04
+
+ steps:
+ - name: Checkout code
+ uses: actions/checkout@v4
+
+ - name: Composer normalize
+ uses: docker://ergebnis/composer-normalize-action
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/workflows/ci.yml b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/workflows/ci.yml
new file mode 100644
index 0000000000..0012420980
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/workflows/ci.yml
@@ -0,0 +1,132 @@
+name: CI
+
+on:
+ push:
+ branches:
+ pull_request:
+
+permissions:
+ contents: read
+
+jobs:
+ build-lowest-version:
+ name: Build lowest version
+ runs-on: ubuntu-22.04
+
+ steps:
+ - name: Set up PHP
+ uses: shivammathur/setup-php@v2
+ with:
+ php-version: '7.2'
+ ini-values: error_reporting=E_ALL
+ coverage: none
+ extensions: mbstring, intl
+
+ - name: Set up Node
+ uses: actions/setup-node@v3
+ with:
+ node-version: '18.x'
+
+ - name: Setup Problem Matchers for PHPUnit
+ run: echo "::add-matcher::${{ runner.tool_cache }}/phpunit.json"
+
+ - name: Checkout code
+ uses: actions/checkout@v4
+
+ - name: Download dependencies
+ run: composer update --no-interaction --no-progress --prefer-stable --prefer-lowest
+
+ - name: Start test servers
+ shell: bash
+ run: |
+ node tests/server.js &
+ ./vendor/bin/http_test_server &
+
+ - name: Run tests
+ run: ./vendor/bin/phpunit
+
+ build:
+ name: Build
+ runs-on: ubuntu-22.04
+ strategy:
+ max-parallel: 10
+ matrix:
+ php: ['7.2', '7.3', '7.4', '8.0', '8.1', '8.2', '8.3', '8.4']
+ psr7: ['^2.7.0']
+ include:
+ - php: '8.4'
+ psr7: '^2.7.0@dev'
+
+ steps:
+ - name: Set up PHP
+ uses: shivammathur/setup-php@v2
+ with:
+ php-version: ${{ matrix.php }}
+ ini-values: error_reporting=E_ALL
+ coverage: none
+ extensions: mbstring, intl
+
+ - name: Set up Node
+ uses: actions/setup-node@v3
+ with:
+ node-version: '18.x'
+
+ - name: Setup Problem Matchers for PHPUnit
+ run: echo "::add-matcher::${{ runner.tool_cache }}/phpunit.json"
+
+ - name: Checkout code
+ uses: actions/checkout@v4
+
+ - name: Download dependencies
+ run: |
+ composer require --no-update "guzzlehttp/psr7:${{ matrix.psr7 }}"
+ composer update --no-interaction --no-progress
+
+ - name: Start test servers
+ shell: bash
+ run: |
+ node tests/server.js &
+ ./vendor/bin/http_test_server &
+
+ - name: Run tests
+ run: ./vendor/bin/phpunit
+
+ build-windows:
+ name: Build on Windows
+ runs-on: windows-2022
+ strategy:
+ max-parallel: 10
+ matrix:
+ php: ['7.2', '7.3', '7.4', '8.0', '8.1', '8.2', '8.3', '8.4']
+
+ steps:
+ - name: Set up PHP
+ uses: shivammathur/setup-php@v2
+ with:
+ php-version: ${{ matrix.php }}
+ ini-values: error_reporting=E_ALL
+ coverage: none
+ extensions: mbstring, intl
+
+ - name: Set up Node
+ uses: actions/setup-node@v3
+ with:
+ node-version: '18.x'
+
+ - name: Setup Problem Matchers for PHPUnit
+ run: echo "::add-matcher::${{ runner.tool_cache }}/phpunit.json"
+
+ - name: Checkout code
+ uses: actions/checkout@v4
+
+ - name: Download dependencies
+ run: composer update --no-interaction --no-progress
+
+ - name: Start test servers
+ shell: bash
+ run: |
+ node tests/server.js &
+ ./vendor/bin/http_test_server &
+
+ - name: Run tests
+ run: vendor/bin/phpunit.bat
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/workflows/static.yml b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/workflows/static.yml
new file mode 100644
index 0000000000..799401385f
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.github/workflows/static.yml
@@ -0,0 +1,82 @@
+name: Static analysis
+
+on:
+ push:
+ branches:
+ pull_request:
+
+permissions:
+ contents: read
+
+jobs:
+ phpstan:
+ name: PHPStan
+ runs-on: ubuntu-22.04
+
+ steps:
+ - name: Checkout code
+ uses: actions/checkout@v4
+
+ - name: Setup PHP
+ uses: shivammathur/setup-php@v2
+ with:
+ php-version: '7.4'
+ coverage: none
+ extensions: mbstring, intl
+
+ - name: Download dependencies
+ run: composer update --no-interaction --no-progress
+
+ - name: Download PHPStan
+ run: composer bin phpstan update --no-interaction --no-progress
+
+ - name: Execute PHPStan
+ run: vendor/bin/phpstan analyze --no-progress
+
+ php-cs-fixer:
+ name: PHP-CS-Fixer
+ runs-on: ubuntu-22.04
+
+ steps:
+ - name: Checkout code
+ uses: actions/checkout@v4
+
+ - name: Setup PHP
+ uses: shivammathur/setup-php@v2
+ with:
+ php-version: '7.4'
+ coverage: none
+ extensions: mbstring
+
+ - name: Download dependencies
+ run: composer update --no-interaction --no-progress
+
+ - name: Download PHP CS Fixer
+ run: composer bin php-cs-fixer update --no-interaction --no-progress
+
+ - name: Execute PHP CS Fixer
+ run: vendor/bin/php-cs-fixer fix --diff --dry-run
+
+ psalm:
+ name: Psalm
+ runs-on: ubuntu-22.04
+
+ steps:
+ - name: Checkout code
+ uses: actions/checkout@v4
+
+ - name: Setup PHP
+ uses: shivammathur/setup-php@v2
+ with:
+ php-version: '7.4'
+ coverage: none
+ extensions: mbstring, intl
+
+ - name: Download dependencies
+ run: composer update --no-interaction --no-progress
+
+ - name: Download Psalm
+ run: composer bin psalm update --no-interaction --no-progress
+
+ - name: Execute Psalm
+ run: vendor/bin/psalm.phar --no-progress --output-format=github
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.gitignore b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.gitignore
new file mode 100644
index 0000000000..17a858b223
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.gitignore
@@ -0,0 +1,12 @@
+.php-cs-fixer.php
+.php-cs-fixer.cache
+.phpunit.result.cache
+composer.lock
+vendor/
+/phpstan.neon
+/phpunit.xml
+
+build/
+artifacts/
+docs/_build
+docs/*.pyc
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.php-cs-fixer.dist.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.php-cs-fixer.dist.php
new file mode 100644
index 0000000000..48dee7382b
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/.php-cs-fixer.dist.php
@@ -0,0 +1,30 @@
+setRiskyAllowed(true)
+ ->setRules([
+ '@PHP71Migration:risky' => true,
+ '@PHPUnit75Migration:risky' => true,
+ '@PSR12:risky' => true,
+ '@Symfony' => true,
+ 'declare_strict_types' => false,
+ 'global_namespace_import' => false,
+ 'no_superfluous_phpdoc_tags' => [
+ 'allow_mixed' => true,
+ ],
+ 'phpdoc_annotation_without_dot' => false,
+ 'phpdoc_summary' => false,
+ 'phpdoc_to_comment' => false,
+ 'single_line_throw' => false,
+ 'void_return' => false,
+ 'yoda_style' => false,
+ ])
+ ->setFinder(
+ PhpCsFixer\Finder::create()
+ ->in(__DIR__.'/src')
+ ->in(__DIR__.'/tests')
+ ->name('*.php')
+ )
+;
+
+return $config;
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/CHANGELOG.md b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/CHANGELOG.md
new file mode 100644
index 0000000000..e0b6216598
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/CHANGELOG.md
@@ -0,0 +1,1664 @@
+# Change Log
+
+Please refer to [UPGRADING](UPGRADING.md) guide for upgrading to a major version.
+
+
+## 7.9.2 - 2024-07-24
+
+### Fixed
+
+- Adjusted handler selection to use cURL if its version is 7.21.2 or higher, rather than 7.34.0
+
+
+## 7.9.1 - 2024-07-19
+
+### Fixed
+
+- Fix TLS 1.3 check for HTTP/2 requests
+
+
+## 7.9.0 - 2024-07-18
+
+### Changed
+
+- Improve protocol version checks to provide feedback around unsupported protocols
+- Only select the cURL handler by default if 7.34.0 or higher is linked
+- Improved `CurlMultiHandler` to avoid busy wait if possible
+- Dropped support for EOL `guzzlehttp/psr7` v1
+- Improved URI user info redaction in errors
+
+## 7.8.2 - 2024-07-18
+
+### Added
+
+- Support for PHP 8.4
+
+
+## 7.8.1 - 2023-12-03
+
+### Changed
+
+- Updated links in docs to their canonical versions
+- Replaced `call_user_func*` with native calls
+
+
+## 7.8.0 - 2023-08-27
+
+### Added
+
+- Support for PHP 8.3
+- Added automatic closing of handles on `CurlFactory` object destruction
+
+
+## 7.7.1 - 2023-08-27
+
+### Changed
+
+- Remove the need for `AllowDynamicProperties` in `CurlMultiHandler`
+
+
+## 7.7.0 - 2023-05-21
+
+### Added
+
+- Support `guzzlehttp/promises` v2
+
+
+## 7.6.1 - 2023-05-15
+
+### Fixed
+
+- Fix `SetCookie::fromString` MaxAge deprecation warning and skip invalid MaxAge values
+
+
+## 7.6.0 - 2023-05-14
+
+### Added
+
+- Support for setting the minimum TLS version in a unified way
+- Apply on request the version set in options parameters
+
+
+## 7.5.2 - 2023-05-14
+
+### Fixed
+
+- Fixed set cookie constructor validation
+- Fixed handling of files with `'0'` body
+
+### Changed
+
+- Corrected docs and default connect timeout value to 300 seconds
+
+
+## 7.5.1 - 2023-04-17
+
+### Fixed
+
+- Fixed `NO_PROXY` settings so that setting the `proxy` option to `no` overrides the env variable
+
+### Changed
+
+- Adjusted `guzzlehttp/psr7` version constraint to `^1.9.1 || ^2.4.5`
+
+
+## 7.5.0 - 2022-08-28
+
+### Added
+
+- Support PHP 8.2
+- Add request to delay closure params
+
+
+## 7.4.5 - 2022-06-20
+
+### Fixed
+
+* Fix change in port should be considered a change in origin
+* Fix `CURLOPT_HTTPAUTH` option not cleared on change of origin
+
+
+## 7.4.4 - 2022-06-09
+
+### Fixed
+
+* Fix failure to strip Authorization header on HTTP downgrade
+* Fix failure to strip the Cookie header on change in host or HTTP downgrade
+
+
+## 7.4.3 - 2022-05-25
+
+### Fixed
+
+* Fix cross-domain cookie leakage
+
+
+## 7.4.2 - 2022-03-20
+
+### Fixed
+
+- Remove curl auth on cross-domain redirects to align with the Authorization HTTP header
+- Reject non-HTTP schemes in StreamHandler
+- Set a default ssl.peer_name context in StreamHandler to allow `force_ip_resolve`
+
+
+## 7.4.1 - 2021-12-06
+
+### Changed
+
+- Replaced implicit URI to string coercion [#2946](https://github.com/guzzle/guzzle/pull/2946)
+- Allow `symfony/deprecation-contracts` version 3 [#2961](https://github.com/guzzle/guzzle/pull/2961)
+
+### Fixed
+
+- Only close curl handle if it's done [#2950](https://github.com/guzzle/guzzle/pull/2950)
+
+
+## 7.4.0 - 2021-10-18
+
+### Added
+
+- Support PHP 8.1 [#2929](https://github.com/guzzle/guzzle/pull/2929), [#2939](https://github.com/guzzle/guzzle/pull/2939)
+- Support `psr/log` version 2 and 3 [#2943](https://github.com/guzzle/guzzle/pull/2943)
+
+### Fixed
+
+- Make sure we always call `restore_error_handler()` [#2915](https://github.com/guzzle/guzzle/pull/2915)
+- Fix progress parameter type compatibility between the cURL and stream handlers [#2936](https://github.com/guzzle/guzzle/pull/2936)
+- Throw `InvalidArgumentException` when an incorrect `headers` array is provided [#2916](https://github.com/guzzle/guzzle/pull/2916), [#2942](https://github.com/guzzle/guzzle/pull/2942)
+
+### Changed
+
+- Be more strict with types [#2914](https://github.com/guzzle/guzzle/pull/2914), [#2917](https://github.com/guzzle/guzzle/pull/2917), [#2919](https://github.com/guzzle/guzzle/pull/2919), [#2945](https://github.com/guzzle/guzzle/pull/2945)
+
+
+## 7.3.0 - 2021-03-23
+
+### Added
+
+- Support for DER and P12 certificates [#2413](https://github.com/guzzle/guzzle/pull/2413)
+- Support the cURL (http://) scheme for StreamHandler proxies [#2850](https://github.com/guzzle/guzzle/pull/2850)
+- Support for `guzzlehttp/psr7:^2.0` [#2878](https://github.com/guzzle/guzzle/pull/2878)
+
+### Fixed
+
+- Handle exceptions on invalid header consistently between PHP versions and handlers [#2872](https://github.com/guzzle/guzzle/pull/2872)
+
+
+## 7.2.0 - 2020-10-10
+
+### Added
+
+- Support for PHP 8 [#2712](https://github.com/guzzle/guzzle/pull/2712), [#2715](https://github.com/guzzle/guzzle/pull/2715), [#2789](https://github.com/guzzle/guzzle/pull/2789)
+- Support passing a body summarizer to the http errors middleware [#2795](https://github.com/guzzle/guzzle/pull/2795)
+
+### Fixed
+
+- Handle exceptions during response creation [#2591](https://github.com/guzzle/guzzle/pull/2591)
+- Fix CURLOPT_ENCODING not to be overwritten [#2595](https://github.com/guzzle/guzzle/pull/2595)
+- Make sure the Request always has a body object [#2804](https://github.com/guzzle/guzzle/pull/2804)
+
+### Changed
+
+- The `TooManyRedirectsException` has a response [#2660](https://github.com/guzzle/guzzle/pull/2660)
+- Avoid "functions" from dependencies [#2712](https://github.com/guzzle/guzzle/pull/2712)
+
+### Deprecated
+
+- Using environment variable GUZZLE_CURL_SELECT_TIMEOUT [#2786](https://github.com/guzzle/guzzle/pull/2786)
+
+
+## 7.1.1 - 2020-09-30
+
+### Fixed
+
+- Incorrect EOF detection for response body streams on Windows.
+
+### Changed
+
+- We dont connect curl `sink` on HEAD requests.
+- Removed some PHP 5 workarounds
+
+
+## 7.1.0 - 2020-09-22
+
+### Added
+
+- `GuzzleHttp\MessageFormatterInterface`
+
+### Fixed
+
+- Fixed issue that caused cookies with no value not to be stored.
+- On redirects, we allow all safe methods like GET, HEAD and OPTIONS.
+- Fixed logging on empty responses.
+- Make sure MessageFormatter::format returns string
+
+### Deprecated
+
+- All functions in `GuzzleHttp` has been deprecated. Use static methods on `Utils` instead.
+- `ClientInterface::getConfig()`
+- `Client::getConfig()`
+- `Client::__call()`
+- `Utils::defaultCaBundle()`
+- `CurlFactory::LOW_CURL_VERSION_NUMBER`
+
+
+## 7.0.1 - 2020-06-27
+
+* Fix multiply defined functions fatal error [#2699](https://github.com/guzzle/guzzle/pull/2699)
+
+
+## 7.0.0 - 2020-06-27
+
+No changes since 7.0.0-rc1.
+
+
+## 7.0.0-rc1 - 2020-06-15
+
+### Changed
+
+* Use error level for logging errors in Middleware [#2629](https://github.com/guzzle/guzzle/pull/2629)
+* Disabled IDN support by default and require ext-intl to use it [#2675](https://github.com/guzzle/guzzle/pull/2675)
+
+
+## 7.0.0-beta2 - 2020-05-25
+
+### Added
+
+* Using `Utils` class instead of functions in the `GuzzleHttp` namespace. [#2546](https://github.com/guzzle/guzzle/pull/2546)
+* `ClientInterface::MAJOR_VERSION` [#2583](https://github.com/guzzle/guzzle/pull/2583)
+
+### Changed
+
+* Avoid the `getenv` function when unsafe [#2531](https://github.com/guzzle/guzzle/pull/2531)
+* Added real client methods [#2529](https://github.com/guzzle/guzzle/pull/2529)
+* Avoid functions due to global install conflicts [#2546](https://github.com/guzzle/guzzle/pull/2546)
+* Use Symfony intl-idn polyfill [#2550](https://github.com/guzzle/guzzle/pull/2550)
+* Adding methods for HTTP verbs like `Client::get()`, `Client::head()`, `Client::patch()` etc [#2529](https://github.com/guzzle/guzzle/pull/2529)
+* `ConnectException` extends `TransferException` [#2541](https://github.com/guzzle/guzzle/pull/2541)
+* Updated the default User Agent to "GuzzleHttp/7" [#2654](https://github.com/guzzle/guzzle/pull/2654)
+
+### Fixed
+
+* Various intl icu issues [#2626](https://github.com/guzzle/guzzle/pull/2626)
+
+### Removed
+
+* Pool option `pool_size` [#2528](https://github.com/guzzle/guzzle/pull/2528)
+
+
+## 7.0.0-beta1 - 2019-12-30
+
+The diff might look very big but 95% of Guzzle users will be able to upgrade without modification.
+Please see [the upgrade document](UPGRADING.md) that describes all BC breaking changes.
+
+### Added
+
+* Implement PSR-18 and dropped PHP 5 support [#2421](https://github.com/guzzle/guzzle/pull/2421) [#2474](https://github.com/guzzle/guzzle/pull/2474)
+* PHP 7 types [#2442](https://github.com/guzzle/guzzle/pull/2442) [#2449](https://github.com/guzzle/guzzle/pull/2449) [#2466](https://github.com/guzzle/guzzle/pull/2466) [#2497](https://github.com/guzzle/guzzle/pull/2497) [#2499](https://github.com/guzzle/guzzle/pull/2499)
+* IDN support for redirects [2424](https://github.com/guzzle/guzzle/pull/2424)
+
+### Changed
+
+* Dont allow passing null as third argument to `BadResponseException::__construct()` [#2427](https://github.com/guzzle/guzzle/pull/2427)
+* Use SAPI constant instead of method call [#2450](https://github.com/guzzle/guzzle/pull/2450)
+* Use native function invocation [#2444](https://github.com/guzzle/guzzle/pull/2444)
+* Better defaults for PHP installations with old ICU lib [2454](https://github.com/guzzle/guzzle/pull/2454)
+* Added visibility to all constants [#2462](https://github.com/guzzle/guzzle/pull/2462)
+* Dont allow passing `null` as URI to `Client::request()` and `Client::requestAsync()` [#2461](https://github.com/guzzle/guzzle/pull/2461)
+* Widen the exception argument to throwable [#2495](https://github.com/guzzle/guzzle/pull/2495)
+
+### Fixed
+
+* Logging when Promise rejected with a string [#2311](https://github.com/guzzle/guzzle/pull/2311)
+
+### Removed
+
+* Class `SeekException` [#2162](https://github.com/guzzle/guzzle/pull/2162)
+* `RequestException::getResponseBodySummary()` [#2425](https://github.com/guzzle/guzzle/pull/2425)
+* `CookieJar::getCookieValue()` [#2433](https://github.com/guzzle/guzzle/pull/2433)
+* `uri_template()` and `UriTemplate` [#2440](https://github.com/guzzle/guzzle/pull/2440)
+* Request options `save_to` and `exceptions` [#2464](https://github.com/guzzle/guzzle/pull/2464)
+
+
+## 6.5.2 - 2019-12-23
+
+* idn_to_ascii() fix for old PHP versions [#2489](https://github.com/guzzle/guzzle/pull/2489)
+
+
+## 6.5.1 - 2019-12-21
+
+* Better defaults for PHP installations with old ICU lib [#2454](https://github.com/guzzle/guzzle/pull/2454)
+* IDN support for redirects [#2424](https://github.com/guzzle/guzzle/pull/2424)
+
+
+## 6.5.0 - 2019-12-07
+
+* Improvement: Added support for reset internal queue in MockHandler. [#2143](https://github.com/guzzle/guzzle/pull/2143)
+* Improvement: Added support to pass arbitrary options to `curl_multi_init`. [#2287](https://github.com/guzzle/guzzle/pull/2287)
+* Fix: Gracefully handle passing `null` to the `header` option. [#2132](https://github.com/guzzle/guzzle/pull/2132)
+* Fix: `RetryMiddleware` did not do exponential delay between retires due unit mismatch. [#2132](https://github.com/guzzle/guzzle/pull/2132)
+* Fix: Prevent undefined offset when using array for ssl_key options. [#2348](https://github.com/guzzle/guzzle/pull/2348)
+* Deprecated `ClientInterface::VERSION`
+
+
+## 6.4.1 - 2019-10-23
+
+* No `guzzle.phar` was created in 6.4.0 due expired API token. This release will fix that
+* Added `parent::__construct()` to `FileCookieJar` and `SessionCookieJar`
+
+
+## 6.4.0 - 2019-10-23
+
+* Improvement: Improved error messages when using curl < 7.21.2 [#2108](https://github.com/guzzle/guzzle/pull/2108)
+* Fix: Test if response is readable before returning a summary in `RequestException::getResponseBodySummary()` [#2081](https://github.com/guzzle/guzzle/pull/2081)
+* Fix: Add support for GUZZLE_CURL_SELECT_TIMEOUT environment variable [#2161](https://github.com/guzzle/guzzle/pull/2161)
+* Improvement: Added `GuzzleHttp\Exception\InvalidArgumentException` [#2163](https://github.com/guzzle/guzzle/pull/2163)
+* Improvement: Added `GuzzleHttp\_current_time()` to use `hrtime()` if that function exists. [#2242](https://github.com/guzzle/guzzle/pull/2242)
+* Improvement: Added curl's `appconnect_time` in `TransferStats` [#2284](https://github.com/guzzle/guzzle/pull/2284)
+* Improvement: Make GuzzleException extend Throwable wherever it's available [#2273](https://github.com/guzzle/guzzle/pull/2273)
+* Fix: Prevent concurrent writes to file when saving `CookieJar` [#2335](https://github.com/guzzle/guzzle/pull/2335)
+* Improvement: Update `MockHandler` so we can test transfer time [#2362](https://github.com/guzzle/guzzle/pull/2362)
+
+
+## 6.3.3 - 2018-04-22
+
+* Fix: Default headers when decode_content is specified
+
+
+## 6.3.2 - 2018-03-26
+
+* Fix: Release process
+
+
+## 6.3.1 - 2018-03-26
+
+* Bug fix: Parsing 0 epoch expiry times in cookies [#2014](https://github.com/guzzle/guzzle/pull/2014)
+* Improvement: Better ConnectException detection [#2012](https://github.com/guzzle/guzzle/pull/2012)
+* Bug fix: Malformed domain that contains a "/" [#1999](https://github.com/guzzle/guzzle/pull/1999)
+* Bug fix: Undefined offset when a cookie has no first key-value pair [#1998](https://github.com/guzzle/guzzle/pull/1998)
+* Improvement: Support PHPUnit 6 [#1953](https://github.com/guzzle/guzzle/pull/1953)
+* Bug fix: Support empty headers [#1915](https://github.com/guzzle/guzzle/pull/1915)
+* Bug fix: Ignore case during header modifications [#1916](https://github.com/guzzle/guzzle/pull/1916)
+
++ Minor code cleanups, documentation fixes and clarifications.
+
+
+## 6.3.0 - 2017-06-22
+
+* Feature: force IP resolution (ipv4 or ipv6) [#1608](https://github.com/guzzle/guzzle/pull/1608), [#1659](https://github.com/guzzle/guzzle/pull/1659)
+* Improvement: Don't include summary in exception message when body is empty [#1621](https://github.com/guzzle/guzzle/pull/1621)
+* Improvement: Handle `on_headers` option in MockHandler [#1580](https://github.com/guzzle/guzzle/pull/1580)
+* Improvement: Added SUSE Linux CA path [#1609](https://github.com/guzzle/guzzle/issues/1609)
+* Improvement: Use class reference for getting the name of the class instead of using hardcoded strings [#1641](https://github.com/guzzle/guzzle/pull/1641)
+* Feature: Added `read_timeout` option [#1611](https://github.com/guzzle/guzzle/pull/1611)
+* Bug fix: PHP 7.x fixes [#1685](https://github.com/guzzle/guzzle/pull/1685), [#1686](https://github.com/guzzle/guzzle/pull/1686), [#1811](https://github.com/guzzle/guzzle/pull/1811)
+* Deprecation: BadResponseException instantiation without a response [#1642](https://github.com/guzzle/guzzle/pull/1642)
+* Feature: Added NTLM auth [#1569](https://github.com/guzzle/guzzle/pull/1569)
+* Feature: Track redirect HTTP status codes [#1711](https://github.com/guzzle/guzzle/pull/1711)
+* Improvement: Check handler type during construction [#1745](https://github.com/guzzle/guzzle/pull/1745)
+* Improvement: Always include the Content-Length if there's a body [#1721](https://github.com/guzzle/guzzle/pull/1721)
+* Feature: Added convenience method to access a cookie by name [#1318](https://github.com/guzzle/guzzle/pull/1318)
+* Bug fix: Fill `CURLOPT_CAPATH` and `CURLOPT_CAINFO` properly [#1684](https://github.com/guzzle/guzzle/pull/1684)
+* Improvement: Use `\GuzzleHttp\Promise\rejection_for` function instead of object init [#1827](https://github.com/guzzle/guzzle/pull/1827)
+
++ Minor code cleanups, documentation fixes and clarifications.
+
+
+## 6.2.3 - 2017-02-28
+
+* Fix deprecations with guzzle/psr7 version 1.4
+
+
+## 6.2.2 - 2016-10-08
+
+* Allow to pass nullable Response to delay callable
+* Only add scheme when host is present
+* Fix drain case where content-length is the literal string zero
+* Obfuscate in-URL credentials in exceptions
+
+
+## 6.2.1 - 2016-07-18
+
+* Address HTTP_PROXY security vulnerability, CVE-2016-5385:
+ https://httpoxy.org/
+* Fixing timeout bug with StreamHandler:
+ https://github.com/guzzle/guzzle/pull/1488
+* Only read up to `Content-Length` in PHP StreamHandler to avoid timeouts when
+ a server does not honor `Connection: close`.
+* Ignore URI fragment when sending requests.
+
+
+## 6.2.0 - 2016-03-21
+
+* Feature: added `GuzzleHttp\json_encode` and `GuzzleHttp\json_decode`.
+ https://github.com/guzzle/guzzle/pull/1389
+* Bug fix: Fix sleep calculation when waiting for delayed requests.
+ https://github.com/guzzle/guzzle/pull/1324
+* Feature: More flexible history containers.
+ https://github.com/guzzle/guzzle/pull/1373
+* Bug fix: defer sink stream opening in StreamHandler.
+ https://github.com/guzzle/guzzle/pull/1377
+* Bug fix: do not attempt to escape cookie values.
+ https://github.com/guzzle/guzzle/pull/1406
+* Feature: report original content encoding and length on decoded responses.
+ https://github.com/guzzle/guzzle/pull/1409
+* Bug fix: rewind seekable request bodies before dispatching to cURL.
+ https://github.com/guzzle/guzzle/pull/1422
+* Bug fix: provide an empty string to `http_build_query` for HHVM workaround.
+ https://github.com/guzzle/guzzle/pull/1367
+
+
+## 6.1.1 - 2015-11-22
+
+* Bug fix: Proxy::wrapSync() now correctly proxies to the appropriate handler
+ https://github.com/guzzle/guzzle/commit/911bcbc8b434adce64e223a6d1d14e9a8f63e4e4
+* Feature: HandlerStack is now more generic.
+ https://github.com/guzzle/guzzle/commit/f2102941331cda544745eedd97fc8fd46e1ee33e
+* Bug fix: setting verify to false in the StreamHandler now disables peer
+ verification. https://github.com/guzzle/guzzle/issues/1256
+* Feature: Middleware now uses an exception factory, including more error
+ context. https://github.com/guzzle/guzzle/pull/1282
+* Feature: better support for disabled functions.
+ https://github.com/guzzle/guzzle/pull/1287
+* Bug fix: fixed regression where MockHandler was not using `sink`.
+ https://github.com/guzzle/guzzle/pull/1292
+
+
+## 6.1.0 - 2015-09-08
+
+* Feature: Added the `on_stats` request option to provide access to transfer
+ statistics for requests. https://github.com/guzzle/guzzle/pull/1202
+* Feature: Added the ability to persist session cookies in CookieJars.
+ https://github.com/guzzle/guzzle/pull/1195
+* Feature: Some compatibility updates for Google APP Engine
+ https://github.com/guzzle/guzzle/pull/1216
+* Feature: Added support for NO_PROXY to prevent the use of a proxy based on
+ a simple set of rules. https://github.com/guzzle/guzzle/pull/1197
+* Feature: Cookies can now contain square brackets.
+ https://github.com/guzzle/guzzle/pull/1237
+* Bug fix: Now correctly parsing `=` inside of quotes in Cookies.
+ https://github.com/guzzle/guzzle/pull/1232
+* Bug fix: Cusotm cURL options now correctly override curl options of the
+ same name. https://github.com/guzzle/guzzle/pull/1221
+* Bug fix: Content-Type header is now added when using an explicitly provided
+ multipart body. https://github.com/guzzle/guzzle/pull/1218
+* Bug fix: Now ignoring Set-Cookie headers that have no name.
+* Bug fix: Reason phrase is no longer cast to an int in some cases in the
+ cURL handler. https://github.com/guzzle/guzzle/pull/1187
+* Bug fix: Remove the Authorization header when redirecting if the Host
+ header changes. https://github.com/guzzle/guzzle/pull/1207
+* Bug fix: Cookie path matching fixes
+ https://github.com/guzzle/guzzle/issues/1129
+* Bug fix: Fixing the cURL `body_as_string` setting
+ https://github.com/guzzle/guzzle/pull/1201
+* Bug fix: quotes are no longer stripped when parsing cookies.
+ https://github.com/guzzle/guzzle/issues/1172
+* Bug fix: `form_params` and `query` now always uses the `&` separator.
+ https://github.com/guzzle/guzzle/pull/1163
+* Bug fix: Adding a Content-Length to PHP stream wrapper requests if not set.
+ https://github.com/guzzle/guzzle/pull/1189
+
+
+## 6.0.2 - 2015-07-04
+
+* Fixed a memory leak in the curl handlers in which references to callbacks
+ were not being removed by `curl_reset`.
+* Cookies are now extracted properly before redirects.
+* Cookies now allow more character ranges.
+* Decoded Content-Encoding responses are now modified to correctly reflect
+ their state if the encoding was automatically removed by a handler. This
+ means that the `Content-Encoding` header may be removed an the
+ `Content-Length` modified to reflect the message size after removing the
+ encoding.
+* Added a more explicit error message when trying to use `form_params` and
+ `multipart` in the same request.
+* Several fixes for HHVM support.
+* Functions are now conditionally required using an additional level of
+ indirection to help with global Composer installations.
+
+
+## 6.0.1 - 2015-05-27
+
+* Fixed a bug with serializing the `query` request option where the `&`
+ separator was missing.
+* Added a better error message for when `body` is provided as an array. Please
+ use `form_params` or `multipart` instead.
+* Various doc fixes.
+
+
+## 6.0.0 - 2015-05-26
+
+* See the UPGRADING.md document for more information.
+* Added `multipart` and `form_params` request options.
+* Added `synchronous` request option.
+* Added the `on_headers` request option.
+* Fixed `expect` handling.
+* No longer adding default middlewares in the client ctor. These need to be
+ present on the provided handler in order to work.
+* Requests are no longer initiated when sending async requests with the
+ CurlMultiHandler. This prevents unexpected recursion from requests completing
+ while ticking the cURL loop.
+* Removed the semantics of setting `default` to `true`. This is no longer
+ required now that the cURL loop is not ticked for async requests.
+* Added request and response logging middleware.
+* No longer allowing self signed certificates when using the StreamHandler.
+* Ensuring that `sink` is valid if saving to a file.
+* Request exceptions now include a "handler context" which provides handler
+ specific contextual information.
+* Added `GuzzleHttp\RequestOptions` to allow request options to be applied
+ using constants.
+* `$maxHandles` has been removed from CurlMultiHandler.
+* `MultipartPostBody` is now part of the `guzzlehttp/psr7` package.
+
+
+## 5.3.0 - 2015-05-19
+
+* Mock now supports `save_to`
+* Marked `AbstractRequestEvent::getTransaction()` as public.
+* Fixed a bug in which multiple headers using different casing would overwrite
+ previous headers in the associative array.
+* Added `Utils::getDefaultHandler()`
+* Marked `GuzzleHttp\Client::getDefaultUserAgent` as deprecated.
+* URL scheme is now always lowercased.
+
+
+## 6.0.0-beta.1
+
+* Requires PHP >= 5.5
+* Updated to use PSR-7
+ * Requires immutable messages, which basically means an event based system
+ owned by a request instance is no longer possible.
+ * Utilizing the [Guzzle PSR-7 package](https://github.com/guzzle/psr7).
+ * Removed the dependency on `guzzlehttp/streams`. These stream abstractions
+ are available in the `guzzlehttp/psr7` package under the `GuzzleHttp\Psr7`
+ namespace.
+* Added middleware and handler system
+ * Replaced the Guzzle event and subscriber system with a middleware system.
+ * No longer depends on RingPHP, but rather places the HTTP handlers directly
+ in Guzzle, operating on PSR-7 messages.
+ * Retry logic is now encapsulated in `GuzzleHttp\Middleware::retry`, which
+ means the `guzzlehttp/retry-subscriber` is now obsolete.
+ * Mocking responses is now handled using `GuzzleHttp\Handler\MockHandler`.
+* Asynchronous responses
+ * No longer supports the `future` request option to send an async request.
+ Instead, use one of the `*Async` methods of a client (e.g., `requestAsync`,
+ `getAsync`, etc.).
+ * Utilizing `GuzzleHttp\Promise` instead of React's promise library to avoid
+ recursion required by chaining and forwarding react promises. See
+ https://github.com/guzzle/promises
+ * Added `requestAsync` and `sendAsync` to send request asynchronously.
+ * Added magic methods for `getAsync()`, `postAsync()`, etc. to send requests
+ asynchronously.
+* Request options
+ * POST and form updates
+ * Added the `form_fields` and `form_files` request options.
+ * Removed the `GuzzleHttp\Post` namespace.
+ * The `body` request option no longer accepts an array for POST requests.
+ * The `exceptions` request option has been deprecated in favor of the
+ `http_errors` request options.
+ * The `save_to` request option has been deprecated in favor of `sink` request
+ option.
+* Clients no longer accept an array of URI template string and variables for
+ URI variables. You will need to expand URI templates before passing them
+ into a client constructor or request method.
+* Client methods `get()`, `post()`, `put()`, `patch()`, `options()`, etc. are
+ now magic methods that will send synchronous requests.
+* Replaced `Utils.php` with plain functions in `functions.php`.
+* Removed `GuzzleHttp\Collection`.
+* Removed `GuzzleHttp\BatchResults`. Batched pool results are now returned as
+ an array.
+* Removed `GuzzleHttp\Query`. Query string handling is now handled using an
+ associative array passed into the `query` request option. The query string
+ is serialized using PHP's `http_build_query`. If you need more control, you
+ can pass the query string in as a string.
+* `GuzzleHttp\QueryParser` has been replaced with the
+ `GuzzleHttp\Psr7\parse_query`.
+
+
+## 5.2.0 - 2015-01-27
+
+* Added `AppliesHeadersInterface` to make applying headers to a request based
+ on the body more generic and not specific to `PostBodyInterface`.
+* Reduced the number of stack frames needed to send requests.
+* Nested futures are now resolved in the client rather than the RequestFsm
+* Finishing state transitions is now handled in the RequestFsm rather than the
+ RingBridge.
+* Added a guard in the Pool class to not use recursion for request retries.
+
+
+## 5.1.0 - 2014-12-19
+
+* Pool class no longer uses recursion when a request is intercepted.
+* The size of a Pool can now be dynamically adjusted using a callback.
+ See https://github.com/guzzle/guzzle/pull/943.
+* Setting a request option to `null` when creating a request with a client will
+ ensure that the option is not set. This allows you to overwrite default
+ request options on a per-request basis.
+ See https://github.com/guzzle/guzzle/pull/937.
+* Added the ability to limit which protocols are allowed for redirects by
+ specifying a `protocols` array in the `allow_redirects` request option.
+* Nested futures due to retries are now resolved when waiting for synchronous
+ responses. See https://github.com/guzzle/guzzle/pull/947.
+* `"0"` is now an allowed URI path. See
+ https://github.com/guzzle/guzzle/pull/935.
+* `Query` no longer typehints on the `$query` argument in the constructor,
+ allowing for strings and arrays.
+* Exceptions thrown in the `end` event are now correctly wrapped with Guzzle
+ specific exceptions if necessary.
+
+
+## 5.0.3 - 2014-11-03
+
+This change updates query strings so that they are treated as un-encoded values
+by default where the value represents an un-encoded value to send over the
+wire. A Query object then encodes the value before sending over the wire. This
+means that even value query string values (e.g., ":") are url encoded. This
+makes the Query class match PHP's http_build_query function. However, if you
+want to send requests over the wire using valid query string characters that do
+not need to be encoded, then you can provide a string to Url::setQuery() and
+pass true as the second argument to specify that the query string is a raw
+string that should not be parsed or encoded (unless a call to getQuery() is
+subsequently made, forcing the query-string to be converted into a Query
+object).
+
+
+## 5.0.2 - 2014-10-30
+
+* Added a trailing `\r\n` to multipart/form-data payloads. See
+ https://github.com/guzzle/guzzle/pull/871
+* Added a `GuzzleHttp\Pool::send()` convenience method to match the docs.
+* Status codes are now returned as integers. See
+ https://github.com/guzzle/guzzle/issues/881
+* No longer overwriting an existing `application/x-www-form-urlencoded` header
+ when sending POST requests, allowing for customized headers. See
+ https://github.com/guzzle/guzzle/issues/877
+* Improved path URL serialization.
+
+ * No longer double percent-encoding characters in the path or query string if
+ they are already encoded.
+ * Now properly encoding the supplied path to a URL object, instead of only
+ encoding ' ' and '?'.
+ * Note: This has been changed in 5.0.3 to now encode query string values by
+ default unless the `rawString` argument is provided when setting the query
+ string on a URL: Now allowing many more characters to be present in the
+ query string without being percent encoded. See
+ https://datatracker.ietf.org/doc/html/rfc3986#appendix-A
+
+
+## 5.0.1 - 2014-10-16
+
+Bugfix release.
+
+* Fixed an issue where connection errors still returned response object in
+ error and end events event though the response is unusable. This has been
+ corrected so that a response is not returned in the `getResponse` method of
+ these events if the response did not complete. https://github.com/guzzle/guzzle/issues/867
+* Fixed an issue where transfer statistics were not being populated in the
+ RingBridge. https://github.com/guzzle/guzzle/issues/866
+
+
+## 5.0.0 - 2014-10-12
+
+Adding support for non-blocking responses and some minor API cleanup.
+
+### New Features
+
+* Added support for non-blocking responses based on `guzzlehttp/guzzle-ring`.
+* Added a public API for creating a default HTTP adapter.
+* Updated the redirect plugin to be non-blocking so that redirects are sent
+ concurrently. Other plugins like this can now be updated to be non-blocking.
+* Added a "progress" event so that you can get upload and download progress
+ events.
+* Added `GuzzleHttp\Pool` which implements FutureInterface and transfers
+ requests concurrently using a capped pool size as efficiently as possible.
+* Added `hasListeners()` to EmitterInterface.
+* Removed `GuzzleHttp\ClientInterface::sendAll` and marked
+ `GuzzleHttp\Client::sendAll` as deprecated (it's still there, just not the
+ recommended way).
+
+### Breaking changes
+
+The breaking changes in this release are relatively minor. The biggest thing to
+look out for is that request and response objects no longer implement fluent
+interfaces.
+
+* Removed the fluent interfaces (i.e., `return $this`) from requests,
+ responses, `GuzzleHttp\Collection`, `GuzzleHttp\Url`,
+ `GuzzleHttp\Query`, `GuzzleHttp\Post\PostBody`, and
+ `GuzzleHttp\Cookie\SetCookie`. This blog post provides a good outline of
+ why I did this: https://ocramius.github.io/blog/fluent-interfaces-are-evil/.
+ This also makes the Guzzle message interfaces compatible with the current
+ PSR-7 message proposal.
+* Removed "functions.php", so that Guzzle is truly PSR-4 compliant. Except
+ for the HTTP request functions from function.php, these functions are now
+ implemented in `GuzzleHttp\Utils` using camelCase. `GuzzleHttp\json_decode`
+ moved to `GuzzleHttp\Utils::jsonDecode`. `GuzzleHttp\get_path` moved to
+ `GuzzleHttp\Utils::getPath`. `GuzzleHttp\set_path` moved to
+ `GuzzleHttp\Utils::setPath`. `GuzzleHttp\batch` should now be
+ `GuzzleHttp\Pool::batch`, which returns an `objectStorage`. Using functions.php
+ caused problems for many users: they aren't PSR-4 compliant, require an
+ explicit include, and needed an if-guard to ensure that the functions are not
+ declared multiple times.
+* Rewrote adapter layer.
+ * Removing all classes from `GuzzleHttp\Adapter`, these are now
+ implemented as callables that are stored in `GuzzleHttp\Ring\Client`.
+ * Removed the concept of "parallel adapters". Sending requests serially or
+ concurrently is now handled using a single adapter.
+ * Moved `GuzzleHttp\Adapter\Transaction` to `GuzzleHttp\Transaction`. The
+ Transaction object now exposes the request, response, and client as public
+ properties. The getters and setters have been removed.
+* Removed the "headers" event. This event was only useful for changing the
+ body a response once the headers of the response were known. You can implement
+ a similar behavior in a number of ways. One example might be to use a
+ FnStream that has access to the transaction being sent. For example, when the
+ first byte is written, you could check if the response headers match your
+ expectations, and if so, change the actual stream body that is being
+ written to.
+* Removed the `asArray` parameter from
+ `GuzzleHttp\Message\MessageInterface::getHeader`. If you want to get a header
+ value as an array, then use the newly added `getHeaderAsArray()` method of
+ `MessageInterface`. This change makes the Guzzle interfaces compatible with
+ the PSR-7 interfaces.
+* `GuzzleHttp\Message\MessageFactory` no longer allows subclasses to add
+ custom request options using double-dispatch (this was an implementation
+ detail). Instead, you should now provide an associative array to the
+ constructor which is a mapping of the request option name mapping to a
+ function that applies the option value to a request.
+* Removed the concept of "throwImmediately" from exceptions and error events.
+ This control mechanism was used to stop a transfer of concurrent requests
+ from completing. This can now be handled by throwing the exception or by
+ cancelling a pool of requests or each outstanding future request individually.
+* Updated to "GuzzleHttp\Streams" 3.0.
+ * `GuzzleHttp\Stream\StreamInterface::getContents()` no longer accepts a
+ `maxLen` parameter. This update makes the Guzzle streams project
+ compatible with the current PSR-7 proposal.
+ * `GuzzleHttp\Stream\Stream::__construct`,
+ `GuzzleHttp\Stream\Stream::factory`, and
+ `GuzzleHttp\Stream\Utils::create` no longer accept a size in the second
+ argument. They now accept an associative array of options, including the
+ "size" key and "metadata" key which can be used to provide custom metadata.
+
+
+## 4.2.2 - 2014-09-08
+
+* Fixed a memory leak in the CurlAdapter when reusing cURL handles.
+* No longer using `request_fulluri` in stream adapter proxies.
+* Relative redirects are now based on the last response, not the first response.
+
+## 4.2.1 - 2014-08-19
+
+* Ensuring that the StreamAdapter does not always add a Content-Type header
+* Adding automated github releases with a phar and zip
+
+## 4.2.0 - 2014-08-17
+
+* Now merging in default options using a case-insensitive comparison.
+ Closes https://github.com/guzzle/guzzle/issues/767
+* Added the ability to automatically decode `Content-Encoding` response bodies
+ using the `decode_content` request option. This is set to `true` by default
+ to decode the response body if it comes over the wire with a
+ `Content-Encoding`. Set this value to `false` to disable decoding the
+ response content, and pass a string to provide a request `Accept-Encoding`
+ header and turn on automatic response decoding. This feature now allows you
+ to pass an `Accept-Encoding` header in the headers of a request but still
+ disable automatic response decoding.
+ Closes https://github.com/guzzle/guzzle/issues/764
+* Added the ability to throw an exception immediately when transferring
+ requests in parallel. Closes https://github.com/guzzle/guzzle/issues/760
+* Updating guzzlehttp/streams dependency to ~2.1
+* No longer utilizing the now deprecated namespaced methods from the stream
+ package.
+
+## 4.1.8 - 2014-08-14
+
+* Fixed an issue in the CurlFactory that caused setting the `stream=false`
+ request option to throw an exception.
+ See: https://github.com/guzzle/guzzle/issues/769
+* TransactionIterator now calls rewind on the inner iterator.
+ See: https://github.com/guzzle/guzzle/pull/765
+* You can now set the `Content-Type` header to `multipart/form-data`
+ when creating POST requests to force multipart bodies.
+ See https://github.com/guzzle/guzzle/issues/768
+
+## 4.1.7 - 2014-08-07
+
+* Fixed an error in the HistoryPlugin that caused the same request and response
+ to be logged multiple times when an HTTP protocol error occurs.
+* Ensuring that cURL does not add a default Content-Type when no Content-Type
+ has been supplied by the user. This prevents the adapter layer from modifying
+ the request that is sent over the wire after any listeners may have already
+ put the request in a desired state (e.g., signed the request).
+* Throwing an exception when you attempt to send requests that have the
+ "stream" set to true in parallel using the MultiAdapter.
+* Only calling curl_multi_select when there are active cURL handles. This was
+ previously changed and caused performance problems on some systems due to PHP
+ always selecting until the maximum select timeout.
+* Fixed a bug where multipart/form-data POST fields were not correctly
+ aggregated (e.g., values with "&").
+
+## 4.1.6 - 2014-08-03
+
+* Added helper methods to make it easier to represent messages as strings,
+ including getting the start line and getting headers as a string.
+
+## 4.1.5 - 2014-08-02
+
+* Automatically retrying cURL "Connection died, retrying a fresh connect"
+ errors when possible.
+* cURL implementation cleanup
+* Allowing multiple event subscriber listeners to be registered per event by
+ passing an array of arrays of listener configuration.
+
+## 4.1.4 - 2014-07-22
+
+* Fixed a bug that caused multi-part POST requests with more than one field to
+ serialize incorrectly.
+* Paths can now be set to "0"
+* `ResponseInterface::xml` now accepts a `libxml_options` option and added a
+ missing default argument that was required when parsing XML response bodies.
+* A `save_to` stream is now created lazily, which means that files are not
+ created on disk unless a request succeeds.
+
+## 4.1.3 - 2014-07-15
+
+* Various fixes to multipart/form-data POST uploads
+* Wrapping function.php in an if-statement to ensure Guzzle can be used
+ globally and in a Composer install
+* Fixed an issue with generating and merging in events to an event array
+* POST headers are only applied before sending a request to allow you to change
+ the query aggregator used before uploading
+* Added much more robust query string parsing
+* Fixed various parsing and normalization issues with URLs
+* Fixing an issue where multi-valued headers were not being utilized correctly
+ in the StreamAdapter
+
+## 4.1.2 - 2014-06-18
+
+* Added support for sending payloads with GET requests
+
+## 4.1.1 - 2014-06-08
+
+* Fixed an issue related to using custom message factory options in subclasses
+* Fixed an issue with nested form fields in a multi-part POST
+* Fixed an issue with using the `json` request option for POST requests
+* Added `ToArrayInterface` to `GuzzleHttp\Cookie\CookieJar`
+
+## 4.1.0 - 2014-05-27
+
+* Added a `json` request option to easily serialize JSON payloads.
+* Added a `GuzzleHttp\json_decode()` wrapper to safely parse JSON.
+* Added `setPort()` and `getPort()` to `GuzzleHttp\Message\RequestInterface`.
+* Added the ability to provide an emitter to a client in the client constructor.
+* Added the ability to persist a cookie session using $_SESSION.
+* Added a trait that can be used to add event listeners to an iterator.
+* Removed request method constants from RequestInterface.
+* Fixed warning when invalid request start-lines are received.
+* Updated MessageFactory to work with custom request option methods.
+* Updated cacert bundle to latest build.
+
+4.0.2 (2014-04-16)
+------------------
+
+* Proxy requests using the StreamAdapter now properly use request_fulluri (#632)
+* Added the ability to set scalars as POST fields (#628)
+
+## 4.0.1 - 2014-04-04
+
+* The HTTP status code of a response is now set as the exception code of
+ RequestException objects.
+* 303 redirects will now correctly switch from POST to GET requests.
+* The default parallel adapter of a client now correctly uses the MultiAdapter.
+* HasDataTrait now initializes the internal data array as an empty array so
+ that the toArray() method always returns an array.
+
+## 4.0.0 - 2014-03-29
+
+* For information on changes and upgrading, see:
+ https://github.com/guzzle/guzzle/blob/master/UPGRADING.md#3x-to-40
+* Added `GuzzleHttp\batch()` as a convenience function for sending requests in
+ parallel without needing to write asynchronous code.
+* Restructured how events are added to `GuzzleHttp\ClientInterface::sendAll()`.
+ You can now pass a callable or an array of associative arrays where each
+ associative array contains the "fn", "priority", and "once" keys.
+
+## 4.0.0.rc-2 - 2014-03-25
+
+* Removed `getConfig()` and `setConfig()` from clients to avoid confusion
+ around whether things like base_url, message_factory, etc. should be able to
+ be retrieved or modified.
+* Added `getDefaultOption()` and `setDefaultOption()` to ClientInterface
+* functions.php functions were renamed using snake_case to match PHP idioms
+* Added support for `HTTP_PROXY`, `HTTPS_PROXY`, and
+ `GUZZLE_CURL_SELECT_TIMEOUT` environment variables
+* Added the ability to specify custom `sendAll()` event priorities
+* Added the ability to specify custom stream context options to the stream
+ adapter.
+* Added a functions.php function for `get_path()` and `set_path()`
+* CurlAdapter and MultiAdapter now use a callable to generate curl resources
+* MockAdapter now properly reads a body and emits a `headers` event
+* Updated Url class to check if a scheme and host are set before adding ":"
+ and "//". This allows empty Url (e.g., "") to be serialized as "".
+* Parsing invalid XML no longer emits warnings
+* Curl classes now properly throw AdapterExceptions
+* Various performance optimizations
+* Streams are created with the faster `Stream\create()` function
+* Marked deprecation_proxy() as internal
+* Test server is now a collection of static methods on a class
+
+## 4.0.0-rc.1 - 2014-03-15
+
+* See https://github.com/guzzle/guzzle/blob/master/UPGRADING.md#3x-to-40
+
+## 3.8.1 - 2014-01-28
+
+* Bug: Always using GET requests when redirecting from a 303 response
+* Bug: CURLOPT_SSL_VERIFYHOST is now correctly set to false when setting `$certificateAuthority` to false in
+ `Guzzle\Http\ClientInterface::setSslVerification()`
+* Bug: RedirectPlugin now uses strict RFC 3986 compliance when combining a base URL with a relative URL
+* Bug: The body of a request can now be set to `"0"`
+* Sending PHP stream requests no longer forces `HTTP/1.0`
+* Adding more information to ExceptionCollection exceptions so that users have more context, including a stack trace of
+ each sub-exception
+* Updated the `$ref` attribute in service descriptions to merge over any existing parameters of a schema (rather than
+ clobbering everything).
+* Merging URLs will now use the query string object from the relative URL (thus allowing custom query aggregators)
+* Query strings are now parsed in a way that they do no convert empty keys with no value to have a dangling `=`.
+ For example `foo&bar=baz` is now correctly parsed and recognized as `foo&bar=baz` rather than `foo=&bar=baz`.
+* Now properly escaping the regular expression delimiter when matching Cookie domains.
+* Network access is now disabled when loading XML documents
+
+## 3.8.0 - 2013-12-05
+
+* Added the ability to define a POST name for a file
+* JSON response parsing now properly walks additionalProperties
+* cURL error code 18 is now retried automatically in the BackoffPlugin
+* Fixed a cURL error when URLs contain fragments
+* Fixed an issue in the BackoffPlugin retry event where it was trying to access all exceptions as if they were
+ CurlExceptions
+* CURLOPT_PROGRESS function fix for PHP 5.5 (69fcc1e)
+* Added the ability for Guzzle to work with older versions of cURL that do not support `CURLOPT_TIMEOUT_MS`
+* Fixed a bug that was encountered when parsing empty header parameters
+* UriTemplate now has a `setRegex()` method to match the docs
+* The `debug` request parameter now checks if it is truthy rather than if it exists
+* Setting the `debug` request parameter to true shows verbose cURL output instead of using the LogPlugin
+* Added the ability to combine URLs using strict RFC 3986 compliance
+* Command objects can now return the validation errors encountered by the command
+* Various fixes to cache revalidation (#437 and 29797e5)
+* Various fixes to the AsyncPlugin
+* Cleaned up build scripts
+
+## 3.7.4 - 2013-10-02
+
+* Bug fix: 0 is now an allowed value in a description parameter that has a default value (#430)
+* Bug fix: SchemaFormatter now returns an integer when formatting to a Unix timestamp
+ (see https://github.com/aws/aws-sdk-php/issues/147)
+* Bug fix: Cleaned up and fixed URL dot segment removal to properly resolve internal dots
+* Minimum PHP version is now properly specified as 5.3.3 (up from 5.3.2) (#420)
+* Updated the bundled cacert.pem (#419)
+* OauthPlugin now supports adding authentication to headers or query string (#425)
+
+## 3.7.3 - 2013-09-08
+
+* Added the ability to get the exception associated with a request/command when using `MultiTransferException` and
+ `CommandTransferException`.
+* Setting `additionalParameters` of a response to false is now honored when parsing responses with a service description
+* Schemas are only injected into response models when explicitly configured.
+* No longer guessing Content-Type based on the path of a request. Content-Type is now only guessed based on the path of
+ an EntityBody.
+* Bug fix: ChunkedIterator can now properly chunk a \Traversable as well as an \Iterator.
+* Bug fix: FilterIterator now relies on `\Iterator` instead of `\Traversable`.
+* Bug fix: Gracefully handling malformed responses in RequestMediator::writeResponseBody()
+* Bug fix: Replaced call to canCache with canCacheRequest in the CallbackCanCacheStrategy of the CachePlugin
+* Bug fix: Visiting XML attributes first before visiting XML children when serializing requests
+* Bug fix: Properly parsing headers that contain commas contained in quotes
+* Bug fix: mimetype guessing based on a filename is now case-insensitive
+
+## 3.7.2 - 2013-08-02
+
+* Bug fix: Properly URL encoding paths when using the PHP-only version of the UriTemplate expander
+ See https://github.com/guzzle/guzzle/issues/371
+* Bug fix: Cookie domains are now matched correctly according to RFC 6265
+ See https://github.com/guzzle/guzzle/issues/377
+* Bug fix: GET parameters are now used when calculating an OAuth signature
+* Bug fix: Fixed an issue with cache revalidation where the If-None-Match header was being double quoted
+* `Guzzle\Common\AbstractHasDispatcher::dispatch()` now returns the event that was dispatched
+* `Guzzle\Http\QueryString::factory()` now guesses the most appropriate query aggregator to used based on the input.
+ See https://github.com/guzzle/guzzle/issues/379
+* Added a way to add custom domain objects to service description parsing using the `operation.parse_class` event. See
+ https://github.com/guzzle/guzzle/pull/380
+* cURL multi cleanup and optimizations
+
+## 3.7.1 - 2013-07-05
+
+* Bug fix: Setting default options on a client now works
+* Bug fix: Setting options on HEAD requests now works. See #352
+* Bug fix: Moving stream factory before send event to before building the stream. See #353
+* Bug fix: Cookies no longer match on IP addresses per RFC 6265
+* Bug fix: Correctly parsing header parameters that are in `<>` and quotes
+* Added `cert` and `ssl_key` as request options
+* `Host` header can now diverge from the host part of a URL if the header is set manually
+* `Guzzle\Service\Command\LocationVisitor\Request\XmlVisitor` was rewritten to change from using SimpleXML to XMLWriter
+* OAuth parameters are only added via the plugin if they aren't already set
+* Exceptions are now thrown when a URL cannot be parsed
+* Returning `false` if `Guzzle\Http\EntityBody::getContentMd5()` fails
+* Not setting a `Content-MD5` on a command if calculating the Content-MD5 fails via the CommandContentMd5Plugin
+
+## 3.7.0 - 2013-06-10
+
+* See UPGRADING.md for more information on how to upgrade.
+* Requests now support the ability to specify an array of $options when creating a request to more easily modify a
+ request. You can pass a 'request.options' configuration setting to a client to apply default request options to
+ every request created by a client (e.g. default query string variables, headers, curl options, etc.).
+* Added a static facade class that allows you to use Guzzle with static methods and mount the class to `\Guzzle`.
+ See `Guzzle\Http\StaticClient::mount`.
+* Added `command.request_options` to `Guzzle\Service\Command\AbstractCommand` to pass request options to requests
+ created by a command (e.g. custom headers, query string variables, timeout settings, etc.).
+* Stream size in `Guzzle\Stream\PhpStreamRequestFactory` will now be set if Content-Length is returned in the
+ headers of a response
+* Added `Guzzle\Common\Collection::setPath($path, $value)` to set a value into an array using a nested key
+ (e.g. `$collection->setPath('foo/baz/bar', 'test'); echo $collection['foo']['bar']['bar'];`)
+* ServiceBuilders now support storing and retrieving arbitrary data
+* CachePlugin can now purge all resources for a given URI
+* CachePlugin can automatically purge matching cached items when a non-idempotent request is sent to a resource
+* CachePlugin now uses the Vary header to determine if a resource is a cache hit
+* `Guzzle\Http\Message\Response` now implements `\Serializable`
+* Added `Guzzle\Cache\CacheAdapterFactory::fromCache()` to more easily create cache adapters
+* `Guzzle\Service\ClientInterface::execute()` now accepts an array, single command, or Traversable
+* Fixed a bug in `Guzzle\Http\Message\Header\Link::addLink()`
+* Better handling of calculating the size of a stream in `Guzzle\Stream\Stream` using fstat() and caching the size
+* `Guzzle\Common\Exception\ExceptionCollection` now creates a more readable exception message
+* Fixing BC break: Added back the MonologLogAdapter implementation rather than extending from PsrLog so that older
+ Symfony users can still use the old version of Monolog.
+* Fixing BC break: Added the implementation back in for `Guzzle\Http\Message\AbstractMessage::getTokenizedHeader()`.
+ Now triggering an E_USER_DEPRECATED warning when used. Use `$message->getHeader()->parseParams()`.
+* Several performance improvements to `Guzzle\Common\Collection`
+* Added an `$options` argument to the end of the following methods of `Guzzle\Http\ClientInterface`:
+ createRequest, head, delete, put, patch, post, options, prepareRequest
+* Added an `$options` argument to the end of `Guzzle\Http\Message\Request\RequestFactoryInterface::createRequest()`
+* Added an `applyOptions()` method to `Guzzle\Http\Message\Request\RequestFactoryInterface`
+* Changed `Guzzle\Http\ClientInterface::get($uri = null, $headers = null, $body = null)` to
+ `Guzzle\Http\ClientInterface::get($uri = null, $headers = null, $options = array())`. You can still pass in a
+ resource, string, or EntityBody into the $options parameter to specify the download location of the response.
+* Changed `Guzzle\Common\Collection::__construct($data)` to no longer accepts a null value for `$data` but a
+ default `array()`
+* Added `Guzzle\Stream\StreamInterface::isRepeatable`
+* Removed `Guzzle\Http\ClientInterface::setDefaultHeaders(). Use
+ $client->getConfig()->setPath('request.options/headers/{header_name}', 'value')`. or
+ $client->getConfig()->setPath('request.options/headers', array('header_name' => 'value'))`.
+* Removed `Guzzle\Http\ClientInterface::getDefaultHeaders(). Use $client->getConfig()->getPath('request.options/headers')`.
+* Removed `Guzzle\Http\ClientInterface::expandTemplate()`
+* Removed `Guzzle\Http\ClientInterface::setRequestFactory()`
+* Removed `Guzzle\Http\ClientInterface::getCurlMulti()`
+* Removed `Guzzle\Http\Message\RequestInterface::canCache`
+* Removed `Guzzle\Http\Message\RequestInterface::setIsRedirect`
+* Removed `Guzzle\Http\Message\RequestInterface::isRedirect`
+* Made `Guzzle\Http\Client::expandTemplate` and `getUriTemplate` protected methods.
+* You can now enable E_USER_DEPRECATED warnings to see if you are using a deprecated method by setting
+ `Guzzle\Common\Version::$emitWarnings` to true.
+* Marked `Guzzle\Http\Message\Request::isResponseBodyRepeatable()` as deprecated. Use
+ `$request->getResponseBody()->isRepeatable()` instead.
+* Marked `Guzzle\Http\Message\Request::canCache()` as deprecated. Use
+ `Guzzle\Plugin\Cache\DefaultCanCacheStrategy->canCacheRequest()` instead.
+* Marked `Guzzle\Http\Message\Request::canCache()` as deprecated. Use
+ `Guzzle\Plugin\Cache\DefaultCanCacheStrategy->canCacheRequest()` instead.
+* Marked `Guzzle\Http\Message\Request::setIsRedirect()` as deprecated. Use the HistoryPlugin instead.
+* Marked `Guzzle\Http\Message\Request::isRedirect()` as deprecated. Use the HistoryPlugin instead.
+* Marked `Guzzle\Cache\CacheAdapterFactory::factory()` as deprecated
+* Marked 'command.headers', 'command.response_body' and 'command.on_complete' as deprecated for AbstractCommand.
+ These will work through Guzzle 4.0
+* Marked 'request.params' for `Guzzle\Http\Client` as deprecated. Use [request.options][params].
+* Marked `Guzzle\Service\Client::enableMagicMethods()` as deprecated. Magic methods can no longer be disabled on a Guzzle\Service\Client.
+* Marked `Guzzle\Service\Client::getDefaultHeaders()` as deprecated. Use $client->getConfig()->getPath('request.options/headers')`.
+* Marked `Guzzle\Service\Client::setDefaultHeaders()` as deprecated. Use $client->getConfig()->setPath('request.options/headers/{header_name}', 'value')`.
+* Marked `Guzzle\Parser\Url\UrlParser` as deprecated. Just use PHP's `parse_url()` and percent encode your UTF-8.
+* Marked `Guzzle\Common\Collection::inject()` as deprecated.
+* Marked `Guzzle\Plugin\CurlAuth\CurlAuthPlugin` as deprecated. Use `$client->getConfig()->setPath('request.options/auth', array('user', 'pass', 'Basic|Digest');`
+* CacheKeyProviderInterface and DefaultCacheKeyProvider are no longer used. All of this logic is handled in a
+ CacheStorageInterface. These two objects and interface will be removed in a future version.
+* Always setting X-cache headers on cached responses
+* Default cache TTLs are now handled by the CacheStorageInterface of a CachePlugin
+* `CacheStorageInterface::cache($key, Response $response, $ttl = null)` has changed to `cache(RequestInterface
+ $request, Response $response);`
+* `CacheStorageInterface::fetch($key)` has changed to `fetch(RequestInterface $request);`
+* `CacheStorageInterface::delete($key)` has changed to `delete(RequestInterface $request);`
+* Added `CacheStorageInterface::purge($url)`
+* `DefaultRevalidation::__construct(CacheKeyProviderInterface $cacheKey, CacheStorageInterface $cache, CachePlugin
+ $plugin)` has changed to `DefaultRevalidation::__construct(CacheStorageInterface $cache,
+ CanCacheStrategyInterface $canCache = null)`
+* Added `RevalidationInterface::shouldRevalidate(RequestInterface $request, Response $response)`
+
+## 3.6.0 - 2013-05-29
+
+* ServiceDescription now implements ToArrayInterface
+* Added command.hidden_params to blacklist certain headers from being treated as additionalParameters
+* Guzzle can now correctly parse incomplete URLs
+* Mixed casing of headers are now forced to be a single consistent casing across all values for that header.
+* Messages internally use a HeaderCollection object to delegate handling case-insensitive header resolution
+* Removed the whole changedHeader() function system of messages because all header changes now go through addHeader().
+* Specific header implementations can be created for complex headers. When a message creates a header, it uses a
+ HeaderFactory which can map specific headers to specific header classes. There is now a Link header and
+ CacheControl header implementation.
+* Removed from interface: Guzzle\Http\ClientInterface::setUriTemplate
+* Removed from interface: Guzzle\Http\ClientInterface::setCurlMulti()
+* Removed Guzzle\Http\Message\Request::receivedRequestHeader() and implemented this functionality in
+ Guzzle\Http\Curl\RequestMediator
+* Removed the optional $asString parameter from MessageInterface::getHeader(). Just cast the header to a string.
+* Removed the optional $tryChunkedTransfer option from Guzzle\Http\Message\EntityEnclosingRequestInterface
+* Removed the $asObjects argument from Guzzle\Http\Message\MessageInterface::getHeaders()
+* Removed Guzzle\Parser\ParserRegister::get(). Use getParser()
+* Removed Guzzle\Parser\ParserRegister::set(). Use registerParser().
+* All response header helper functions return a string rather than mixing Header objects and strings inconsistently
+* Removed cURL blacklist support. This is no longer necessary now that Expect, Accept, etc. are managed by Guzzle
+ directly via interfaces
+* Removed the injecting of a request object onto a response object. The methods to get and set a request still exist
+ but are a no-op until removed.
+* Most classes that used to require a `Guzzle\Service\Command\CommandInterface` typehint now request a
+ `Guzzle\Service\Command\ArrayCommandInterface`.
+* Added `Guzzle\Http\Message\RequestInterface::startResponse()` to the RequestInterface to handle injecting a response
+ on a request while the request is still being transferred
+* The ability to case-insensitively search for header values
+* Guzzle\Http\Message\Header::hasExactHeader
+* Guzzle\Http\Message\Header::raw. Use getAll()
+* Deprecated cache control specific methods on Guzzle\Http\Message\AbstractMessage. Use the CacheControl header object
+ instead.
+* `Guzzle\Service\Command\CommandInterface` now extends from ToArrayInterface and ArrayAccess
+* Added the ability to cast Model objects to a string to view debug information.
+
+## 3.5.0 - 2013-05-13
+
+* Bug: Fixed a regression so that request responses are parsed only once per oncomplete event rather than multiple times
+* Bug: Better cleanup of one-time events across the board (when an event is meant to fire once, it will now remove
+ itself from the EventDispatcher)
+* Bug: `Guzzle\Log\MessageFormatter` now properly writes "total_time" and "connect_time" values
+* Bug: Cloning an EntityEnclosingRequest now clones the EntityBody too
+* Bug: Fixed an undefined index error when parsing nested JSON responses with a sentAs parameter that reference a
+ non-existent key
+* Bug: All __call() method arguments are now required (helps with mocking frameworks)
+* Deprecating Response::getRequest() and now using a shallow clone of a request object to remove a circular reference
+ to help with refcount based garbage collection of resources created by sending a request
+* Deprecating ZF1 cache and log adapters. These will be removed in the next major version.
+* Deprecating `Response::getPreviousResponse()` (method signature still exists, but it's deprecated). Use the
+ HistoryPlugin for a history.
+* Added a `responseBody` alias for the `response_body` location
+* Refactored internals to no longer rely on Response::getRequest()
+* HistoryPlugin can now be cast to a string
+* HistoryPlugin now logs transactions rather than requests and responses to more accurately keep track of the requests
+ and responses that are sent over the wire
+* Added `getEffectiveUrl()` and `getRedirectCount()` to Response objects
+
+## 3.4.3 - 2013-04-30
+
+* Bug fix: Fixing bug introduced in 3.4.2 where redirect responses are duplicated on the final redirected response
+* Added a check to re-extract the temp cacert bundle from the phar before sending each request
+
+## 3.4.2 - 2013-04-29
+
+* Bug fix: Stream objects now work correctly with "a" and "a+" modes
+* Bug fix: Removing `Transfer-Encoding: chunked` header when a Content-Length is present
+* Bug fix: AsyncPlugin no longer forces HEAD requests
+* Bug fix: DateTime timezones are now properly handled when using the service description schema formatter
+* Bug fix: CachePlugin now properly handles stale-if-error directives when a request to the origin server fails
+* Setting a response on a request will write to the custom request body from the response body if one is specified
+* LogPlugin now writes to php://output when STDERR is undefined
+* Added the ability to set multiple POST files for the same key in a single call
+* application/x-www-form-urlencoded POSTs now use the utf-8 charset by default
+* Added the ability to queue CurlExceptions to the MockPlugin
+* Cleaned up how manual responses are queued on requests (removed "queued_response" and now using request.before_send)
+* Configuration loading now allows remote files
+
+## 3.4.1 - 2013-04-16
+
+* Large refactoring to how CurlMulti handles work. There is now a proxy that sits in front of a pool of CurlMulti
+ handles. This greatly simplifies the implementation, fixes a couple bugs, and provides a small performance boost.
+* Exceptions are now properly grouped when sending requests in parallel
+* Redirects are now properly aggregated when a multi transaction fails
+* Redirects now set the response on the original object even in the event of a failure
+* Bug fix: Model names are now properly set even when using $refs
+* Added support for PHP 5.5's CurlFile to prevent warnings with the deprecated @ syntax
+* Added support for oauth_callback in OAuth signatures
+* Added support for oauth_verifier in OAuth signatures
+* Added support to attempt to retrieve a command first literally, then ucfirst, the with inflection
+
+## 3.4.0 - 2013-04-11
+
+* Bug fix: URLs are now resolved correctly based on https://datatracker.ietf.org/doc/html/rfc3986#section-5.2. #289
+* Bug fix: Absolute URLs with a path in a service description will now properly override the base URL. #289
+* Bug fix: Parsing a query string with a single PHP array value will now result in an array. #263
+* Bug fix: Better normalization of the User-Agent header to prevent duplicate headers. #264.
+* Bug fix: Added `number` type to service descriptions.
+* Bug fix: empty parameters are removed from an OAuth signature
+* Bug fix: Revalidating a cache entry prefers the Last-Modified over the Date header
+* Bug fix: Fixed "array to string" error when validating a union of types in a service description
+* Bug fix: Removed code that attempted to determine the size of a stream when data is written to the stream
+* Bug fix: Not including an `oauth_token` if the value is null in the OauthPlugin.
+* Bug fix: Now correctly aggregating successful requests and failed requests in CurlMulti when a redirect occurs.
+* The new default CURLOPT_TIMEOUT setting has been increased to 150 seconds so that Guzzle works on poor connections.
+* Added a feature to EntityEnclosingRequest::setBody() that will automatically set the Content-Type of the request if
+ the Content-Type can be determined based on the entity body or the path of the request.
+* Added the ability to overwrite configuration settings in a client when grabbing a throwaway client from a builder.
+* Added support for a PSR-3 LogAdapter.
+* Added a `command.after_prepare` event
+* Added `oauth_callback` parameter to the OauthPlugin
+* Added the ability to create a custom stream class when using a stream factory
+* Added a CachingEntityBody decorator
+* Added support for `additionalParameters` in service descriptions to define how custom parameters are serialized.
+* The bundled SSL certificate is now provided in the phar file and extracted when running Guzzle from a phar.
+* You can now send any EntityEnclosingRequest with POST fields or POST files and cURL will handle creating bodies
+* POST requests using a custom entity body are now treated exactly like PUT requests but with a custom cURL method. This
+ means that the redirect behavior of POST requests with custom bodies will not be the same as POST requests that use
+ POST fields or files (the latter is only used when emulating a form POST in the browser).
+* Lots of cleanup to CurlHandle::factory and RequestFactory::createRequest
+
+## 3.3.1 - 2013-03-10
+
+* Added the ability to create PHP streaming responses from HTTP requests
+* Bug fix: Running any filters when parsing response headers with service descriptions
+* Bug fix: OauthPlugin fixes to allow for multi-dimensional array signing, and sorting parameters before signing
+* Bug fix: Removed the adding of default empty arrays and false Booleans to responses in order to be consistent across
+ response location visitors.
+* Bug fix: Removed the possibility of creating configuration files with circular dependencies
+* RequestFactory::create() now uses the key of a POST file when setting the POST file name
+* Added xmlAllowEmpty to serialize an XML body even if no XML specific parameters are set
+
+## 3.3.0 - 2013-03-03
+
+* A large number of performance optimizations have been made
+* Bug fix: Added 'wb' as a valid write mode for streams
+* Bug fix: `Guzzle\Http\Message\Response::json()` now allows scalar values to be returned
+* Bug fix: Fixed bug in `Guzzle\Http\Message\Response` where wrapping quotes were stripped from `getEtag()`
+* BC: Removed `Guzzle\Http\Utils` class
+* BC: Setting a service description on a client will no longer modify the client's command factories.
+* BC: Emitting IO events from a RequestMediator is now a parameter that must be set in a request's curl options using
+ the 'emit_io' key. This was previously set under a request's parameters using 'curl.emit_io'
+* BC: `Guzzle\Stream\Stream::getWrapper()` and `Guzzle\Stream\Stream::getSteamType()` are no longer converted to
+ lowercase
+* Operation parameter objects are now lazy loaded internally
+* Added ErrorResponsePlugin that can throw errors for responses defined in service description operations' errorResponses
+* Added support for instantiating responseType=class responseClass classes. Classes must implement
+ `Guzzle\Service\Command\ResponseClassInterface`
+* Added support for additionalProperties for top-level parameters in responseType=model responseClasses. These
+ additional properties also support locations and can be used to parse JSON responses where the outermost part of the
+ JSON is an array
+* Added support for nested renaming of JSON models (rename sentAs to name)
+* CachePlugin
+ * Added support for stale-if-error so that the CachePlugin can now serve stale content from the cache on error
+ * Debug headers can now added to cached response in the CachePlugin
+
+## 3.2.0 - 2013-02-14
+
+* CurlMulti is no longer reused globally. A new multi object is created per-client. This helps to isolate clients.
+* URLs with no path no longer contain a "/" by default
+* Guzzle\Http\QueryString does no longer manages the leading "?". This is now handled in Guzzle\Http\Url.
+* BadResponseException no longer includes the full request and response message
+* Adding setData() to Guzzle\Service\Description\ServiceDescriptionInterface
+* Adding getResponseBody() to Guzzle\Http\Message\RequestInterface
+* Various updates to classes to use ServiceDescriptionInterface type hints rather than ServiceDescription
+* Header values can now be normalized into distinct values when multiple headers are combined with a comma separated list
+* xmlEncoding can now be customized for the XML declaration of a XML service description operation
+* Guzzle\Http\QueryString now uses Guzzle\Http\QueryAggregator\QueryAggregatorInterface objects to add custom value
+ aggregation and no longer uses callbacks
+* The URL encoding implementation of Guzzle\Http\QueryString can now be customized
+* Bug fix: Filters were not always invoked for array service description parameters
+* Bug fix: Redirects now use a target response body rather than a temporary response body
+* Bug fix: The default exponential backoff BackoffPlugin was not giving when the request threshold was exceeded
+* Bug fix: Guzzle now takes the first found value when grabbing Cache-Control directives
+
+## 3.1.2 - 2013-01-27
+
+* Refactored how operation responses are parsed. Visitors now include a before() method responsible for parsing the
+ response body. For example, the XmlVisitor now parses the XML response into an array in the before() method.
+* Fixed an issue where cURL would not automatically decompress responses when the Accept-Encoding header was sent
+* CURLOPT_SSL_VERIFYHOST is never set to 1 because it is deprecated (see 5e0ff2ef20f839e19d1eeb298f90ba3598784444)
+* Fixed a bug where redirect responses were not chained correctly using getPreviousResponse()
+* Setting default headers on a client after setting the user-agent will not erase the user-agent setting
+
+## 3.1.1 - 2013-01-20
+
+* Adding wildcard support to Guzzle\Common\Collection::getPath()
+* Adding alias support to ServiceBuilder configs
+* Adding Guzzle\Service\Resource\CompositeResourceIteratorFactory and cleaning up factory interface
+
+## 3.1.0 - 2013-01-12
+
+* BC: CurlException now extends from RequestException rather than BadResponseException
+* BC: Renamed Guzzle\Plugin\Cache\CanCacheStrategyInterface::canCache() to canCacheRequest() and added CanCacheResponse()
+* Added getData to ServiceDescriptionInterface
+* Added context array to RequestInterface::setState()
+* Bug: Removing hard dependency on the BackoffPlugin from Guzzle\Http
+* Bug: Adding required content-type when JSON request visitor adds JSON to a command
+* Bug: Fixing the serialization of a service description with custom data
+* Made it easier to deal with exceptions thrown when transferring commands or requests in parallel by providing
+ an array of successful and failed responses
+* Moved getPath from Guzzle\Service\Resource\Model to Guzzle\Common\Collection
+* Added Guzzle\Http\IoEmittingEntityBody
+* Moved command filtration from validators to location visitors
+* Added `extends` attributes to service description parameters
+* Added getModels to ServiceDescriptionInterface
+
+## 3.0.7 - 2012-12-19
+
+* Fixing phar detection when forcing a cacert to system if null or true
+* Allowing filename to be passed to `Guzzle\Http\Message\Request::setResponseBody()`
+* Cleaning up `Guzzle\Common\Collection::inject` method
+* Adding a response_body location to service descriptions
+
+## 3.0.6 - 2012-12-09
+
+* CurlMulti performance improvements
+* Adding setErrorResponses() to Operation
+* composer.json tweaks
+
+## 3.0.5 - 2012-11-18
+
+* Bug: Fixing an infinite recursion bug caused from revalidating with the CachePlugin
+* Bug: Response body can now be a string containing "0"
+* Bug: Using Guzzle inside of a phar uses system by default but now allows for a custom cacert
+* Bug: QueryString::fromString now properly parses query string parameters that contain equal signs
+* Added support for XML attributes in service description responses
+* DefaultRequestSerializer now supports array URI parameter values for URI template expansion
+* Added better mimetype guessing to requests and post files
+
+## 3.0.4 - 2012-11-11
+
+* Bug: Fixed a bug when adding multiple cookies to a request to use the correct glue value
+* Bug: Cookies can now be added that have a name, domain, or value set to "0"
+* Bug: Using the system cacert bundle when using the Phar
+* Added json and xml methods to Response to make it easier to parse JSON and XML response data into data structures
+* Enhanced cookie jar de-duplication
+* Added the ability to enable strict cookie jars that throw exceptions when invalid cookies are added
+* Added setStream to StreamInterface to actually make it possible to implement custom rewind behavior for entity bodies
+* Added the ability to create any sort of hash for a stream rather than just an MD5 hash
+
+## 3.0.3 - 2012-11-04
+
+* Implementing redirects in PHP rather than cURL
+* Added PECL URI template extension and using as default parser if available
+* Bug: Fixed Content-Length parsing of Response factory
+* Adding rewind() method to entity bodies and streams. Allows for custom rewinding of non-repeatable streams.
+* Adding ToArrayInterface throughout library
+* Fixing OauthPlugin to create unique nonce values per request
+
+## 3.0.2 - 2012-10-25
+
+* Magic methods are enabled by default on clients
+* Magic methods return the result of a command
+* Service clients no longer require a base_url option in the factory
+* Bug: Fixed an issue with URI templates where null template variables were being expanded
+
+## 3.0.1 - 2012-10-22
+
+* Models can now be used like regular collection objects by calling filter, map, etc.
+* Models no longer require a Parameter structure or initial data in the constructor
+* Added a custom AppendIterator to get around a PHP bug with the `\AppendIterator`
+
+## 3.0.0 - 2012-10-15
+
+* Rewrote service description format to be based on Swagger
+ * Now based on JSON schema
+ * Added nested input structures and nested response models
+ * Support for JSON and XML input and output models
+ * Renamed `commands` to `operations`
+ * Removed dot class notation
+ * Removed custom types
+* Broke the project into smaller top-level namespaces to be more component friendly
+* Removed support for XML configs and descriptions. Use arrays or JSON files.
+* Removed the Validation component and Inspector
+* Moved all cookie code to Guzzle\Plugin\Cookie
+* Magic methods on a Guzzle\Service\Client now return the command un-executed.
+* Calling getResult() or getResponse() on a command will lazily execute the command if needed.
+* Now shipping with cURL's CA certs and using it by default
+* Added previousResponse() method to response objects
+* No longer sending Accept and Accept-Encoding headers on every request
+* Only sending an Expect header by default when a payload is greater than 1MB
+* Added/moved client options:
+ * curl.blacklist to curl.option.blacklist
+ * Added ssl.certificate_authority
+* Added a Guzzle\Iterator component
+* Moved plugins from Guzzle\Http\Plugin to Guzzle\Plugin
+* Added a more robust backoff retry strategy (replaced the ExponentialBackoffPlugin)
+* Added a more robust caching plugin
+* Added setBody to response objects
+* Updating LogPlugin to use a more flexible MessageFormatter
+* Added a completely revamped build process
+* Cleaning up Collection class and removing default values from the get method
+* Fixed ZF2 cache adapters
+
+## 2.8.8 - 2012-10-15
+
+* Bug: Fixed a cookie issue that caused dot prefixed domains to not match where popular browsers did
+
+## 2.8.7 - 2012-09-30
+
+* Bug: Fixed config file aliases for JSON includes
+* Bug: Fixed cookie bug on a request object by using CookieParser to parse cookies on requests
+* Bug: Removing the path to a file when sending a Content-Disposition header on a POST upload
+* Bug: Hardening request and response parsing to account for missing parts
+* Bug: Fixed PEAR packaging
+* Bug: Fixed Request::getInfo
+* Bug: Fixed cases where CURLM_CALL_MULTI_PERFORM return codes were causing curl transactions to fail
+* Adding the ability for the namespace Iterator factory to look in multiple directories
+* Added more getters/setters/removers from service descriptions
+* Added the ability to remove POST fields from OAuth signatures
+* OAuth plugin now supports 2-legged OAuth
+
+## 2.8.6 - 2012-09-05
+
+* Added the ability to modify and build service descriptions
+* Added the use of visitors to apply parameters to locations in service descriptions using the dynamic command
+* Added a `json` parameter location
+* Now allowing dot notation for classes in the CacheAdapterFactory
+* Using the union of two arrays rather than an array_merge when extending service builder services and service params
+* Ensuring that a service is a string before doing strpos() checks on it when substituting services for references
+ in service builder config files.
+* Services defined in two different config files that include one another will by default replace the previously
+ defined service, but you can now create services that extend themselves and merge their settings over the previous
+* The JsonLoader now supports aliasing filenames with different filenames. This allows you to alias something like
+ '_default' with a default JSON configuration file.
+
+## 2.8.5 - 2012-08-29
+
+* Bug: Suppressed empty arrays from URI templates
+* Bug: Added the missing $options argument from ServiceDescription::factory to enable caching
+* Added support for HTTP responses that do not contain a reason phrase in the start-line
+* AbstractCommand commands are now invokable
+* Added a way to get the data used when signing an Oauth request before a request is sent
+
+## 2.8.4 - 2012-08-15
+
+* Bug: Custom delay time calculations are no longer ignored in the ExponentialBackoffPlugin
+* Added the ability to transfer entity bodies as a string rather than streamed. This gets around curl error 65. Set `body_as_string` in a request's curl options to enable.
+* Added a StreamInterface, EntityBodyInterface, and added ftell() to Guzzle\Common\Stream
+* Added an AbstractEntityBodyDecorator and a ReadLimitEntityBody decorator to transfer only a subset of a decorated stream
+* Stream and EntityBody objects will now return the file position to the previous position after a read required operation (e.g. getContentMd5())
+* Added additional response status codes
+* Removed SSL information from the default User-Agent header
+* DELETE requests can now send an entity body
+* Added an EventDispatcher to the ExponentialBackoffPlugin and added an ExponentialBackoffLogger to log backoff retries
+* Added the ability of the MockPlugin to consume mocked request bodies
+* LogPlugin now exposes request and response objects in the extras array
+
+## 2.8.3 - 2012-07-30
+
+* Bug: Fixed a case where empty POST requests were sent as GET requests
+* Bug: Fixed a bug in ExponentialBackoffPlugin that caused fatal errors when retrying an EntityEnclosingRequest that does not have a body
+* Bug: Setting the response body of a request to null after completing a request, not when setting the state of a request to new
+* Added multiple inheritance to service description commands
+* Added an ApiCommandInterface and added `getParamNames()` and `hasParam()`
+* Removed the default 2mb size cutoff from the Md5ValidatorPlugin so that it now defaults to validating everything
+* Changed CurlMulti::perform to pass a smaller timeout to CurlMulti::executeHandles
+
+## 2.8.2 - 2012-07-24
+
+* Bug: Query string values set to 0 are no longer dropped from the query string
+* Bug: A Collection object is no longer created each time a call is made to `Guzzle\Service\Command\AbstractCommand::getRequestHeaders()`
+* Bug: `+` is now treated as an encoded space when parsing query strings
+* QueryString and Collection performance improvements
+* Allowing dot notation for class paths in filters attribute of a service descriptions
+
+## 2.8.1 - 2012-07-16
+
+* Loosening Event Dispatcher dependency
+* POST redirects can now be customized using CURLOPT_POSTREDIR
+
+## 2.8.0 - 2012-07-15
+
+* BC: Guzzle\Http\Query
+ * Query strings with empty variables will always show an equal sign unless the variable is set to QueryString::BLANK (e.g. ?acl= vs ?acl)
+ * Changed isEncodingValues() and isEncodingFields() to isUrlEncoding()
+ * Changed setEncodeValues(bool) and setEncodeFields(bool) to useUrlEncoding(bool)
+ * Changed the aggregation functions of QueryString to be static methods
+ * Can now use fromString() with querystrings that have a leading ?
+* cURL configuration values can be specified in service descriptions using `curl.` prefixed parameters
+* Content-Length is set to 0 before emitting the request.before_send event when sending an empty request body
+* Cookies are no longer URL decoded by default
+* Bug: URI template variables set to null are no longer expanded
+
+## 2.7.2 - 2012-07-02
+
+* BC: Moving things to get ready for subtree splits. Moving Inflection into Common. Moving Guzzle\Http\Parser to Guzzle\Parser.
+* BC: Removing Guzzle\Common\Batch\Batch::count() and replacing it with isEmpty()
+* CachePlugin now allows for a custom request parameter function to check if a request can be cached
+* Bug fix: CachePlugin now only caches GET and HEAD requests by default
+* Bug fix: Using header glue when transferring headers over the wire
+* Allowing deeply nested arrays for composite variables in URI templates
+* Batch divisors can now return iterators or arrays
+
+## 2.7.1 - 2012-06-26
+
+* Minor patch to update version number in UA string
+* Updating build process
+
+## 2.7.0 - 2012-06-25
+
+* BC: Inflection classes moved to Guzzle\Inflection. No longer static methods. Can now inject custom inflectors into classes.
+* BC: Removed magic setX methods from commands
+* BC: Magic methods mapped to service description commands are now inflected in the command factory rather than the client __call() method
+* Verbose cURL options are no longer enabled by default. Set curl.debug to true on a client to enable.
+* Bug: Now allowing colons in a response start-line (e.g. HTTP/1.1 503 Service Unavailable: Back-end server is at capacity)
+* Guzzle\Service\Resource\ResourceIteratorApplyBatched now internally uses the Guzzle\Common\Batch namespace
+* Added Guzzle\Service\Plugin namespace and a PluginCollectionPlugin
+* Added the ability to set POST fields and files in a service description
+* Guzzle\Http\EntityBody::factory() now accepts objects with a __toString() method
+* Adding a command.before_prepare event to clients
+* Added BatchClosureTransfer and BatchClosureDivisor
+* BatchTransferException now includes references to the batch divisor and transfer strategies
+* Fixed some tests so that they pass more reliably
+* Added Guzzle\Common\Log\ArrayLogAdapter
+
+## 2.6.6 - 2012-06-10
+
+* BC: Removing Guzzle\Http\Plugin\BatchQueuePlugin
+* BC: Removing Guzzle\Service\Command\CommandSet
+* Adding generic batching system (replaces the batch queue plugin and command set)
+* Updating ZF cache and log adapters and now using ZF's composer repository
+* Bug: Setting the name of each ApiParam when creating through an ApiCommand
+* Adding result_type, result_doc, deprecated, and doc_url to service descriptions
+* Bug: Changed the default cookie header casing back to 'Cookie'
+
+## 2.6.5 - 2012-06-03
+
+* BC: Renaming Guzzle\Http\Message\RequestInterface::getResourceUri() to getResource()
+* BC: Removing unused AUTH_BASIC and AUTH_DIGEST constants from
+* BC: Guzzle\Http\Cookie is now used to manage Set-Cookie data, not Cookie data
+* BC: Renaming methods in the CookieJarInterface
+* Moving almost all cookie logic out of the CookiePlugin and into the Cookie or CookieJar implementations
+* Making the default glue for HTTP headers ';' instead of ','
+* Adding a removeValue to Guzzle\Http\Message\Header
+* Adding getCookies() to request interface.
+* Making it easier to add event subscribers to HasDispatcherInterface classes. Can now directly call addSubscriber()
+
+## 2.6.4 - 2012-05-30
+
+* BC: Cleaning up how POST files are stored in EntityEnclosingRequest objects. Adding PostFile class.
+* BC: Moving ApiCommand specific functionality from the Inspector and on to the ApiCommand
+* Bug: Fixing magic method command calls on clients
+* Bug: Email constraint only validates strings
+* Bug: Aggregate POST fields when POST files are present in curl handle
+* Bug: Fixing default User-Agent header
+* Bug: Only appending or prepending parameters in commands if they are specified
+* Bug: Not requiring response reason phrases or status codes to match a predefined list of codes
+* Allowing the use of dot notation for class namespaces when using instance_of constraint
+* Added any_match validation constraint
+* Added an AsyncPlugin
+* Passing request object to the calculateWait method of the ExponentialBackoffPlugin
+* Allowing the result of a command object to be changed
+* Parsing location and type sub values when instantiating a service description rather than over and over at runtime
+
+## 2.6.3 - 2012-05-23
+
+* [BC] Guzzle\Common\FromConfigInterface no longer requires any config options.
+* [BC] Refactoring how POST files are stored on an EntityEnclosingRequest. They are now separate from POST fields.
+* You can now use an array of data when creating PUT request bodies in the request factory.
+* Removing the requirement that HTTPS requests needed a Cache-Control: public directive to be cacheable.
+* [Http] Adding support for Content-Type in multipart POST uploads per upload
+* [Http] Added support for uploading multiple files using the same name (foo[0], foo[1])
+* Adding more POST data operations for easier manipulation of POST data.
+* You can now set empty POST fields.
+* The body of a request is only shown on EntityEnclosingRequest objects that do not use POST files.
+* Split the Guzzle\Service\Inspector::validateConfig method into two methods. One to initialize when a command is created, and one to validate.
+* CS updates
+
+## 2.6.2 - 2012-05-19
+
+* [Http] Better handling of nested scope requests in CurlMulti. Requests are now always prepares in the send() method rather than the addRequest() method.
+
+## 2.6.1 - 2012-05-19
+
+* [BC] Removing 'path' support in service descriptions. Use 'uri'.
+* [BC] Guzzle\Service\Inspector::parseDocBlock is now protected. Adding getApiParamsForClass() with cache.
+* [BC] Removing Guzzle\Common\NullObject. Use https://github.com/mtdowling/NullObject if you need it.
+* [BC] Removing Guzzle\Common\XmlElement.
+* All commands, both dynamic and concrete, have ApiCommand objects.
+* Adding a fix for CurlMulti so that if all of the connections encounter some sort of curl error, then the loop exits.
+* Adding checks to EntityEnclosingRequest so that empty POST files and fields are ignored.
+* Making the method signature of Guzzle\Service\Builder\ServiceBuilder::factory more flexible.
+
+## 2.6.0 - 2012-05-15
+
+* [BC] Moving Guzzle\Service\Builder to Guzzle\Service\Builder\ServiceBuilder
+* [BC] Executing a Command returns the result of the command rather than the command
+* [BC] Moving all HTTP parsing logic to Guzzle\Http\Parsers. Allows for faster C implementations if needed.
+* [BC] Changing the Guzzle\Http\Message\Response::setProtocol() method to accept a protocol and version in separate args.
+* [BC] Moving ResourceIterator* to Guzzle\Service\Resource
+* [BC] Completely refactored ResourceIterators to iterate over a cloned command object
+* [BC] Moved Guzzle\Http\UriTemplate to Guzzle\Http\Parser\UriTemplate\UriTemplate
+* [BC] Guzzle\Guzzle is now deprecated
+* Moving Guzzle\Common\Guzzle::inject to Guzzle\Common\Collection::inject
+* Adding Guzzle\Version class to give version information about Guzzle
+* Adding Guzzle\Http\Utils class to provide getDefaultUserAgent() and getHttpDate()
+* Adding Guzzle\Curl\CurlVersion to manage caching curl_version() data
+* ServiceDescription and ServiceBuilder are now cacheable using similar configs
+* Changing the format of XML and JSON service builder configs. Backwards compatible.
+* Cleaned up Cookie parsing
+* Trimming the default Guzzle User-Agent header
+* Adding a setOnComplete() method to Commands that is called when a command completes
+* Keeping track of requests that were mocked in the MockPlugin
+* Fixed a caching bug in the CacheAdapterFactory
+* Inspector objects can be injected into a Command object
+* Refactoring a lot of code and tests to be case insensitive when dealing with headers
+* Adding Guzzle\Http\Message\HeaderComparison for easy comparison of HTTP headers using a DSL
+* Adding the ability to set global option overrides to service builder configs
+* Adding the ability to include other service builder config files from within XML and JSON files
+* Moving the parseQuery method out of Url and on to QueryString::fromString() as a static factory method.
+
+## 2.5.0 - 2012-05-08
+
+* Major performance improvements
+* [BC] Simplifying Guzzle\Common\Collection. Please check to see if you are using features that are now deprecated.
+* [BC] Using a custom validation system that allows a flyweight implementation for much faster validation. No longer using Symfony2 Validation component.
+* [BC] No longer supporting "{{ }}" for injecting into command or UriTemplates. Use "{}"
+* Added the ability to passed parameters to all requests created by a client
+* Added callback functionality to the ExponentialBackoffPlugin
+* Using microtime in ExponentialBackoffPlugin to allow more granular backoff strategies.
+* Rewinding request stream bodies when retrying requests
+* Exception is thrown when JSON response body cannot be decoded
+* Added configurable magic method calls to clients and commands. This is off by default.
+* Fixed a defect that added a hash to every parsed URL part
+* Fixed duplicate none generation for OauthPlugin.
+* Emitting an event each time a client is generated by a ServiceBuilder
+* Using an ApiParams object instead of a Collection for parameters of an ApiCommand
+* cache.* request parameters should be renamed to params.cache.*
+* Added the ability to set arbitrary curl options on requests (disable_wire, progress, etc.). See CurlHandle.
+* Added the ability to disable type validation of service descriptions
+* ServiceDescriptions and ServiceBuilders are now Serializable
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/Dockerfile b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/Dockerfile
new file mode 100644
index 0000000000..bb651d0fe7
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/Dockerfile
@@ -0,0 +1,14 @@
+FROM composer:latest as setup
+
+WORKDIR /guzzle
+
+RUN set -xe \
+ && composer init --name=guzzlehttp/test --description="Simple project for testing Guzzle scripts" --author="Márk Sági-Kazár " --no-interaction \
+ && composer require guzzlehttp/guzzle
+
+
+FROM php:7.3
+
+WORKDIR /guzzle
+
+COPY --from=setup /guzzle /guzzle
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/LICENSE b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/LICENSE
new file mode 100644
index 0000000000..fd2375d888
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/LICENSE
@@ -0,0 +1,27 @@
+The MIT License (MIT)
+
+Copyright (c) 2011 Michael Dowling
+Copyright (c) 2012 Jeremy Lindblom
+Copyright (c) 2014 Graham Campbell
+Copyright (c) 2015 Márk Sági-Kazár
+Copyright (c) 2015 Tobias Schultze
+Copyright (c) 2016 Tobias Nyholm
+Copyright (c) 2016 George Mponos
+
+Permission is hereby granted, free of charge, to any person obtaining a copy
+of this software and associated documentation files (the "Software"), to deal
+in the Software without restriction, including without limitation the rights
+to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
+copies of the Software, and to permit persons to whom the Software is
+furnished to do so, subject to the following conditions:
+
+The above copyright notice and this permission notice shall be included in
+all copies or substantial portions of the Software.
+
+THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
+AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
+LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
+OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
+THE SOFTWARE.
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/Makefile b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/Makefile
new file mode 100644
index 0000000000..0b52841fdb
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/Makefile
@@ -0,0 +1,85 @@
+help:
+ @echo "Please use \`make ' where is one of"
+ @echo " start-server to start the test server"
+ @echo " stop-server to stop the test server"
+ @echo " test to perform unit tests. Provide TEST to perform a specific test."
+ @echo " coverage to perform unit tests with code coverage. Provide TEST to perform a specific test."
+ @echo " coverage-show to show the code coverage report"
+ @echo " clean to remove build artifacts"
+ @echo " docs to build the Sphinx docs"
+ @echo " docs-show to view the Sphinx docs"
+ @echo " static to run phpstan and php-cs-fixer on the codebase"
+ @echo " static-phpstan to run phpstan on the codebase"
+ @echo " static-phpstan-update-baseline to regenerate the phpstan baseline file"
+ @echo " static-codestyle-fix to run php-cs-fixer on the codebase, writing the changes"
+ @echo " static-codestyle-check to run php-cs-fixer on the codebase"
+
+start-server: stop-server
+ node tests/server.js &> /dev/null &
+ ./vendor/bin/http_test_server &> /dev/null &
+
+stop-server:
+ @PID=$(shell ps axo pid,command \
+ | grep 'tests/server.js' \
+ | grep -v grep \
+ | cut -f 1 -d " "\
+ ) && [ -n "$$PID" ] && kill $$PID || true
+ @PID=$(shell ps axo pid,command \
+ | grep 'vendor/bin/http_test_server' \
+ | grep -v grep \
+ | cut -f 1 -d " "\
+ ) && [ -n "$$PID" ] && kill $$PID || true
+
+test: start-server
+ vendor/bin/phpunit
+ $(MAKE) stop-server
+
+coverage: start-server
+ vendor/bin/phpunit --coverage-html=build/artifacts/coverage
+ $(MAKE) stop-server
+
+coverage-show: view-coverage
+
+view-coverage:
+ open build/artifacts/coverage/index.html
+
+clean:
+ rm -rf artifacts/*
+
+docs:
+ cd docs && make html && cd ..
+
+docs-show:
+ open docs/_build/html/index.html
+
+static: static-phpstan static-psalm static-codestyle-check
+
+static-psalm:
+ composer install
+ composer bin psalm update
+ vendor/bin/psalm.phar $(PSALM_PARAMS)
+
+static-psalm-update-baseline:
+ composer install
+ composer bin psalm update
+ $(MAKE) static-psalm PSALM_PARAMS="--set-baseline=psalm-baseline.xml"
+
+static-phpstan:
+ composer install
+ composer bin phpstan update
+ vendor/bin/phpstan analyze $(PHPSTAN_PARAMS)
+
+static-phpstan-update-baseline:
+ composer install
+ composer bin phpstan update
+ $(MAKE) static-phpstan PHPSTAN_PARAMS="--generate-baseline"
+
+static-codestyle-fix:
+ composer install
+ composer bin php-cs-fixer update
+ vendor/bin/php-cs-fixer fix --diff $(CS_PARAMS)
+
+static-codestyle-check:
+ $(MAKE) static-codestyle-fix CS_PARAMS="--dry-run"
+
+.PHONY: docs coverage-show view-coverage
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/README.md b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/README.md
new file mode 100644
index 0000000000..cdaebee3ff
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/README.md
@@ -0,0 +1,94 @@
+
+
+# Guzzle, PHP HTTP client
+
+[](https://github.com/guzzle/guzzle/releases)
+[](https://github.com/guzzle/guzzle/actions?query=workflow%3ACI)
+[](https://packagist.org/packages/guzzlehttp/guzzle)
+
+Guzzle is a PHP HTTP client that makes it easy to send HTTP requests and
+trivial to integrate with web services.
+
+- Simple interface for building query strings, POST requests, streaming large
+ uploads, streaming large downloads, using HTTP cookies, uploading JSON data,
+ etc...
+- Can send both synchronous and asynchronous requests using the same interface.
+- Uses PSR-7 interfaces for requests, responses, and streams. This allows you
+ to utilize other PSR-7 compatible libraries with Guzzle.
+- Supports PSR-18 allowing interoperability between other PSR-18 HTTP Clients.
+- Abstracts away the underlying HTTP transport, allowing you to write
+ environment and transport agnostic code; i.e., no hard dependency on cURL,
+ PHP streams, sockets, or non-blocking event loops.
+- Middleware system allows you to augment and compose client behavior.
+
+```php
+$client = new \GuzzleHttp\Client();
+$response = $client->request('GET', 'https://api.github.com/repos/guzzle/guzzle');
+
+echo $response->getStatusCode(); // 200
+echo $response->getHeaderLine('content-type'); // 'application/json; charset=utf8'
+echo $response->getBody(); // '{"id": 1420053, "name": "guzzle", ...}'
+
+// Send an asynchronous request.
+$request = new \GuzzleHttp\Psr7\Request('GET', 'http://httpbin.org');
+$promise = $client->sendAsync($request)->then(function ($response) {
+ echo 'I completed! ' . $response->getBody();
+});
+
+$promise->wait();
+```
+
+## Help and docs
+
+We use GitHub issues only to discuss bugs and new features. For support please refer to:
+
+- [Documentation](https://docs.guzzlephp.org)
+- [Stack Overflow](https://stackoverflow.com/questions/tagged/guzzle)
+- [#guzzle](https://app.slack.com/client/T0D2S9JCT/CE6UAAKL4) channel on [PHP-HTTP Slack](https://slack.httplug.io/)
+- [Gitter](https://gitter.im/guzzle/guzzle)
+
+
+## Installing Guzzle
+
+The recommended way to install Guzzle is through
+[Composer](https://getcomposer.org/).
+
+```bash
+composer require guzzlehttp/guzzle
+```
+
+
+## Version Guidance
+
+| Version | Status | Packagist | Namespace | Repo | Docs | PSR-7 | PHP Version |
+|---------|---------------------|---------------------|--------------|---------------------|---------------------|-------|--------------|
+| 3.x | EOL (2016-10-31) | `guzzle/guzzle` | `Guzzle` | [v3][guzzle-3-repo] | [v3][guzzle-3-docs] | No | >=5.3.3,<7.0 |
+| 4.x | EOL (2016-10-31) | `guzzlehttp/guzzle` | `GuzzleHttp` | [v4][guzzle-4-repo] | N/A | No | >=5.4,<7.0 |
+| 5.x | EOL (2019-10-31) | `guzzlehttp/guzzle` | `GuzzleHttp` | [v5][guzzle-5-repo] | [v5][guzzle-5-docs] | No | >=5.4,<7.4 |
+| 6.x | EOL (2023-10-31) | `guzzlehttp/guzzle` | `GuzzleHttp` | [v6][guzzle-6-repo] | [v6][guzzle-6-docs] | Yes | >=5.5,<8.0 |
+| 7.x | Latest | `guzzlehttp/guzzle` | `GuzzleHttp` | [v7][guzzle-7-repo] | [v7][guzzle-7-docs] | Yes | >=7.2.5,<8.5 |
+
+[guzzle-3-repo]: https://github.com/guzzle/guzzle3
+[guzzle-4-repo]: https://github.com/guzzle/guzzle/tree/4.x
+[guzzle-5-repo]: https://github.com/guzzle/guzzle/tree/5.3
+[guzzle-6-repo]: https://github.com/guzzle/guzzle/tree/6.5
+[guzzle-7-repo]: https://github.com/guzzle/guzzle
+[guzzle-3-docs]: https://guzzle3.readthedocs.io/
+[guzzle-5-docs]: https://docs.guzzlephp.org/en/5.3/
+[guzzle-6-docs]: https://docs.guzzlephp.org/en/6.5/
+[guzzle-7-docs]: https://docs.guzzlephp.org/en/latest/
+
+
+## Security
+
+If you discover a security vulnerability within this package, please send an email to security@tidelift.com. All security vulnerabilities will be promptly addressed. Please do not disclose security-related issues publicly until a fix has been announced. Please see [Security Policy](https://github.com/guzzle/guzzle/security/policy) for more information.
+
+## License
+
+Guzzle is made available under the MIT License (MIT). Please see [License File](LICENSE) for more information.
+
+## For Enterprise
+
+Available as part of the Tidelift Subscription
+
+The maintainers of Guzzle and thousands of other packages are working with Tidelift to deliver commercial support and maintenance for the open source dependencies you use to build your applications. Save time, reduce risk, and improve code health, while paying the maintainers of the exact dependencies you use. [Learn more.](https://tidelift.com/subscription/pkg/packagist-guzzlehttp-guzzle?utm_source=packagist-guzzlehttp-guzzle&utm_medium=referral&utm_campaign=enterprise&utm_term=repo)
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/UPGRADING.md b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/UPGRADING.md
new file mode 100644
index 0000000000..4efbb5962e
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/UPGRADING.md
@@ -0,0 +1,1253 @@
+Guzzle Upgrade Guide
+====================
+
+6.0 to 7.0
+----------
+
+In order to take advantage of the new features of PHP, Guzzle dropped the support
+of PHP 5. The minimum supported PHP version is now PHP 7.2. Type hints and return
+types for functions and methods have been added wherever possible.
+
+Please make sure:
+- You are calling a function or a method with the correct type.
+- If you extend a class of Guzzle; update all signatures on methods you override.
+
+#### Other backwards compatibility breaking changes
+
+- Class `GuzzleHttp\UriTemplate` is removed.
+- Class `GuzzleHttp\Exception\SeekException` is removed.
+- Classes `GuzzleHttp\Exception\BadResponseException`, `GuzzleHttp\Exception\ClientException`,
+ `GuzzleHttp\Exception\ServerException` can no longer be initialized with an empty
+ Response as argument.
+- Class `GuzzleHttp\Exception\ConnectException` now extends `GuzzleHttp\Exception\TransferException`
+ instead of `GuzzleHttp\Exception\RequestException`.
+- Function `GuzzleHttp\Exception\ConnectException::getResponse()` is removed.
+- Function `GuzzleHttp\Exception\ConnectException::hasResponse()` is removed.
+- Constant `GuzzleHttp\ClientInterface::VERSION` is removed. Added `GuzzleHttp\ClientInterface::MAJOR_VERSION` instead.
+- Function `GuzzleHttp\Exception\RequestException::getResponseBodySummary` is removed.
+ Use `\GuzzleHttp\Psr7\get_message_body_summary` as an alternative.
+- Function `GuzzleHttp\Cookie\CookieJar::getCookieValue` is removed.
+- Request option `exceptions` is removed. Please use `http_errors`.
+- Request option `save_to` is removed. Please use `sink`.
+- Pool option `pool_size` is removed. Please use `concurrency`.
+- We now look for environment variables in the `$_SERVER` super global, due to thread safety issues with `getenv`. We continue to fallback to `getenv` in CLI environments, for maximum compatibility.
+- The `get`, `head`, `put`, `post`, `patch`, `delete`, `getAsync`, `headAsync`, `putAsync`, `postAsync`, `patchAsync`, and `deleteAsync` methods are now implemented as genuine methods on `GuzzleHttp\Client`, with strong typing. The original `__call` implementation remains unchanged for now, for maximum backwards compatibility, but won't be invoked under normal operation.
+- The `log` middleware will log the errors with level `error` instead of `notice`
+- Support for international domain names (IDN) is now disabled by default, and enabling it requires installing ext-intl, linked against a modern version of the C library (ICU 4.6 or higher).
+
+#### Native functions calls
+
+All internal native functions calls of Guzzle are now prefixed with a slash. This
+change makes it impossible for method overloading by other libraries or applications.
+Example:
+
+```php
+// Before:
+curl_version();
+
+// After:
+\curl_version();
+```
+
+For the full diff you can check [here](https://github.com/guzzle/guzzle/compare/6.5.4..master).
+
+5.0 to 6.0
+----------
+
+Guzzle now uses [PSR-7](https://www.php-fig.org/psr/psr-7/) for HTTP messages.
+Due to the fact that these messages are immutable, this prompted a refactoring
+of Guzzle to use a middleware based system rather than an event system. Any
+HTTP message interaction (e.g., `GuzzleHttp\Message\Request`) need to be
+updated to work with the new immutable PSR-7 request and response objects. Any
+event listeners or subscribers need to be updated to become middleware
+functions that wrap handlers (or are injected into a
+`GuzzleHttp\HandlerStack`).
+
+- Removed `GuzzleHttp\BatchResults`
+- Removed `GuzzleHttp\Collection`
+- Removed `GuzzleHttp\HasDataTrait`
+- Removed `GuzzleHttp\ToArrayInterface`
+- The `guzzlehttp/streams` dependency has been removed. Stream functionality
+ is now present in the `GuzzleHttp\Psr7` namespace provided by the
+ `guzzlehttp/psr7` package.
+- Guzzle no longer uses ReactPHP promises and now uses the
+ `guzzlehttp/promises` library. We use a custom promise library for three
+ significant reasons:
+ 1. React promises (at the time of writing this) are recursive. Promise
+ chaining and promise resolution will eventually blow the stack. Guzzle
+ promises are not recursive as they use a sort of trampolining technique.
+ Note: there has been movement in the React project to modify promises to
+ no longer utilize recursion.
+ 2. Guzzle needs to have the ability to synchronously block on a promise to
+ wait for a result. Guzzle promises allows this functionality (and does
+ not require the use of recursion).
+ 3. Because we need to be able to wait on a result, doing so using React
+ promises requires wrapping react promises with RingPHP futures. This
+ overhead is no longer needed, reducing stack sizes, reducing complexity,
+ and improving performance.
+- `GuzzleHttp\Mimetypes` has been moved to a function in
+ `GuzzleHttp\Psr7\mimetype_from_extension` and
+ `GuzzleHttp\Psr7\mimetype_from_filename`.
+- `GuzzleHttp\Query` and `GuzzleHttp\QueryParser` have been removed. Query
+ strings must now be passed into request objects as strings, or provided to
+ the `query` request option when creating requests with clients. The `query`
+ option uses PHP's `http_build_query` to convert an array to a string. If you
+ need a different serialization technique, you will need to pass the query
+ string in as a string. There are a couple helper functions that will make
+ working with query strings easier: `GuzzleHttp\Psr7\parse_query` and
+ `GuzzleHttp\Psr7\build_query`.
+- Guzzle no longer has a dependency on RingPHP. Due to the use of a middleware
+ system based on PSR-7, using RingPHP and it's middleware system as well adds
+ more complexity than the benefits it provides. All HTTP handlers that were
+ present in RingPHP have been modified to work directly with PSR-7 messages
+ and placed in the `GuzzleHttp\Handler` namespace. This significantly reduces
+ complexity in Guzzle, removes a dependency, and improves performance. RingPHP
+ will be maintained for Guzzle 5 support, but will no longer be a part of
+ Guzzle 6.
+- As Guzzle now uses a middleware based systems the event system and RingPHP
+ integration has been removed. Note: while the event system has been removed,
+ it is possible to add your own type of event system that is powered by the
+ middleware system.
+ - Removed the `Event` namespace.
+ - Removed the `Subscriber` namespace.
+ - Removed `Transaction` class
+ - Removed `RequestFsm`
+ - Removed `RingBridge`
+ - `GuzzleHttp\Subscriber\Cookie` is now provided by
+ `GuzzleHttp\Middleware::cookies`
+ - `GuzzleHttp\Subscriber\HttpError` is now provided by
+ `GuzzleHttp\Middleware::httpError`
+ - `GuzzleHttp\Subscriber\History` is now provided by
+ `GuzzleHttp\Middleware::history`
+ - `GuzzleHttp\Subscriber\Mock` is now provided by
+ `GuzzleHttp\Handler\MockHandler`
+ - `GuzzleHttp\Subscriber\Prepare` is now provided by
+ `GuzzleHttp\PrepareBodyMiddleware`
+ - `GuzzleHttp\Subscriber\Redirect` is now provided by
+ `GuzzleHttp\RedirectMiddleware`
+- Guzzle now uses `Psr\Http\Message\UriInterface` (implements in
+ `GuzzleHttp\Psr7\Uri`) for URI support. `GuzzleHttp\Url` is now gone.
+- Static functions in `GuzzleHttp\Utils` have been moved to namespaced
+ functions under the `GuzzleHttp` namespace. This requires either a Composer
+ based autoloader or you to include functions.php.
+- `GuzzleHttp\ClientInterface::getDefaultOption` has been renamed to
+ `GuzzleHttp\ClientInterface::getConfig`.
+- `GuzzleHttp\ClientInterface::setDefaultOption` has been removed.
+- The `json` and `xml` methods of response objects has been removed. With the
+ migration to strictly adhering to PSR-7 as the interface for Guzzle messages,
+ adding methods to message interfaces would actually require Guzzle messages
+ to extend from PSR-7 messages rather then work with them directly.
+
+## Migrating to middleware
+
+The change to PSR-7 unfortunately required significant refactoring to Guzzle
+due to the fact that PSR-7 messages are immutable. Guzzle 5 relied on an event
+system from plugins. The event system relied on mutability of HTTP messages and
+side effects in order to work. With immutable messages, you have to change your
+workflow to become more about either returning a value (e.g., functional
+middlewares) or setting a value on an object. Guzzle v6 has chosen the
+functional middleware approach.
+
+Instead of using the event system to listen for things like the `before` event,
+you now create a stack based middleware function that intercepts a request on
+the way in and the promise of the response on the way out. This is a much
+simpler and more predictable approach than the event system and works nicely
+with PSR-7 middleware. Due to the use of promises, the middleware system is
+also asynchronous.
+
+v5:
+
+```php
+use GuzzleHttp\Event\BeforeEvent;
+$client = new GuzzleHttp\Client();
+// Get the emitter and listen to the before event.
+$client->getEmitter()->on('before', function (BeforeEvent $e) {
+ // Guzzle v5 events relied on mutation
+ $e->getRequest()->setHeader('X-Foo', 'Bar');
+});
+```
+
+v6:
+
+In v6, you can modify the request before it is sent using the `mapRequest`
+middleware. The idiomatic way in v6 to modify the request/response lifecycle is
+to setup a handler middleware stack up front and inject the handler into a
+client.
+
+```php
+use GuzzleHttp\Middleware;
+// Create a handler stack that has all of the default middlewares attached
+$handler = GuzzleHttp\HandlerStack::create();
+// Push the handler onto the handler stack
+$handler->push(Middleware::mapRequest(function (RequestInterface $request) {
+ // Notice that we have to return a request object
+ return $request->withHeader('X-Foo', 'Bar');
+}));
+// Inject the handler into the client
+$client = new GuzzleHttp\Client(['handler' => $handler]);
+```
+
+## POST Requests
+
+This version added the [`form_params`](https://docs.guzzlephp.org/en/latest/request-options.html#form_params)
+and `multipart` request options. `form_params` is an associative array of
+strings or array of strings and is used to serialize an
+`application/x-www-form-urlencoded` POST request. The
+[`multipart`](https://docs.guzzlephp.org/en/latest/request-options.html#multipart)
+option is now used to send a multipart/form-data POST request.
+
+`GuzzleHttp\Post\PostFile` has been removed. Use the `multipart` option to add
+POST files to a multipart/form-data request.
+
+The `body` option no longer accepts an array to send POST requests. Please use
+`multipart` or `form_params` instead.
+
+The `base_url` option has been renamed to `base_uri`.
+
+4.x to 5.0
+----------
+
+## Rewritten Adapter Layer
+
+Guzzle now uses [RingPHP](https://ringphp.readthedocs.org/en/latest) to send
+HTTP requests. The `adapter` option in a `GuzzleHttp\Client` constructor
+is still supported, but it has now been renamed to `handler`. Instead of
+passing a `GuzzleHttp\Adapter\AdapterInterface`, you must now pass a PHP
+`callable` that follows the RingPHP specification.
+
+## Removed Fluent Interfaces
+
+[Fluent interfaces were removed](https://ocramius.github.io/blog/fluent-interfaces-are-evil/)
+from the following classes:
+
+- `GuzzleHttp\Collection`
+- `GuzzleHttp\Url`
+- `GuzzleHttp\Query`
+- `GuzzleHttp\Post\PostBody`
+- `GuzzleHttp\Cookie\SetCookie`
+
+## Removed functions.php
+
+Removed "functions.php", so that Guzzle is truly PSR-4 compliant. The following
+functions can be used as replacements.
+
+- `GuzzleHttp\json_decode` -> `GuzzleHttp\Utils::jsonDecode`
+- `GuzzleHttp\get_path` -> `GuzzleHttp\Utils::getPath`
+- `GuzzleHttp\Utils::setPath` -> `GuzzleHttp\set_path`
+- `GuzzleHttp\Pool::batch` -> `GuzzleHttp\batch`. This function is, however,
+ deprecated in favor of using `GuzzleHttp\Pool::batch()`.
+
+The "procedural" global client has been removed with no replacement (e.g.,
+`GuzzleHttp\get()`, `GuzzleHttp\post()`, etc.). Use a `GuzzleHttp\Client`
+object as a replacement.
+
+## `throwImmediately` has been removed
+
+The concept of "throwImmediately" has been removed from exceptions and error
+events. This control mechanism was used to stop a transfer of concurrent
+requests from completing. This can now be handled by throwing the exception or
+by cancelling a pool of requests or each outstanding future request
+individually.
+
+## headers event has been removed
+
+Removed the "headers" event. This event was only useful for changing the
+body a response once the headers of the response were known. You can implement
+a similar behavior in a number of ways. One example might be to use a
+FnStream that has access to the transaction being sent. For example, when the
+first byte is written, you could check if the response headers match your
+expectations, and if so, change the actual stream body that is being
+written to.
+
+## Updates to HTTP Messages
+
+Removed the `asArray` parameter from
+`GuzzleHttp\Message\MessageInterface::getHeader`. If you want to get a header
+value as an array, then use the newly added `getHeaderAsArray()` method of
+`MessageInterface`. This change makes the Guzzle interfaces compatible with
+the PSR-7 interfaces.
+
+3.x to 4.0
+----------
+
+## Overarching changes:
+
+- Now requires PHP 5.4 or greater.
+- No longer requires cURL to send requests.
+- Guzzle no longer wraps every exception it throws. Only exceptions that are
+ recoverable are now wrapped by Guzzle.
+- Various namespaces have been removed or renamed.
+- No longer requiring the Symfony EventDispatcher. A custom event dispatcher
+ based on the Symfony EventDispatcher is
+ now utilized in `GuzzleHttp\Event\EmitterInterface` (resulting in significant
+ speed and functionality improvements).
+
+Changes per Guzzle 3.x namespace are described below.
+
+## Batch
+
+The `Guzzle\Batch` namespace has been removed. This is best left to
+third-parties to implement on top of Guzzle's core HTTP library.
+
+## Cache
+
+The `Guzzle\Cache` namespace has been removed. (Todo: No suitable replacement
+has been implemented yet, but hoping to utilize a PSR cache interface).
+
+## Common
+
+- Removed all of the wrapped exceptions. It's better to use the standard PHP
+ library for unrecoverable exceptions.
+- `FromConfigInterface` has been removed.
+- `Guzzle\Common\Version` has been removed. The VERSION constant can be found
+ at `GuzzleHttp\ClientInterface::VERSION`.
+
+### Collection
+
+- `getAll` has been removed. Use `toArray` to convert a collection to an array.
+- `inject` has been removed.
+- `keySearch` has been removed.
+- `getPath` no longer supports wildcard expressions. Use something better like
+ JMESPath for this.
+- `setPath` now supports appending to an existing array via the `[]` notation.
+
+### Events
+
+Guzzle no longer requires Symfony's EventDispatcher component. Guzzle now uses
+`GuzzleHttp\Event\Emitter`.
+
+- `Symfony\Component\EventDispatcher\EventDispatcherInterface` is replaced by
+ `GuzzleHttp\Event\EmitterInterface`.
+- `Symfony\Component\EventDispatcher\EventDispatcher` is replaced by
+ `GuzzleHttp\Event\Emitter`.
+- `Symfony\Component\EventDispatcher\Event` is replaced by
+ `GuzzleHttp\Event\Event`, and Guzzle now has an EventInterface in
+ `GuzzleHttp\Event\EventInterface`.
+- `AbstractHasDispatcher` has moved to a trait, `HasEmitterTrait`, and
+ `HasDispatcherInterface` has moved to `HasEmitterInterface`. Retrieving the
+ event emitter of a request, client, etc. now uses the `getEmitter` method
+ rather than the `getDispatcher` method.
+
+#### Emitter
+
+- Use the `once()` method to add a listener that automatically removes itself
+ the first time it is invoked.
+- Use the `listeners()` method to retrieve a list of event listeners rather than
+ the `getListeners()` method.
+- Use `emit()` instead of `dispatch()` to emit an event from an emitter.
+- Use `attach()` instead of `addSubscriber()` and `detach()` instead of
+ `removeSubscriber()`.
+
+```php
+$mock = new Mock();
+// 3.x
+$request->getEventDispatcher()->addSubscriber($mock);
+$request->getEventDispatcher()->removeSubscriber($mock);
+// 4.x
+$request->getEmitter()->attach($mock);
+$request->getEmitter()->detach($mock);
+```
+
+Use the `on()` method to add a listener rather than the `addListener()` method.
+
+```php
+// 3.x
+$request->getEventDispatcher()->addListener('foo', function (Event $event) { /* ... */ } );
+// 4.x
+$request->getEmitter()->on('foo', function (Event $event, $name) { /* ... */ } );
+```
+
+## Http
+
+### General changes
+
+- The cacert.pem certificate has been moved to `src/cacert.pem`.
+- Added the concept of adapters that are used to transfer requests over the
+ wire.
+- Simplified the event system.
+- Sending requests in parallel is still possible, but batching is no longer a
+ concept of the HTTP layer. Instead, you must use the `complete` and `error`
+ events to asynchronously manage parallel request transfers.
+- `Guzzle\Http\Url` has moved to `GuzzleHttp\Url`.
+- `Guzzle\Http\QueryString` has moved to `GuzzleHttp\Query`.
+- QueryAggregators have been rewritten so that they are simply callable
+ functions.
+- `GuzzleHttp\StaticClient` has been removed. Use the functions provided in
+ `functions.php` for an easy to use static client instance.
+- Exceptions in `GuzzleHttp\Exception` have been updated to all extend from
+ `GuzzleHttp\Exception\TransferException`.
+
+### Client
+
+Calling methods like `get()`, `post()`, `head()`, etc. no longer create and
+return a request, but rather creates a request, sends the request, and returns
+the response.
+
+```php
+// 3.0
+$request = $client->get('/');
+$response = $request->send();
+
+// 4.0
+$response = $client->get('/');
+
+// or, to mirror the previous behavior
+$request = $client->createRequest('GET', '/');
+$response = $client->send($request);
+```
+
+`GuzzleHttp\ClientInterface` has changed.
+
+- The `send` method no longer accepts more than one request. Use `sendAll` to
+ send multiple requests in parallel.
+- `setUserAgent()` has been removed. Use a default request option instead. You
+ could, for example, do something like:
+ `$client->setConfig('defaults/headers/User-Agent', 'Foo/Bar ' . $client::getDefaultUserAgent())`.
+- `setSslVerification()` has been removed. Use default request options instead,
+ like `$client->setConfig('defaults/verify', true)`.
+
+`GuzzleHttp\Client` has changed.
+
+- The constructor now accepts only an associative array. You can include a
+ `base_url` string or array to use a URI template as the base URL of a client.
+ You can also specify a `defaults` key that is an associative array of default
+ request options. You can pass an `adapter` to use a custom adapter,
+ `batch_adapter` to use a custom adapter for sending requests in parallel, or
+ a `message_factory` to change the factory used to create HTTP requests and
+ responses.
+- The client no longer emits a `client.create_request` event.
+- Creating requests with a client no longer automatically utilize a URI
+ template. You must pass an array into a creational method (e.g.,
+ `createRequest`, `get`, `put`, etc.) in order to expand a URI template.
+
+### Messages
+
+Messages no longer have references to their counterparts (i.e., a request no
+longer has a reference to it's response, and a response no loger has a
+reference to its request). This association is now managed through a
+`GuzzleHttp\Adapter\TransactionInterface` object. You can get references to
+these transaction objects using request events that are emitted over the
+lifecycle of a request.
+
+#### Requests with a body
+
+- `GuzzleHttp\Message\EntityEnclosingRequest` and
+ `GuzzleHttp\Message\EntityEnclosingRequestInterface` have been removed. The
+ separation between requests that contain a body and requests that do not
+ contain a body has been removed, and now `GuzzleHttp\Message\RequestInterface`
+ handles both use cases.
+- Any method that previously accepts a `GuzzleHttp\Response` object now accept a
+ `GuzzleHttp\Message\ResponseInterface`.
+- `GuzzleHttp\Message\RequestFactoryInterface` has been renamed to
+ `GuzzleHttp\Message\MessageFactoryInterface`. This interface is used to create
+ both requests and responses and is implemented in
+ `GuzzleHttp\Message\MessageFactory`.
+- POST field and file methods have been removed from the request object. You
+ must now use the methods made available to `GuzzleHttp\Post\PostBodyInterface`
+ to control the format of a POST body. Requests that are created using a
+ standard `GuzzleHttp\Message\MessageFactoryInterface` will automatically use
+ a `GuzzleHttp\Post\PostBody` body if the body was passed as an array or if
+ the method is POST and no body is provided.
+
+```php
+$request = $client->createRequest('POST', '/');
+$request->getBody()->setField('foo', 'bar');
+$request->getBody()->addFile(new PostFile('file_key', fopen('/path/to/content', 'r')));
+```
+
+#### Headers
+
+- `GuzzleHttp\Message\Header` has been removed. Header values are now simply
+ represented by an array of values or as a string. Header values are returned
+ as a string by default when retrieving a header value from a message. You can
+ pass an optional argument of `true` to retrieve a header value as an array
+ of strings instead of a single concatenated string.
+- `GuzzleHttp\PostFile` and `GuzzleHttp\PostFileInterface` have been moved to
+ `GuzzleHttp\Post`. This interface has been simplified and now allows the
+ addition of arbitrary headers.
+- Custom headers like `GuzzleHttp\Message\Header\Link` have been removed. Most
+ of the custom headers are now handled separately in specific
+ subscribers/plugins, and `GuzzleHttp\Message\HeaderValues::parseParams()` has
+ been updated to properly handle headers that contain parameters (like the
+ `Link` header).
+
+#### Responses
+
+- `GuzzleHttp\Message\Response::getInfo()` and
+ `GuzzleHttp\Message\Response::setInfo()` have been removed. Use the event
+ system to retrieve this type of information.
+- `GuzzleHttp\Message\Response::getRawHeaders()` has been removed.
+- `GuzzleHttp\Message\Response::getMessage()` has been removed.
+- `GuzzleHttp\Message\Response::calculateAge()` and other cache specific
+ methods have moved to the CacheSubscriber.
+- Header specific helper functions like `getContentMd5()` have been removed.
+ Just use `getHeader('Content-MD5')` instead.
+- `GuzzleHttp\Message\Response::setRequest()` and
+ `GuzzleHttp\Message\Response::getRequest()` have been removed. Use the event
+ system to work with request and response objects as a transaction.
+- `GuzzleHttp\Message\Response::getRedirectCount()` has been removed. Use the
+ Redirect subscriber instead.
+- `GuzzleHttp\Message\Response::isSuccessful()` and other related methods have
+ been removed. Use `getStatusCode()` instead.
+
+#### Streaming responses
+
+Streaming requests can now be created by a client directly, returning a
+`GuzzleHttp\Message\ResponseInterface` object that contains a body stream
+referencing an open PHP HTTP stream.
+
+```php
+// 3.0
+use Guzzle\Stream\PhpStreamRequestFactory;
+$request = $client->get('/');
+$factory = new PhpStreamRequestFactory();
+$stream = $factory->fromRequest($request);
+$data = $stream->read(1024);
+
+// 4.0
+$response = $client->get('/', ['stream' => true]);
+// Read some data off of the stream in the response body
+$data = $response->getBody()->read(1024);
+```
+
+#### Redirects
+
+The `configureRedirects()` method has been removed in favor of a
+`allow_redirects` request option.
+
+```php
+// Standard redirects with a default of a max of 5 redirects
+$request = $client->createRequest('GET', '/', ['allow_redirects' => true]);
+
+// Strict redirects with a custom number of redirects
+$request = $client->createRequest('GET', '/', [
+ 'allow_redirects' => ['max' => 5, 'strict' => true]
+]);
+```
+
+#### EntityBody
+
+EntityBody interfaces and classes have been removed or moved to
+`GuzzleHttp\Stream`. All classes and interfaces that once required
+`GuzzleHttp\EntityBodyInterface` now require
+`GuzzleHttp\Stream\StreamInterface`. Creating a new body for a request no
+longer uses `GuzzleHttp\EntityBody::factory` but now uses
+`GuzzleHttp\Stream\Stream::factory` or even better:
+`GuzzleHttp\Stream\create()`.
+
+- `Guzzle\Http\EntityBodyInterface` is now `GuzzleHttp\Stream\StreamInterface`
+- `Guzzle\Http\EntityBody` is now `GuzzleHttp\Stream\Stream`
+- `Guzzle\Http\CachingEntityBody` is now `GuzzleHttp\Stream\CachingStream`
+- `Guzzle\Http\ReadLimitEntityBody` is now `GuzzleHttp\Stream\LimitStream`
+- `Guzzle\Http\IoEmittyinEntityBody` has been removed.
+
+#### Request lifecycle events
+
+Requests previously submitted a large number of requests. The number of events
+emitted over the lifecycle of a request has been significantly reduced to make
+it easier to understand how to extend the behavior of a request. All events
+emitted during the lifecycle of a request now emit a custom
+`GuzzleHttp\Event\EventInterface` object that contains context providing
+methods and a way in which to modify the transaction at that specific point in
+time (e.g., intercept the request and set a response on the transaction).
+
+- `request.before_send` has been renamed to `before` and now emits a
+ `GuzzleHttp\Event\BeforeEvent`
+- `request.complete` has been renamed to `complete` and now emits a
+ `GuzzleHttp\Event\CompleteEvent`.
+- `request.sent` has been removed. Use `complete`.
+- `request.success` has been removed. Use `complete`.
+- `error` is now an event that emits a `GuzzleHttp\Event\ErrorEvent`.
+- `request.exception` has been removed. Use `error`.
+- `request.receive.status_line` has been removed.
+- `curl.callback.progress` has been removed. Use a custom `StreamInterface` to
+ maintain a status update.
+- `curl.callback.write` has been removed. Use a custom `StreamInterface` to
+ intercept writes.
+- `curl.callback.read` has been removed. Use a custom `StreamInterface` to
+ intercept reads.
+
+`headers` is a new event that is emitted after the response headers of a
+request have been received before the body of the response is downloaded. This
+event emits a `GuzzleHttp\Event\HeadersEvent`.
+
+You can intercept a request and inject a response using the `intercept()` event
+of a `GuzzleHttp\Event\BeforeEvent`, `GuzzleHttp\Event\CompleteEvent`, and
+`GuzzleHttp\Event\ErrorEvent` event.
+
+See: https://docs.guzzlephp.org/en/latest/events.html
+
+## Inflection
+
+The `Guzzle\Inflection` namespace has been removed. This is not a core concern
+of Guzzle.
+
+## Iterator
+
+The `Guzzle\Iterator` namespace has been removed.
+
+- `Guzzle\Iterator\AppendIterator`, `Guzzle\Iterator\ChunkedIterator`, and
+ `Guzzle\Iterator\MethodProxyIterator` are nice, but not a core requirement of
+ Guzzle itself.
+- `Guzzle\Iterator\FilterIterator` is no longer needed because an equivalent
+ class is shipped with PHP 5.4.
+- `Guzzle\Iterator\MapIterator` is not really needed when using PHP 5.5 because
+ it's easier to just wrap an iterator in a generator that maps values.
+
+For a replacement of these iterators, see https://github.com/nikic/iter
+
+## Log
+
+The LogPlugin has moved to https://github.com/guzzle/log-subscriber. The
+`Guzzle\Log` namespace has been removed. Guzzle now relies on
+`Psr\Log\LoggerInterface` for all logging. The MessageFormatter class has been
+moved to `GuzzleHttp\Subscriber\Log\Formatter`.
+
+## Parser
+
+The `Guzzle\Parser` namespace has been removed. This was previously used to
+make it possible to plug in custom parsers for cookies, messages, URI
+templates, and URLs; however, this level of complexity is not needed in Guzzle
+so it has been removed.
+
+- Cookie: Cookie parsing logic has been moved to
+ `GuzzleHttp\Cookie\SetCookie::fromString`.
+- Message: Message parsing logic for both requests and responses has been moved
+ to `GuzzleHttp\Message\MessageFactory::fromMessage`. Message parsing is only
+ used in debugging or deserializing messages, so it doesn't make sense for
+ Guzzle as a library to add this level of complexity to parsing messages.
+- UriTemplate: URI template parsing has been moved to
+ `GuzzleHttp\UriTemplate`. The Guzzle library will automatically use the PECL
+ URI template library if it is installed.
+- Url: URL parsing is now performed in `GuzzleHttp\Url::fromString` (previously
+ it was `Guzzle\Http\Url::factory()`). If custom URL parsing is necessary,
+ then developers are free to subclass `GuzzleHttp\Url`.
+
+## Plugin
+
+The `Guzzle\Plugin` namespace has been renamed to `GuzzleHttp\Subscriber`.
+Several plugins are shipping with the core Guzzle library under this namespace.
+
+- `GuzzleHttp\Subscriber\Cookie`: Replaces the old CookiePlugin. Cookie jar
+ code has moved to `GuzzleHttp\Cookie`.
+- `GuzzleHttp\Subscriber\History`: Replaces the old HistoryPlugin.
+- `GuzzleHttp\Subscriber\HttpError`: Throws errors when a bad HTTP response is
+ received.
+- `GuzzleHttp\Subscriber\Mock`: Replaces the old MockPlugin.
+- `GuzzleHttp\Subscriber\Prepare`: Prepares the body of a request just before
+ sending. This subscriber is attached to all requests by default.
+- `GuzzleHttp\Subscriber\Redirect`: Replaces the RedirectPlugin.
+
+The following plugins have been removed (third-parties are free to re-implement
+these if needed):
+
+- `GuzzleHttp\Plugin\Async` has been removed.
+- `GuzzleHttp\Plugin\CurlAuth` has been removed.
+- `GuzzleHttp\Plugin\ErrorResponse\ErrorResponsePlugin` has been removed. This
+ functionality should instead be implemented with event listeners that occur
+ after normal response parsing occurs in the guzzle/command package.
+
+The following plugins are not part of the core Guzzle package, but are provided
+in separate repositories:
+
+- `Guzzle\Http\Plugin\BackoffPlugin` has been rewritten to be much simpler
+ to build custom retry policies using simple functions rather than various
+ chained classes. See: https://github.com/guzzle/retry-subscriber
+- `Guzzle\Http\Plugin\Cache\CachePlugin` has moved to
+ https://github.com/guzzle/cache-subscriber
+- `Guzzle\Http\Plugin\Log\LogPlugin` has moved to
+ https://github.com/guzzle/log-subscriber
+- `Guzzle\Http\Plugin\Md5\Md5Plugin` has moved to
+ https://github.com/guzzle/message-integrity-subscriber
+- `Guzzle\Http\Plugin\Mock\MockPlugin` has moved to
+ `GuzzleHttp\Subscriber\MockSubscriber`.
+- `Guzzle\Http\Plugin\Oauth\OauthPlugin` has moved to
+ https://github.com/guzzle/oauth-subscriber
+
+## Service
+
+The service description layer of Guzzle has moved into two separate packages:
+
+- https://github.com/guzzle/command Provides a high level abstraction over web
+ services by representing web service operations using commands.
+- https://github.com/guzzle/guzzle-services Provides an implementation of
+ guzzle/command that provides request serialization and response parsing using
+ Guzzle service descriptions.
+
+## Stream
+
+Stream have moved to a separate package available at
+https://github.com/guzzle/streams.
+
+`Guzzle\Stream\StreamInterface` has been given a large update to cleanly take
+on the responsibilities of `Guzzle\Http\EntityBody` and
+`Guzzle\Http\EntityBodyInterface` now that they have been removed. The number
+of methods implemented by the `StreamInterface` has been drastically reduced to
+allow developers to more easily extend and decorate stream behavior.
+
+## Removed methods from StreamInterface
+
+- `getStream` and `setStream` have been removed to better encapsulate streams.
+- `getMetadata` and `setMetadata` have been removed in favor of
+ `GuzzleHttp\Stream\MetadataStreamInterface`.
+- `getWrapper`, `getWrapperData`, `getStreamType`, and `getUri` have all been
+ removed. This data is accessible when
+ using streams that implement `GuzzleHttp\Stream\MetadataStreamInterface`.
+- `rewind` has been removed. Use `seek(0)` for a similar behavior.
+
+## Renamed methods
+
+- `detachStream` has been renamed to `detach`.
+- `feof` has been renamed to `eof`.
+- `ftell` has been renamed to `tell`.
+- `readLine` has moved from an instance method to a static class method of
+ `GuzzleHttp\Stream\Stream`.
+
+## Metadata streams
+
+`GuzzleHttp\Stream\MetadataStreamInterface` has been added to denote streams
+that contain additional metadata accessible via `getMetadata()`.
+`GuzzleHttp\Stream\StreamInterface::getMetadata` and
+`GuzzleHttp\Stream\StreamInterface::setMetadata` have been removed.
+
+## StreamRequestFactory
+
+The entire concept of the StreamRequestFactory has been removed. The way this
+was used in Guzzle 3 broke the actual interface of sending streaming requests
+(instead of getting back a Response, you got a StreamInterface). Streaming
+PHP requests are now implemented through the `GuzzleHttp\Adapter\StreamAdapter`.
+
+3.6 to 3.7
+----------
+
+### Deprecations
+
+- You can now enable E_USER_DEPRECATED warnings to see if you are using any deprecated methods.:
+
+```php
+\Guzzle\Common\Version::$emitWarnings = true;
+```
+
+The following APIs and options have been marked as deprecated:
+
+- Marked `Guzzle\Http\Message\Request::isResponseBodyRepeatable()` as deprecated. Use `$request->getResponseBody()->isRepeatable()` instead.
+- Marked `Guzzle\Http\Message\Request::canCache()` as deprecated. Use `Guzzle\Plugin\Cache\DefaultCanCacheStrategy->canCacheRequest()` instead.
+- Marked `Guzzle\Http\Message\Request::canCache()` as deprecated. Use `Guzzle\Plugin\Cache\DefaultCanCacheStrategy->canCacheRequest()` instead.
+- Marked `Guzzle\Http\Message\Request::setIsRedirect()` as deprecated. Use the HistoryPlugin instead.
+- Marked `Guzzle\Http\Message\Request::isRedirect()` as deprecated. Use the HistoryPlugin instead.
+- Marked `Guzzle\Cache\CacheAdapterFactory::factory()` as deprecated
+- Marked `Guzzle\Service\Client::enableMagicMethods()` as deprecated. Magic methods can no longer be disabled on a Guzzle\Service\Client.
+- Marked `Guzzle\Parser\Url\UrlParser` as deprecated. Just use PHP's `parse_url()` and percent encode your UTF-8.
+- Marked `Guzzle\Common\Collection::inject()` as deprecated.
+- Marked `Guzzle\Plugin\CurlAuth\CurlAuthPlugin` as deprecated. Use
+ `$client->getConfig()->setPath('request.options/auth', array('user', 'pass', 'Basic|Digest|NTLM|Any'));` or
+ `$client->setDefaultOption('auth', array('user', 'pass', 'Basic|Digest|NTLM|Any'));`
+
+3.7 introduces `request.options` as a parameter for a client configuration and as an optional argument to all creational
+request methods. When paired with a client's configuration settings, these options allow you to specify default settings
+for various aspects of a request. Because these options make other previous configuration options redundant, several
+configuration options and methods of a client and AbstractCommand have been deprecated.
+
+- Marked `Guzzle\Service\Client::getDefaultHeaders()` as deprecated. Use `$client->getDefaultOption('headers')`.
+- Marked `Guzzle\Service\Client::setDefaultHeaders()` as deprecated. Use `$client->setDefaultOption('headers/{header_name}', 'value')`.
+- Marked 'request.params' for `Guzzle\Http\Client` as deprecated. Use `$client->setDefaultOption('params/{param_name}', 'value')`
+- Marked 'command.headers', 'command.response_body' and 'command.on_complete' as deprecated for AbstractCommand. These will work through Guzzle 4.0
+
+ $command = $client->getCommand('foo', array(
+ 'command.headers' => array('Test' => '123'),
+ 'command.response_body' => '/path/to/file'
+ ));
+
+ // Should be changed to:
+
+ $command = $client->getCommand('foo', array(
+ 'command.request_options' => array(
+ 'headers' => array('Test' => '123'),
+ 'save_as' => '/path/to/file'
+ )
+ ));
+
+### Interface changes
+
+Additions and changes (you will need to update any implementations or subclasses you may have created):
+
+- Added an `$options` argument to the end of the following methods of `Guzzle\Http\ClientInterface`:
+ createRequest, head, delete, put, patch, post, options, prepareRequest
+- Added an `$options` argument to the end of `Guzzle\Http\Message\Request\RequestFactoryInterface::createRequest()`
+- Added an `applyOptions()` method to `Guzzle\Http\Message\Request\RequestFactoryInterface`
+- Changed `Guzzle\Http\ClientInterface::get($uri = null, $headers = null, $body = null)` to
+ `Guzzle\Http\ClientInterface::get($uri = null, $headers = null, $options = array())`. You can still pass in a
+ resource, string, or EntityBody into the $options parameter to specify the download location of the response.
+- Changed `Guzzle\Common\Collection::__construct($data)` to no longer accepts a null value for `$data` but a
+ default `array()`
+- Added `Guzzle\Stream\StreamInterface::isRepeatable`
+- Made `Guzzle\Http\Client::expandTemplate` and `getUriTemplate` protected methods.
+
+The following methods were removed from interfaces. All of these methods are still available in the concrete classes
+that implement them, but you should update your code to use alternative methods:
+
+- Removed `Guzzle\Http\ClientInterface::setDefaultHeaders(). Use
+ `$client->getConfig()->setPath('request.options/headers/{header_name}', 'value')`. or
+ `$client->getConfig()->setPath('request.options/headers', array('header_name' => 'value'))` or
+ `$client->setDefaultOption('headers/{header_name}', 'value')`. or
+ `$client->setDefaultOption('headers', array('header_name' => 'value'))`.
+- Removed `Guzzle\Http\ClientInterface::getDefaultHeaders(). Use `$client->getConfig()->getPath('request.options/headers')`.
+- Removed `Guzzle\Http\ClientInterface::expandTemplate()`. This is an implementation detail.
+- Removed `Guzzle\Http\ClientInterface::setRequestFactory()`. This is an implementation detail.
+- Removed `Guzzle\Http\ClientInterface::getCurlMulti()`. This is a very specific implementation detail.
+- Removed `Guzzle\Http\Message\RequestInterface::canCache`. Use the CachePlugin.
+- Removed `Guzzle\Http\Message\RequestInterface::setIsRedirect`. Use the HistoryPlugin.
+- Removed `Guzzle\Http\Message\RequestInterface::isRedirect`. Use the HistoryPlugin.
+
+### Cache plugin breaking changes
+
+- CacheKeyProviderInterface and DefaultCacheKeyProvider are no longer used. All of this logic is handled in a
+ CacheStorageInterface. These two objects and interface will be removed in a future version.
+- Always setting X-cache headers on cached responses
+- Default cache TTLs are now handled by the CacheStorageInterface of a CachePlugin
+- `CacheStorageInterface::cache($key, Response $response, $ttl = null)` has changed to `cache(RequestInterface
+ $request, Response $response);`
+- `CacheStorageInterface::fetch($key)` has changed to `fetch(RequestInterface $request);`
+- `CacheStorageInterface::delete($key)` has changed to `delete(RequestInterface $request);`
+- Added `CacheStorageInterface::purge($url)`
+- `DefaultRevalidation::__construct(CacheKeyProviderInterface $cacheKey, CacheStorageInterface $cache, CachePlugin
+ $plugin)` has changed to `DefaultRevalidation::__construct(CacheStorageInterface $cache,
+ CanCacheStrategyInterface $canCache = null)`
+- Added `RevalidationInterface::shouldRevalidate(RequestInterface $request, Response $response)`
+
+3.5 to 3.6
+----------
+
+* Mixed casing of headers are now forced to be a single consistent casing across all values for that header.
+* Messages internally use a HeaderCollection object to delegate handling case-insensitive header resolution
+* Removed the whole changedHeader() function system of messages because all header changes now go through addHeader().
+ For example, setHeader() first removes the header using unset on a HeaderCollection and then calls addHeader().
+ Keeping the Host header and URL host in sync is now handled by overriding the addHeader method in Request.
+* Specific header implementations can be created for complex headers. When a message creates a header, it uses a
+ HeaderFactory which can map specific headers to specific header classes. There is now a Link header and
+ CacheControl header implementation.
+* Moved getLinks() from Response to just be used on a Link header object.
+
+If you previously relied on Guzzle\Http\Message\Header::raw(), then you will need to update your code to use the
+HeaderInterface (e.g. toArray(), getAll(), etc.).
+
+### Interface changes
+
+* Removed from interface: Guzzle\Http\ClientInterface::setUriTemplate
+* Removed from interface: Guzzle\Http\ClientInterface::setCurlMulti()
+* Removed Guzzle\Http\Message\Request::receivedRequestHeader() and implemented this functionality in
+ Guzzle\Http\Curl\RequestMediator
+* Removed the optional $asString parameter from MessageInterface::getHeader(). Just cast the header to a string.
+* Removed the optional $tryChunkedTransfer option from Guzzle\Http\Message\EntityEnclosingRequestInterface
+* Removed the $asObjects argument from Guzzle\Http\Message\MessageInterface::getHeaders()
+
+### Removed deprecated functions
+
+* Removed Guzzle\Parser\ParserRegister::get(). Use getParser()
+* Removed Guzzle\Parser\ParserRegister::set(). Use registerParser().
+
+### Deprecations
+
+* The ability to case-insensitively search for header values
+* Guzzle\Http\Message\Header::hasExactHeader
+* Guzzle\Http\Message\Header::raw. Use getAll()
+* Deprecated cache control specific methods on Guzzle\Http\Message\AbstractMessage. Use the CacheControl header object
+ instead.
+
+### Other changes
+
+* All response header helper functions return a string rather than mixing Header objects and strings inconsistently
+* Removed cURL blacklist support. This is no longer necessary now that Expect, Accept, etc. are managed by Guzzle
+ directly via interfaces
+* Removed the injecting of a request object onto a response object. The methods to get and set a request still exist
+ but are a no-op until removed.
+* Most classes that used to require a `Guzzle\Service\Command\CommandInterface` typehint now request a
+ `Guzzle\Service\Command\ArrayCommandInterface`.
+* Added `Guzzle\Http\Message\RequestInterface::startResponse()` to the RequestInterface to handle injecting a response
+ on a request while the request is still being transferred
+* `Guzzle\Service\Command\CommandInterface` now extends from ToArrayInterface and ArrayAccess
+
+3.3 to 3.4
+----------
+
+Base URLs of a client now follow the rules of https://datatracker.ietf.org/doc/html/rfc3986#section-5.2.2 when merging URLs.
+
+3.2 to 3.3
+----------
+
+### Response::getEtag() quote stripping removed
+
+`Guzzle\Http\Message\Response::getEtag()` no longer strips quotes around the ETag response header
+
+### Removed `Guzzle\Http\Utils`
+
+The `Guzzle\Http\Utils` class was removed. This class was only used for testing.
+
+### Stream wrapper and type
+
+`Guzzle\Stream\Stream::getWrapper()` and `Guzzle\Stream\Stream::getStreamType()` are no longer converted to lowercase.
+
+### curl.emit_io became emit_io
+
+Emitting IO events from a RequestMediator is now a parameter that must be set in a request's curl options using the
+'emit_io' key. This was previously set under a request's parameters using 'curl.emit_io'
+
+3.1 to 3.2
+----------
+
+### CurlMulti is no longer reused globally
+
+Before 3.2, the same CurlMulti object was reused globally for each client. This can cause issue where plugins added
+to a single client can pollute requests dispatched from other clients.
+
+If you still wish to reuse the same CurlMulti object with each client, then you can add a listener to the
+ServiceBuilder's `service_builder.create_client` event to inject a custom CurlMulti object into each client as it is
+created.
+
+```php
+$multi = new Guzzle\Http\Curl\CurlMulti();
+$builder = Guzzle\Service\Builder\ServiceBuilder::factory('/path/to/config.json');
+$builder->addListener('service_builder.create_client', function ($event) use ($multi) {
+ $event['client']->setCurlMulti($multi);
+}
+});
+```
+
+### No default path
+
+URLs no longer have a default path value of '/' if no path was specified.
+
+Before:
+
+```php
+$request = $client->get('http://www.foo.com');
+echo $request->getUrl();
+// >> http://www.foo.com/
+```
+
+After:
+
+```php
+$request = $client->get('http://www.foo.com');
+echo $request->getUrl();
+// >> http://www.foo.com
+```
+
+### Less verbose BadResponseException
+
+The exception message for `Guzzle\Http\Exception\BadResponseException` no longer contains the full HTTP request and
+response information. You can, however, get access to the request and response object by calling `getRequest()` or
+`getResponse()` on the exception object.
+
+### Query parameter aggregation
+
+Multi-valued query parameters are no longer aggregated using a callback function. `Guzzle\Http\Query` now has a
+setAggregator() method that accepts a `Guzzle\Http\QueryAggregator\QueryAggregatorInterface` object. This object is
+responsible for handling the aggregation of multi-valued query string variables into a flattened hash.
+
+2.8 to 3.x
+----------
+
+### Guzzle\Service\Inspector
+
+Change `\Guzzle\Service\Inspector::fromConfig` to `\Guzzle\Common\Collection::fromConfig`
+
+**Before**
+
+```php
+use Guzzle\Service\Inspector;
+
+class YourClient extends \Guzzle\Service\Client
+{
+ public static function factory($config = array())
+ {
+ $default = array();
+ $required = array('base_url', 'username', 'api_key');
+ $config = Inspector::fromConfig($config, $default, $required);
+
+ $client = new self(
+ $config->get('base_url'),
+ $config->get('username'),
+ $config->get('api_key')
+ );
+ $client->setConfig($config);
+
+ $client->setDescription(ServiceDescription::factory(__DIR__ . DIRECTORY_SEPARATOR . 'client.json'));
+
+ return $client;
+ }
+```
+
+**After**
+
+```php
+use Guzzle\Common\Collection;
+
+class YourClient extends \Guzzle\Service\Client
+{
+ public static function factory($config = array())
+ {
+ $default = array();
+ $required = array('base_url', 'username', 'api_key');
+ $config = Collection::fromConfig($config, $default, $required);
+
+ $client = new self(
+ $config->get('base_url'),
+ $config->get('username'),
+ $config->get('api_key')
+ );
+ $client->setConfig($config);
+
+ $client->setDescription(ServiceDescription::factory(__DIR__ . DIRECTORY_SEPARATOR . 'client.json'));
+
+ return $client;
+ }
+```
+
+### Convert XML Service Descriptions to JSON
+
+**Before**
+
+```xml
+
+
+
+
+
+ Get a list of groups
+
+
+ Uses a search query to get a list of groups
+
+
+
+ Create a group
+
+
+
+
+ Delete a group by ID
+
+
+
+
+
+
+ Update a group
+
+
+
+
+
+
+```
+
+**After**
+
+```json
+{
+ "name": "Zendesk REST API v2",
+ "apiVersion": "2012-12-31",
+ "description":"Provides access to Zendesk views, groups, tickets, ticket fields, and users",
+ "operations": {
+ "list_groups": {
+ "httpMethod":"GET",
+ "uri": "groups.json",
+ "summary": "Get a list of groups"
+ },
+ "search_groups":{
+ "httpMethod":"GET",
+ "uri": "search.json?query=\"{query} type:group\"",
+ "summary": "Uses a search query to get a list of groups",
+ "parameters":{
+ "query":{
+ "location": "uri",
+ "description":"Zendesk Search Query",
+ "type": "string",
+ "required": true
+ }
+ }
+ },
+ "create_group": {
+ "httpMethod":"POST",
+ "uri": "groups.json",
+ "summary": "Create a group",
+ "parameters":{
+ "data": {
+ "type": "array",
+ "location": "body",
+ "description":"Group JSON",
+ "filters": "json_encode",
+ "required": true
+ },
+ "Content-Type":{
+ "type": "string",
+ "location":"header",
+ "static": "application/json"
+ }
+ }
+ },
+ "delete_group": {
+ "httpMethod":"DELETE",
+ "uri": "groups/{id}.json",
+ "summary": "Delete a group",
+ "parameters":{
+ "id":{
+ "location": "uri",
+ "description":"Group to delete by ID",
+ "type": "integer",
+ "required": true
+ }
+ }
+ },
+ "get_group": {
+ "httpMethod":"GET",
+ "uri": "groups/{id}.json",
+ "summary": "Get a ticket",
+ "parameters":{
+ "id":{
+ "location": "uri",
+ "description":"Group to get by ID",
+ "type": "integer",
+ "required": true
+ }
+ }
+ },
+ "update_group": {
+ "httpMethod":"PUT",
+ "uri": "groups/{id}.json",
+ "summary": "Update a group",
+ "parameters":{
+ "id": {
+ "location": "uri",
+ "description":"Group to update by ID",
+ "type": "integer",
+ "required": true
+ },
+ "data": {
+ "type": "array",
+ "location": "body",
+ "description":"Group JSON",
+ "filters": "json_encode",
+ "required": true
+ },
+ "Content-Type":{
+ "type": "string",
+ "location":"header",
+ "static": "application/json"
+ }
+ }
+ }
+}
+```
+
+### Guzzle\Service\Description\ServiceDescription
+
+Commands are now called Operations
+
+**Before**
+
+```php
+use Guzzle\Service\Description\ServiceDescription;
+
+$sd = new ServiceDescription();
+$sd->getCommands(); // @returns ApiCommandInterface[]
+$sd->hasCommand($name);
+$sd->getCommand($name); // @returns ApiCommandInterface|null
+$sd->addCommand($command); // @param ApiCommandInterface $command
+```
+
+**After**
+
+```php
+use Guzzle\Service\Description\ServiceDescription;
+
+$sd = new ServiceDescription();
+$sd->getOperations(); // @returns OperationInterface[]
+$sd->hasOperation($name);
+$sd->getOperation($name); // @returns OperationInterface|null
+$sd->addOperation($operation); // @param OperationInterface $operation
+```
+
+### Guzzle\Common\Inflection\Inflector
+
+Namespace is now `Guzzle\Inflection\Inflector`
+
+### Guzzle\Http\Plugin
+
+Namespace is now `Guzzle\Plugin`. Many other changes occur within this namespace and are detailed in their own sections below.
+
+### Guzzle\Http\Plugin\LogPlugin and Guzzle\Common\Log
+
+Now `Guzzle\Plugin\Log\LogPlugin` and `Guzzle\Log` respectively.
+
+**Before**
+
+```php
+use Guzzle\Common\Log\ClosureLogAdapter;
+use Guzzle\Http\Plugin\LogPlugin;
+
+/** @var \Guzzle\Http\Client */
+$client;
+
+// $verbosity is an integer indicating desired message verbosity level
+$client->addSubscriber(new LogPlugin(new ClosureLogAdapter(function($m) { echo $m; }, $verbosity = LogPlugin::LOG_VERBOSE);
+```
+
+**After**
+
+```php
+use Guzzle\Log\ClosureLogAdapter;
+use Guzzle\Log\MessageFormatter;
+use Guzzle\Plugin\Log\LogPlugin;
+
+/** @var \Guzzle\Http\Client */
+$client;
+
+// $format is a string indicating desired message format -- @see MessageFormatter
+$client->addSubscriber(new LogPlugin(new ClosureLogAdapter(function($m) { echo $m; }, $format = MessageFormatter::DEBUG_FORMAT);
+```
+
+### Guzzle\Http\Plugin\CurlAuthPlugin
+
+Now `Guzzle\Plugin\CurlAuth\CurlAuthPlugin`.
+
+### Guzzle\Http\Plugin\ExponentialBackoffPlugin
+
+Now `Guzzle\Plugin\Backoff\BackoffPlugin`, and other changes.
+
+**Before**
+
+```php
+use Guzzle\Http\Plugin\ExponentialBackoffPlugin;
+
+$backoffPlugin = new ExponentialBackoffPlugin($maxRetries, array_merge(
+ ExponentialBackoffPlugin::getDefaultFailureCodes(), array(429)
+ ));
+
+$client->addSubscriber($backoffPlugin);
+```
+
+**After**
+
+```php
+use Guzzle\Plugin\Backoff\BackoffPlugin;
+use Guzzle\Plugin\Backoff\HttpBackoffStrategy;
+
+// Use convenient factory method instead -- see implementation for ideas of what
+// you can do with chaining backoff strategies
+$backoffPlugin = BackoffPlugin::getExponentialBackoff($maxRetries, array_merge(
+ HttpBackoffStrategy::getDefaultFailureCodes(), array(429)
+ ));
+$client->addSubscriber($backoffPlugin);
+```
+
+### Known Issues
+
+#### [BUG] Accept-Encoding header behavior changed unintentionally.
+
+(See #217) (Fixed in 09daeb8c666fb44499a0646d655a8ae36456575e)
+
+In version 2.8 setting the `Accept-Encoding` header would set the CURLOPT_ENCODING option, which permitted cURL to
+properly handle gzip/deflate compressed responses from the server. In versions affected by this bug this does not happen.
+See issue #217 for a workaround, or use a version containing the fix.
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/composer.json b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/composer.json
new file mode 100644
index 0000000000..cbede149ac
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/composer.json
@@ -0,0 +1,131 @@
+{
+ "name": "guzzlehttp/guzzle",
+ "description": "Guzzle is a PHP HTTP client library",
+ "keywords": [
+ "framework",
+ "http",
+ "rest",
+ "web service",
+ "curl",
+ "client",
+ "HTTP client",
+ "PSR-7",
+ "PSR-18"
+ ],
+ "license": "MIT",
+ "authors": [
+ {
+ "name": "Graham Campbell",
+ "email": "hello@gjcampbell.co.uk",
+ "homepage": "https://github.com/GrahamCampbell"
+ },
+ {
+ "name": "Michael Dowling",
+ "email": "mtdowling@gmail.com",
+ "homepage": "https://github.com/mtdowling"
+ },
+ {
+ "name": "Jeremy Lindblom",
+ "email": "jeremeamia@gmail.com",
+ "homepage": "https://github.com/jeremeamia"
+ },
+ {
+ "name": "George Mponos",
+ "email": "gmponos@gmail.com",
+ "homepage": "https://github.com/gmponos"
+ },
+ {
+ "name": "Tobias Nyholm",
+ "email": "tobias.nyholm@gmail.com",
+ "homepage": "https://github.com/Nyholm"
+ },
+ {
+ "name": "Márk Sági-Kazár",
+ "email": "mark.sagikazar@gmail.com",
+ "homepage": "https://github.com/sagikazarmark"
+ },
+ {
+ "name": "Tobias Schultze",
+ "email": "webmaster@tubo-world.de",
+ "homepage": "https://github.com/Tobion"
+ }
+ ],
+ "repositories": [
+ {
+ "type": "package",
+ "package": {
+ "name": "guzzle/client-integration-tests",
+ "version": "v3.0.2",
+ "dist": {
+ "url": "https://codeload.github.com/guzzle/client-integration-tests/zip/2c025848417c1135031fdf9c728ee53d0a7ceaee",
+ "type": "zip"
+ },
+ "require": {
+ "php": "^7.2.5 || ^8.0",
+ "phpunit/phpunit": "^7.5.20 || ^8.5.8 || ^9.3.11",
+ "php-http/message": "^1.0 || ^2.0",
+ "guzzlehttp/psr7": "^1.7 || ^2.0",
+ "th3n3rd/cartesian-product": "^0.3"
+ },
+ "autoload": {
+ "psr-4": {
+ "Http\\Client\\Tests\\": "src/"
+ }
+ },
+ "bin": [
+ "bin/http_test_server"
+ ]
+ }
+ }
+ ],
+ "require": {
+ "php": "^7.2.5 || ^8.0",
+ "ext-json": "*",
+ "guzzlehttp/promises": "^1.5.3 || ^2.0.3",
+ "guzzlehttp/psr7": "^2.7.0",
+ "psr/http-client": "^1.0",
+ "symfony/deprecation-contracts": "^2.2 || ^3.0"
+ },
+ "provide": {
+ "psr/http-client-implementation": "1.0"
+ },
+ "require-dev": {
+ "ext-curl": "*",
+ "bamarni/composer-bin-plugin": "^1.8.2",
+ "guzzle/client-integration-tests": "3.0.2",
+ "php-http/message-factory": "^1.1",
+ "phpunit/phpunit": "^8.5.39 || ^9.6.20",
+ "psr/log": "^1.1 || ^2.0 || ^3.0"
+ },
+ "suggest": {
+ "ext-curl": "Required for CURL handler support",
+ "ext-intl": "Required for Internationalized Domain Name (IDN) support",
+ "psr/log": "Required for using the Log middleware"
+ },
+ "config": {
+ "allow-plugins": {
+ "bamarni/composer-bin-plugin": true
+ },
+ "preferred-install": "dist",
+ "sort-packages": true
+ },
+ "extra": {
+ "bamarni-bin": {
+ "bin-links": true,
+ "forward-command": false
+ }
+ },
+ "autoload": {
+ "psr-4": {
+ "GuzzleHttp\\": "src/"
+ },
+ "files": [
+ "src/functions_include.php"
+ ]
+ },
+ "autoload-dev": {
+ "psr-4": {
+ "GuzzleHttp\\Tests\\": "tests/"
+ }
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/Makefile b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/Makefile
new file mode 100644
index 0000000000..d92e03f95e
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/Makefile
@@ -0,0 +1,153 @@
+# Makefile for Sphinx documentation
+#
+
+# You can set these variables from the command line.
+SPHINXOPTS =
+SPHINXBUILD = sphinx-build
+PAPER =
+BUILDDIR = _build
+
+# Internal variables.
+PAPEROPT_a4 = -D latex_paper_size=a4
+PAPEROPT_letter = -D latex_paper_size=letter
+ALLSPHINXOPTS = -d $(BUILDDIR)/doctrees $(PAPEROPT_$(PAPER)) $(SPHINXOPTS) .
+# the i18n builder cannot share the environment and doctrees with the others
+I18NSPHINXOPTS = $(PAPEROPT_$(PAPER)) $(SPHINXOPTS) .
+
+.PHONY: help clean html dirhtml singlehtml pickle json htmlhelp qthelp devhelp epub latex latexpdf text man changes linkcheck doctest gettext
+
+help:
+ @echo "Please use \`make ' where is one of"
+ @echo " html to make standalone HTML files"
+ @echo " dirhtml to make HTML files named index.html in directories"
+ @echo " singlehtml to make a single large HTML file"
+ @echo " pickle to make pickle files"
+ @echo " json to make JSON files"
+ @echo " htmlhelp to make HTML files and a HTML help project"
+ @echo " qthelp to make HTML files and a qthelp project"
+ @echo " devhelp to make HTML files and a Devhelp project"
+ @echo " epub to make an epub"
+ @echo " latex to make LaTeX files, you can set PAPER=a4 or PAPER=letter"
+ @echo " latexpdf to make LaTeX files and run them through pdflatex"
+ @echo " text to make text files"
+ @echo " man to make manual pages"
+ @echo " texinfo to make Texinfo files"
+ @echo " info to make Texinfo files and run them through makeinfo"
+ @echo " gettext to make PO message catalogs"
+ @echo " changes to make an overview of all changed/added/deprecated items"
+ @echo " linkcheck to check all external links for integrity"
+ @echo " doctest to run all doctests embedded in the documentation (if enabled)"
+
+clean:
+ -rm -rf $(BUILDDIR)/*
+
+html:
+ $(SPHINXBUILD) -b html $(ALLSPHINXOPTS) $(BUILDDIR)/html
+ @echo
+ @echo "Build finished. The HTML pages are in $(BUILDDIR)/html."
+
+dirhtml:
+ $(SPHINXBUILD) -b dirhtml $(ALLSPHINXOPTS) $(BUILDDIR)/dirhtml
+ @echo
+ @echo "Build finished. The HTML pages are in $(BUILDDIR)/dirhtml."
+
+singlehtml:
+ $(SPHINXBUILD) -b singlehtml $(ALLSPHINXOPTS) $(BUILDDIR)/singlehtml
+ @echo
+ @echo "Build finished. The HTML page is in $(BUILDDIR)/singlehtml."
+
+pickle:
+ $(SPHINXBUILD) -b pickle $(ALLSPHINXOPTS) $(BUILDDIR)/pickle
+ @echo
+ @echo "Build finished; now you can process the pickle files."
+
+json:
+ $(SPHINXBUILD) -b json $(ALLSPHINXOPTS) $(BUILDDIR)/json
+ @echo
+ @echo "Build finished; now you can process the JSON files."
+
+htmlhelp:
+ $(SPHINXBUILD) -b htmlhelp $(ALLSPHINXOPTS) $(BUILDDIR)/htmlhelp
+ @echo
+ @echo "Build finished; now you can run HTML Help Workshop with the" \
+ ".hhp project file in $(BUILDDIR)/htmlhelp."
+
+qthelp:
+ $(SPHINXBUILD) -b qthelp $(ALLSPHINXOPTS) $(BUILDDIR)/qthelp
+ @echo
+ @echo "Build finished; now you can run "qcollectiongenerator" with the" \
+ ".qhcp project file in $(BUILDDIR)/qthelp, like this:"
+ @echo "# qcollectiongenerator $(BUILDDIR)/qthelp/Guzzle.qhcp"
+ @echo "To view the help file:"
+ @echo "# assistant -collectionFile $(BUILDDIR)/qthelp/Guzzle.qhc"
+
+devhelp:
+ $(SPHINXBUILD) -b devhelp $(ALLSPHINXOPTS) $(BUILDDIR)/devhelp
+ @echo
+ @echo "Build finished."
+ @echo "To view the help file:"
+ @echo "# mkdir -p $$HOME/.local/share/devhelp/Guzzle"
+ @echo "# ln -s $(BUILDDIR)/devhelp $$HOME/.local/share/devhelp/Guzzle"
+ @echo "# devhelp"
+
+epub:
+ $(SPHINXBUILD) -b epub $(ALLSPHINXOPTS) $(BUILDDIR)/epub
+ @echo
+ @echo "Build finished. The epub file is in $(BUILDDIR)/epub."
+
+latex:
+ $(SPHINXBUILD) -b latex $(ALLSPHINXOPTS) $(BUILDDIR)/latex
+ @echo
+ @echo "Build finished; the LaTeX files are in $(BUILDDIR)/latex."
+ @echo "Run \`make' in that directory to run these through (pdf)latex" \
+ "(use \`make latexpdf' here to do that automatically)."
+
+latexpdf:
+ $(SPHINXBUILD) -b latex $(ALLSPHINXOPTS) $(BUILDDIR)/latex
+ @echo "Running LaTeX files through pdflatex..."
+ $(MAKE) -C $(BUILDDIR)/latex all-pdf
+ @echo "pdflatex finished; the PDF files are in $(BUILDDIR)/latex."
+
+text:
+ $(SPHINXBUILD) -b text $(ALLSPHINXOPTS) $(BUILDDIR)/text
+ @echo
+ @echo "Build finished. The text files are in $(BUILDDIR)/text."
+
+man:
+ $(SPHINXBUILD) -b man $(ALLSPHINXOPTS) $(BUILDDIR)/man
+ @echo
+ @echo "Build finished. The manual pages are in $(BUILDDIR)/man."
+
+texinfo:
+ $(SPHINXBUILD) -b texinfo $(ALLSPHINXOPTS) $(BUILDDIR)/texinfo
+ @echo
+ @echo "Build finished. The Texinfo files are in $(BUILDDIR)/texinfo."
+ @echo "Run \`make' in that directory to run these through makeinfo" \
+ "(use \`make info' here to do that automatically)."
+
+info:
+ $(SPHINXBUILD) -b texinfo $(ALLSPHINXOPTS) $(BUILDDIR)/texinfo
+ @echo "Running Texinfo files through makeinfo..."
+ make -C $(BUILDDIR)/texinfo info
+ @echo "makeinfo finished; the Info files are in $(BUILDDIR)/texinfo."
+
+gettext:
+ $(SPHINXBUILD) -b gettext $(I18NSPHINXOPTS) $(BUILDDIR)/locale
+ @echo
+ @echo "Build finished. The message catalogs are in $(BUILDDIR)/locale."
+
+changes:
+ $(SPHINXBUILD) -b changes $(ALLSPHINXOPTS) $(BUILDDIR)/changes
+ @echo
+ @echo "The overview file is in $(BUILDDIR)/changes."
+
+linkcheck:
+ $(SPHINXBUILD) -b linkcheck $(ALLSPHINXOPTS) $(BUILDDIR)/linkcheck
+ @echo
+ @echo "Link check complete; look for any errors in the above output " \
+ "or in $(BUILDDIR)/linkcheck/output.txt."
+
+doctest:
+ $(SPHINXBUILD) -b doctest $(ALLSPHINXOPTS) $(BUILDDIR)/doctest
+ @echo "Testing of doctests in the sources finished, look at the " \
+ "results in $(BUILDDIR)/doctest/output.txt."
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/_static/guzzle-icon.png b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/_static/guzzle-icon.png
new file mode 100644
index 0000000000..f1017f7e60
Binary files /dev/null and b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/_static/guzzle-icon.png differ
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/_static/logo.png b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/_static/logo.png
new file mode 100644
index 0000000000..965a4ef413
Binary files /dev/null and b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/_static/logo.png differ
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/conf.py b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/conf.py
new file mode 100644
index 0000000000..c271a62722
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/conf.py
@@ -0,0 +1,68 @@
+import sys, os
+from sphinx.highlighting import lexers
+from pygments.lexers.web import PhpLexer
+
+
+lexers['php'] = PhpLexer(startinline=True, linenos=1)
+lexers['php-annotations'] = PhpLexer(startinline=True, linenos=1)
+primary_domain = 'php'
+
+extensions = []
+templates_path = ['_templates']
+source_suffix = '.rst'
+master_doc = 'index'
+project = u'Guzzle'
+copyright = u'2015, Michael Dowling'
+version = '7'
+html_title = "Guzzle Documentation"
+html_short_title = "Guzzle 7"
+
+exclude_patterns = ['_build']
+html_static_path = ['_static']
+
+##### Guzzle sphinx theme
+
+import guzzle_sphinx_theme
+html_translator_class = 'guzzle_sphinx_theme.HTMLTranslator'
+html_theme_path = guzzle_sphinx_theme.html_theme_path()
+html_theme = 'guzzle_sphinx_theme'
+
+# Custom sidebar templates, maps document names to template names.
+html_sidebars = {
+ '**': ['logo-text.html', 'globaltoc.html', 'searchbox.html']
+}
+
+# Register the theme as an extension to generate a sitemap.xml
+extensions.append("guzzle_sphinx_theme")
+
+# Guzzle theme options (see theme.conf for more information)
+html_theme_options = {
+
+ # Set the path to a special layout to include for the homepage
+ # "index_template": "homepage.html",
+
+ # Allow a separate homepage from the master_doc
+ # homepage = index
+
+ # Set the name of the project to appear in the nav menu
+ # "project_nav_name": "Guzzle",
+
+ # Set your Disqus short name to enable comments
+ # "disqus_comments_shortname": "my_disqus_comments_short_name",
+
+ # Set you GA account ID to enable tracking
+ # "google_analytics_account": "my_ga_account",
+
+ # Path to a touch icon
+ # "touch_icon": "",
+
+ # Specify a base_url used to generate sitemap.xml links. If not
+ # specified, then no sitemap will be built.
+ "base_url": "http://guzzlephp.org"
+
+ # Allow the "Table of Contents" page to be defined separately from "master_doc"
+ # tocpage = Contents
+
+ # Allow the project link to be overriden to a custom URL.
+ # projectlink = http://myproject.url
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/faq.rst b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/faq.rst
new file mode 100644
index 0000000000..1e93699f78
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/faq.rst
@@ -0,0 +1,193 @@
+===
+FAQ
+===
+
+Does Guzzle require cURL?
+=========================
+
+No. Guzzle can use any HTTP handler to send requests. This means that Guzzle
+can be used with cURL, PHP's stream wrapper, sockets, and non-blocking libraries
+like `React `_. You just need to configure an HTTP handler
+to use a different method of sending requests.
+
+.. note::
+
+ Guzzle has historically only utilized cURL to send HTTP requests. cURL is
+ an amazing HTTP client (arguably the best), and Guzzle will continue to use
+ it by default when it is available. It is rare, but some developers don't
+ have cURL installed on their systems or run into version specific issues.
+ By allowing swappable HTTP handlers, Guzzle is now much more customizable
+ and able to adapt to fit the needs of more developers.
+
+
+Can Guzzle send asynchronous requests?
+======================================
+
+Yes. You can use the ``requestAsync``, ``sendAsync``, ``getAsync``,
+``headAsync``, ``putAsync``, ``postAsync``, ``deleteAsync``, and ``patchAsync``
+methods of a client to send an asynchronous request. The client will return a
+``GuzzleHttp\Promise\PromiseInterface`` object. You can chain ``then``
+functions off of the promise.
+
+.. code-block:: php
+
+ $promise = $client->requestAsync('GET', 'http://httpbin.org/get');
+ $promise->then(function ($response) {
+ echo 'Got a response! ' . $response->getStatusCode();
+ });
+
+You can force an asynchronous response to complete using the ``wait()`` method
+of the returned promise.
+
+.. code-block:: php
+
+ $promise = $client->requestAsync('GET', 'http://httpbin.org/get');
+ $response = $promise->wait();
+
+
+How can I add custom cURL options?
+==================================
+
+cURL offers a huge number of `customizable options `_.
+While Guzzle normalizes many of these options across different handlers, there
+are times when you need to set custom cURL options. This can be accomplished
+by passing an associative array of cURL settings in the **curl** key of a
+request.
+
+For example, let's say you need to customize the outgoing network interface
+used with a client.
+
+.. code-block:: php
+
+ $client->request('GET', '/', [
+ 'curl' => [
+ CURLOPT_INTERFACE => 'xxx.xxx.xxx.xxx'
+ ]
+ ]);
+
+If you use asynchronous requests with cURL multi handler and want to tweak it,
+additional options can be specified as an associative array in the
+**options** key of the ``CurlMultiHandler`` constructor.
+
+.. code-block:: php
+
+ use GuzzleHttp\Client;
+ use GuzzleHttp\HandlerStack;
+ use GuzzleHttp\Handler\CurlMultiHandler;
+
+ $client = new Client(['handler' => HandlerStack::create(new CurlMultiHandler([
+ 'options' => [
+ CURLMOPT_MAX_TOTAL_CONNECTIONS => 50,
+ CURLMOPT_MAX_HOST_CONNECTIONS => 5,
+ ]
+ ]))]);
+
+
+How can I add custom stream context options?
+============================================
+
+You can pass custom `stream context options `_
+using the **stream_context** key of the request option. The **stream_context**
+array is an associative array where each key is a PHP transport, and each value
+is an associative array of transport options.
+
+For example, let's say you need to customize the outgoing network interface
+used with a client and allow self-signed certificates.
+
+.. code-block:: php
+
+ $client->request('GET', '/', [
+ 'stream' => true,
+ 'stream_context' => [
+ 'ssl' => [
+ 'allow_self_signed' => true
+ ],
+ 'socket' => [
+ 'bindto' => 'xxx.xxx.xxx.xxx'
+ ]
+ ]
+ ]);
+
+
+Why am I getting an SSL verification error?
+===========================================
+
+You need to specify the path on disk to the CA bundle used by Guzzle for
+verifying the peer certificate. See :ref:`verify-option`.
+
+
+What is this Maximum function nesting error?
+============================================
+
+ Maximum function nesting level of '100' reached, aborting
+
+You could run into this error if you have the XDebug extension installed and
+you execute a lot of requests in callbacks. This error message comes
+specifically from the XDebug extension. PHP itself does not have a function
+nesting limit. Change this setting in your php.ini to increase the limit::
+
+ xdebug.max_nesting_level = 1000
+
+
+Why am I getting a 417 error response?
+======================================
+
+This can occur for a number of reasons, but if you are sending PUT, POST, or
+PATCH requests with an ``Expect: 100-Continue`` header, a server that does not
+support this header will return a 417 response. You can work around this by
+setting the ``expect`` request option to ``false``:
+
+.. code-block:: php
+
+ $client = new GuzzleHttp\Client();
+
+ // Disable the expect header on a single request
+ $response = $client->request('PUT', '/', ['expect' => false]);
+
+ // Disable the expect header on all client requests
+ $client = new GuzzleHttp\Client(['expect' => false]);
+
+How can I track redirected requests?
+====================================
+
+You can enable tracking of redirected URIs and status codes via the
+`track_redirects` option. Each redirected URI and status code will be stored in the
+``X-Guzzle-Redirect-History`` and the ``X-Guzzle-Redirect-Status-History``
+header respectively.
+
+The initial request's URI and the final status code will be excluded from the results.
+With this in mind you should be able to easily track a request's full redirect path.
+
+For example, let's say you need to track redirects and provide both results
+together in a single report:
+
+.. code-block:: php
+
+ // First you configure Guzzle with redirect tracking and make a request
+ $client = new Client([
+ RequestOptions::ALLOW_REDIRECTS => [
+ 'max' => 10, // allow at most 10 redirects.
+ 'strict' => true, // use "strict" RFC compliant redirects.
+ 'referer' => true, // add a Referer header
+ 'track_redirects' => true,
+ ],
+ ]);
+ $initialRequest = '/redirect/3'; // Store the request URI for later use
+ $response = $client->request('GET', $initialRequest); // Make your request
+
+ // Retrieve both Redirect History headers
+ $redirectUriHistory = $response->getHeader('X-Guzzle-Redirect-History')[0]; // retrieve Redirect URI history
+ $redirectCodeHistory = $response->getHeader('X-Guzzle-Redirect-Status-History')[0]; // retrieve Redirect HTTP Status history
+
+ // Add the initial URI requested to the (beginning of) URI history
+ array_unshift($redirectUriHistory, $initialRequest);
+
+ // Add the final HTTP status code to the end of HTTP response history
+ array_push($redirectCodeHistory, $response->getStatusCode());
+
+ // (Optional) Combine the items of each array into a single result set
+ $fullRedirectReport = [];
+ foreach ($redirectUriHistory as $key => $value) {
+ $fullRedirectReport[$key] = ['location' => $value, 'code' => $redirectCodeHistory[$key]];
+ }
+ echo json_encode($fullRedirectReport);
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/handlers-and-middleware.rst b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/handlers-and-middleware.rst
new file mode 100644
index 0000000000..9f1473e4f6
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/handlers-and-middleware.rst
@@ -0,0 +1,304 @@
+=======================
+Handlers and Middleware
+=======================
+
+Guzzle clients use a handler and middleware system to send HTTP requests.
+
+Handlers
+========
+
+A handler function accepts a ``Psr\Http\Message\RequestInterface`` and array of
+request options and returns a ``GuzzleHttp\Promise\PromiseInterface`` that is
+fulfilled with a ``Psr\Http\Message\ResponseInterface`` or rejected with an
+exception.
+
+You can provide a custom handler to a client using the ``handler`` option of
+a client constructor. It is important to understand that several request
+options used by Guzzle require that specific middlewares wrap the handler used
+by the client. You can ensure that the handler you provide to a client uses the
+default middlewares by wrapping the handler in the
+``GuzzleHttp\HandlerStack::create(callable $handler = null)`` static method.
+
+.. code-block:: php
+
+ use GuzzleHttp\Client;
+ use GuzzleHttp\HandlerStack;
+ use GuzzleHttp\Handler\CurlHandler;
+
+ $handler = new CurlHandler();
+ $stack = HandlerStack::create($handler); // Wrap w/ middleware
+ $client = new Client(['handler' => $stack]);
+
+The ``create`` method adds default handlers to the ``HandlerStack``. When the
+``HandlerStack`` is resolved, the handlers will execute in the following order:
+
+1. Sending request:
+
+ 1. ``http_errors`` - No op when sending a request. The response status code
+ is checked in the response processing when returning a response promise up
+ the stack.
+ 2. ``allow_redirects`` - No op when sending a request. Following redirects
+ occurs when a response promise is being returned up the stack.
+ 3. ``cookies`` - Adds cookies to requests.
+ 4. ``prepare_body`` - The body of an HTTP request will be prepared (e.g.,
+ add default headers like Content-Length, Content-Type, etc.).
+ 5.
+
+2. Processing response:
+
+ 1. ``prepare_body`` - no op on response processing.
+ 2. ``cookies`` - extracts response cookies into the cookie jar.
+ 3. ``allow_redirects`` - Follows redirects.
+ 4. ``http_errors`` - throws exceptions when the response status code ``>=``
+ 400.
+
+When provided no ``$handler`` argument, ``GuzzleHttp\HandlerStack::create()``
+will choose the most appropriate handler based on the extensions available on
+your system.
+
+.. important::
+
+ The handler provided to a client determines how request options are applied
+ and utilized for each request sent by a client. For example, if you do not
+ have a cookie middleware associated with a client, then setting the
+ ``cookies`` request option will have no effect on the request.
+
+
+Middleware
+==========
+
+Middleware augments the functionality of handlers by invoking them in the
+process of generating responses. Middleware is implemented as a higher order
+function that takes the following form.
+
+.. code-block:: php
+
+ use Psr\Http\Message\RequestInterface;
+
+ function my_middleware()
+ {
+ return function (callable $handler) {
+ return function (RequestInterface $request, array $options) use ($handler) {
+ return $handler($request, $options);
+ };
+ };
+ }
+
+Middleware functions return a function that accepts the next handler to invoke.
+This returned function then returns another function that acts as a composed
+handler-- it accepts a request and options, and returns a promise that is
+fulfilled with a response. Your composed middleware can modify the request,
+add custom request options, and modify the promise returned by the downstream
+handler.
+
+Here's an example of adding a header to each request.
+
+.. code-block:: php
+
+ use Psr\Http\Message\RequestInterface;
+
+ function add_header($header, $value)
+ {
+ return function (callable $handler) use ($header, $value) {
+ return function (
+ RequestInterface $request,
+ array $options
+ ) use ($handler, $header, $value) {
+ $request = $request->withHeader($header, $value);
+ return $handler($request, $options);
+ };
+ };
+ }
+
+Once a middleware has been created, you can add it to a client by either
+wrapping the handler used by the client or by decorating a handler stack.
+
+.. code-block:: php
+
+ use GuzzleHttp\HandlerStack;
+ use GuzzleHttp\Handler\CurlHandler;
+ use GuzzleHttp\Client;
+
+ $stack = new HandlerStack();
+ $stack->setHandler(new CurlHandler());
+ $stack->push(add_header('X-Foo', 'bar'));
+ $client = new Client(['handler' => $stack]);
+
+Now when you send a request, the client will use a handler composed with your
+added middleware, adding a header to each request.
+
+Here's an example of creating a middleware that modifies the response of the
+downstream handler. This example adds a header to the response.
+
+.. code-block:: php
+
+ use Psr\Http\Message\RequestInterface;
+ use Psr\Http\Message\ResponseInterface;
+ use GuzzleHttp\HandlerStack;
+ use GuzzleHttp\Handler\CurlHandler;
+ use GuzzleHttp\Client;
+
+ function add_response_header($header, $value)
+ {
+ return function (callable $handler) use ($header, $value) {
+ return function (
+ RequestInterface $request,
+ array $options
+ ) use ($handler, $header, $value) {
+ $promise = $handler($request, $options);
+ return $promise->then(
+ function (ResponseInterface $response) use ($header, $value) {
+ return $response->withHeader($header, $value);
+ }
+ );
+ };
+ };
+ }
+
+ $stack = new HandlerStack();
+ $stack->setHandler(new CurlHandler());
+ $stack->push(add_response_header('X-Foo', 'bar'));
+ $client = new Client(['handler' => $stack]);
+
+Creating a middleware that modifies a request is made much simpler using the
+``GuzzleHttp\Middleware::mapRequest()`` middleware. This middleware accepts
+a function that takes the request argument and returns the request to send.
+
+.. code-block:: php
+
+ use Psr\Http\Message\RequestInterface;
+ use GuzzleHttp\HandlerStack;
+ use GuzzleHttp\Handler\CurlHandler;
+ use GuzzleHttp\Client;
+ use GuzzleHttp\Middleware;
+
+ $stack = new HandlerStack();
+ $stack->setHandler(new CurlHandler());
+
+ $stack->push(Middleware::mapRequest(function (RequestInterface $request) {
+ return $request->withHeader('X-Foo', 'bar');
+ }));
+
+ $client = new Client(['handler' => $stack]);
+
+Modifying a response is also much simpler using the
+``GuzzleHttp\Middleware::mapResponse()`` middleware.
+
+.. code-block:: php
+
+ use Psr\Http\Message\ResponseInterface;
+ use GuzzleHttp\HandlerStack;
+ use GuzzleHttp\Handler\CurlHandler;
+ use GuzzleHttp\Client;
+ use GuzzleHttp\Middleware;
+
+ $stack = new HandlerStack();
+ $stack->setHandler(new CurlHandler());
+
+ $stack->push(Middleware::mapResponse(function (ResponseInterface $response) {
+ return $response->withHeader('X-Foo', 'bar');
+ }));
+
+ $client = new Client(['handler' => $stack]);
+
+
+HandlerStack
+============
+
+A handler stack represents a stack of middleware to apply to a base handler
+function. You can push middleware to the stack to add to the top of the stack,
+and unshift middleware onto the stack to add to the bottom of the stack. When
+the stack is resolved, the handler is pushed onto the stack. Each value is
+then popped off of the stack, wrapping the previous value popped off of the
+stack.
+
+.. code-block:: php
+
+ use GuzzleHttp\Client;
+ use GuzzleHttp\HandlerStack;
+ use GuzzleHttp\Middleware;
+ use GuzzleHttp\Utils;
+ use Psr\Http\Message\RequestInterface;
+
+ $stack = new HandlerStack();
+ $stack->setHandler(Utils::chooseHandler());
+
+ $stack->push(Middleware::mapRequest(function (RequestInterface $r) {
+ echo 'A';
+ return $r;
+ }));
+
+ $stack->push(Middleware::mapRequest(function (RequestInterface $r) {
+ echo 'B';
+ return $r;
+ }));
+
+ $stack->push(Middleware::mapRequest(function (RequestInterface $r) {
+ echo 'C';
+ return $r;
+ }));
+
+ $client->request('GET', 'http://httpbin.org/');
+ // echoes 'ABC';
+
+ $stack->unshift(Middleware::mapRequest(function (RequestInterface $r) {
+ echo '0';
+ return $r;
+ }));
+
+ $client = new Client(['handler' => $stack]);
+ $client->request('GET', 'http://httpbin.org/');
+ // echoes '0ABC';
+
+You can give middleware a name, which allows you to add middleware before
+other named middleware, after other named middleware, or remove middleware
+by name.
+
+.. code-block:: php
+
+ use Psr\Http\Message\RequestInterface;
+ use GuzzleHttp\Middleware;
+
+ // Add a middleware with a name
+ $stack->push(Middleware::mapRequest(function (RequestInterface $r) {
+ return $r->withHeader('X-Foo', 'Bar');
+ }, 'add_foo'));
+
+ // Add a middleware before a named middleware (unshift before).
+ $stack->before('add_foo', Middleware::mapRequest(function (RequestInterface $r) {
+ return $r->withHeader('X-Baz', 'Qux');
+ }, 'add_baz'));
+
+ // Add a middleware after a named middleware (pushed after).
+ $stack->after('add_baz', Middleware::mapRequest(function (RequestInterface $r) {
+ return $r->withHeader('X-Lorem', 'Ipsum');
+ }));
+
+ // Remove a middleware by name
+ $stack->remove('add_foo');
+
+
+Creating a Handler
+==================
+
+As stated earlier, a handler is a function accepts a
+``Psr\Http\Message\RequestInterface`` and array of request options and returns
+a ``GuzzleHttp\Promise\PromiseInterface`` that is fulfilled with a
+``Psr\Http\Message\ResponseInterface`` or rejected with an exception.
+
+A handler is responsible for applying the following :doc:`request-options`.
+These request options are a subset of request options called
+"transfer options".
+
+- :ref:`cert-option`
+- :ref:`connect_timeout-option`
+- :ref:`debug-option`
+- :ref:`delay-option`
+- :ref:`decode_content-option`
+- :ref:`expect-option`
+- :ref:`proxy-option`
+- :ref:`sink-option`
+- :ref:`timeout-option`
+- :ref:`ssl_key-option`
+- :ref:`stream-option`
+- :ref:`verify-option`
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/index.rst b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/index.rst
new file mode 100644
index 0000000000..fba46f064e
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/index.rst
@@ -0,0 +1,54 @@
+.. title:: Guzzle, PHP HTTP client
+
+====================
+Guzzle Documentation
+====================
+
+Guzzle is a PHP HTTP client that makes it easy to send HTTP requests and
+trivial to integrate with web services.
+
+- Simple interface for building query strings, POST requests, streaming large
+ uploads, streaming large downloads, using HTTP cookies, uploading JSON data,
+ etc...
+- Can send both synchronous and asynchronous requests using the same interface.
+- Uses PSR-7 interfaces for requests, responses, and streams. This allows you
+ to utilize other PSR-7 compatible libraries with Guzzle.
+- Abstracts away the underlying HTTP transport, allowing you to write
+ environment and transport agnostic code; i.e., no hard dependency on cURL,
+ PHP streams, sockets, or non-blocking event loops.
+- Middleware system allows you to augment and compose client behavior.
+
+.. code-block:: php
+
+ $client = new GuzzleHttp\Client();
+ $res = $client->request('GET', 'https://api.github.com/user', [
+ 'auth' => ['user', 'pass']
+ ]);
+ echo $res->getStatusCode();
+ // "200"
+ echo $res->getHeader('content-type')[0];
+ // 'application/json; charset=utf8'
+ echo $res->getBody();
+ // {"type":"User"...'
+
+ // Send an asynchronous request.
+ $request = new \GuzzleHttp\Psr7\Request('GET', 'http://httpbin.org');
+ $promise = $client->sendAsync($request)->then(function ($response) {
+ echo 'I completed! ' . $response->getBody();
+ });
+ $promise->wait();
+
+
+User Guide
+==========
+
+.. toctree::
+ :maxdepth: 3
+
+ overview
+ quickstart
+ request-options
+ psr7
+ handlers-and-middleware
+ testing
+ faq
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/overview.rst b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/overview.rst
new file mode 100644
index 0000000000..1e7c729073
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/overview.rst
@@ -0,0 +1,169 @@
+========
+Overview
+========
+
+Requirements
+============
+
+#. PHP 7.2.5
+#. To use the PHP stream handler, ``allow_url_fopen`` must be enabled in your
+ system's php.ini.
+#. To use the cURL handler, you must have a recent version of cURL >= 7.19.4
+ compiled with OpenSSL and zlib.
+
+.. note::
+
+ Guzzle no longer requires cURL in order to send HTTP requests. Guzzle will
+ use the PHP stream wrapper to send HTTP requests if cURL is not installed.
+ Alternatively, you can provide your own HTTP handler used to send requests.
+ Keep in mind that cURL is still required for sending concurrent requests.
+
+
+.. _installation:
+
+
+Installation
+============
+
+The recommended way to install Guzzle is with
+`Composer `_. Composer is a dependency management tool
+for PHP that allows you to declare the dependencies your project needs and
+installs them into your project.
+
+.. code-block:: bash
+
+ # Install Composer
+ curl -sS https://getcomposer.org/installer | php
+
+You can add Guzzle as a dependency using Composer:
+
+.. code-block:: bash
+
+ composer require guzzlehttp/guzzle:^7.0
+
+Alternatively, you can specify Guzzle as a dependency in your project's
+existing composer.json file:
+
+.. code-block:: js
+
+ {
+ "require": {
+ "guzzlehttp/guzzle": "^7.0"
+ }
+ }
+
+After installing, you need to require Composer's autoloader:
+
+.. code-block:: php
+
+ require 'vendor/autoload.php';
+
+You can find out more on how to install Composer, configure autoloading, and
+other best-practices for defining dependencies at `getcomposer.org `_.
+
+
+Bleeding edge
+-------------
+
+During your development, you can keep up with the latest changes on the master
+branch by setting the version requirement for Guzzle to ``^7.0@dev``.
+
+.. code-block:: js
+
+ {
+ "require": {
+ "guzzlehttp/guzzle": "^7.0@dev"
+ }
+ }
+
+
+Upgrading
+=========
+The git repository contains an `upgrade guide`__ that details what changed
+between the major versions.
+
+__ https://github.com/guzzle/guzzle/blob/master/UPGRADING.md
+
+
+License
+=======
+
+Licensed using the `MIT license `_.
+
+ Copyright (c) 2015 Michael Dowling
+
+ Permission is hereby granted, free of charge, to any person obtaining a copy
+ of this software and associated documentation files (the "Software"), to deal
+ in the Software without restriction, including without limitation the rights
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
+ copies of the Software, and to permit persons to whom the Software is
+ furnished to do so, subject to the following conditions:
+
+ The above copyright notice and this permission notice shall be included in
+ all copies or substantial portions of the Software.
+
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
+ THE SOFTWARE.
+
+
+Contributing
+============
+
+
+Guidelines
+----------
+
+1. Guzzle utilizes PSR-1, PSR-2, PSR-4, and PSR-7.
+2. Guzzle is meant to be lean and fast with very few dependencies. This means
+ that not every feature request will be accepted.
+3. Guzzle has a minimum PHP version requirement of PHP 7.2. Pull requests must
+ not require a PHP version greater than PHP 7.2 unless the feature is only
+ utilized conditionally and the file can be parsed by PHP 7.2.
+4. All pull requests must include unit tests to ensure the change works as
+ expected and to prevent regressions.
+
+
+Running the tests
+-----------------
+
+In order to contribute, you'll need to checkout the source from GitHub and
+install Guzzle's dependencies using Composer:
+
+.. code-block:: bash
+
+ git clone https://github.com/guzzle/guzzle.git
+ cd guzzle && composer install
+
+Guzzle is unit tested with PHPUnit. Run the tests using the Makefile:
+
+.. code-block:: bash
+
+ make test
+
+.. note::
+
+ You'll need to install node.js v8 or newer in order to perform integration
+ tests on Guzzle's HTTP handlers.
+
+
+Reporting a security vulnerability
+==================================
+
+We want to ensure that Guzzle is a secure HTTP client library for everyone. If
+you've discovered a security vulnerability in Guzzle, we appreciate your help
+in disclosing it to us in a `responsible manner `_.
+
+Publicly disclosing a vulnerability can put the entire community at risk. If
+you've discovered a security concern, please email us at
+security@guzzlephp.org. We'll work with you to make sure that we understand the
+scope of the issue, and that we fully address your concern. We consider
+correspondence sent to security@guzzlephp.org our highest priority, and work to
+address any issues that arise as quickly as possible.
+
+After a security vulnerability has been corrected, a security hotfix release will
+be deployed as soon as possible.
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/psr7.rst b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/psr7.rst
new file mode 100644
index 0000000000..c3aa7fe2e1
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/psr7.rst
@@ -0,0 +1,456 @@
+================
+Guzzle and PSR-7
+================
+
+Guzzle utilizes PSR-7 as the HTTP message interface. This allows Guzzle to work
+with any other library that utilizes PSR-7 message interfaces.
+
+Guzzle is an HTTP client that sends HTTP requests to a server and receives HTTP
+responses. Both requests and responses are referred to as messages.
+
+Guzzle relies on the ``guzzlehttp/psr7`` Composer package for its message
+implementation of PSR-7.
+
+You can create a request using the ``GuzzleHttp\Psr7\Request`` class:
+
+.. code-block:: php
+
+ use GuzzleHttp\Psr7\Request;
+
+ $request = new Request('GET', 'http://httpbin.org/get');
+
+ // You can provide other optional constructor arguments.
+ $headers = ['X-Foo' => 'Bar'];
+ $body = 'hello!';
+ $request = new Request('PUT', 'http://httpbin.org/put', $headers, $body);
+
+You can create a response using the ``GuzzleHttp\Psr7\Response`` class:
+
+.. code-block:: php
+
+ use GuzzleHttp\Psr7\Response;
+
+ // The constructor requires no arguments.
+ $response = new Response();
+ echo $response->getStatusCode(); // 200
+ echo $response->getProtocolVersion(); // 1.1
+
+ // You can supply any number of optional arguments.
+ $status = 200;
+ $headers = ['X-Foo' => 'Bar'];
+ $body = 'hello!';
+ $protocol = '1.1';
+ $response = new Response($status, $headers, $body, $protocol);
+
+
+Headers
+=======
+
+Both request and response messages contain HTTP headers.
+
+
+Accessing Headers
+-----------------
+
+You can check if a request or response has a specific header using the
+``hasHeader()`` method.
+
+.. code-block:: php
+
+ use GuzzleHttp\Psr7;
+
+ $request = new Psr7\Request('GET', '/', ['X-Foo' => 'bar']);
+
+ if ($request->hasHeader('X-Foo')) {
+ echo 'It is there';
+ }
+
+You can retrieve all the header values as an array of strings using
+``getHeader()``.
+
+.. code-block:: php
+
+ $request->getHeader('X-Foo'); // ['bar']
+
+ // Retrieving a missing header returns an empty array.
+ $request->getHeader('X-Bar'); // []
+
+You can iterate over the headers of a message using the ``getHeaders()``
+method.
+
+.. code-block:: php
+
+ foreach ($request->getHeaders() as $name => $values) {
+ echo $name . ': ' . implode(', ', $values) . "\r\n";
+ }
+
+
+Complex Headers
+---------------
+
+Some headers contain additional key value pair information. For example, Link
+headers contain a link and several key value pairs:
+
+::
+
+ ; rel="thing"; type="image/jpeg"
+
+Guzzle provides a convenience feature that can be used to parse these types of
+headers:
+
+.. code-block:: php
+
+ use GuzzleHttp\Psr7;
+
+ $request = new Psr7\Request('GET', '/', [
+ 'Link' => '; rel="front"; type="image/jpeg"'
+ ]);
+
+ $parsed = Psr7\Header::parse($request->getHeader('Link'));
+ var_export($parsed);
+
+Will output:
+
+.. code-block:: php
+
+ array (
+ 0 =>
+ array (
+ 0 => '',
+ 'rel' => 'front',
+ 'type' => 'image/jpeg',
+ ),
+ )
+
+The result contains a hash of key value pairs. Header values that have no key
+(i.e., the link) are indexed numerically while headers parts that form a key
+value pair are added as a key value pair.
+
+
+Body
+====
+
+Both request and response messages can contain a body.
+
+You can retrieve the body of a message using the ``getBody()`` method:
+
+.. code-block:: php
+
+ $response = GuzzleHttp\get('http://httpbin.org/get');
+ echo $response->getBody();
+ // JSON string: { ... }
+
+The body used in request and response objects is a
+``Psr\Http\Message\StreamInterface``. This stream is used for both
+uploading data and downloading data. Guzzle will, by default, store the body of
+a message in a stream that uses PHP temp streams. When the size of the body
+exceeds 2 MB, the stream will automatically switch to storing data on disk
+rather than in memory (protecting your application from memory exhaustion).
+
+The easiest way to create a body for a message is using the ``streamFor``
+method from the ``GuzzleHttp\Psr7\Utils`` class --
+``Utils::streamFor``. This method accepts strings, resources,
+callables, iterators, other streamables, and returns an instance of
+``Psr\Http\Message\StreamInterface``.
+
+The body of a request or response can be cast to a string or you can read and
+write bytes off of the stream as needed.
+
+.. code-block:: php
+
+ use GuzzleHttp\Stream\Stream;
+ $response = $client->request('GET', 'http://httpbin.org/get');
+
+ echo $response->getBody()->read(4);
+ echo $response->getBody()->read(4);
+ echo $response->getBody()->read(1024);
+ var_export($response->eof());
+
+
+Requests
+========
+
+Requests are sent from a client to a server. Requests include the method to
+be applied to a resource, the identifier of the resource, and the protocol
+version to use.
+
+
+Request Methods
+---------------
+
+When creating a request, you are expected to provide the HTTP method you wish
+to perform. You can specify any method you'd like, including a custom method
+that might not be part of RFC 7231 (like "MOVE").
+
+.. code-block:: php
+
+ // Create a request using a completely custom HTTP method
+ $request = new \GuzzleHttp\Psr7\Request('MOVE', 'http://httpbin.org/move');
+
+ echo $request->getMethod();
+ // MOVE
+
+You can create and send a request using methods on a client that map to the
+HTTP method you wish to use.
+
+:GET: ``$client->get('http://httpbin.org/get', [/** options **/])``
+:POST: ``$client->post('http://httpbin.org/post', [/** options **/])``
+:HEAD: ``$client->head('http://httpbin.org/get', [/** options **/])``
+:PUT: ``$client->put('http://httpbin.org/put', [/** options **/])``
+:DELETE: ``$client->delete('http://httpbin.org/delete', [/** options **/])``
+:OPTIONS: ``$client->options('http://httpbin.org/get', [/** options **/])``
+:PATCH: ``$client->patch('http://httpbin.org/put', [/** options **/])``
+
+For example:
+
+.. code-block:: php
+
+ $response = $client->patch('http://httpbin.org/patch', ['body' => 'content']);
+
+
+Request URI
+-----------
+
+The request URI is represented by a ``Psr\Http\Message\UriInterface`` object.
+Guzzle provides an implementation of this interface using the
+``GuzzleHttp\Psr7\Uri`` class.
+
+When creating a request, you can provide the URI as a string or an instance of
+``Psr\Http\Message\UriInterface``.
+
+.. code-block:: php
+
+ $response = $client->request('GET', 'http://httpbin.org/get?q=foo');
+
+
+Scheme
+------
+
+The `scheme `_ of a
+request specifies the protocol to use when sending the request. When using
+Guzzle, the scheme can be set to "http" or "https".
+
+.. code-block:: php
+
+ $request = new Request('GET', 'http://httpbin.org');
+ echo $request->getUri()->getScheme(); // http
+ echo $request->getUri(); // http://httpbin.org
+
+
+Host
+----
+
+The host is accessible using the URI owned by the request or by accessing the
+Host header.
+
+.. code-block:: php
+
+ $request = new Request('GET', 'http://httpbin.org');
+ echo $request->getUri()->getHost(); // httpbin.org
+ echo $request->getHeader('Host'); // httpbin.org
+
+
+Port
+----
+
+No port is necessary when using the "http" or "https" schemes.
+
+.. code-block:: php
+
+ $request = new Request('GET', 'http://httpbin.org:8080');
+ echo $request->getUri()->getPort(); // 8080
+ echo $request->getUri(); // http://httpbin.org:8080
+
+
+Path
+----
+
+The path of a request is accessible via the URI object.
+
+.. code-block:: php
+
+ $request = new Request('GET', 'http://httpbin.org/get');
+ echo $request->getUri()->getPath(); // /get
+
+The contents of the path will be automatically filtered to ensure that only
+allowed characters are present in the path. Any characters that are not allowed
+in the path will be percent-encoded according to
+`RFC 3986 section 3.3 `_
+
+
+Query string
+------------
+
+The query string of a request can be accessed using the ``getQuery()`` of the
+URI object owned by the request.
+
+.. code-block:: php
+
+ $request = new Request('GET', 'http://httpbin.org/?foo=bar');
+ echo $request->getUri()->getQuery(); // foo=bar
+
+The contents of the query string will be automatically filtered to ensure that
+only allowed characters are present in the query string. Any characters that
+are not allowed in the query string will be percent-encoded according to
+`RFC 3986 section 3.4 `_
+
+
+Responses
+=========
+
+Responses are the HTTP messages a client receives from a server after sending
+an HTTP request message.
+
+
+Start-Line
+----------
+
+The start-line of a response contains the protocol and protocol version,
+status code, and reason phrase.
+
+.. code-block:: php
+
+ $client = new \GuzzleHttp\Client();
+ $response = $client->request('GET', 'http://httpbin.org/get');
+
+ echo $response->getStatusCode(); // 200
+ echo $response->getReasonPhrase(); // OK
+ echo $response->getProtocolVersion(); // 1.1
+
+
+Body
+----
+
+As described earlier, you can get the body of a response using the
+``getBody()`` method.
+
+.. code-block:: php
+
+ $body = $response->getBody();
+ echo $body;
+ // Cast to a string: { ... }
+ $body->seek(0);
+ // Rewind the body
+ $body->read(1024);
+ // Read bytes of the body
+
+
+Streams
+=======
+
+Guzzle uses PSR-7 stream objects to represent request and response message
+bodies. These stream objects allow you to work with various types of data all
+using a common interface.
+
+HTTP messages consist of a start-line, headers, and a body. The body of an HTTP
+message can be very small or extremely large. Attempting to represent the body
+of a message as a string can easily consume more memory than intended because
+the body must be stored completely in memory. Attempting to store the body of a
+request or response in memory would preclude the use of that implementation from
+being able to work with large message bodies. The StreamInterface is used in
+order to hide the implementation details of where a stream of data is read from
+or written to.
+
+The PSR-7 ``Psr\Http\Message\StreamInterface`` exposes several methods
+that enable streams to be read from, written to, and traversed effectively.
+
+Streams expose their capabilities using three methods: ``isReadable()``,
+``isWritable()``, and ``isSeekable()``. These methods can be used by stream
+collaborators to determine if a stream is capable of their requirements.
+
+Each stream instance has various capabilities: they can be read-only,
+write-only, read-write, allow arbitrary random access (seeking forwards or
+backwards to any location), or only allow sequential access (for example in the
+case of a socket or pipe).
+
+Guzzle uses the ``guzzlehttp/psr7`` package to provide stream support. More
+information on using streams, creating streams, converting streams to PHP
+stream resource, and stream decorators can be found in the
+`Guzzle PSR-7 documentation `_.
+
+
+Creating Streams
+----------------
+
+The best way to create a stream is using the ``GuzzleHttp\Psr7\Utils::streamFor``
+method. This method accepts strings, resources returned from ``fopen()``,
+an object that implements ``__toString()``, iterators, callables, and instances
+of ``Psr\Http\Message\StreamInterface``.
+
+.. code-block:: php
+
+ use GuzzleHttp\Psr7;
+
+ $stream = Psr7\Utils::streamFor('string data');
+ echo $stream;
+ // string data
+ echo $stream->read(3);
+ // str
+ echo $stream->getContents();
+ // ing data
+ var_export($stream->eof());
+ // true
+ var_export($stream->tell());
+ // 11
+
+You can create streams from iterators. The iterator can yield any number of
+bytes per iteration. Any excess bytes returned by the iterator that were not
+requested by a stream consumer will be buffered until a subsequent read.
+
+.. code-block:: php
+
+ use GuzzleHttp\Psr7;
+
+ $generator = function ($bytes) {
+ for ($i = 0; $i < $bytes; $i++) {
+ yield '.';
+ }
+ };
+
+ $iter = $generator(1024);
+ $stream = Psr7\Utils::streamFor($iter);
+ echo $stream->read(3); // ...
+
+
+Metadata
+--------
+
+Streams expose stream metadata through the ``getMetadata()`` method. This
+method provides the data you would retrieve when calling PHP's
+`stream_get_meta_data() function `_,
+and can optionally expose other custom data.
+
+.. code-block:: php
+
+ use GuzzleHttp\Psr7;
+
+ $resource = Psr7\Utils::tryFopen('/path/to/file', 'r');
+ $stream = Psr7\Utils::streamFor($resource);
+ echo $stream->getMetadata('uri');
+ // /path/to/file
+ var_export($stream->isReadable());
+ // true
+ var_export($stream->isWritable());
+ // false
+ var_export($stream->isSeekable());
+ // true
+
+
+Stream Decorators
+-----------------
+
+Adding custom functionality to streams is very simple with stream decorators.
+Guzzle provides several built-in decorators that provide additional stream
+functionality.
+
+- `AppendStream `_
+- `BufferStream `_
+- `CachingStream `_
+- `DroppingStream `_
+- `FnStream `_
+- `InflateStream `_
+- `LazyOpenStream `_
+- `LimitStream `_
+- `MultipartStream `_
+- `NoSeekStream `_
+- `PumpStream `_
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/quickstart.rst b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/quickstart.rst
new file mode 100644
index 0000000000..78f282b3a0
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/quickstart.rst
@@ -0,0 +1,613 @@
+==========
+Quickstart
+==========
+
+This page provides a quick introduction to Guzzle and introductory examples.
+If you have not already installed, Guzzle, head over to the :ref:`installation`
+page.
+
+
+Making a Request
+================
+
+You can send requests with Guzzle using a ``GuzzleHttp\ClientInterface``
+object.
+
+
+Creating a Client
+-----------------
+
+.. code-block:: php
+
+ use GuzzleHttp\Client;
+
+ $client = new Client([
+ // Base URI is used with relative requests
+ 'base_uri' => 'http://httpbin.org',
+ // You can set any number of default request options.
+ 'timeout' => 2.0,
+ ]);
+
+Clients are immutable in Guzzle, which means that you cannot change the defaults used by a client after it's created.
+
+The client constructor accepts an associative array of options:
+
+``base_uri``
+ (string|UriInterface) Base URI of the client that is merged into relative
+ URIs. Can be a string or instance of UriInterface. When a relative URI
+ is provided to a client, the client will combine the base URI with the
+ relative URI using the rules described in
+ `RFC 3986, section 5.2 `_.
+
+ .. code-block:: php
+
+ // Create a client with a base URI
+ $client = new GuzzleHttp\Client(['base_uri' => 'https://foo.com/api/']);
+ // Send a request to https://foo.com/api/test
+ $response = $client->request('GET', 'test');
+ // Send a request to https://foo.com/root
+ $response = $client->request('GET', '/root');
+
+ Don't feel like reading RFC 3986? Here are some quick examples on how a
+ ``base_uri`` is resolved with another URI.
+
+ ======================= ================== ===============================
+ base_uri URI Result
+ ======================= ================== ===============================
+ ``http://foo.com`` ``/bar`` ``http://foo.com/bar``
+ ``http://foo.com/foo`` ``/bar`` ``http://foo.com/bar``
+ ``http://foo.com/foo`` ``bar`` ``http://foo.com/bar``
+ ``http://foo.com/foo/`` ``bar`` ``http://foo.com/foo/bar``
+ ``http://foo.com/foo/`` ``/bar`` ``http://foo.com/bar``
+ ``http://foo.com`` ``http://baz.com`` ``http://baz.com``
+ ``http://foo.com/?bar`` ``bar`` ``http://foo.com/bar``
+ ======================= ================== ===============================
+
+``handler``
+ (callable) Function that transfers HTTP requests over the wire. The
+ function is called with a ``Psr7\Http\Message\RequestInterface`` and array
+ of transfer options, and must return a
+ ``GuzzleHttp\Promise\PromiseInterface`` that is fulfilled with a
+ ``Psr7\Http\Message\ResponseInterface`` on success.
+
+``...``
+ (mixed) All other options passed to the constructor are used as default
+ request options with every request created by the client.
+
+
+Sending Requests
+----------------
+
+Magic methods on the client make it easy to send synchronous requests:
+
+.. code-block:: php
+
+ $response = $client->get('http://httpbin.org/get');
+ $response = $client->delete('http://httpbin.org/delete');
+ $response = $client->head('http://httpbin.org/get');
+ $response = $client->options('http://httpbin.org/get');
+ $response = $client->patch('http://httpbin.org/patch');
+ $response = $client->post('http://httpbin.org/post');
+ $response = $client->put('http://httpbin.org/put');
+
+You can create a request and then send the request with the client when you're
+ready:
+
+.. code-block:: php
+
+ use GuzzleHttp\Psr7\Request;
+
+ $request = new Request('PUT', 'http://httpbin.org/put');
+ $response = $client->send($request, ['timeout' => 2]);
+
+Client objects provide a great deal of flexibility in how request are
+transferred including default request options, default handler stack middleware
+that are used by each request, and a base URI that allows you to send requests
+with relative URIs.
+
+You can find out more about client middleware in the
+:doc:`handlers-and-middleware` page of the documentation.
+
+
+Async Requests
+--------------
+
+You can send asynchronous requests using the magic methods provided by a client:
+
+.. code-block:: php
+
+ $promise = $client->getAsync('http://httpbin.org/get');
+ $promise = $client->deleteAsync('http://httpbin.org/delete');
+ $promise = $client->headAsync('http://httpbin.org/get');
+ $promise = $client->optionsAsync('http://httpbin.org/get');
+ $promise = $client->patchAsync('http://httpbin.org/patch');
+ $promise = $client->postAsync('http://httpbin.org/post');
+ $promise = $client->putAsync('http://httpbin.org/put');
+
+You can also use the `sendAsync()` and `requestAsync()` methods of a client:
+
+.. code-block:: php
+
+ use GuzzleHttp\Psr7\Request;
+
+ // Create a PSR-7 request object to send
+ $headers = ['X-Foo' => 'Bar'];
+ $body = 'Hello!';
+ $request = new Request('HEAD', 'http://httpbin.org/head', $headers, $body);
+ $promise = $client->sendAsync($request);
+
+ // Or, if you don't need to pass in a request instance:
+ $promise = $client->requestAsync('GET', 'http://httpbin.org/get');
+
+The promise returned by these methods implements the
+`Promises/A+ spec `_, provided by the
+`Guzzle promises library `_. This means
+that you can chain ``then()`` calls off of the promise. These then calls are
+either fulfilled with a successful ``Psr\Http\Message\ResponseInterface`` or
+rejected with an exception.
+
+.. code-block:: php
+
+ use Psr\Http\Message\ResponseInterface;
+ use GuzzleHttp\Exception\RequestException;
+
+ $promise = $client->requestAsync('GET', 'http://httpbin.org/get');
+ $promise->then(
+ function (ResponseInterface $res) {
+ echo $res->getStatusCode() . "\n";
+ },
+ function (RequestException $e) {
+ echo $e->getMessage() . "\n";
+ echo $e->getRequest()->getMethod();
+ }
+ );
+
+
+Concurrent requests
+-------------------
+
+You can send multiple requests concurrently using promises and asynchronous
+requests.
+
+.. code-block:: php
+
+ use GuzzleHttp\Client;
+ use GuzzleHttp\Promise;
+
+ $client = new Client(['base_uri' => 'http://httpbin.org/']);
+
+ // Initiate each request but do not block
+ $promises = [
+ 'image' => $client->getAsync('/image'),
+ 'png' => $client->getAsync('/image/png'),
+ 'jpeg' => $client->getAsync('/image/jpeg'),
+ 'webp' => $client->getAsync('/image/webp')
+ ];
+
+ // Wait for the requests to complete; throws a ConnectException
+ // if any of the requests fail
+ $responses = Promise\Utils::unwrap($promises);
+
+ // You can access each response using the key of the promise
+ echo $responses['image']->getHeader('Content-Length')[0];
+ echo $responses['png']->getHeader('Content-Length')[0];
+
+ // Wait for the requests to complete, even if some of them fail
+ $responses = Promise\Utils::settle($promises)->wait();
+
+ // Values returned above are wrapped in an array with 2 keys: "state" (either fulfilled or rejected) and "value" (contains the response)
+ echo $responses['image']['state']; // returns "fulfilled"
+ echo $responses['image']['value']->getHeader('Content-Length')[0];
+ echo $responses['png']['value']->getHeader('Content-Length')[0];
+
+You can use the ``GuzzleHttp\Pool`` object when you have an indeterminate
+amount of requests you wish to send.
+
+.. code-block:: php
+
+ use GuzzleHttp\Client;
+ use GuzzleHttp\Exception\RequestException;
+ use GuzzleHttp\Pool;
+ use GuzzleHttp\Psr7\Request;
+ use GuzzleHttp\Psr7\Response;
+
+ $client = new Client();
+
+ $requests = function ($total) {
+ $uri = 'http://127.0.0.1:8126/guzzle-server/perf';
+ for ($i = 0; $i < $total; $i++) {
+ yield new Request('GET', $uri);
+ }
+ };
+
+ $pool = new Pool($client, $requests(100), [
+ 'concurrency' => 5,
+ 'fulfilled' => function (Response $response, $index) {
+ // this is delivered each successful response
+ },
+ 'rejected' => function (RequestException $reason, $index) {
+ // this is delivered each failed request
+ },
+ ]);
+
+ // Initiate the transfers and create a promise
+ $promise = $pool->promise();
+
+ // Force the pool of requests to complete.
+ $promise->wait();
+
+Or using a closure that will return a promise once the pool calls the closure.
+
+.. code-block:: php
+
+ $client = new Client();
+
+ $requests = function ($total) use ($client) {
+ $uri = 'http://127.0.0.1:8126/guzzle-server/perf';
+ for ($i = 0; $i < $total; $i++) {
+ yield function() use ($client, $uri) {
+ return $client->getAsync($uri);
+ };
+ }
+ };
+
+ $pool = new Pool($client, $requests(100));
+
+
+Using Responses
+===============
+
+In the previous examples, we retrieved a ``$response`` variable or we were
+delivered a response from a promise. The response object implements a PSR-7
+response, ``Psr\Http\Message\ResponseInterface``, and contains lots of
+helpful information.
+
+You can get the status code and reason phrase of the response:
+
+.. code-block:: php
+
+ $code = $response->getStatusCode(); // 200
+ $reason = $response->getReasonPhrase(); // OK
+
+You can retrieve headers from the response:
+
+.. code-block:: php
+
+ // Check if a header exists.
+ if ($response->hasHeader('Content-Length')) {
+ echo "It exists";
+ }
+
+ // Get a header from the response.
+ echo $response->getHeader('Content-Length')[0];
+
+ // Get all of the response headers.
+ foreach ($response->getHeaders() as $name => $values) {
+ echo $name . ': ' . implode(', ', $values) . "\r\n";
+ }
+
+The body of a response can be retrieved using the ``getBody`` method. The body
+can be used as a string, cast to a string, or used as a stream like object.
+
+.. code-block:: php
+
+ $body = $response->getBody();
+ // Implicitly cast the body to a string and echo it
+ echo $body;
+ // Explicitly cast the body to a string
+ $stringBody = (string) $body;
+ // Read 10 bytes from the body
+ $tenBytes = $body->read(10);
+ // Read the remaining contents of the body as a string
+ $remainingBytes = $body->getContents();
+
+
+Query String Parameters
+=======================
+
+You can provide query string parameters with a request in several ways.
+
+You can set query string parameters in the request's URI:
+
+.. code-block:: php
+
+ $response = $client->request('GET', 'http://httpbin.org?foo=bar');
+
+You can specify the query string parameters using the ``query`` request
+option as an array.
+
+.. code-block:: php
+
+ $client->request('GET', 'http://httpbin.org', [
+ 'query' => ['foo' => 'bar']
+ ]);
+
+Providing the option as an array will use PHP's ``http_build_query`` function
+to format the query string.
+
+And finally, you can provide the ``query`` request option as a string.
+
+.. code-block:: php
+
+ $client->request('GET', 'http://httpbin.org', ['query' => 'foo=bar']);
+
+
+Uploading Data
+==============
+
+Guzzle provides several methods for uploading data.
+
+You can send requests that contain a stream of data by passing a string,
+resource returned from ``fopen``, or an instance of a
+``Psr\Http\Message\StreamInterface`` to the ``body`` request option.
+
+.. code-block:: php
+
+ use GuzzleHttp\Psr7;
+
+ // Provide the body as a string.
+ $r = $client->request('POST', 'http://httpbin.org/post', [
+ 'body' => 'raw data'
+ ]);
+
+ // Provide an fopen resource.
+ $body = Psr7\Utils::tryFopen('/path/to/file', 'r');
+ $r = $client->request('POST', 'http://httpbin.org/post', ['body' => $body]);
+
+ // Use the Utils::streamFor method to create a PSR-7 stream.
+ $body = Psr7\Utils::streamFor('hello!');
+ $r = $client->request('POST', 'http://httpbin.org/post', ['body' => $body]);
+
+An easy way to upload JSON data and set the appropriate header is using the
+``json`` request option:
+
+.. code-block:: php
+
+ $r = $client->request('PUT', 'http://httpbin.org/put', [
+ 'json' => ['foo' => 'bar']
+ ]);
+
+
+POST/Form Requests
+------------------
+
+In addition to specifying the raw data of a request using the ``body`` request
+option, Guzzle provides helpful abstractions over sending POST data.
+
+
+Sending form fields
+~~~~~~~~~~~~~~~~~~~
+
+Sending ``application/x-www-form-urlencoded`` POST requests requires that you
+specify the POST fields as an array in the ``form_params`` request options.
+
+.. code-block:: php
+
+ $response = $client->request('POST', 'http://httpbin.org/post', [
+ 'form_params' => [
+ 'field_name' => 'abc',
+ 'other_field' => '123',
+ 'nested_field' => [
+ 'nested' => 'hello'
+ ]
+ ]
+ ]);
+
+
+Sending form files
+~~~~~~~~~~~~~~~~~~
+
+You can send files along with a form (``multipart/form-data`` POST requests),
+using the ``multipart`` request option. ``multipart`` accepts an array of
+associative arrays, where each associative array contains the following keys:
+
+- name: (required, string) key mapping to the form field name.
+- contents: (required, mixed) Provide a string to send the contents of the
+ file as a string, provide an fopen resource to stream the contents from a
+ PHP stream, or provide a ``Psr\Http\Message\StreamInterface`` to stream
+ the contents from a PSR-7 stream.
+
+.. code-block:: php
+
+ use GuzzleHttp\Psr7;
+
+ $response = $client->request('POST', 'http://httpbin.org/post', [
+ 'multipart' => [
+ [
+ 'name' => 'field_name',
+ 'contents' => 'abc'
+ ],
+ [
+ 'name' => 'file_name',
+ 'contents' => Psr7\Utils::tryFopen('/path/to/file', 'r')
+ ],
+ [
+ 'name' => 'other_file',
+ 'contents' => 'hello',
+ 'filename' => 'filename.txt',
+ 'headers' => [
+ 'X-Foo' => 'this is an extra header to include'
+ ]
+ ]
+ ]
+ ]);
+
+
+Cookies
+=======
+
+Guzzle can maintain a cookie session for you if instructed using the
+``cookies`` request option. When sending a request, the ``cookies`` option
+must be set to an instance of ``GuzzleHttp\Cookie\CookieJarInterface``.
+
+.. code-block:: php
+
+ // Use a specific cookie jar
+ $jar = new \GuzzleHttp\Cookie\CookieJar;
+ $r = $client->request('GET', 'http://httpbin.org/cookies', [
+ 'cookies' => $jar
+ ]);
+
+You can set ``cookies`` to ``true`` in a client constructor if you would like
+to use a shared cookie jar for all requests.
+
+.. code-block:: php
+
+ // Use a shared client cookie jar
+ $client = new \GuzzleHttp\Client(['cookies' => true]);
+ $r = $client->request('GET', 'http://httpbin.org/cookies');
+
+Different implementations exist for the ``GuzzleHttp\Cookie\CookieJarInterface``
+:
+
+- The ``GuzzleHttp\Cookie\CookieJar`` class stores cookies as an array.
+- The ``GuzzleHttp\Cookie\FileCookieJar`` class persists non-session cookies
+ using a JSON formatted file.
+- The ``GuzzleHttp\Cookie\SessionCookieJar`` class persists cookies in the
+ client session.
+
+You can manually set cookies into a cookie jar with the named constructor
+``fromArray(array $cookies, $domain)``.
+
+.. code-block:: php
+
+ $jar = \GuzzleHttp\Cookie\CookieJar::fromArray(
+ [
+ 'some_cookie' => 'foo',
+ 'other_cookie' => 'barbaz1234'
+ ],
+ 'example.org'
+ );
+
+You can get a cookie by its name with the ``getCookieByName($name)`` method
+which returns a ``GuzzleHttp\Cookie\SetCookie`` instance.
+
+.. code-block:: php
+
+ $cookie = $jar->getCookieByName('some_cookie');
+
+ $cookie->getValue(); // 'foo'
+ $cookie->getDomain(); // 'example.org'
+ $cookie->getExpires(); // expiration date as a Unix timestamp
+
+The cookies can be also fetched into an array thanks to the `toArray()` method.
+The ``GuzzleHttp\Cookie\CookieJarInterface`` interface extends
+``Traversable`` so it can be iterated in a foreach loop.
+
+
+Redirects
+=========
+
+Guzzle will automatically follow redirects unless you tell it not to. You can
+customize the redirect behavior using the ``allow_redirects`` request option.
+
+- Set to ``true`` to enable normal redirects with a maximum number of 5
+ redirects. This is the default setting.
+- Set to ``false`` to disable redirects.
+- Pass an associative array containing the 'max' key to specify the maximum
+ number of redirects and optionally provide a 'strict' key value to specify
+ whether or not to use strict RFC compliant redirects (meaning redirect POST
+ requests with POST requests vs. doing what most browsers do which is
+ redirect POST requests with GET requests).
+
+.. code-block:: php
+
+ $response = $client->request('GET', 'http://github.com');
+ echo $response->getStatusCode();
+ // 200
+
+The following example shows that redirects can be disabled.
+
+.. code-block:: php
+
+ $response = $client->request('GET', 'http://github.com', [
+ 'allow_redirects' => false
+ ]);
+ echo $response->getStatusCode();
+ // 301
+
+
+Exceptions
+==========
+
+**Tree View**
+
+The following tree view describes how the Guzzle Exceptions depend
+on each other.
+
+.. code-block:: none
+
+ . \RuntimeException
+ └── TransferException (implements GuzzleException)
+ ├── ConnectException (implements NetworkExceptionInterface)
+ └── RequestException
+ ├── BadResponseException
+ │ ├── ServerException
+ │ └── ClientException
+ └── TooManyRedirectsException
+
+Guzzle throws exceptions for errors that occur during a transfer.
+
+- A ``GuzzleHttp\Exception\ConnectException`` exception is thrown in the
+ event of a networking error. This exception extends from
+ ``GuzzleHttp\Exception\TransferException``.
+
+- A ``GuzzleHttp\Exception\ClientException`` is thrown for 400
+ level errors if the ``http_errors`` request option is set to true. This
+ exception extends from ``GuzzleHttp\Exception\BadResponseException`` and
+ ``GuzzleHttp\Exception\BadResponseException`` extends from
+ ``GuzzleHttp\Exception\RequestException``.
+
+ .. code-block:: php
+
+ use GuzzleHttp\Psr7;
+ use GuzzleHttp\Exception\ClientException;
+
+ try {
+ $client->request('GET', 'https://github.com/_abc_123_404');
+ } catch (ClientException $e) {
+ echo Psr7\Message::toString($e->getRequest());
+ echo Psr7\Message::toString($e->getResponse());
+ }
+
+- A ``GuzzleHttp\Exception\ServerException`` is thrown for 500 level
+ errors if the ``http_errors`` request option is set to true. This
+ exception extends from ``GuzzleHttp\Exception\BadResponseException``.
+
+- A ``GuzzleHttp\Exception\TooManyRedirectsException`` is thrown when too
+ many redirects are followed. This exception extends from ``GuzzleHttp\Exception\RequestException``.
+
+All of the above exceptions extend from
+``GuzzleHttp\Exception\TransferException``.
+
+
+Environment Variables
+=====================
+
+Guzzle exposes a few environment variables that can be used to customize the
+behavior of the library.
+
+``GUZZLE_CURL_SELECT_TIMEOUT``
+ Controls the duration in seconds that a curl_multi_* handler will use when
+ selecting on curl handles using ``curl_multi_select()``. Some systems
+ have issues with PHP's implementation of ``curl_multi_select()`` where
+ calling this function always results in waiting for the maximum duration of
+ the timeout.
+``HTTP_PROXY``
+ Defines the proxy to use when sending requests using the "http" protocol.
+
+ Note: because the HTTP_PROXY variable may contain arbitrary user input on some (CGI) environments, the variable is only used on the CLI SAPI. See https://httpoxy.org for more information.
+``HTTPS_PROXY``
+ Defines the proxy to use when sending requests using the "https" protocol.
+``NO_PROXY``
+ Defines URLs for which a proxy should not be used. See :ref:`proxy-option` for usage.
+
+
+Relevant ini Settings
+---------------------
+
+Guzzle can utilize PHP ini settings when configuring clients.
+
+``openssl.cafile``
+ Specifies the path on disk to a CA file in PEM format to use when sending
+ requests over "https". See: https://wiki.php.net/rfc/tls-peer-verification#phpini_defaults
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/request-options.rst b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/request-options.rst
new file mode 100644
index 0000000000..53ea057597
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/request-options.rst
@@ -0,0 +1,1108 @@
+===============
+Request Options
+===============
+
+You can customize requests created and transferred by a client using
+**request options**. Request options control various aspects of a request
+including, headers, query string parameters, timeout settings, the body of a
+request, and much more.
+
+All of the following examples use the following client:
+
+.. code-block:: php
+
+ $client = new GuzzleHttp\Client(['base_uri' => 'http://httpbin.org']);
+
+
+.. _allow_redirects-option:
+
+allow_redirects
+---------------
+
+:Summary: Describes the redirect behavior of a request
+:Types:
+ - bool
+ - array
+:Default:
+
+ ::
+
+ [
+ 'max' => 5,
+ 'strict' => false,
+ 'referer' => false,
+ 'protocols' => ['http', 'https'],
+ 'track_redirects' => false
+ ]
+
+:Constant: ``GuzzleHttp\RequestOptions::ALLOW_REDIRECTS``
+
+Set to ``false`` to disable redirects.
+
+.. code-block:: php
+
+ $res = $client->request('GET', '/redirect/3', ['allow_redirects' => false]);
+ echo $res->getStatusCode();
+ // 302
+
+Set to ``true`` (the default setting) to enable normal redirects with a maximum
+number of 5 redirects.
+
+.. code-block:: php
+
+ $res = $client->request('GET', '/redirect/3');
+ echo $res->getStatusCode();
+ // 200
+
+You can also pass an associative array containing the following key value
+pairs:
+
+- max: (int, default=5) maximum number of allowed redirects.
+- strict: (bool, default=false) Set to true to use strict redirects.
+ Strict RFC compliant redirects mean that POST redirect requests are sent as
+ POST requests vs. doing what most browsers do which is redirect POST requests
+ with GET requests.
+- referer: (bool, default=false) Set to true to enable adding the Referer
+ header when redirecting.
+- protocols: (array, default=['http', 'https']) Specified which protocols are
+ allowed for redirect requests.
+- on_redirect: (callable) PHP callable that is invoked when a redirect
+ is encountered. The callable is invoked with the original request and the
+ redirect response that was received. Any return value from the on_redirect
+ function is ignored.
+- track_redirects: (bool) When set to ``true``, each redirected URI and status
+ code encountered will be tracked in the ``X-Guzzle-Redirect-History`` and
+ ``X-Guzzle-Redirect-Status-History`` headers respectively. All URIs and
+ status codes will be stored in the order which the redirects were encountered.
+
+ Note: When tracking redirects the ``X-Guzzle-Redirect-History`` header will
+ exclude the initial request's URI and the ``X-Guzzle-Redirect-Status-History``
+ header will exclude the final status code.
+
+.. code-block:: php
+
+ use Psr\Http\Message\RequestInterface;
+ use Psr\Http\Message\ResponseInterface;
+ use Psr\Http\Message\UriInterface;
+
+ $onRedirect = function(
+ RequestInterface $request,
+ ResponseInterface $response,
+ UriInterface $uri
+ ) {
+ echo 'Redirecting! ' . $request->getUri() . ' to ' . $uri . "\n";
+ };
+
+ $res = $client->request('GET', '/redirect/3', [
+ 'allow_redirects' => [
+ 'max' => 10, // allow at most 10 redirects.
+ 'strict' => true, // use "strict" RFC compliant redirects.
+ 'referer' => true, // add a Referer header
+ 'protocols' => ['https'], // only allow https URLs
+ 'on_redirect' => $onRedirect,
+ 'track_redirects' => true
+ ]
+ ]);
+
+ echo $res->getStatusCode();
+ // 200
+
+ echo $res->getHeaderLine('X-Guzzle-Redirect-History');
+ // http://first-redirect, http://second-redirect, etc...
+
+ echo $res->getHeaderLine('X-Guzzle-Redirect-Status-History');
+ // 301, 302, etc...
+
+.. warning::
+
+ This option only has an effect if your handler has the
+ ``GuzzleHttp\Middleware::redirect`` middleware. This middleware is added
+ by default when a client is created with no handler, and is added by
+ default when creating a handler with ``GuzzleHttp\HandlerStack::create``.
+
+.. note::
+
+ This option has **no** effect when making requests using ``GuzzleHttp\Client::sendRequest()``. In order to stay compliant with PSR-18 any redirect response is returned as is.
+
+
+auth
+----
+
+:Summary: Pass an array of HTTP authentication parameters to use with the
+ request. The array must contain the username in index [0], the password in
+ index [1], and you can optionally provide a built-in authentication type in
+ index [2]. Pass ``null`` to disable authentication for a request.
+:Types:
+ - array
+ - string
+ - null
+:Default: None
+:Constant: ``GuzzleHttp\RequestOptions::AUTH``
+
+The built-in authentication types are as follows:
+
+basic
+ Use `basic HTTP authentication `_
+ in the ``Authorization`` header (the default setting used if none is
+ specified).
+
+.. code-block:: php
+
+ $client->request('GET', '/get', ['auth' => ['username', 'password']]);
+
+digest
+ Use `digest authentication `_
+ (must be supported by the HTTP handler).
+
+.. code-block:: php
+
+ $client->request('GET', '/get', [
+ 'auth' => ['username', 'password', 'digest']
+ ]);
+
+.. note::
+
+ This is currently only supported when using the cURL handler, but
+ creating a replacement that can be used with any HTTP handler is
+ planned.
+
+ntlm
+ Use `Microsoft NTLM authentication `_
+ (must be supported by the HTTP handler).
+
+.. code-block:: php
+
+ $client->request('GET', '/get', [
+ 'auth' => ['username', 'password', 'ntlm']
+ ]);
+
+.. note::
+
+ This is currently only supported when using the cURL handler.
+
+
+body
+----
+
+:Summary: The ``body`` option is used to control the body of an entity
+ enclosing request (e.g., PUT, POST, PATCH).
+:Types:
+ - string
+ - ``fopen()`` resource
+ - ``Psr\Http\Message\StreamInterface``
+:Default: None
+:Constant: ``GuzzleHttp\RequestOptions::BODY``
+
+This setting can be set to any of the following types:
+
+- string
+
+ .. code-block:: php
+
+ // You can send requests that use a string as the message body.
+ $client->request('PUT', '/put', ['body' => 'foo']);
+
+- resource returned from ``fopen()``
+
+ .. code-block:: php
+
+ // You can send requests that use a stream resource as the body.
+ $resource = \GuzzleHttp\Psr7\Utils::tryFopen('http://httpbin.org', 'r');
+ $client->request('PUT', '/put', ['body' => $resource]);
+
+- ``Psr\Http\Message\StreamInterface``
+
+ .. code-block:: php
+
+ // You can send requests that use a Guzzle stream object as the body
+ $stream = GuzzleHttp\Psr7\Utils::streamFor('contents...');
+ $client->request('POST', '/post', ['body' => $stream]);
+
+.. note::
+
+ This option cannot be used with ``form_params``, ``multipart``, or ``json``
+
+
+.. _cert-option:
+
+cert
+----
+
+:Summary: Set to a string to specify the path to a file containing a PEM
+ formatted client side certificate. If a password is required, then set to
+ an array containing the path to the PEM file in the first array element
+ followed by the password required for the certificate in the second array
+ element.
+:Types:
+ - string
+ - array
+:Default: None
+:Constant: ``GuzzleHttp\RequestOptions::CERT``
+
+.. code-block:: php
+
+ $client->request('GET', '/', ['cert' => ['/path/server.pem', 'password']]);
+
+
+.. _cookies-option:
+
+cookies
+-------
+
+:Summary: Specifies whether or not cookies are used in a request or what cookie
+ jar to use or what cookies to send.
+:Types: ``GuzzleHttp\Cookie\CookieJarInterface``
+:Default: None
+:Constant: ``GuzzleHttp\RequestOptions::COOKIES``
+
+You must specify the cookies option as a
+``GuzzleHttp\Cookie\CookieJarInterface`` or ``false``.
+
+.. code-block:: php
+
+ $jar = new \GuzzleHttp\Cookie\CookieJar();
+ $client->request('GET', '/get', ['cookies' => $jar]);
+
+.. warning::
+
+ This option only has an effect if your handler has the
+ ``GuzzleHttp\Middleware::cookies`` middleware. This middleware is added
+ by default when a client is created with no handler, and is added by
+ default when creating a handler with ``GuzzleHttp\HandlerStack::create``.
+
+.. tip::
+
+ When creating a client, you can set the default cookie option to ``true``
+ to use a shared cookie session associated with the client.
+
+
+.. _connect_timeout-option:
+
+connect_timeout
+---------------
+
+:Summary: Float describing the number of seconds to wait while trying to connect
+ to a server. Use ``0`` to wait 300 seconds (the default behavior).
+:Types: float
+:Default: ``0``
+:Constant: ``GuzzleHttp\RequestOptions::CONNECT_TIMEOUT``
+
+.. code-block:: php
+
+ // Timeout if the client fails to connect to the server in 3.14 seconds.
+ $client->request('GET', '/delay/5', ['connect_timeout' => 3.14]);
+
+.. note::
+
+ This setting must be supported by the HTTP handler used to send a request.
+ ``connect_timeout`` is currently only supported by the built-in cURL
+ handler.
+
+
+.. _crypto_method-option:
+
+crypto_method
+---------------
+
+:Summary: A value describing the minimum TLS protocol version to use.
+:Types: int
+:Default: None
+:Constant: ``GuzzleHttp\RequestOptions::CRYPTO_METHOD``
+
+.. code-block:: php
+
+ $client->request('GET', '/foo', ['crypto_method' => STREAM_CRYPTO_METHOD_TLSv1_2_CLIENT]);
+
+.. note::
+
+ This setting must be set to one of the ``STREAM_CRYPTO_METHOD_TLS*_CLIENT``
+ constants. PHP 7.4 or higher is required in order to use TLS 1.3, and cURL
+ 7.34.0 or higher is required in order to specify a crypto method, with cURL
+ 7.52.0 or higher being required to use TLS 1.3.
+
+
+.. _debug-option:
+
+debug
+-----
+
+:Summary: Set to ``true`` or set to a PHP stream returned by ``fopen()`` to
+ enable debug output with the handler used to send a request. For example,
+ when using cURL to transfer requests, cURL's verbose of ``CURLOPT_VERBOSE``
+ will be emitted. When using the PHP stream wrapper, stream wrapper
+ notifications will be emitted. If set to true, the output is written to
+ PHP's STDOUT. If a PHP stream is provided, output is written to the stream.
+:Types:
+ - bool
+ - ``fopen()`` resource
+:Default: None
+:Constant: ``GuzzleHttp\RequestOptions::DEBUG``
+
+.. code-block:: php
+
+ $client->request('GET', '/get', ['debug' => true]);
+
+Running the above example would output something like the following:
+
+::
+
+ * About to connect() to httpbin.org port 80 (#0)
+ * Trying 107.21.213.98... * Connected to httpbin.org (107.21.213.98) port 80 (#0)
+ > GET /get HTTP/1.1
+ Host: httpbin.org
+ User-Agent: Guzzle/4.0 curl/7.21.4 PHP/5.5.7
+
+ < HTTP/1.1 200 OK
+ < Access-Control-Allow-Origin: *
+ < Content-Type: application/json
+ < Date: Sun, 16 Feb 2014 06:50:09 GMT
+ < Server: gunicorn/0.17.4
+ < Content-Length: 335
+ < Connection: keep-alive
+ <
+ * Connection #0 to host httpbin.org left intact
+
+
+.. _decode_content-option:
+
+decode_content
+--------------
+
+:Summary: Specify whether or not ``Content-Encoding`` responses (gzip,
+ deflate, etc.) are automatically decoded.
+:Types:
+ - string
+ - bool
+:Default: ``true``
+:Constant: ``GuzzleHttp\RequestOptions::DECODE_CONTENT``
+
+This option can be used to control how content-encoded response bodies are
+handled. By default, ``decode_content`` is set to true, meaning any gzipped
+or deflated response will be decoded by Guzzle.
+
+When set to ``false``, the body of a response is never decoded, meaning the
+bytes pass through the handler unchanged.
+
+.. code-block:: php
+
+ // Request gzipped data, but do not decode it while downloading
+ $client->request('GET', '/foo.js', [
+ 'headers' => ['Accept-Encoding' => 'gzip'],
+ 'decode_content' => false
+ ]);
+
+When set to a string, the bytes of a response are decoded and the string value
+provided to the ``decode_content`` option is passed as the ``Accept-Encoding``
+header of the request.
+
+.. code-block:: php
+
+ // Pass "gzip" as the Accept-Encoding header.
+ $client->request('GET', '/foo.js', ['decode_content' => 'gzip']);
+
+.. warning::
+
+ The ``Accept-Encoding`` header will not be sent unless you provide it
+ explicitly, or pass a string value to ``decode_content``. That is
+ `equivalent `
+ to sending ``Accept-Encoding: *``. Most servers will probably
+ return an uncompressed body in response to that but some might opt
+ to use a compression method that is not supported by your system.
+
+ In order to enable compression, and to ensure that only supported
+ encoding methods will be used, you should let curl send
+ the ``Accept-Encoding`` header:
+
+ .. code-block:: php
+
+ // Delegate choosing compression method to curl
+ $client->request('GET', '/foo.js', [
+ 'curl' => [
+ \CURLOPT_ENCODING => '',
+ ],
+ ]);
+
+
+.. _delay-option:
+
+delay
+-----
+
+:Summary: The number of milliseconds to delay before sending the request.
+:Types:
+ - integer
+ - float
+:Default: null
+:Constant: ``GuzzleHttp\RequestOptions::DELAY``
+
+
+.. _expect-option:
+
+expect
+------
+
+:Summary: Controls the behavior of the "Expect: 100-Continue" header.
+:Types:
+ - bool
+ - integer
+:Default: ``1048576``
+:Constant: ``GuzzleHttp\RequestOptions::EXPECT``
+
+Set to ``true`` to enable the "Expect: 100-Continue" header for all requests
+that sends a body. Set to ``false`` to disable the "Expect: 100-Continue"
+header for all requests. Set to a number so that the size of the payload must
+be greater than the number in order to send the Expect header. Setting to a
+number will send the Expect header for all requests in which the size of the
+payload cannot be determined or where the body is not rewindable.
+
+By default, Guzzle will add the "Expect: 100-Continue" header when the size of
+the body of a request is greater than 1 MB and a request is using HTTP/1.1.
+
+.. note::
+
+ This option only takes effect when using HTTP/1.1. The HTTP/1.0 and
+ HTTP/2.0 protocols do not support the "Expect: 100-Continue" header.
+ Support for handling the "Expect: 100-Continue" workflow must be
+ implemented by Guzzle HTTP handlers used by a client.
+
+
+force_ip_resolve
+----------------
+
+:Summary: Set to "v4" if you want the HTTP handlers to use only ipv4 protocol or "v6" for ipv6 protocol.
+:Types: string
+:Default: null
+:Constant: ``GuzzleHttp\RequestOptions::FORCE_IP_RESOLVE``
+
+.. code-block:: php
+
+ // Force ipv4 protocol
+ $client->request('GET', '/foo', ['force_ip_resolve' => 'v4']);
+
+ // Force ipv6 protocol
+ $client->request('GET', '/foo', ['force_ip_resolve' => 'v6']);
+
+.. note::
+
+ This setting must be supported by the HTTP handler used to send a request.
+ ``force_ip_resolve`` is currently only supported by the built-in cURL
+ and stream handlers.
+
+
+form_params
+-----------
+
+:Summary: Used to send an `application/x-www-form-urlencoded` POST request.
+:Types: array
+:Constant: ``GuzzleHttp\RequestOptions::FORM_PARAMS``
+
+Associative array of form field names to values where each value is a string or
+array of strings. Sets the Content-Type header to
+application/x-www-form-urlencoded when no Content-Type header is already
+present.
+
+.. code-block:: php
+
+ $client->request('POST', '/post', [
+ 'form_params' => [
+ 'foo' => 'bar',
+ 'baz' => ['hi', 'there!']
+ ]
+ ]);
+
+.. note::
+
+ ``form_params`` cannot be used with the ``multipart`` option. You will need to use
+ one or the other. Use ``form_params`` for ``application/x-www-form-urlencoded``
+ requests, and ``multipart`` for ``multipart/form-data`` requests.
+
+ This option cannot be used with ``body``, ``multipart``, or ``json``
+
+
+headers
+-------
+
+:Summary: Associative array of headers to add to the request. Each key is the
+ name of a header, and each value is a string or array of strings
+ representing the header field values.
+:Types: array
+:Defaults: None
+:Constant: ``GuzzleHttp\RequestOptions::HEADERS``
+
+.. code-block:: php
+
+ // Set various headers on a request
+ $client->request('GET', '/get', [
+ 'headers' => [
+ 'User-Agent' => 'testing/1.0',
+ 'Accept' => 'application/json',
+ 'X-Foo' => ['Bar', 'Baz']
+ ]
+ ]);
+
+Headers may be added as default options when creating a client. When headers
+are used as default options, they are only applied if the request being created
+does not already contain the specific header. This includes both requests passed
+to the client in the ``send()`` and ``sendAsync()`` methods, and requests
+created by the client (e.g., ``request()`` and ``requestAsync()``).
+
+.. code-block:: php
+
+ $client = new GuzzleHttp\Client(['headers' => ['X-Foo' => 'Bar']]);
+
+ // Will send a request with the X-Foo header.
+ $client->request('GET', '/get');
+
+ // Sets the X-Foo header to "test", which prevents the default header
+ // from being applied.
+ $client->request('GET', '/get', ['headers' => ['X-Foo' => 'test']]);
+
+ // Will disable adding in default headers.
+ $client->request('GET', '/get', ['headers' => null]);
+
+ // Will not overwrite the X-Foo header because it is in the message.
+ use GuzzleHttp\Psr7\Request;
+ $request = new Request('GET', 'http://foo.com', ['X-Foo' => 'test']);
+ $client->send($request);
+
+ // Will overwrite the X-Foo header with the request option provided in the
+ // send method.
+ use GuzzleHttp\Psr7\Request;
+ $request = new Request('GET', 'http://foo.com', ['X-Foo' => 'test']);
+ $client->send($request, ['headers' => ['X-Foo' => 'overwrite']]);
+
+
+.. _http-errors-option:
+
+http_errors
+-----------
+
+:Summary: Set to ``false`` to disable throwing exceptions on an HTTP protocol
+ errors (i.e., 4xx and 5xx responses). Exceptions are thrown by default when
+ HTTP protocol errors are encountered.
+:Types: bool
+:Default: ``true``
+:Constant: ``GuzzleHttp\RequestOptions::HTTP_ERRORS``
+
+.. code-block:: php
+
+ $client->request('GET', '/status/500');
+ // Throws a GuzzleHttp\Exception\ServerException
+
+ $res = $client->request('GET', '/status/500', ['http_errors' => false]);
+ echo $res->getStatusCode();
+ // 500
+
+.. warning::
+
+ This option only has an effect if your handler has the
+ ``GuzzleHttp\Middleware::httpErrors`` middleware. This middleware is added
+ by default when a client is created with no handler, and is added by
+ default when creating a handler with ``GuzzleHttp\HandlerStack::create``.
+
+
+idn_conversion
+--------------
+
+:Summary: Internationalized Domain Name (IDN) support.
+:Types:
+ - bool
+ - int
+:Default: ``false``
+:Constant: ``GuzzleHttp\RequestOptions::IDN_CONVERSION``
+
+.. code-block:: php
+
+ $client->request('GET', 'https://яндекс.рф');
+ // яндекс.рф is translated to xn--d1acpjx3f.xn--p1ai before passing it to the handler
+
+ $res = $client->request('GET', 'https://яндекс.рф', ['idn_conversion' => false]);
+ // The domain part (яндекс.рф) stays unmodified
+
+Enables/disables IDN support, can also be used for precise control by combining
+IDNA_* constants (except IDNA_ERROR_*), see ``$options`` parameter in
+`idn_to_ascii() `_
+documentation for more details.
+
+
+json
+----
+
+:Summary: The ``json`` option is used to easily upload JSON encoded data as the
+ body of a request. A Content-Type header of ``application/json`` will be
+ added if no Content-Type header is already present on the message.
+:Types:
+ Any PHP type that can be operated on by PHP's ``json_encode()`` function.
+:Default: None
+:Constant: ``GuzzleHttp\RequestOptions::JSON``
+
+.. code-block:: php
+
+ $response = $client->request('PUT', '/put', ['json' => ['foo' => 'bar']]);
+
+Here's an example of using the ``tap`` middleware to see what request is sent
+over the wire.
+
+.. code-block:: php
+
+ use GuzzleHttp\Middleware;
+
+ // Create a middleware that echoes parts of the request.
+ $tapMiddleware = Middleware::tap(function ($request) {
+ echo $request->getHeaderLine('Content-Type');
+ // application/json
+ echo $request->getBody();
+ // {"foo":"bar"}
+ });
+
+ // The $handler variable is the handler passed in the
+ // options to the client constructor.
+ $response = $client->request('PUT', '/put', [
+ 'json' => ['foo' => 'bar'],
+ 'handler' => $tapMiddleware($handler)
+ ]);
+
+.. note::
+
+ This request option does not support customizing the Content-Type header
+ or any of the options from PHP's `json_encode() `_
+ function. If you need to customize these settings, then you must pass the
+ JSON encoded data into the request yourself using the ``body`` request
+ option and you must specify the correct Content-Type header using the
+ ``headers`` request option.
+
+ This option cannot be used with ``body``, ``form_params``, or ``multipart``
+
+
+multipart
+---------
+
+:Summary: Sets the body of the request to a `multipart/form-data` form.
+:Types: array
+:Constant: ``GuzzleHttp\RequestOptions::MULTIPART``
+
+The value of ``multipart`` is an array of associative arrays, each containing
+the following key value pairs:
+
+- ``name``: (string, required) the form field name
+- ``contents``: (StreamInterface/resource/string, required) The data to use in
+ the form element.
+- ``headers``: (array) Optional associative array of custom headers to use with
+ the form element.
+- ``filename``: (string) Optional string to send as the filename in the part.
+
+.. code-block:: php
+
+ use GuzzleHttp\Psr7;
+
+ $client->request('POST', '/post', [
+ 'multipart' => [
+ [
+ 'name' => 'foo',
+ 'contents' => 'data',
+ 'headers' => ['X-Baz' => 'bar']
+ ],
+ [
+ 'name' => 'baz',
+ 'contents' => Psr7\Utils::tryFopen('/path/to/file', 'r')
+ ],
+ [
+ 'name' => 'qux',
+ 'contents' => Psr7\Utils::tryFopen('/path/to/file', 'r'),
+ 'filename' => 'custom_filename.txt'
+ ],
+ ]
+ ]);
+
+.. note::
+
+ ``multipart`` cannot be used with the ``form_params`` option. You will need to
+ use one or the other. Use ``form_params`` for ``application/x-www-form-urlencoded``
+ requests, and ``multipart`` for ``multipart/form-data`` requests.
+
+ This option cannot be used with ``body``, ``form_params``, or ``json``
+
+
+.. _on-headers:
+
+on_headers
+----------
+
+:Summary: A callable that is invoked when the HTTP headers of the response have
+ been received but the body has not yet begun to download.
+:Types: - callable
+:Constant: ``GuzzleHttp\RequestOptions::ON_HEADERS``
+
+The callable accepts a ``Psr\Http\Message\ResponseInterface`` object. If an exception
+is thrown by the callable, then the promise associated with the response will
+be rejected with a ``GuzzleHttp\Exception\RequestException`` that wraps the
+exception that was thrown.
+
+You may need to know what headers and status codes were received before data
+can be written to the sink.
+
+.. code-block:: php
+
+ // Reject responses that are greater than 1024 bytes.
+ $client->request('GET', 'http://httpbin.org/stream/1024', [
+ 'on_headers' => function (ResponseInterface $response) {
+ if ($response->getHeaderLine('Content-Length') > 1024) {
+ throw new \Exception('The file is too big!');
+ }
+ }
+ ]);
+
+.. note::
+
+ When writing HTTP handlers, the ``on_headers`` function must be invoked
+ before writing data to the body of the response.
+
+
+.. _on_stats:
+
+on_stats
+--------
+
+:Summary: ``on_stats`` allows you to get access to transfer statistics of a
+ request and access the lower level transfer details of the handler
+ associated with your client. ``on_stats`` is a callable that is invoked
+ when a handler has finished sending a request. The callback is invoked
+ with transfer statistics about the request, the response received, or the
+ error encountered. Included in the data is the total amount of time taken
+ to send the request.
+:Types: - callable
+:Constant: ``GuzzleHttp\RequestOptions::ON_STATS``
+
+The callable accepts a ``GuzzleHttp\TransferStats`` object.
+
+.. code-block:: php
+
+ use GuzzleHttp\TransferStats;
+
+ $client = new GuzzleHttp\Client();
+
+ $client->request('GET', 'http://httpbin.org/stream/1024', [
+ 'on_stats' => function (TransferStats $stats) {
+ echo $stats->getEffectiveUri() . "\n";
+ echo $stats->getTransferTime() . "\n";
+ var_dump($stats->getHandlerStats());
+
+ // You must check if a response was received before using the
+ // response object.
+ if ($stats->hasResponse()) {
+ echo $stats->getResponse()->getStatusCode();
+ } else {
+ // Error data is handler specific. You will need to know what
+ // type of error data your handler uses before using this
+ // value.
+ var_dump($stats->getHandlerErrorData());
+ }
+ }
+ ]);
+
+
+progress
+--------
+
+:Summary: Defines a function to invoke when transfer progress is made.
+:Types: - callable
+:Default: None
+:Constant: ``GuzzleHttp\RequestOptions::PROGRESS``
+
+The function accepts the following positional arguments:
+
+- the total number of bytes expected to be downloaded, zero if unknown
+- the number of bytes downloaded so far
+- the total number of bytes expected to be uploaded
+- the number of bytes uploaded so far
+
+.. code-block:: php
+
+ // Send a GET request to /get?foo=bar
+ $result = $client->request(
+ 'GET',
+ '/',
+ [
+ 'progress' => function(
+ $downloadTotal,
+ $downloadedBytes,
+ $uploadTotal,
+ $uploadedBytes
+ ) {
+ //do something
+ },
+ ]
+ );
+
+
+.. _proxy-option:
+
+proxy
+-----
+
+:Summary: Pass a string to specify an HTTP proxy, or an array to specify
+ different proxies for different protocols.
+:Types:
+ - string
+ - array
+:Default: None
+:Constant: ``GuzzleHttp\RequestOptions::PROXY``
+
+Pass a string to specify a proxy for all protocols.
+
+.. code-block:: php
+
+ $client->request('GET', '/', ['proxy' => 'http://localhost:8125']);
+
+Pass an associative array to specify HTTP proxies for specific URI schemes
+(i.e., "http", "https"). Provide a ``no`` key value pair to provide a list of
+host names that should not be proxied to.
+
+.. note::
+
+ Guzzle will automatically populate this value with your environment's
+ ``NO_PROXY`` environment variable. However, when providing a ``proxy``
+ request option, it is up to you to provide the ``no`` value parsed from
+ the ``NO_PROXY`` environment variable
+ (e.g., ``explode(',', getenv('NO_PROXY'))``).
+
+.. code-block:: php
+
+ $client->request('GET', '/', [
+ 'proxy' => [
+ 'http' => 'http://localhost:8125', // Use this proxy with "http"
+ 'https' => 'http://localhost:9124', // Use this proxy with "https",
+ 'no' => ['.mit.edu', 'foo.com'] // Don't use a proxy with these
+ ]
+ ]);
+
+.. note::
+
+ You can provide proxy URLs that contain a scheme, username, and password.
+ For example, ``"http://username:password@192.168.16.1:10"``.
+
+
+query
+-----
+
+:Summary: Associative array of query string values or query string to add to
+ the request.
+:Types:
+ - array
+ - string
+:Default: None
+:Constant: ``GuzzleHttp\RequestOptions::QUERY``
+
+.. code-block:: php
+
+ // Send a GET request to /get?foo=bar
+ $client->request('GET', '/get', ['query' => ['foo' => 'bar']]);
+
+Query strings specified in the ``query`` option will overwrite all query string
+values supplied in the URI of a request.
+
+.. code-block:: php
+
+ // Send a GET request to /get?foo=bar
+ $client->request('GET', '/get?abc=123', ['query' => ['foo' => 'bar']]);
+
+read_timeout
+------------
+
+:Summary: Float describing the timeout to use when reading a streamed body
+:Types: float
+:Default: Defaults to the value of the ``default_socket_timeout`` PHP ini setting
+:Constant: ``GuzzleHttp\RequestOptions::READ_TIMEOUT``
+
+The timeout applies to individual read operations on a streamed body (when the ``stream`` option is enabled).
+
+.. code-block:: php
+
+ $response = $client->request('GET', '/stream', [
+ 'stream' => true,
+ 'read_timeout' => 10,
+ ]);
+
+ $body = $response->getBody();
+
+ // Returns false on timeout
+ $data = $body->read(1024);
+
+ // Returns false on timeout
+ $line = fgets($body->detach());
+
+.. _sink-option:
+
+sink
+----
+
+:Summary: Specify where the body of a response will be saved.
+:Types:
+ - string (path to file on disk)
+ - ``fopen()`` resource
+ - ``Psr\Http\Message\StreamInterface``
+
+:Default: PHP temp stream
+:Constant: ``GuzzleHttp\RequestOptions::SINK``
+
+Pass a string to specify the path to a file that will store the contents of the
+response body:
+
+.. code-block:: php
+
+ $client->request('GET', '/stream/20', ['sink' => '/path/to/file']);
+
+Pass a resource returned from ``fopen()`` to write the response to a PHP stream:
+
+.. code-block:: php
+
+ $resource = \GuzzleHttp\Psr7\Utils::tryFopen('/path/to/file', 'w');
+ $client->request('GET', '/stream/20', ['sink' => $resource]);
+
+Pass a ``Psr\Http\Message\StreamInterface`` object to stream the response
+body to an open PSR-7 stream.
+
+.. code-block:: php
+
+ $resource = \GuzzleHttp\Psr7\Utils::tryFopen('/path/to/file', 'w');
+ $stream = \GuzzleHttp\Psr7\Utils::streamFor($resource);
+ $client->request('GET', '/stream/20', ['save_to' => $stream]);
+
+.. note::
+
+ The ``save_to`` request option has been deprecated in favor of the
+ ``sink`` request option. Providing the ``save_to`` option is now an alias
+ of ``sink``.
+
+
+.. _ssl_key-option:
+
+ssl_key
+-------
+
+:Summary: Specify the path to a file containing a private SSL key in PEM
+ format. If a password is required, then set to an array containing the path
+ to the SSL key in the first array element followed by the password required
+ for the certificate in the second element.
+:Types:
+ - string
+ - array
+:Default: None
+:Constant: ``GuzzleHttp\RequestOptions::SSL_KEY``
+
+.. note::
+
+ ``ssl_key`` is implemented by HTTP handlers. This is currently only
+ supported by the cURL handler, but might be supported by other third-part
+ handlers.
+
+
+.. _stream-option:
+
+stream
+------
+
+:Summary: Set to ``true`` to stream a response rather than download it all
+ up-front.
+:Types: bool
+:Default: ``false``
+:Constant: ``GuzzleHttp\RequestOptions::STREAM``
+
+.. code-block:: php
+
+ $response = $client->request('GET', '/stream/20', ['stream' => true]);
+ // Read bytes off of the stream until the end of the stream is reached
+ $body = $response->getBody();
+ while (!$body->eof()) {
+ echo $body->read(1024);
+ }
+
+.. note::
+
+ Streaming response support must be implemented by the HTTP handler used by
+ a client. This option might not be supported by every HTTP handler, but the
+ interface of the response object remains the same regardless of whether or
+ not it is supported by the handler.
+
+
+synchronous
+-----------
+
+:Summary: Set to true to inform HTTP handlers that you intend on waiting on the
+ response. This can be useful for optimizations.
+:Types: bool
+:Default: none
+:Constant: ``GuzzleHttp\RequestOptions::SYNCHRONOUS``
+
+
+.. _verify-option:
+
+verify
+------
+
+:Summary: Describes the SSL certificate verification behavior of a request.
+
+ - Set to ``true`` to enable SSL certificate verification and use the default
+ CA bundle provided by operating system.
+ - Set to ``false`` to disable certificate verification (this is insecure!).
+ - Set to a string to provide the path to a CA bundle to enable verification
+ using a custom certificate.
+:Types:
+ - bool
+ - string
+:Default: ``true``
+:Constant: ``GuzzleHttp\RequestOptions::VERIFY``
+
+.. code-block:: php
+
+ // Use the system's CA bundle (this is the default setting)
+ $client->request('GET', '/', ['verify' => true]);
+
+ // Use a custom SSL certificate on disk.
+ $client->request('GET', '/', ['verify' => '/path/to/cert.pem']);
+
+ // Disable validation entirely (don't do this!).
+ $client->request('GET', '/', ['verify' => false]);
+
+If you do not need a specific certificate bundle, then Mozilla provides a
+commonly used CA bundle which can be downloaded
+`here `_
+(provided by the maintainer of cURL). Once you have a CA bundle available on
+disk, you can set the "openssl.cafile" PHP ini setting to point to the path to
+the file, allowing you to omit the "verify" request option. Much more detail on
+SSL certificates can be found on the
+`cURL website `_.
+
+
+.. _timeout-option:
+
+timeout
+-------
+
+:Summary: Float describing the total timeout of the request in seconds. Use ``0``
+ to wait indefinitely (the default behavior).
+:Types: float
+:Default: ``0``
+:Constant: ``GuzzleHttp\RequestOptions::TIMEOUT``
+
+.. code-block:: php
+
+ // Timeout if a server does not return a response in 3.14 seconds.
+ $client->request('GET', '/delay/5', ['timeout' => 3.14]);
+ // PHP Fatal error: Uncaught exception 'GuzzleHttp\Exception\TransferException'
+
+
+.. _version-option:
+
+version
+-------
+
+:Summary: Protocol version to use with the request.
+:Types: string, float
+:Default: ``1.1``
+:Constant: ``GuzzleHttp\RequestOptions::VERSION``
+
+.. code-block:: php
+
+ // Force HTTP/1.0
+ $request = $client->request('GET', '/get', ['version' => 1.0]);
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/requirements.txt b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/requirements.txt
new file mode 100644
index 0000000000..65adf95d2c
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/requirements.txt
@@ -0,0 +1,4 @@
+Sphinx>=1.3.0,<1.4.0
+guzzle_sphinx_theme>=0.7.0,<0.8.0
+jinja2<3
+markupsafe<2.1
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/testing.rst b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/testing.rst
new file mode 100644
index 0000000000..e1bf8324e4
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/docs/testing.rst
@@ -0,0 +1,214 @@
+======================
+Testing Guzzle Clients
+======================
+
+Guzzle provides several tools that will enable you to easily mock the HTTP
+layer without needing to send requests over the internet.
+
+* Mock handler
+* History middleware
+* Node.js web server for integration testing
+
+
+Mock Handler
+============
+
+When testing HTTP clients, you often need to simulate specific scenarios like
+returning a successful response, returning an error, or returning specific
+responses in a certain order. Because unit tests need to be predictable, easy
+to bootstrap, and fast, hitting an actual remote API is a test smell.
+
+Guzzle provides a mock handler that can be used to fulfill HTTP requests with
+a response or exception by shifting return values off of a queue.
+
+.. code-block:: php
+
+ use GuzzleHttp\Client;
+ use GuzzleHttp\Handler\MockHandler;
+ use GuzzleHttp\HandlerStack;
+ use GuzzleHttp\Psr7\Response;
+ use GuzzleHttp\Psr7\Request;
+ use GuzzleHttp\Exception\RequestException;
+
+ // Create a mock and queue two responses.
+ $mock = new MockHandler([
+ new Response(200, ['X-Foo' => 'Bar'], 'Hello, World'),
+ new Response(202, ['Content-Length' => 0]),
+ new RequestException('Error Communicating with Server', new Request('GET', 'test'))
+ ]);
+
+ $handlerStack = HandlerStack::create($mock);
+ $client = new Client(['handler' => $handlerStack]);
+
+ // The first request is intercepted with the first response.
+ $response = $client->request('GET', '/');
+ echo $response->getStatusCode();
+ //> 200
+ echo $response->getBody();
+ //> Hello, World
+ // The second request is intercepted with the second response.
+ echo $client->request('GET', '/')->getStatusCode();
+ //> 202
+
+ // Reset the queue and queue up a new response
+ $mock->reset();
+ $mock->append(new Response(201));
+
+ // As the mock was reset, the new response is the 201 CREATED,
+ // instead of the previously queued RequestException
+ echo $client->request('GET', '/')->getStatusCode();
+ //> 201
+
+
+When no more responses are in the queue and a request is sent, an
+``OutOfBoundsException`` is thrown.
+
+History Middleware
+==================
+
+When using things like the ``Mock`` handler, you often need to know if the
+requests you expected to send were sent exactly as you intended. While the mock
+handler responds with mocked responses, the history middleware maintains a
+history of the requests that were sent by a client.
+
+.. code-block:: php
+
+ use GuzzleHttp\Client;
+ use GuzzleHttp\HandlerStack;
+ use GuzzleHttp\Middleware;
+
+ $container = [];
+ $history = Middleware::history($container);
+
+ $handlerStack = HandlerStack::create();
+ // or $handlerStack = HandlerStack::create($mock); if using the Mock handler.
+
+ // Add the history middleware to the handler stack.
+ $handlerStack->push($history);
+
+ $client = new Client(['handler' => $handlerStack]);
+
+ $client->request('GET', 'http://httpbin.org/get');
+ $client->request('HEAD', 'http://httpbin.org/get');
+
+ // Count the number of transactions
+ echo count($container);
+ //> 2
+
+ // Iterate over the requests and responses
+ foreach ($container as $transaction) {
+ echo $transaction['request']->getMethod();
+ //> GET, HEAD
+ if ($transaction['response']) {
+ echo $transaction['response']->getStatusCode();
+ //> 200, 200
+ } elseif ($transaction['error']) {
+ echo $transaction['error'];
+ //> exception
+ }
+ var_dump($transaction['options']);
+ //> dumps the request options of the sent request.
+ }
+
+
+Test Web Server
+===============
+
+Using mock responses is almost always enough when testing a web service client.
+When implementing custom :doc:`HTTP handlers `, you'll
+need to send actual HTTP requests in order to sufficiently test the handler.
+However, a best practice is to contact a local web server rather than a server
+over the internet.
+
+- Tests are more reliable
+- Tests do not require a network connection
+- Tests have no external dependencies
+
+
+Using the test server
+---------------------
+
+.. warning::
+
+ The following functionality is provided to help developers of Guzzle
+ develop HTTP handlers. There is no promise of backwards compatibility
+ when it comes to the node.js test server or the ``GuzzleHttp\Tests\Server``
+ class. If you are using the test server or ``Server`` class outside of
+ guzzlehttp/guzzle, then you will need to configure autoloading and
+ ensure the web server is started manually.
+
+.. hint::
+
+ You almost never need to use this test web server. You should only ever
+ consider using it when developing HTTP handlers. The test web server
+ is not necessary for mocking requests. For that, please use the
+ Mock handler and history middleware.
+
+Guzzle provides a node.js test server as a separate composer package that
+receives requests and returns responses from a queue. The test server exposes
+a simple API that is used to enqueue responses and inspect the requests that it
+has received.
+
+You can add the test server as a dev dependency using Composer.
+
+.. code-block:: bash
+
+ composer require --dev guzzlehttp/test-server:^0.1
+
+Alternatively, you can include it as a dev dependency in your project's
+existing composer.json file:
+
+.. code-block:: json
+
+ {
+ "require-dev": {
+ "guzzlehttp/test-server": "^0.1"
+ }
+ }
+
+Any operation on the ``Server`` object will ensure that
+the server is running and wait until it is able to receive requests before
+returning.
+
+``GuzzleHttp\Tests\Server`` provides a static interface to the test server. You
+can queue an HTTP response or an array of responses by calling
+``Server::enqueue()``. This method accepts an array of
+``Psr\Http\Message\ResponseInterface`` and ``Exception`` objects.
+
+.. code-block:: php
+
+ use GuzzleHttp\Client;
+ use GuzzleHttp\Psr7\Response;
+ use GuzzleHttp\Tests\Server;
+
+ // Start the server and queue a response
+ Server::enqueue([
+ new Response(200, ['Content-Length' => 0])
+ ]);
+
+ $client = new Client(['base_uri' => Server::$url]);
+ echo $client->request('GET', '/foo')->getStatusCode();
+ // 200
+
+When a response is queued on the test server, the test server will remove any
+previously queued responses. As the server receives requests, queued responses
+are dequeued and returned to the request. When the queue is empty, the server
+will return a 500 response.
+
+You can inspect the requests that the server has retrieved by calling
+``Server::received()``.
+
+.. code-block:: php
+
+ foreach (Server::received() as $response) {
+ echo $response->getStatusCode();
+ }
+
+You can clear the list of received requests from the web server using the
+``Server::flush()`` method.
+
+.. code-block:: php
+
+ Server::flush();
+ echo count(Server::received());
+ // 0
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/phpstan-baseline.neon b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/phpstan-baseline.neon
new file mode 100644
index 0000000000..f7dff93a58
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/phpstan-baseline.neon
@@ -0,0 +1,202 @@
+parameters:
+ ignoreErrors:
+ -
+ message: "#^Method GuzzleHttp\\\\Client\\:\\:request\\(\\) should return Psr\\\\Http\\\\Message\\\\ResponseInterface but returns mixed\\.$#"
+ count: 1
+ path: src/Client.php
+
+ -
+ message: "#^Method GuzzleHttp\\\\Client\\:\\:send\\(\\) should return Psr\\\\Http\\\\Message\\\\ResponseInterface but returns mixed\\.$#"
+ count: 1
+ path: src/Client.php
+
+ -
+ message: "#^Method GuzzleHttp\\\\Client\\:\\:sendRequest\\(\\) should return Psr\\\\Http\\\\Message\\\\ResponseInterface but returns mixed\\.$#"
+ count: 1
+ path: src/Client.php
+
+ -
+ message: "#^Parameter \\#1 \\$str of function strtolower expects string, int\\|string given\\.$#"
+ count: 1
+ path: src/Client.php
+
+ -
+ message: "#^Parameter \\#1 \\$string of function strlen expects string, mixed given\\.$#"
+ count: 1
+ path: src/Cookie/SessionCookieJar.php
+
+ -
+ message: "#^Result of && is always false\\.$#"
+ count: 3
+ path: src/Cookie/SetCookie.php
+
+ -
+ message: "#^Strict comparison using \\!\\=\\= between null and null will always evaluate to false\\.$#"
+ count: 3
+ path: src/Cookie/SetCookie.php
+
+ -
+ message: "#^Cannot access offset 'features' on array\\|false\\.$#"
+ count: 3
+ path: src/Handler/CurlFactory.php
+
+ -
+ message: "#^Cannot access offset 'version' on array\\|false\\.$#"
+ count: 1
+ path: src/Handler/CurlFactory.php
+
+ -
+ message: "#^Cannot call method getBody\\(\\) on Psr\\\\Http\\\\Message\\\\ResponseInterface\\|null\\.$#"
+ count: 1
+ path: src/Handler/CurlFactory.php
+
+ -
+ message: "#^Parameter \\#1 \\$ch of function curl_close expects resource, CurlHandle\\|resource given\\.$#"
+ count: 2
+ path: src/Handler/CurlFactory.php
+
+ -
+ message: "#^Parameter \\#1 \\$ch of function curl_error expects resource, CurlHandle\\|resource given\\.$#"
+ count: 1
+ path: src/Handler/CurlFactory.php
+
+ -
+ message: "#^Parameter \\#1 \\$ch of function curl_getinfo expects resource, CurlHandle\\|resource given\\.$#"
+ count: 4
+ path: src/Handler/CurlFactory.php
+
+ -
+ message: "#^Parameter \\#1 \\$ch of function curl_reset expects resource, CurlHandle\\|resource given\\.$#"
+ count: 1
+ path: src/Handler/CurlFactory.php
+
+ -
+ message: "#^Parameter \\#1 \\$ch of function curl_setopt expects resource, CurlHandle\\|resource given\\.$#"
+ count: 4
+ path: src/Handler/CurlFactory.php
+
+ -
+ message: "#^Parameter \\#1 \\$ch of function curl_setopt_array expects resource, CurlHandle\\|resource given\\.$#"
+ count: 1
+ path: src/Handler/CurlFactory.php
+
+ -
+ message: "#^Parameter \\#1 \\$str1 of function strcasecmp expects string, int\\|string given\\.$#"
+ count: 1
+ path: src/Handler/CurlFactory.php
+
+ -
+ message: "#^Property GuzzleHttp\\\\Handler\\\\CurlFactory\\:\\:\\$handles has unknown class CurlHandle as its type\\.$#"
+ count: 1
+ path: src/Handler/CurlFactory.php
+
+ -
+ message: "#^Parameter \\#1 \\$ch of function curl_errno expects resource, CurlHandle\\|resource given\\.$#"
+ count: 1
+ path: src/Handler/CurlHandler.php
+
+ -
+ message: "#^Parameter \\#1 \\$ch of function curl_exec expects resource, CurlHandle\\|resource given\\.$#"
+ count: 1
+ path: src/Handler/CurlHandler.php
+
+ -
+ message: "#^Method GuzzleHttp\\\\Handler\\\\CurlMultiHandler\\:\\:__get\\(\\) has invalid return type CurlMultiHandle\\.$#"
+ count: 1
+ path: src/Handler/CurlMultiHandler.php
+
+ -
+ message: "#^Parameter \\#1 \\$mh of function curl_multi_add_handle expects resource, CurlMultiHandle\\|resource given\\.$#"
+ count: 2
+ path: src/Handler/CurlMultiHandler.php
+
+ -
+ message: "#^Parameter \\#1 \\$mh of function curl_multi_close expects resource, CurlMultiHandle\\|resource given\\.$#"
+ count: 1
+ path: src/Handler/CurlMultiHandler.php
+
+ -
+ message: "#^Parameter \\#1 \\$mh of function curl_multi_exec expects resource, CurlMultiHandle\\|resource given\\.$#"
+ count: 2
+ path: src/Handler/CurlMultiHandler.php
+
+ -
+ message: "#^Parameter \\#1 \\$mh of function curl_multi_info_read expects resource, CurlMultiHandle\\|resource given\\.$#"
+ count: 1
+ path: src/Handler/CurlMultiHandler.php
+
+ -
+ message: "#^Parameter \\#1 \\$mh of function curl_multi_remove_handle expects resource, CurlMultiHandle\\|resource given\\.$#"
+ count: 2
+ path: src/Handler/CurlMultiHandler.php
+
+ -
+ message: "#^Parameter \\#1 \\$mh of function curl_multi_select expects resource, CurlMultiHandle\\|resource given\\.$#"
+ count: 3
+ path: src/Handler/CurlMultiHandler.php
+
+ -
+ message: "#^Property GuzzleHttp\\\\Handler\\\\CurlMultiHandler\\:\\:\\$_mh \\(CurlMultiHandle\\|resource\\) in isset\\(\\) is not nullable\\.$#"
+ count: 1
+ path: src/Handler/CurlMultiHandler.php
+
+ -
+ message: "#^Property GuzzleHttp\\\\Handler\\\\CurlMultiHandler\\:\\:\\$_mh has unknown class CurlMultiHandle as its type\\.$#"
+ count: 1
+ path: src/Handler/CurlMultiHandler.php
+
+ -
+ message: "#^Strict comparison using \\=\\=\\= between false and resource will always evaluate to false\\.$#"
+ count: 1
+ path: src/Handler/CurlMultiHandler.php
+
+ -
+ message: "#^Property GuzzleHttp\\\\Handler\\\\EasyHandle\\:\\:\\$handle has unknown class CurlHandle as its type\\.$#"
+ count: 1
+ path: src/Handler/EasyHandle.php
+
+ -
+ message: "#^Trying to invoke mixed but it's not a callable\\.$#"
+ count: 1
+ path: src/Handler/StreamHandler.php
+
+ -
+ message: "#^Variable \\$http_response_header on left side of \\?\\? always exists and is not nullable\\.$#"
+ count: 1
+ path: src/Handler/StreamHandler.php
+
+ -
+ message: "#^Variable \\$options in empty\\(\\) always exists and is not falsy\\.$#"
+ count: 1
+ path: src/Handler/StreamHandler.php
+
+ -
+ message: "#^Result of && is always false\\.$#"
+ count: 1
+ path: src/HandlerStack.php
+
+ -
+ message: "#^Result of && is always false\\.$#"
+ count: 2
+ path: src/Middleware.php
+
+ -
+ message: "#^Cannot access offset 'version' on array\\|false\\.$#"
+ count: 1
+ path: src/Utils.php
+
+ -
+ message: "#^Method GuzzleHttp\\\\Utils\\:\\:jsonDecode\\(\\) should return array\\|bool\\|float\\|int\\|object\\|string\\|null but returns mixed\\.$#"
+ count: 1
+ path: src/Utils.php
+
+ -
+ message: "#^Parameter \\#3 \\$depth of function json_decode expects int\\<1, max\\>, int given\\.$#"
+ count: 1
+ path: src/Utils.php
+
+ -
+ message: "#^Parameter \\#3 \\$depth of function json_encode expects int\\<1, max\\>, int given\\.$#"
+ count: 1
+ path: src/Utils.php
+
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/phpstan.neon.dist b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/phpstan.neon.dist
new file mode 100644
index 0000000000..4a8a32171c
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/phpstan.neon.dist
@@ -0,0 +1,13 @@
+includes:
+ - phpstan-baseline.neon
+ - vendor-bin/phpstan/vendor/phpstan/phpstan-deprecation-rules/rules.neon
+
+parameters:
+ ignoreErrors:
+ -
+ identifier: missingType.iterableValue
+ level: max
+ paths:
+ - src
+ bootstrapFiles:
+ - tests/bootstrap-phpstan.php
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/phpunit.xml.dist b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/phpunit.xml.dist
new file mode 100644
index 0000000000..4dd5ecc6da
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/phpunit.xml.dist
@@ -0,0 +1,30 @@
+
+
+
+
+ tests
+
+
+
+
+
+
+
+
+
+ src
+
+ src/
+
+
+
+
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/psalm-baseline.xml b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/psalm-baseline.xml
new file mode 100644
index 0000000000..396852dbfe
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/psalm-baseline.xml
@@ -0,0 +1,276 @@
+
+
+
+
+
+
+
+
+
+
+
+
+ cookies))]]>
+
+
+ ]]>
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ handle]]>
+ handle]]>
+ handle]]>
+ handle]]>
+ handle]]>
+ handle]]>
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ handle]]>
+ handle]]>
+
+
+
+
+ timeToNext()]]>
+
+
+ handle]]>
+
+
+ _mh]]>
+ _mh]]>
+ _mh]]>
+ _mh]]>
+ _mh]]>
+ _mh]]>
+ _mh]]>
+ _mh]]>
+ _mh]]>
+ _mh]]>
+ _mh]]>
+
+
+ _mh)]]>
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ getMethod()
+ .' '.$request->getRequestTarget())
+ .' HTTP/'.$request->getProtocolVersion()."\r\n"
+ .$this->headers($request);
+ break;
+ case 'res_headers':
+ $result = $response ?
+ \sprintf(
+ 'HTTP/%s %d %s',
+ $response->getProtocolVersion(),
+ $response->getStatusCode(),
+ $response->getReasonPhrase()
+ )."\r\n".$this->headers($response)
+ : 'NULL';
+ break;
+ case 'req_body':
+ $result = $request->getBody()->__toString();
+ break;
+ case 'res_body':
+ if (!$response instanceof ResponseInterface) {
+ $result = 'NULL';
+ break;
+ }
+
+ $body = $response->getBody();
+
+ if (!$body->isSeekable()) {
+ $result = 'RESPONSE_NOT_LOGGEABLE';
+ break;
+ }
+
+ $result = $response->getBody()->__toString();
+ break;
+ case 'ts':
+ case 'date_iso_8601':
+ $result = \gmdate('c');
+ break;
+ case 'date_common_log':
+ $result = \date('d/M/Y:H:i:s O');
+ break;
+ case 'method':
+ $result = $request->getMethod();
+ break;
+ case 'version':
+ $result = $request->getProtocolVersion();
+ break;
+ case 'uri':
+ case 'url':
+ $result = $request->getUri()->__toString();
+ break;
+ case 'target':
+ $result = $request->getRequestTarget();
+ break;
+ case 'req_version':
+ $result = $request->getProtocolVersion();
+ break;
+ case 'res_version':
+ $result = $response
+ ? $response->getProtocolVersion()
+ : 'NULL';
+ break;
+ case 'host':
+ $result = $request->getHeaderLine('Host');
+ break;
+ case 'hostname':
+ $result = \gethostname();
+ break;
+ case 'code':
+ $result = $response ? $response->getStatusCode() : 'NULL';
+ break;
+ case 'phrase':
+ $result = $response ? $response->getReasonPhrase() : 'NULL';
+ break;
+ case 'error':
+ $result = $error ? $error->getMessage() : 'NULL';
+ break;
+ default:
+ // handle prefixed dynamic headers
+ if (\strpos($matches[1], 'req_header_') === 0) {
+ $result = $request->getHeaderLine(\substr($matches[1], 11));
+ } elseif (\strpos($matches[1], 'res_header_') === 0) {
+ $result = $response
+ ? $response->getHeaderLine(\substr($matches[1], 11))
+ : 'NULL';
+ }
+ }
+
+ $cache[$matches[1]] = $result;
+
+ return $result;
+ }]]>
+
+
+
+
+
+
+
+
+
+ delay)(++$options['retries'], $response, $request)]]>
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/psalm.xml b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/psalm.xml
new file mode 100644
index 0000000000..86d8671da8
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/psalm.xml
@@ -0,0 +1,18 @@
+
+
+
+
+
+
+
+
+
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/BodySummarizer.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/BodySummarizer.php
new file mode 100644
index 0000000000..761506dd07
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/BodySummarizer.php
@@ -0,0 +1,28 @@
+truncateAt = $truncateAt;
+ }
+
+ /**
+ * Returns a summarized message body.
+ */
+ public function summarize(MessageInterface $message): ?string
+ {
+ return $this->truncateAt === null
+ ? Psr7\Message::bodySummary($message)
+ : Psr7\Message::bodySummary($message, $this->truncateAt);
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/BodySummarizerInterface.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/BodySummarizerInterface.php
new file mode 100644
index 0000000000..3e02e036e3
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/BodySummarizerInterface.php
@@ -0,0 +1,13 @@
+ 'http://www.foo.com/1.0/',
+ * 'timeout' => 0,
+ * 'allow_redirects' => false,
+ * 'proxy' => '192.168.16.1:10'
+ * ]);
+ *
+ * Client configuration settings include the following options:
+ *
+ * - handler: (callable) Function that transfers HTTP requests over the
+ * wire. The function is called with a Psr7\Http\Message\RequestInterface
+ * and array of transfer options, and must return a
+ * GuzzleHttp\Promise\PromiseInterface that is fulfilled with a
+ * Psr7\Http\Message\ResponseInterface on success.
+ * If no handler is provided, a default handler will be created
+ * that enables all of the request options below by attaching all of the
+ * default middleware to the handler.
+ * - base_uri: (string|UriInterface) Base URI of the client that is merged
+ * into relative URIs. Can be a string or instance of UriInterface.
+ * - **: any request option
+ *
+ * @param array $config Client configuration settings.
+ *
+ * @see RequestOptions for a list of available request options.
+ */
+ public function __construct(array $config = [])
+ {
+ if (!isset($config['handler'])) {
+ $config['handler'] = HandlerStack::create();
+ } elseif (!\is_callable($config['handler'])) {
+ throw new InvalidArgumentException('handler must be a callable');
+ }
+
+ // Convert the base_uri to a UriInterface
+ if (isset($config['base_uri'])) {
+ $config['base_uri'] = Psr7\Utils::uriFor($config['base_uri']);
+ }
+
+ $this->configureDefaults($config);
+ }
+
+ /**
+ * @param string $method
+ * @param array $args
+ *
+ * @return PromiseInterface|ResponseInterface
+ *
+ * @deprecated Client::__call will be removed in guzzlehttp/guzzle:8.0.
+ */
+ public function __call($method, $args)
+ {
+ if (\count($args) < 1) {
+ throw new InvalidArgumentException('Magic request methods require a URI and optional options array');
+ }
+
+ $uri = $args[0];
+ $opts = $args[1] ?? [];
+
+ return \substr($method, -5) === 'Async'
+ ? $this->requestAsync(\substr($method, 0, -5), $uri, $opts)
+ : $this->request($method, $uri, $opts);
+ }
+
+ /**
+ * Asynchronously send an HTTP request.
+ *
+ * @param array $options Request options to apply to the given
+ * request and to the transfer. See \GuzzleHttp\RequestOptions.
+ */
+ public function sendAsync(RequestInterface $request, array $options = []): PromiseInterface
+ {
+ // Merge the base URI into the request URI if needed.
+ $options = $this->prepareDefaults($options);
+
+ return $this->transfer(
+ $request->withUri($this->buildUri($request->getUri(), $options), $request->hasHeader('Host')),
+ $options
+ );
+ }
+
+ /**
+ * Send an HTTP request.
+ *
+ * @param array $options Request options to apply to the given
+ * request and to the transfer. See \GuzzleHttp\RequestOptions.
+ *
+ * @throws GuzzleException
+ */
+ public function send(RequestInterface $request, array $options = []): ResponseInterface
+ {
+ $options[RequestOptions::SYNCHRONOUS] = true;
+
+ return $this->sendAsync($request, $options)->wait();
+ }
+
+ /**
+ * The HttpClient PSR (PSR-18) specify this method.
+ *
+ * {@inheritDoc}
+ */
+ public function sendRequest(RequestInterface $request): ResponseInterface
+ {
+ $options[RequestOptions::SYNCHRONOUS] = true;
+ $options[RequestOptions::ALLOW_REDIRECTS] = false;
+ $options[RequestOptions::HTTP_ERRORS] = false;
+
+ return $this->sendAsync($request, $options)->wait();
+ }
+
+ /**
+ * Create and send an asynchronous HTTP request.
+ *
+ * Use an absolute path to override the base path of the client, or a
+ * relative path to append to the base path of the client. The URL can
+ * contain the query string as well. Use an array to provide a URL
+ * template and additional variables to use in the URL template expansion.
+ *
+ * @param string $method HTTP method
+ * @param string|UriInterface $uri URI object or string.
+ * @param array $options Request options to apply. See \GuzzleHttp\RequestOptions.
+ */
+ public function requestAsync(string $method, $uri = '', array $options = []): PromiseInterface
+ {
+ $options = $this->prepareDefaults($options);
+ // Remove request modifying parameter because it can be done up-front.
+ $headers = $options['headers'] ?? [];
+ $body = $options['body'] ?? null;
+ $version = $options['version'] ?? '1.1';
+ // Merge the URI into the base URI.
+ $uri = $this->buildUri(Psr7\Utils::uriFor($uri), $options);
+ if (\is_array($body)) {
+ throw $this->invalidBody();
+ }
+ $request = new Psr7\Request($method, $uri, $headers, $body, $version);
+ // Remove the option so that they are not doubly-applied.
+ unset($options['headers'], $options['body'], $options['version']);
+
+ return $this->transfer($request, $options);
+ }
+
+ /**
+ * Create and send an HTTP request.
+ *
+ * Use an absolute path to override the base path of the client, or a
+ * relative path to append to the base path of the client. The URL can
+ * contain the query string as well.
+ *
+ * @param string $method HTTP method.
+ * @param string|UriInterface $uri URI object or string.
+ * @param array $options Request options to apply. See \GuzzleHttp\RequestOptions.
+ *
+ * @throws GuzzleException
+ */
+ public function request(string $method, $uri = '', array $options = []): ResponseInterface
+ {
+ $options[RequestOptions::SYNCHRONOUS] = true;
+
+ return $this->requestAsync($method, $uri, $options)->wait();
+ }
+
+ /**
+ * Get a client configuration option.
+ *
+ * These options include default request options of the client, a "handler"
+ * (if utilized by the concrete client), and a "base_uri" if utilized by
+ * the concrete client.
+ *
+ * @param string|null $option The config option to retrieve.
+ *
+ * @return mixed
+ *
+ * @deprecated Client::getConfig will be removed in guzzlehttp/guzzle:8.0.
+ */
+ public function getConfig(?string $option = null)
+ {
+ return $option === null
+ ? $this->config
+ : ($this->config[$option] ?? null);
+ }
+
+ private function buildUri(UriInterface $uri, array $config): UriInterface
+ {
+ if (isset($config['base_uri'])) {
+ $uri = Psr7\UriResolver::resolve(Psr7\Utils::uriFor($config['base_uri']), $uri);
+ }
+
+ if (isset($config['idn_conversion']) && ($config['idn_conversion'] !== false)) {
+ $idnOptions = ($config['idn_conversion'] === true) ? \IDNA_DEFAULT : $config['idn_conversion'];
+ $uri = Utils::idnUriConvert($uri, $idnOptions);
+ }
+
+ return $uri->getScheme() === '' && $uri->getHost() !== '' ? $uri->withScheme('http') : $uri;
+ }
+
+ /**
+ * Configures the default options for a client.
+ */
+ private function configureDefaults(array $config): void
+ {
+ $defaults = [
+ 'allow_redirects' => RedirectMiddleware::$defaultSettings,
+ 'http_errors' => true,
+ 'decode_content' => true,
+ 'verify' => true,
+ 'cookies' => false,
+ 'idn_conversion' => false,
+ ];
+
+ // Use the standard Linux HTTP_PROXY and HTTPS_PROXY if set.
+
+ // We can only trust the HTTP_PROXY environment variable in a CLI
+ // process due to the fact that PHP has no reliable mechanism to
+ // get environment variables that start with "HTTP_".
+ if (\PHP_SAPI === 'cli' && ($proxy = Utils::getenv('HTTP_PROXY'))) {
+ $defaults['proxy']['http'] = $proxy;
+ }
+
+ if ($proxy = Utils::getenv('HTTPS_PROXY')) {
+ $defaults['proxy']['https'] = $proxy;
+ }
+
+ if ($noProxy = Utils::getenv('NO_PROXY')) {
+ $cleanedNoProxy = \str_replace(' ', '', $noProxy);
+ $defaults['proxy']['no'] = \explode(',', $cleanedNoProxy);
+ }
+
+ $this->config = $config + $defaults;
+
+ if (!empty($config['cookies']) && $config['cookies'] === true) {
+ $this->config['cookies'] = new CookieJar();
+ }
+
+ // Add the default user-agent header.
+ if (!isset($this->config['headers'])) {
+ $this->config['headers'] = ['User-Agent' => Utils::defaultUserAgent()];
+ } else {
+ // Add the User-Agent header if one was not already set.
+ foreach (\array_keys($this->config['headers']) as $name) {
+ if (\strtolower($name) === 'user-agent') {
+ return;
+ }
+ }
+ $this->config['headers']['User-Agent'] = Utils::defaultUserAgent();
+ }
+ }
+
+ /**
+ * Merges default options into the array.
+ *
+ * @param array $options Options to modify by reference
+ */
+ private function prepareDefaults(array $options): array
+ {
+ $defaults = $this->config;
+
+ if (!empty($defaults['headers'])) {
+ // Default headers are only added if they are not present.
+ $defaults['_conditional'] = $defaults['headers'];
+ unset($defaults['headers']);
+ }
+
+ // Special handling for headers is required as they are added as
+ // conditional headers and as headers passed to a request ctor.
+ if (\array_key_exists('headers', $options)) {
+ // Allows default headers to be unset.
+ if ($options['headers'] === null) {
+ $defaults['_conditional'] = [];
+ unset($options['headers']);
+ } elseif (!\is_array($options['headers'])) {
+ throw new InvalidArgumentException('headers must be an array');
+ }
+ }
+
+ // Shallow merge defaults underneath options.
+ $result = $options + $defaults;
+
+ // Remove null values.
+ foreach ($result as $k => $v) {
+ if ($v === null) {
+ unset($result[$k]);
+ }
+ }
+
+ return $result;
+ }
+
+ /**
+ * Transfers the given request and applies request options.
+ *
+ * The URI of the request is not modified and the request options are used
+ * as-is without merging in default options.
+ *
+ * @param array $options See \GuzzleHttp\RequestOptions.
+ */
+ private function transfer(RequestInterface $request, array $options): PromiseInterface
+ {
+ $request = $this->applyOptions($request, $options);
+ /** @var HandlerStack $handler */
+ $handler = $options['handler'];
+
+ try {
+ return P\Create::promiseFor($handler($request, $options));
+ } catch (\Exception $e) {
+ return P\Create::rejectionFor($e);
+ }
+ }
+
+ /**
+ * Applies the array of request options to a request.
+ */
+ private function applyOptions(RequestInterface $request, array &$options): RequestInterface
+ {
+ $modify = [
+ 'set_headers' => [],
+ ];
+
+ if (isset($options['headers'])) {
+ if (array_keys($options['headers']) === range(0, count($options['headers']) - 1)) {
+ throw new InvalidArgumentException('The headers array must have header name as keys.');
+ }
+ $modify['set_headers'] = $options['headers'];
+ unset($options['headers']);
+ }
+
+ if (isset($options['form_params'])) {
+ if (isset($options['multipart'])) {
+ throw new InvalidArgumentException('You cannot use '
+ .'form_params and multipart at the same time. Use the '
+ .'form_params option if you want to send application/'
+ .'x-www-form-urlencoded requests, and the multipart '
+ .'option to send multipart/form-data requests.');
+ }
+ $options['body'] = \http_build_query($options['form_params'], '', '&');
+ unset($options['form_params']);
+ // Ensure that we don't have the header in different case and set the new value.
+ $options['_conditional'] = Psr7\Utils::caselessRemove(['Content-Type'], $options['_conditional']);
+ $options['_conditional']['Content-Type'] = 'application/x-www-form-urlencoded';
+ }
+
+ if (isset($options['multipart'])) {
+ $options['body'] = new Psr7\MultipartStream($options['multipart']);
+ unset($options['multipart']);
+ }
+
+ if (isset($options['json'])) {
+ $options['body'] = Utils::jsonEncode($options['json']);
+ unset($options['json']);
+ // Ensure that we don't have the header in different case and set the new value.
+ $options['_conditional'] = Psr7\Utils::caselessRemove(['Content-Type'], $options['_conditional']);
+ $options['_conditional']['Content-Type'] = 'application/json';
+ }
+
+ if (!empty($options['decode_content'])
+ && $options['decode_content'] !== true
+ ) {
+ // Ensure that we don't have the header in different case and set the new value.
+ $options['_conditional'] = Psr7\Utils::caselessRemove(['Accept-Encoding'], $options['_conditional']);
+ $modify['set_headers']['Accept-Encoding'] = $options['decode_content'];
+ }
+
+ if (isset($options['body'])) {
+ if (\is_array($options['body'])) {
+ throw $this->invalidBody();
+ }
+ $modify['body'] = Psr7\Utils::streamFor($options['body']);
+ unset($options['body']);
+ }
+
+ if (!empty($options['auth']) && \is_array($options['auth'])) {
+ $value = $options['auth'];
+ $type = isset($value[2]) ? \strtolower($value[2]) : 'basic';
+ switch ($type) {
+ case 'basic':
+ // Ensure that we don't have the header in different case and set the new value.
+ $modify['set_headers'] = Psr7\Utils::caselessRemove(['Authorization'], $modify['set_headers']);
+ $modify['set_headers']['Authorization'] = 'Basic '
+ .\base64_encode("$value[0]:$value[1]");
+ break;
+ case 'digest':
+ // @todo: Do not rely on curl
+ $options['curl'][\CURLOPT_HTTPAUTH] = \CURLAUTH_DIGEST;
+ $options['curl'][\CURLOPT_USERPWD] = "$value[0]:$value[1]";
+ break;
+ case 'ntlm':
+ $options['curl'][\CURLOPT_HTTPAUTH] = \CURLAUTH_NTLM;
+ $options['curl'][\CURLOPT_USERPWD] = "$value[0]:$value[1]";
+ break;
+ }
+ }
+
+ if (isset($options['query'])) {
+ $value = $options['query'];
+ if (\is_array($value)) {
+ $value = \http_build_query($value, '', '&', \PHP_QUERY_RFC3986);
+ }
+ if (!\is_string($value)) {
+ throw new InvalidArgumentException('query must be a string or array');
+ }
+ $modify['query'] = $value;
+ unset($options['query']);
+ }
+
+ // Ensure that sink is not an invalid value.
+ if (isset($options['sink'])) {
+ // TODO: Add more sink validation?
+ if (\is_bool($options['sink'])) {
+ throw new InvalidArgumentException('sink must not be a boolean');
+ }
+ }
+
+ if (isset($options['version'])) {
+ $modify['version'] = $options['version'];
+ }
+
+ $request = Psr7\Utils::modifyRequest($request, $modify);
+ if ($request->getBody() instanceof Psr7\MultipartStream) {
+ // Use a multipart/form-data POST if a Content-Type is not set.
+ // Ensure that we don't have the header in different case and set the new value.
+ $options['_conditional'] = Psr7\Utils::caselessRemove(['Content-Type'], $options['_conditional']);
+ $options['_conditional']['Content-Type'] = 'multipart/form-data; boundary='
+ .$request->getBody()->getBoundary();
+ }
+
+ // Merge in conditional headers if they are not present.
+ if (isset($options['_conditional'])) {
+ // Build up the changes so it's in a single clone of the message.
+ $modify = [];
+ foreach ($options['_conditional'] as $k => $v) {
+ if (!$request->hasHeader($k)) {
+ $modify['set_headers'][$k] = $v;
+ }
+ }
+ $request = Psr7\Utils::modifyRequest($request, $modify);
+ // Don't pass this internal value along to middleware/handlers.
+ unset($options['_conditional']);
+ }
+
+ return $request;
+ }
+
+ /**
+ * Return an InvalidArgumentException with pre-set message.
+ */
+ private function invalidBody(): InvalidArgumentException
+ {
+ return new InvalidArgumentException('Passing in the "body" request '
+ .'option as an array to send a request is not supported. '
+ .'Please use the "form_params" request option to send a '
+ .'application/x-www-form-urlencoded request, or the "multipart" '
+ .'request option to send a multipart/form-data request.');
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/ClientInterface.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/ClientInterface.php
new file mode 100644
index 0000000000..6aaee61afc
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/ClientInterface.php
@@ -0,0 +1,84 @@
+request('GET', $uri, $options);
+ }
+
+ /**
+ * Create and send an HTTP HEAD request.
+ *
+ * Use an absolute path to override the base path of the client, or a
+ * relative path to append to the base path of the client. The URL can
+ * contain the query string as well.
+ *
+ * @param string|UriInterface $uri URI object or string.
+ * @param array $options Request options to apply.
+ *
+ * @throws GuzzleException
+ */
+ public function head($uri, array $options = []): ResponseInterface
+ {
+ return $this->request('HEAD', $uri, $options);
+ }
+
+ /**
+ * Create and send an HTTP PUT request.
+ *
+ * Use an absolute path to override the base path of the client, or a
+ * relative path to append to the base path of the client. The URL can
+ * contain the query string as well.
+ *
+ * @param string|UriInterface $uri URI object or string.
+ * @param array $options Request options to apply.
+ *
+ * @throws GuzzleException
+ */
+ public function put($uri, array $options = []): ResponseInterface
+ {
+ return $this->request('PUT', $uri, $options);
+ }
+
+ /**
+ * Create and send an HTTP POST request.
+ *
+ * Use an absolute path to override the base path of the client, or a
+ * relative path to append to the base path of the client. The URL can
+ * contain the query string as well.
+ *
+ * @param string|UriInterface $uri URI object or string.
+ * @param array $options Request options to apply.
+ *
+ * @throws GuzzleException
+ */
+ public function post($uri, array $options = []): ResponseInterface
+ {
+ return $this->request('POST', $uri, $options);
+ }
+
+ /**
+ * Create and send an HTTP PATCH request.
+ *
+ * Use an absolute path to override the base path of the client, or a
+ * relative path to append to the base path of the client. The URL can
+ * contain the query string as well.
+ *
+ * @param string|UriInterface $uri URI object or string.
+ * @param array $options Request options to apply.
+ *
+ * @throws GuzzleException
+ */
+ public function patch($uri, array $options = []): ResponseInterface
+ {
+ return $this->request('PATCH', $uri, $options);
+ }
+
+ /**
+ * Create and send an HTTP DELETE request.
+ *
+ * Use an absolute path to override the base path of the client, or a
+ * relative path to append to the base path of the client. The URL can
+ * contain the query string as well.
+ *
+ * @param string|UriInterface $uri URI object or string.
+ * @param array $options Request options to apply.
+ *
+ * @throws GuzzleException
+ */
+ public function delete($uri, array $options = []): ResponseInterface
+ {
+ return $this->request('DELETE', $uri, $options);
+ }
+
+ /**
+ * Create and send an asynchronous HTTP request.
+ *
+ * Use an absolute path to override the base path of the client, or a
+ * relative path to append to the base path of the client. The URL can
+ * contain the query string as well. Use an array to provide a URL
+ * template and additional variables to use in the URL template expansion.
+ *
+ * @param string $method HTTP method
+ * @param string|UriInterface $uri URI object or string.
+ * @param array $options Request options to apply.
+ */
+ abstract public function requestAsync(string $method, $uri, array $options = []): PromiseInterface;
+
+ /**
+ * Create and send an asynchronous HTTP GET request.
+ *
+ * Use an absolute path to override the base path of the client, or a
+ * relative path to append to the base path of the client. The URL can
+ * contain the query string as well. Use an array to provide a URL
+ * template and additional variables to use in the URL template expansion.
+ *
+ * @param string|UriInterface $uri URI object or string.
+ * @param array $options Request options to apply.
+ */
+ public function getAsync($uri, array $options = []): PromiseInterface
+ {
+ return $this->requestAsync('GET', $uri, $options);
+ }
+
+ /**
+ * Create and send an asynchronous HTTP HEAD request.
+ *
+ * Use an absolute path to override the base path of the client, or a
+ * relative path to append to the base path of the client. The URL can
+ * contain the query string as well. Use an array to provide a URL
+ * template and additional variables to use in the URL template expansion.
+ *
+ * @param string|UriInterface $uri URI object or string.
+ * @param array $options Request options to apply.
+ */
+ public function headAsync($uri, array $options = []): PromiseInterface
+ {
+ return $this->requestAsync('HEAD', $uri, $options);
+ }
+
+ /**
+ * Create and send an asynchronous HTTP PUT request.
+ *
+ * Use an absolute path to override the base path of the client, or a
+ * relative path to append to the base path of the client. The URL can
+ * contain the query string as well. Use an array to provide a URL
+ * template and additional variables to use in the URL template expansion.
+ *
+ * @param string|UriInterface $uri URI object or string.
+ * @param array $options Request options to apply.
+ */
+ public function putAsync($uri, array $options = []): PromiseInterface
+ {
+ return $this->requestAsync('PUT', $uri, $options);
+ }
+
+ /**
+ * Create and send an asynchronous HTTP POST request.
+ *
+ * Use an absolute path to override the base path of the client, or a
+ * relative path to append to the base path of the client. The URL can
+ * contain the query string as well. Use an array to provide a URL
+ * template and additional variables to use in the URL template expansion.
+ *
+ * @param string|UriInterface $uri URI object or string.
+ * @param array $options Request options to apply.
+ */
+ public function postAsync($uri, array $options = []): PromiseInterface
+ {
+ return $this->requestAsync('POST', $uri, $options);
+ }
+
+ /**
+ * Create and send an asynchronous HTTP PATCH request.
+ *
+ * Use an absolute path to override the base path of the client, or a
+ * relative path to append to the base path of the client. The URL can
+ * contain the query string as well. Use an array to provide a URL
+ * template and additional variables to use in the URL template expansion.
+ *
+ * @param string|UriInterface $uri URI object or string.
+ * @param array $options Request options to apply.
+ */
+ public function patchAsync($uri, array $options = []): PromiseInterface
+ {
+ return $this->requestAsync('PATCH', $uri, $options);
+ }
+
+ /**
+ * Create and send an asynchronous HTTP DELETE request.
+ *
+ * Use an absolute path to override the base path of the client, or a
+ * relative path to append to the base path of the client. The URL can
+ * contain the query string as well. Use an array to provide a URL
+ * template and additional variables to use in the URL template expansion.
+ *
+ * @param string|UriInterface $uri URI object or string.
+ * @param array $options Request options to apply.
+ */
+ public function deleteAsync($uri, array $options = []): PromiseInterface
+ {
+ return $this->requestAsync('DELETE', $uri, $options);
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Cookie/CookieJar.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Cookie/CookieJar.php
new file mode 100644
index 0000000000..b616cf2ed6
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Cookie/CookieJar.php
@@ -0,0 +1,307 @@
+strictMode = $strictMode;
+
+ foreach ($cookieArray as $cookie) {
+ if (!($cookie instanceof SetCookie)) {
+ $cookie = new SetCookie($cookie);
+ }
+ $this->setCookie($cookie);
+ }
+ }
+
+ /**
+ * Create a new Cookie jar from an associative array and domain.
+ *
+ * @param array $cookies Cookies to create the jar from
+ * @param string $domain Domain to set the cookies to
+ */
+ public static function fromArray(array $cookies, string $domain): self
+ {
+ $cookieJar = new self();
+ foreach ($cookies as $name => $value) {
+ $cookieJar->setCookie(new SetCookie([
+ 'Domain' => $domain,
+ 'Name' => $name,
+ 'Value' => $value,
+ 'Discard' => true,
+ ]));
+ }
+
+ return $cookieJar;
+ }
+
+ /**
+ * Evaluate if this cookie should be persisted to storage
+ * that survives between requests.
+ *
+ * @param SetCookie $cookie Being evaluated.
+ * @param bool $allowSessionCookies If we should persist session cookies
+ */
+ public static function shouldPersist(SetCookie $cookie, bool $allowSessionCookies = false): bool
+ {
+ if ($cookie->getExpires() || $allowSessionCookies) {
+ if (!$cookie->getDiscard()) {
+ return true;
+ }
+ }
+
+ return false;
+ }
+
+ /**
+ * Finds and returns the cookie based on the name
+ *
+ * @param string $name cookie name to search for
+ *
+ * @return SetCookie|null cookie that was found or null if not found
+ */
+ public function getCookieByName(string $name): ?SetCookie
+ {
+ foreach ($this->cookies as $cookie) {
+ if ($cookie->getName() !== null && \strcasecmp($cookie->getName(), $name) === 0) {
+ return $cookie;
+ }
+ }
+
+ return null;
+ }
+
+ public function toArray(): array
+ {
+ return \array_map(static function (SetCookie $cookie): array {
+ return $cookie->toArray();
+ }, $this->getIterator()->getArrayCopy());
+ }
+
+ public function clear(?string $domain = null, ?string $path = null, ?string $name = null): void
+ {
+ if (!$domain) {
+ $this->cookies = [];
+
+ return;
+ } elseif (!$path) {
+ $this->cookies = \array_filter(
+ $this->cookies,
+ static function (SetCookie $cookie) use ($domain): bool {
+ return !$cookie->matchesDomain($domain);
+ }
+ );
+ } elseif (!$name) {
+ $this->cookies = \array_filter(
+ $this->cookies,
+ static function (SetCookie $cookie) use ($path, $domain): bool {
+ return !($cookie->matchesPath($path)
+ && $cookie->matchesDomain($domain));
+ }
+ );
+ } else {
+ $this->cookies = \array_filter(
+ $this->cookies,
+ static function (SetCookie $cookie) use ($path, $domain, $name) {
+ return !($cookie->getName() == $name
+ && $cookie->matchesPath($path)
+ && $cookie->matchesDomain($domain));
+ }
+ );
+ }
+ }
+
+ public function clearSessionCookies(): void
+ {
+ $this->cookies = \array_filter(
+ $this->cookies,
+ static function (SetCookie $cookie): bool {
+ return !$cookie->getDiscard() && $cookie->getExpires();
+ }
+ );
+ }
+
+ public function setCookie(SetCookie $cookie): bool
+ {
+ // If the name string is empty (but not 0), ignore the set-cookie
+ // string entirely.
+ $name = $cookie->getName();
+ if (!$name && $name !== '0') {
+ return false;
+ }
+
+ // Only allow cookies with set and valid domain, name, value
+ $result = $cookie->validate();
+ if ($result !== true) {
+ if ($this->strictMode) {
+ throw new \RuntimeException('Invalid cookie: '.$result);
+ }
+ $this->removeCookieIfEmpty($cookie);
+
+ return false;
+ }
+
+ // Resolve conflicts with previously set cookies
+ foreach ($this->cookies as $i => $c) {
+ // Two cookies are identical, when their path, and domain are
+ // identical.
+ if ($c->getPath() != $cookie->getPath()
+ || $c->getDomain() != $cookie->getDomain()
+ || $c->getName() != $cookie->getName()
+ ) {
+ continue;
+ }
+
+ // The previously set cookie is a discard cookie and this one is
+ // not so allow the new cookie to be set
+ if (!$cookie->getDiscard() && $c->getDiscard()) {
+ unset($this->cookies[$i]);
+ continue;
+ }
+
+ // If the new cookie's expiration is further into the future, then
+ // replace the old cookie
+ if ($cookie->getExpires() > $c->getExpires()) {
+ unset($this->cookies[$i]);
+ continue;
+ }
+
+ // If the value has changed, we better change it
+ if ($cookie->getValue() !== $c->getValue()) {
+ unset($this->cookies[$i]);
+ continue;
+ }
+
+ // The cookie exists, so no need to continue
+ return false;
+ }
+
+ $this->cookies[] = $cookie;
+
+ return true;
+ }
+
+ public function count(): int
+ {
+ return \count($this->cookies);
+ }
+
+ /**
+ * @return \ArrayIterator
+ */
+ public function getIterator(): \ArrayIterator
+ {
+ return new \ArrayIterator(\array_values($this->cookies));
+ }
+
+ public function extractCookies(RequestInterface $request, ResponseInterface $response): void
+ {
+ if ($cookieHeader = $response->getHeader('Set-Cookie')) {
+ foreach ($cookieHeader as $cookie) {
+ $sc = SetCookie::fromString($cookie);
+ if (!$sc->getDomain()) {
+ $sc->setDomain($request->getUri()->getHost());
+ }
+ if (0 !== \strpos($sc->getPath(), '/')) {
+ $sc->setPath($this->getCookiePathFromRequest($request));
+ }
+ if (!$sc->matchesDomain($request->getUri()->getHost())) {
+ continue;
+ }
+ // Note: At this point `$sc->getDomain()` being a public suffix should
+ // be rejected, but we don't want to pull in the full PSL dependency.
+ $this->setCookie($sc);
+ }
+ }
+ }
+
+ /**
+ * Computes cookie path following RFC 6265 section 5.1.4
+ *
+ * @see https://datatracker.ietf.org/doc/html/rfc6265#section-5.1.4
+ */
+ private function getCookiePathFromRequest(RequestInterface $request): string
+ {
+ $uriPath = $request->getUri()->getPath();
+ if ('' === $uriPath) {
+ return '/';
+ }
+ if (0 !== \strpos($uriPath, '/')) {
+ return '/';
+ }
+ if ('/' === $uriPath) {
+ return '/';
+ }
+ $lastSlashPos = \strrpos($uriPath, '/');
+ if (0 === $lastSlashPos || false === $lastSlashPos) {
+ return '/';
+ }
+
+ return \substr($uriPath, 0, $lastSlashPos);
+ }
+
+ public function withCookieHeader(RequestInterface $request): RequestInterface
+ {
+ $values = [];
+ $uri = $request->getUri();
+ $scheme = $uri->getScheme();
+ $host = $uri->getHost();
+ $path = $uri->getPath() ?: '/';
+
+ foreach ($this->cookies as $cookie) {
+ if ($cookie->matchesPath($path)
+ && $cookie->matchesDomain($host)
+ && !$cookie->isExpired()
+ && (!$cookie->getSecure() || $scheme === 'https')
+ ) {
+ $values[] = $cookie->getName().'='
+ .$cookie->getValue();
+ }
+ }
+
+ return $values
+ ? $request->withHeader('Cookie', \implode('; ', $values))
+ : $request;
+ }
+
+ /**
+ * If a cookie already exists and the server asks to set it again with a
+ * null value, the cookie must be deleted.
+ */
+ private function removeCookieIfEmpty(SetCookie $cookie): void
+ {
+ $cookieValue = $cookie->getValue();
+ if ($cookieValue === null || $cookieValue === '') {
+ $this->clear(
+ $cookie->getDomain(),
+ $cookie->getPath(),
+ $cookie->getName()
+ );
+ }
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Cookie/CookieJarInterface.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Cookie/CookieJarInterface.php
new file mode 100644
index 0000000000..93ada58d22
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Cookie/CookieJarInterface.php
@@ -0,0 +1,80 @@
+
+ */
+interface CookieJarInterface extends \Countable, \IteratorAggregate
+{
+ /**
+ * Create a request with added cookie headers.
+ *
+ * If no matching cookies are found in the cookie jar, then no Cookie
+ * header is added to the request and the same request is returned.
+ *
+ * @param RequestInterface $request Request object to modify.
+ *
+ * @return RequestInterface returns the modified request.
+ */
+ public function withCookieHeader(RequestInterface $request): RequestInterface;
+
+ /**
+ * Extract cookies from an HTTP response and store them in the CookieJar.
+ *
+ * @param RequestInterface $request Request that was sent
+ * @param ResponseInterface $response Response that was received
+ */
+ public function extractCookies(RequestInterface $request, ResponseInterface $response): void;
+
+ /**
+ * Sets a cookie in the cookie jar.
+ *
+ * @param SetCookie $cookie Cookie to set.
+ *
+ * @return bool Returns true on success or false on failure
+ */
+ public function setCookie(SetCookie $cookie): bool;
+
+ /**
+ * Remove cookies currently held in the cookie jar.
+ *
+ * Invoking this method without arguments will empty the whole cookie jar.
+ * If given a $domain argument only cookies belonging to that domain will
+ * be removed. If given a $domain and $path argument, cookies belonging to
+ * the specified path within that domain are removed. If given all three
+ * arguments, then the cookie with the specified name, path and domain is
+ * removed.
+ *
+ * @param string|null $domain Clears cookies matching a domain
+ * @param string|null $path Clears cookies matching a domain and path
+ * @param string|null $name Clears cookies matching a domain, path, and name
+ */
+ public function clear(?string $domain = null, ?string $path = null, ?string $name = null): void;
+
+ /**
+ * Discard all sessions cookies.
+ *
+ * Removes cookies that don't have an expire field or a have a discard
+ * field set to true. To be called when the user agent shuts down according
+ * to RFC 2965.
+ */
+ public function clearSessionCookies(): void;
+
+ /**
+ * Converts the cookie jar to an array.
+ */
+ public function toArray(): array;
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Cookie/FileCookieJar.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Cookie/FileCookieJar.php
new file mode 100644
index 0000000000..290236d543
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Cookie/FileCookieJar.php
@@ -0,0 +1,101 @@
+filename = $cookieFile;
+ $this->storeSessionCookies = $storeSessionCookies;
+
+ if (\file_exists($cookieFile)) {
+ $this->load($cookieFile);
+ }
+ }
+
+ /**
+ * Saves the file when shutting down
+ */
+ public function __destruct()
+ {
+ $this->save($this->filename);
+ }
+
+ /**
+ * Saves the cookies to a file.
+ *
+ * @param string $filename File to save
+ *
+ * @throws \RuntimeException if the file cannot be found or created
+ */
+ public function save(string $filename): void
+ {
+ $json = [];
+ /** @var SetCookie $cookie */
+ foreach ($this as $cookie) {
+ if (CookieJar::shouldPersist($cookie, $this->storeSessionCookies)) {
+ $json[] = $cookie->toArray();
+ }
+ }
+
+ $jsonStr = Utils::jsonEncode($json);
+ if (false === \file_put_contents($filename, $jsonStr, \LOCK_EX)) {
+ throw new \RuntimeException("Unable to save file {$filename}");
+ }
+ }
+
+ /**
+ * Load cookies from a JSON formatted file.
+ *
+ * Old cookies are kept unless overwritten by newly loaded ones.
+ *
+ * @param string $filename Cookie file to load.
+ *
+ * @throws \RuntimeException if the file cannot be loaded.
+ */
+ public function load(string $filename): void
+ {
+ $json = \file_get_contents($filename);
+ if (false === $json) {
+ throw new \RuntimeException("Unable to load file {$filename}");
+ }
+ if ($json === '') {
+ return;
+ }
+
+ $data = Utils::jsonDecode($json, true);
+ if (\is_array($data)) {
+ foreach ($data as $cookie) {
+ $this->setCookie(new SetCookie($cookie));
+ }
+ } elseif (\is_scalar($data) && !empty($data)) {
+ throw new \RuntimeException("Invalid cookie file: {$filename}");
+ }
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Cookie/SessionCookieJar.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Cookie/SessionCookieJar.php
new file mode 100644
index 0000000000..cb3e67c6aa
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Cookie/SessionCookieJar.php
@@ -0,0 +1,77 @@
+sessionKey = $sessionKey;
+ $this->storeSessionCookies = $storeSessionCookies;
+ $this->load();
+ }
+
+ /**
+ * Saves cookies to session when shutting down
+ */
+ public function __destruct()
+ {
+ $this->save();
+ }
+
+ /**
+ * Save cookies to the client session
+ */
+ public function save(): void
+ {
+ $json = [];
+ /** @var SetCookie $cookie */
+ foreach ($this as $cookie) {
+ if (CookieJar::shouldPersist($cookie, $this->storeSessionCookies)) {
+ $json[] = $cookie->toArray();
+ }
+ }
+
+ $_SESSION[$this->sessionKey] = \json_encode($json);
+ }
+
+ /**
+ * Load the contents of the client session into the data array
+ */
+ protected function load(): void
+ {
+ if (!isset($_SESSION[$this->sessionKey])) {
+ return;
+ }
+ $data = \json_decode($_SESSION[$this->sessionKey], true);
+ if (\is_array($data)) {
+ foreach ($data as $cookie) {
+ $this->setCookie(new SetCookie($cookie));
+ }
+ } elseif (\strlen($data)) {
+ throw new \RuntimeException('Invalid cookie data');
+ }
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Cookie/SetCookie.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Cookie/SetCookie.php
new file mode 100644
index 0000000000..c9806da882
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Cookie/SetCookie.php
@@ -0,0 +1,488 @@
+ null,
+ 'Value' => null,
+ 'Domain' => null,
+ 'Path' => '/',
+ 'Max-Age' => null,
+ 'Expires' => null,
+ 'Secure' => false,
+ 'Discard' => false,
+ 'HttpOnly' => false,
+ ];
+
+ /**
+ * @var array Cookie data
+ */
+ private $data;
+
+ /**
+ * Create a new SetCookie object from a string.
+ *
+ * @param string $cookie Set-Cookie header string
+ */
+ public static function fromString(string $cookie): self
+ {
+ // Create the default return array
+ $data = self::$defaults;
+ // Explode the cookie string using a series of semicolons
+ $pieces = \array_filter(\array_map('trim', \explode(';', $cookie)));
+ // The name of the cookie (first kvp) must exist and include an equal sign.
+ if (!isset($pieces[0]) || \strpos($pieces[0], '=') === false) {
+ return new self($data);
+ }
+
+ // Add the cookie pieces into the parsed data array
+ foreach ($pieces as $part) {
+ $cookieParts = \explode('=', $part, 2);
+ $key = \trim($cookieParts[0]);
+ $value = isset($cookieParts[1])
+ ? \trim($cookieParts[1], " \n\r\t\0\x0B")
+ : true;
+
+ // Only check for non-cookies when cookies have been found
+ if (!isset($data['Name'])) {
+ $data['Name'] = $key;
+ $data['Value'] = $value;
+ } else {
+ foreach (\array_keys(self::$defaults) as $search) {
+ if (!\strcasecmp($search, $key)) {
+ if ($search === 'Max-Age') {
+ if (is_numeric($value)) {
+ $data[$search] = (int) $value;
+ }
+ } else {
+ $data[$search] = $value;
+ }
+ continue 2;
+ }
+ }
+ $data[$key] = $value;
+ }
+ }
+
+ return new self($data);
+ }
+
+ /**
+ * @param array $data Array of cookie data provided by a Cookie parser
+ */
+ public function __construct(array $data = [])
+ {
+ $this->data = self::$defaults;
+
+ if (isset($data['Name'])) {
+ $this->setName($data['Name']);
+ }
+
+ if (isset($data['Value'])) {
+ $this->setValue($data['Value']);
+ }
+
+ if (isset($data['Domain'])) {
+ $this->setDomain($data['Domain']);
+ }
+
+ if (isset($data['Path'])) {
+ $this->setPath($data['Path']);
+ }
+
+ if (isset($data['Max-Age'])) {
+ $this->setMaxAge($data['Max-Age']);
+ }
+
+ if (isset($data['Expires'])) {
+ $this->setExpires($data['Expires']);
+ }
+
+ if (isset($data['Secure'])) {
+ $this->setSecure($data['Secure']);
+ }
+
+ if (isset($data['Discard'])) {
+ $this->setDiscard($data['Discard']);
+ }
+
+ if (isset($data['HttpOnly'])) {
+ $this->setHttpOnly($data['HttpOnly']);
+ }
+
+ // Set the remaining values that don't have extra validation logic
+ foreach (array_diff(array_keys($data), array_keys(self::$defaults)) as $key) {
+ $this->data[$key] = $data[$key];
+ }
+
+ // Extract the Expires value and turn it into a UNIX timestamp if needed
+ if (!$this->getExpires() && $this->getMaxAge()) {
+ // Calculate the Expires date
+ $this->setExpires(\time() + $this->getMaxAge());
+ } elseif (null !== ($expires = $this->getExpires()) && !\is_numeric($expires)) {
+ $this->setExpires($expires);
+ }
+ }
+
+ public function __toString()
+ {
+ $str = $this->data['Name'].'='.($this->data['Value'] ?? '').'; ';
+ foreach ($this->data as $k => $v) {
+ if ($k !== 'Name' && $k !== 'Value' && $v !== null && $v !== false) {
+ if ($k === 'Expires') {
+ $str .= 'Expires='.\gmdate('D, d M Y H:i:s \G\M\T', $v).'; ';
+ } else {
+ $str .= ($v === true ? $k : "{$k}={$v}").'; ';
+ }
+ }
+ }
+
+ return \rtrim($str, '; ');
+ }
+
+ public function toArray(): array
+ {
+ return $this->data;
+ }
+
+ /**
+ * Get the cookie name.
+ *
+ * @return string
+ */
+ public function getName()
+ {
+ return $this->data['Name'];
+ }
+
+ /**
+ * Set the cookie name.
+ *
+ * @param string $name Cookie name
+ */
+ public function setName($name): void
+ {
+ if (!is_string($name)) {
+ trigger_deprecation('guzzlehttp/guzzle', '7.4', 'Not passing a string to %s::%s() is deprecated and will cause an error in 8.0.', __CLASS__, __FUNCTION__);
+ }
+
+ $this->data['Name'] = (string) $name;
+ }
+
+ /**
+ * Get the cookie value.
+ *
+ * @return string|null
+ */
+ public function getValue()
+ {
+ return $this->data['Value'];
+ }
+
+ /**
+ * Set the cookie value.
+ *
+ * @param string $value Cookie value
+ */
+ public function setValue($value): void
+ {
+ if (!is_string($value)) {
+ trigger_deprecation('guzzlehttp/guzzle', '7.4', 'Not passing a string to %s::%s() is deprecated and will cause an error in 8.0.', __CLASS__, __FUNCTION__);
+ }
+
+ $this->data['Value'] = (string) $value;
+ }
+
+ /**
+ * Get the domain.
+ *
+ * @return string|null
+ */
+ public function getDomain()
+ {
+ return $this->data['Domain'];
+ }
+
+ /**
+ * Set the domain of the cookie.
+ *
+ * @param string|null $domain
+ */
+ public function setDomain($domain): void
+ {
+ if (!is_string($domain) && null !== $domain) {
+ trigger_deprecation('guzzlehttp/guzzle', '7.4', 'Not passing a string or null to %s::%s() is deprecated and will cause an error in 8.0.', __CLASS__, __FUNCTION__);
+ }
+
+ $this->data['Domain'] = null === $domain ? null : (string) $domain;
+ }
+
+ /**
+ * Get the path.
+ *
+ * @return string
+ */
+ public function getPath()
+ {
+ return $this->data['Path'];
+ }
+
+ /**
+ * Set the path of the cookie.
+ *
+ * @param string $path Path of the cookie
+ */
+ public function setPath($path): void
+ {
+ if (!is_string($path)) {
+ trigger_deprecation('guzzlehttp/guzzle', '7.4', 'Not passing a string to %s::%s() is deprecated and will cause an error in 8.0.', __CLASS__, __FUNCTION__);
+ }
+
+ $this->data['Path'] = (string) $path;
+ }
+
+ /**
+ * Maximum lifetime of the cookie in seconds.
+ *
+ * @return int|null
+ */
+ public function getMaxAge()
+ {
+ return null === $this->data['Max-Age'] ? null : (int) $this->data['Max-Age'];
+ }
+
+ /**
+ * Set the max-age of the cookie.
+ *
+ * @param int|null $maxAge Max age of the cookie in seconds
+ */
+ public function setMaxAge($maxAge): void
+ {
+ if (!is_int($maxAge) && null !== $maxAge) {
+ trigger_deprecation('guzzlehttp/guzzle', '7.4', 'Not passing an int or null to %s::%s() is deprecated and will cause an error in 8.0.', __CLASS__, __FUNCTION__);
+ }
+
+ $this->data['Max-Age'] = $maxAge === null ? null : (int) $maxAge;
+ }
+
+ /**
+ * The UNIX timestamp when the cookie Expires.
+ *
+ * @return string|int|null
+ */
+ public function getExpires()
+ {
+ return $this->data['Expires'];
+ }
+
+ /**
+ * Set the unix timestamp for which the cookie will expire.
+ *
+ * @param int|string|null $timestamp Unix timestamp or any English textual datetime description.
+ */
+ public function setExpires($timestamp): void
+ {
+ if (!is_int($timestamp) && !is_string($timestamp) && null !== $timestamp) {
+ trigger_deprecation('guzzlehttp/guzzle', '7.4', 'Not passing an int, string or null to %s::%s() is deprecated and will cause an error in 8.0.', __CLASS__, __FUNCTION__);
+ }
+
+ $this->data['Expires'] = null === $timestamp ? null : (\is_numeric($timestamp) ? (int) $timestamp : \strtotime((string) $timestamp));
+ }
+
+ /**
+ * Get whether or not this is a secure cookie.
+ *
+ * @return bool
+ */
+ public function getSecure()
+ {
+ return $this->data['Secure'];
+ }
+
+ /**
+ * Set whether or not the cookie is secure.
+ *
+ * @param bool $secure Set to true or false if secure
+ */
+ public function setSecure($secure): void
+ {
+ if (!is_bool($secure)) {
+ trigger_deprecation('guzzlehttp/guzzle', '7.4', 'Not passing a bool to %s::%s() is deprecated and will cause an error in 8.0.', __CLASS__, __FUNCTION__);
+ }
+
+ $this->data['Secure'] = (bool) $secure;
+ }
+
+ /**
+ * Get whether or not this is a session cookie.
+ *
+ * @return bool|null
+ */
+ public function getDiscard()
+ {
+ return $this->data['Discard'];
+ }
+
+ /**
+ * Set whether or not this is a session cookie.
+ *
+ * @param bool $discard Set to true or false if this is a session cookie
+ */
+ public function setDiscard($discard): void
+ {
+ if (!is_bool($discard)) {
+ trigger_deprecation('guzzlehttp/guzzle', '7.4', 'Not passing a bool to %s::%s() is deprecated and will cause an error in 8.0.', __CLASS__, __FUNCTION__);
+ }
+
+ $this->data['Discard'] = (bool) $discard;
+ }
+
+ /**
+ * Get whether or not this is an HTTP only cookie.
+ *
+ * @return bool
+ */
+ public function getHttpOnly()
+ {
+ return $this->data['HttpOnly'];
+ }
+
+ /**
+ * Set whether or not this is an HTTP only cookie.
+ *
+ * @param bool $httpOnly Set to true or false if this is HTTP only
+ */
+ public function setHttpOnly($httpOnly): void
+ {
+ if (!is_bool($httpOnly)) {
+ trigger_deprecation('guzzlehttp/guzzle', '7.4', 'Not passing a bool to %s::%s() is deprecated and will cause an error in 8.0.', __CLASS__, __FUNCTION__);
+ }
+
+ $this->data['HttpOnly'] = (bool) $httpOnly;
+ }
+
+ /**
+ * Check if the cookie matches a path value.
+ *
+ * A request-path path-matches a given cookie-path if at least one of
+ * the following conditions holds:
+ *
+ * - The cookie-path and the request-path are identical.
+ * - The cookie-path is a prefix of the request-path, and the last
+ * character of the cookie-path is %x2F ("/").
+ * - The cookie-path is a prefix of the request-path, and the first
+ * character of the request-path that is not included in the cookie-
+ * path is a %x2F ("/") character.
+ *
+ * @param string $requestPath Path to check against
+ */
+ public function matchesPath(string $requestPath): bool
+ {
+ $cookiePath = $this->getPath();
+
+ // Match on exact matches or when path is the default empty "/"
+ if ($cookiePath === '/' || $cookiePath == $requestPath) {
+ return true;
+ }
+
+ // Ensure that the cookie-path is a prefix of the request path.
+ if (0 !== \strpos($requestPath, $cookiePath)) {
+ return false;
+ }
+
+ // Match if the last character of the cookie-path is "/"
+ if (\substr($cookiePath, -1, 1) === '/') {
+ return true;
+ }
+
+ // Match if the first character not included in cookie path is "/"
+ return \substr($requestPath, \strlen($cookiePath), 1) === '/';
+ }
+
+ /**
+ * Check if the cookie matches a domain value.
+ *
+ * @param string $domain Domain to check against
+ */
+ public function matchesDomain(string $domain): bool
+ {
+ $cookieDomain = $this->getDomain();
+ if (null === $cookieDomain) {
+ return true;
+ }
+
+ // Remove the leading '.' as per spec in RFC 6265.
+ // https://datatracker.ietf.org/doc/html/rfc6265#section-5.2.3
+ $cookieDomain = \ltrim(\strtolower($cookieDomain), '.');
+
+ $domain = \strtolower($domain);
+
+ // Domain not set or exact match.
+ if ('' === $cookieDomain || $domain === $cookieDomain) {
+ return true;
+ }
+
+ // Matching the subdomain according to RFC 6265.
+ // https://datatracker.ietf.org/doc/html/rfc6265#section-5.1.3
+ if (\filter_var($domain, \FILTER_VALIDATE_IP)) {
+ return false;
+ }
+
+ return (bool) \preg_match('/\.'.\preg_quote($cookieDomain, '/').'$/', $domain);
+ }
+
+ /**
+ * Check if the cookie is expired.
+ */
+ public function isExpired(): bool
+ {
+ return $this->getExpires() !== null && \time() > $this->getExpires();
+ }
+
+ /**
+ * Check if the cookie is valid according to RFC 6265.
+ *
+ * @return bool|string Returns true if valid or an error message if invalid
+ */
+ public function validate()
+ {
+ $name = $this->getName();
+ if ($name === '') {
+ return 'The cookie name must not be empty';
+ }
+
+ // Check if any of the invalid characters are present in the cookie name
+ if (\preg_match(
+ '/[\x00-\x20\x22\x28-\x29\x2c\x2f\x3a-\x40\x5c\x7b\x7d\x7f]/',
+ $name
+ )) {
+ return 'Cookie name must not contain invalid characters: ASCII '
+ .'Control characters (0-31;127), space, tab and the '
+ .'following characters: ()<>@,;:\"/?={}';
+ }
+
+ // Value must not be null. 0 and empty string are valid. Empty strings
+ // are technically against RFC 6265, but known to happen in the wild.
+ $value = $this->getValue();
+ if ($value === null) {
+ return 'The cookie value must not be empty';
+ }
+
+ // Domains must not be empty, but can be 0. "0" is not a valid internet
+ // domain, but may be used as server name in a private network.
+ $domain = $this->getDomain();
+ if ($domain === null || $domain === '') {
+ return 'The cookie domain must not be empty';
+ }
+
+ return true;
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Exception/BadResponseException.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Exception/BadResponseException.php
new file mode 100644
index 0000000000..ba67ad498c
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Exception/BadResponseException.php
@@ -0,0 +1,39 @@
+request = $request;
+ $this->handlerContext = $handlerContext;
+ }
+
+ /**
+ * Get the request that caused the exception
+ */
+ public function getRequest(): RequestInterface
+ {
+ return $this->request;
+ }
+
+ /**
+ * Get contextual information about the error from the underlying handler.
+ *
+ * The contents of this array will vary depending on which handler you are
+ * using. It may also be just an empty array. Relying on this data will
+ * couple you to a specific handler, but can give more debug information
+ * when needed.
+ */
+ public function getHandlerContext(): array
+ {
+ return $this->handlerContext;
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Exception/GuzzleException.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Exception/GuzzleException.php
new file mode 100644
index 0000000000..fa3ed6998c
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Exception/GuzzleException.php
@@ -0,0 +1,9 @@
+getStatusCode() : 0;
+ parent::__construct($message, $code, $previous);
+ $this->request = $request;
+ $this->response = $response;
+ $this->handlerContext = $handlerContext;
+ }
+
+ /**
+ * Wrap non-RequestExceptions with a RequestException
+ */
+ public static function wrapException(RequestInterface $request, \Throwable $e): RequestException
+ {
+ return $e instanceof RequestException ? $e : new RequestException($e->getMessage(), $request, null, $e);
+ }
+
+ /**
+ * Factory method to create a new exception with a normalized error message
+ *
+ * @param RequestInterface $request Request sent
+ * @param ResponseInterface $response Response received
+ * @param \Throwable|null $previous Previous exception
+ * @param array $handlerContext Optional handler context
+ * @param BodySummarizerInterface|null $bodySummarizer Optional body summarizer
+ */
+ public static function create(
+ RequestInterface $request,
+ ?ResponseInterface $response = null,
+ ?\Throwable $previous = null,
+ array $handlerContext = [],
+ ?BodySummarizerInterface $bodySummarizer = null
+ ): self {
+ if (!$response) {
+ return new self(
+ 'Error completing request',
+ $request,
+ null,
+ $previous,
+ $handlerContext
+ );
+ }
+
+ $level = (int) \floor($response->getStatusCode() / 100);
+ if ($level === 4) {
+ $label = 'Client error';
+ $className = ClientException::class;
+ } elseif ($level === 5) {
+ $label = 'Server error';
+ $className = ServerException::class;
+ } else {
+ $label = 'Unsuccessful request';
+ $className = __CLASS__;
+ }
+
+ $uri = \GuzzleHttp\Psr7\Utils::redactUserInfo($request->getUri());
+
+ // Client Error: `GET /` resulted in a `404 Not Found` response:
+ // ... (truncated)
+ $message = \sprintf(
+ '%s: `%s %s` resulted in a `%s %s` response',
+ $label,
+ $request->getMethod(),
+ $uri->__toString(),
+ $response->getStatusCode(),
+ $response->getReasonPhrase()
+ );
+
+ $summary = ($bodySummarizer ?? new BodySummarizer())->summarize($response);
+
+ if ($summary !== null) {
+ $message .= ":\n{$summary}\n";
+ }
+
+ return new $className($message, $request, $response, $previous, $handlerContext);
+ }
+
+ /**
+ * Get the request that caused the exception
+ */
+ public function getRequest(): RequestInterface
+ {
+ return $this->request;
+ }
+
+ /**
+ * Get the associated response
+ */
+ public function getResponse(): ?ResponseInterface
+ {
+ return $this->response;
+ }
+
+ /**
+ * Check if a response was received
+ */
+ public function hasResponse(): bool
+ {
+ return $this->response !== null;
+ }
+
+ /**
+ * Get contextual information about the error from the underlying handler.
+ *
+ * The contents of this array will vary depending on which handler you are
+ * using. It may also be just an empty array. Relying on this data will
+ * couple you to a specific handler, but can give more debug information
+ * when needed.
+ */
+ public function getHandlerContext(): array
+ {
+ return $this->handlerContext;
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Exception/ServerException.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Exception/ServerException.php
new file mode 100644
index 0000000000..8055e067c0
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Exception/ServerException.php
@@ -0,0 +1,10 @@
+maxHandles = $maxHandles;
+ }
+
+ public function create(RequestInterface $request, array $options): EasyHandle
+ {
+ $protocolVersion = $request->getProtocolVersion();
+
+ if ('2' === $protocolVersion || '2.0' === $protocolVersion) {
+ if (!self::supportsHttp2()) {
+ throw new ConnectException('HTTP/2 is supported by the cURL handler, however libcurl is built without HTTP/2 support.', $request);
+ }
+ } elseif ('1.0' !== $protocolVersion && '1.1' !== $protocolVersion) {
+ throw new ConnectException(sprintf('HTTP/%s is not supported by the cURL handler.', $protocolVersion), $request);
+ }
+
+ if (isset($options['curl']['body_as_string'])) {
+ $options['_body_as_string'] = $options['curl']['body_as_string'];
+ unset($options['curl']['body_as_string']);
+ }
+
+ $easy = new EasyHandle();
+ $easy->request = $request;
+ $easy->options = $options;
+ $conf = $this->getDefaultConf($easy);
+ $this->applyMethod($easy, $conf);
+ $this->applyHandlerOptions($easy, $conf);
+ $this->applyHeaders($easy, $conf);
+ unset($conf['_headers']);
+
+ // Add handler options from the request configuration options
+ if (isset($options['curl'])) {
+ $conf = \array_replace($conf, $options['curl']);
+ }
+
+ $conf[\CURLOPT_HEADERFUNCTION] = $this->createHeaderFn($easy);
+ $easy->handle = $this->handles ? \array_pop($this->handles) : \curl_init();
+ curl_setopt_array($easy->handle, $conf);
+
+ return $easy;
+ }
+
+ private static function supportsHttp2(): bool
+ {
+ static $supportsHttp2 = null;
+
+ if (null === $supportsHttp2) {
+ $supportsHttp2 = self::supportsTls12()
+ && defined('CURL_VERSION_HTTP2')
+ && (\CURL_VERSION_HTTP2 & \curl_version()['features']);
+ }
+
+ return $supportsHttp2;
+ }
+
+ private static function supportsTls12(): bool
+ {
+ static $supportsTls12 = null;
+
+ if (null === $supportsTls12) {
+ $supportsTls12 = \CURL_SSLVERSION_TLSv1_2 & \curl_version()['features'];
+ }
+
+ return $supportsTls12;
+ }
+
+ private static function supportsTls13(): bool
+ {
+ static $supportsTls13 = null;
+
+ if (null === $supportsTls13) {
+ $supportsTls13 = defined('CURL_SSLVERSION_TLSv1_3')
+ && (\CURL_SSLVERSION_TLSv1_3 & \curl_version()['features']);
+ }
+
+ return $supportsTls13;
+ }
+
+ public function release(EasyHandle $easy): void
+ {
+ $resource = $easy->handle;
+ unset($easy->handle);
+
+ if (\count($this->handles) >= $this->maxHandles) {
+ \curl_close($resource);
+ } else {
+ // Remove all callback functions as they can hold onto references
+ // and are not cleaned up by curl_reset. Using curl_setopt_array
+ // does not work for some reason, so removing each one
+ // individually.
+ \curl_setopt($resource, \CURLOPT_HEADERFUNCTION, null);
+ \curl_setopt($resource, \CURLOPT_READFUNCTION, null);
+ \curl_setopt($resource, \CURLOPT_WRITEFUNCTION, null);
+ \curl_setopt($resource, \CURLOPT_PROGRESSFUNCTION, null);
+ \curl_reset($resource);
+ $this->handles[] = $resource;
+ }
+ }
+
+ /**
+ * Completes a cURL transaction, either returning a response promise or a
+ * rejected promise.
+ *
+ * @param callable(RequestInterface, array): PromiseInterface $handler
+ * @param CurlFactoryInterface $factory Dictates how the handle is released
+ */
+ public static function finish(callable $handler, EasyHandle $easy, CurlFactoryInterface $factory): PromiseInterface
+ {
+ if (isset($easy->options['on_stats'])) {
+ self::invokeStats($easy);
+ }
+
+ if (!$easy->response || $easy->errno) {
+ return self::finishError($handler, $easy, $factory);
+ }
+
+ // Return the response if it is present and there is no error.
+ $factory->release($easy);
+
+ // Rewind the body of the response if possible.
+ $body = $easy->response->getBody();
+ if ($body->isSeekable()) {
+ $body->rewind();
+ }
+
+ return new FulfilledPromise($easy->response);
+ }
+
+ private static function invokeStats(EasyHandle $easy): void
+ {
+ $curlStats = \curl_getinfo($easy->handle);
+ $curlStats['appconnect_time'] = \curl_getinfo($easy->handle, \CURLINFO_APPCONNECT_TIME);
+ $stats = new TransferStats(
+ $easy->request,
+ $easy->response,
+ $curlStats['total_time'],
+ $easy->errno,
+ $curlStats
+ );
+ ($easy->options['on_stats'])($stats);
+ }
+
+ /**
+ * @param callable(RequestInterface, array): PromiseInterface $handler
+ */
+ private static function finishError(callable $handler, EasyHandle $easy, CurlFactoryInterface $factory): PromiseInterface
+ {
+ // Get error information and release the handle to the factory.
+ $ctx = [
+ 'errno' => $easy->errno,
+ 'error' => \curl_error($easy->handle),
+ 'appconnect_time' => \curl_getinfo($easy->handle, \CURLINFO_APPCONNECT_TIME),
+ ] + \curl_getinfo($easy->handle);
+ $ctx[self::CURL_VERSION_STR] = self::getCurlVersion();
+ $factory->release($easy);
+
+ // Retry when nothing is present or when curl failed to rewind.
+ if (empty($easy->options['_err_message']) && (!$easy->errno || $easy->errno == 65)) {
+ return self::retryFailedRewind($handler, $easy, $ctx);
+ }
+
+ return self::createRejection($easy, $ctx);
+ }
+
+ private static function getCurlVersion(): string
+ {
+ static $curlVersion = null;
+
+ if (null === $curlVersion) {
+ $curlVersion = \curl_version()['version'];
+ }
+
+ return $curlVersion;
+ }
+
+ private static function createRejection(EasyHandle $easy, array $ctx): PromiseInterface
+ {
+ static $connectionErrors = [
+ \CURLE_OPERATION_TIMEOUTED => true,
+ \CURLE_COULDNT_RESOLVE_HOST => true,
+ \CURLE_COULDNT_CONNECT => true,
+ \CURLE_SSL_CONNECT_ERROR => true,
+ \CURLE_GOT_NOTHING => true,
+ ];
+
+ if ($easy->createResponseException) {
+ return P\Create::rejectionFor(
+ new RequestException(
+ 'An error was encountered while creating the response',
+ $easy->request,
+ $easy->response,
+ $easy->createResponseException,
+ $ctx
+ )
+ );
+ }
+
+ // If an exception was encountered during the onHeaders event, then
+ // return a rejected promise that wraps that exception.
+ if ($easy->onHeadersException) {
+ return P\Create::rejectionFor(
+ new RequestException(
+ 'An error was encountered during the on_headers event',
+ $easy->request,
+ $easy->response,
+ $easy->onHeadersException,
+ $ctx
+ )
+ );
+ }
+
+ $uri = $easy->request->getUri();
+
+ $sanitizedError = self::sanitizeCurlError($ctx['error'] ?? '', $uri);
+
+ $message = \sprintf(
+ 'cURL error %s: %s (%s)',
+ $ctx['errno'],
+ $sanitizedError,
+ 'see https://curl.haxx.se/libcurl/c/libcurl-errors.html'
+ );
+
+ if ('' !== $sanitizedError) {
+ $redactedUriString = \GuzzleHttp\Psr7\Utils::redactUserInfo($uri)->__toString();
+ if ($redactedUriString !== '' && false === \strpos($sanitizedError, $redactedUriString)) {
+ $message .= \sprintf(' for %s', $redactedUriString);
+ }
+ }
+
+ // Create a connection exception if it was a specific error code.
+ $error = isset($connectionErrors[$easy->errno])
+ ? new ConnectException($message, $easy->request, null, $ctx)
+ : new RequestException($message, $easy->request, $easy->response, null, $ctx);
+
+ return P\Create::rejectionFor($error);
+ }
+
+ private static function sanitizeCurlError(string $error, UriInterface $uri): string
+ {
+ if ('' === $error) {
+ return $error;
+ }
+
+ $baseUri = $uri->withQuery('')->withFragment('');
+ $baseUriString = $baseUri->__toString();
+
+ if ('' === $baseUriString) {
+ return $error;
+ }
+
+ $redactedUriString = \GuzzleHttp\Psr7\Utils::redactUserInfo($baseUri)->__toString();
+
+ return str_replace($baseUriString, $redactedUriString, $error);
+ }
+
+ /**
+ * @return array
+ */
+ private function getDefaultConf(EasyHandle $easy): array
+ {
+ $conf = [
+ '_headers' => $easy->request->getHeaders(),
+ \CURLOPT_CUSTOMREQUEST => $easy->request->getMethod(),
+ \CURLOPT_URL => (string) $easy->request->getUri()->withFragment(''),
+ \CURLOPT_RETURNTRANSFER => false,
+ \CURLOPT_HEADER => false,
+ \CURLOPT_CONNECTTIMEOUT => 300,
+ ];
+
+ if (\defined('CURLOPT_PROTOCOLS')) {
+ $conf[\CURLOPT_PROTOCOLS] = \CURLPROTO_HTTP | \CURLPROTO_HTTPS;
+ }
+
+ $version = $easy->request->getProtocolVersion();
+
+ if ('2' === $version || '2.0' === $version) {
+ $conf[\CURLOPT_HTTP_VERSION] = \CURL_HTTP_VERSION_2_0;
+ } elseif ('1.1' === $version) {
+ $conf[\CURLOPT_HTTP_VERSION] = \CURL_HTTP_VERSION_1_1;
+ } else {
+ $conf[\CURLOPT_HTTP_VERSION] = \CURL_HTTP_VERSION_1_0;
+ }
+
+ return $conf;
+ }
+
+ private function applyMethod(EasyHandle $easy, array &$conf): void
+ {
+ $body = $easy->request->getBody();
+ $size = $body->getSize();
+
+ if ($size === null || $size > 0) {
+ $this->applyBody($easy->request, $easy->options, $conf);
+
+ return;
+ }
+
+ $method = $easy->request->getMethod();
+ if ($method === 'PUT' || $method === 'POST') {
+ // See https://datatracker.ietf.org/doc/html/rfc7230#section-3.3.2
+ if (!$easy->request->hasHeader('Content-Length')) {
+ $conf[\CURLOPT_HTTPHEADER][] = 'Content-Length: 0';
+ }
+ } elseif ($method === 'HEAD') {
+ $conf[\CURLOPT_NOBODY] = true;
+ unset(
+ $conf[\CURLOPT_WRITEFUNCTION],
+ $conf[\CURLOPT_READFUNCTION],
+ $conf[\CURLOPT_FILE],
+ $conf[\CURLOPT_INFILE]
+ );
+ }
+ }
+
+ private function applyBody(RequestInterface $request, array $options, array &$conf): void
+ {
+ $size = $request->hasHeader('Content-Length')
+ ? (int) $request->getHeaderLine('Content-Length')
+ : null;
+
+ // Send the body as a string if the size is less than 1MB OR if the
+ // [curl][body_as_string] request value is set.
+ if (($size !== null && $size < 1000000) || !empty($options['_body_as_string'])) {
+ $conf[\CURLOPT_POSTFIELDS] = (string) $request->getBody();
+ // Don't duplicate the Content-Length header
+ $this->removeHeader('Content-Length', $conf);
+ $this->removeHeader('Transfer-Encoding', $conf);
+ } else {
+ $conf[\CURLOPT_UPLOAD] = true;
+ if ($size !== null) {
+ $conf[\CURLOPT_INFILESIZE] = $size;
+ $this->removeHeader('Content-Length', $conf);
+ }
+ $body = $request->getBody();
+ if ($body->isSeekable()) {
+ $body->rewind();
+ }
+ $conf[\CURLOPT_READFUNCTION] = static function ($ch, $fd, $length) use ($body) {
+ return $body->read($length);
+ };
+ }
+
+ // If the Expect header is not present, prevent curl from adding it
+ if (!$request->hasHeader('Expect')) {
+ $conf[\CURLOPT_HTTPHEADER][] = 'Expect:';
+ }
+
+ // cURL sometimes adds a content-type by default. Prevent this.
+ if (!$request->hasHeader('Content-Type')) {
+ $conf[\CURLOPT_HTTPHEADER][] = 'Content-Type:';
+ }
+ }
+
+ private function applyHeaders(EasyHandle $easy, array &$conf): void
+ {
+ foreach ($conf['_headers'] as $name => $values) {
+ foreach ($values as $value) {
+ $value = (string) $value;
+ if ($value === '') {
+ // cURL requires a special format for empty headers.
+ // See https://github.com/guzzle/guzzle/issues/1882 for more details.
+ $conf[\CURLOPT_HTTPHEADER][] = "$name;";
+ } else {
+ $conf[\CURLOPT_HTTPHEADER][] = "$name: $value";
+ }
+ }
+ }
+
+ // Remove the Accept header if one was not set
+ if (!$easy->request->hasHeader('Accept')) {
+ $conf[\CURLOPT_HTTPHEADER][] = 'Accept:';
+ }
+ }
+
+ /**
+ * Remove a header from the options array.
+ *
+ * @param string $name Case-insensitive header to remove
+ * @param array $options Array of options to modify
+ */
+ private function removeHeader(string $name, array &$options): void
+ {
+ foreach (\array_keys($options['_headers']) as $key) {
+ if (!\strcasecmp($key, $name)) {
+ unset($options['_headers'][$key]);
+
+ return;
+ }
+ }
+ }
+
+ private function applyHandlerOptions(EasyHandle $easy, array &$conf): void
+ {
+ $options = $easy->options;
+ if (isset($options['verify'])) {
+ if ($options['verify'] === false) {
+ unset($conf[\CURLOPT_CAINFO]);
+ $conf[\CURLOPT_SSL_VERIFYHOST] = 0;
+ $conf[\CURLOPT_SSL_VERIFYPEER] = false;
+ } else {
+ $conf[\CURLOPT_SSL_VERIFYHOST] = 2;
+ $conf[\CURLOPT_SSL_VERIFYPEER] = true;
+ if (\is_string($options['verify'])) {
+ // Throw an error if the file/folder/link path is not valid or doesn't exist.
+ if (!\file_exists($options['verify'])) {
+ throw new \InvalidArgumentException("SSL CA bundle not found: {$options['verify']}");
+ }
+ // If it's a directory or a link to a directory use CURLOPT_CAPATH.
+ // If not, it's probably a file, or a link to a file, so use CURLOPT_CAINFO.
+ if (
+ \is_dir($options['verify'])
+ || (
+ \is_link($options['verify']) === true
+ && ($verifyLink = \readlink($options['verify'])) !== false
+ && \is_dir($verifyLink)
+ )
+ ) {
+ $conf[\CURLOPT_CAPATH] = $options['verify'];
+ } else {
+ $conf[\CURLOPT_CAINFO] = $options['verify'];
+ }
+ }
+ }
+ }
+
+ if (!isset($options['curl'][\CURLOPT_ENCODING]) && !empty($options['decode_content'])) {
+ $accept = $easy->request->getHeaderLine('Accept-Encoding');
+ if ($accept) {
+ $conf[\CURLOPT_ENCODING] = $accept;
+ } else {
+ // The empty string enables all available decoders and implicitly
+ // sets a matching 'Accept-Encoding' header.
+ $conf[\CURLOPT_ENCODING] = '';
+ // But as the user did not specify any encoding preference,
+ // let's leave it up to server by preventing curl from sending
+ // the header, which will be interpreted as 'Accept-Encoding: *'.
+ // https://www.rfc-editor.org/rfc/rfc9110#field.accept-encoding
+ $conf[\CURLOPT_HTTPHEADER][] = 'Accept-Encoding:';
+ }
+ }
+
+ if (!isset($options['sink'])) {
+ // Use a default temp stream if no sink was set.
+ $options['sink'] = \GuzzleHttp\Psr7\Utils::tryFopen('php://temp', 'w+');
+ }
+ $sink = $options['sink'];
+ if (!\is_string($sink)) {
+ $sink = \GuzzleHttp\Psr7\Utils::streamFor($sink);
+ } elseif (!\is_dir(\dirname($sink))) {
+ // Ensure that the directory exists before failing in curl.
+ throw new \RuntimeException(\sprintf('Directory %s does not exist for sink value of %s', \dirname($sink), $sink));
+ } else {
+ $sink = new LazyOpenStream($sink, 'w+');
+ }
+ $easy->sink = $sink;
+ $conf[\CURLOPT_WRITEFUNCTION] = static function ($ch, $write) use ($sink): int {
+ return $sink->write($write);
+ };
+
+ $timeoutRequiresNoSignal = false;
+ if (isset($options['timeout'])) {
+ $timeoutRequiresNoSignal |= $options['timeout'] < 1;
+ $conf[\CURLOPT_TIMEOUT_MS] = $options['timeout'] * 1000;
+ }
+
+ // CURL default value is CURL_IPRESOLVE_WHATEVER
+ if (isset($options['force_ip_resolve'])) {
+ if ('v4' === $options['force_ip_resolve']) {
+ $conf[\CURLOPT_IPRESOLVE] = \CURL_IPRESOLVE_V4;
+ } elseif ('v6' === $options['force_ip_resolve']) {
+ $conf[\CURLOPT_IPRESOLVE] = \CURL_IPRESOLVE_V6;
+ }
+ }
+
+ if (isset($options['connect_timeout'])) {
+ $timeoutRequiresNoSignal |= $options['connect_timeout'] < 1;
+ $conf[\CURLOPT_CONNECTTIMEOUT_MS] = $options['connect_timeout'] * 1000;
+ }
+
+ if ($timeoutRequiresNoSignal && \strtoupper(\substr(\PHP_OS, 0, 3)) !== 'WIN') {
+ $conf[\CURLOPT_NOSIGNAL] = true;
+ }
+
+ if (isset($options['proxy'])) {
+ if (!\is_array($options['proxy'])) {
+ $conf[\CURLOPT_PROXY] = $options['proxy'];
+ } else {
+ $scheme = $easy->request->getUri()->getScheme();
+ if (isset($options['proxy'][$scheme])) {
+ $host = $easy->request->getUri()->getHost();
+ if (isset($options['proxy']['no']) && Utils::isHostInNoProxy($host, $options['proxy']['no'])) {
+ unset($conf[\CURLOPT_PROXY]);
+ } else {
+ $conf[\CURLOPT_PROXY] = $options['proxy'][$scheme];
+ }
+ }
+ }
+ }
+
+ if (isset($options['crypto_method'])) {
+ $protocolVersion = $easy->request->getProtocolVersion();
+
+ // If HTTP/2, upgrade TLS 1.0 and 1.1 to 1.2
+ if ('2' === $protocolVersion || '2.0' === $protocolVersion) {
+ if (
+ \STREAM_CRYPTO_METHOD_TLSv1_0_CLIENT === $options['crypto_method']
+ || \STREAM_CRYPTO_METHOD_TLSv1_1_CLIENT === $options['crypto_method']
+ || \STREAM_CRYPTO_METHOD_TLSv1_2_CLIENT === $options['crypto_method']
+ ) {
+ $conf[\CURLOPT_SSLVERSION] = \CURL_SSLVERSION_TLSv1_2;
+ } elseif (defined('STREAM_CRYPTO_METHOD_TLSv1_3_CLIENT') && \STREAM_CRYPTO_METHOD_TLSv1_3_CLIENT === $options['crypto_method']) {
+ if (!self::supportsTls13()) {
+ throw new \InvalidArgumentException('Invalid crypto_method request option: TLS 1.3 not supported by your version of cURL');
+ }
+ $conf[\CURLOPT_SSLVERSION] = \CURL_SSLVERSION_TLSv1_3;
+ } else {
+ throw new \InvalidArgumentException('Invalid crypto_method request option: unknown version provided');
+ }
+ } elseif (\STREAM_CRYPTO_METHOD_TLSv1_0_CLIENT === $options['crypto_method']) {
+ $conf[\CURLOPT_SSLVERSION] = \CURL_SSLVERSION_TLSv1_0;
+ } elseif (\STREAM_CRYPTO_METHOD_TLSv1_1_CLIENT === $options['crypto_method']) {
+ $conf[\CURLOPT_SSLVERSION] = \CURL_SSLVERSION_TLSv1_1;
+ } elseif (\STREAM_CRYPTO_METHOD_TLSv1_2_CLIENT === $options['crypto_method']) {
+ if (!self::supportsTls12()) {
+ throw new \InvalidArgumentException('Invalid crypto_method request option: TLS 1.2 not supported by your version of cURL');
+ }
+ $conf[\CURLOPT_SSLVERSION] = \CURL_SSLVERSION_TLSv1_2;
+ } elseif (defined('STREAM_CRYPTO_METHOD_TLSv1_3_CLIENT') && \STREAM_CRYPTO_METHOD_TLSv1_3_CLIENT === $options['crypto_method']) {
+ if (!self::supportsTls13()) {
+ throw new \InvalidArgumentException('Invalid crypto_method request option: TLS 1.3 not supported by your version of cURL');
+ }
+ $conf[\CURLOPT_SSLVERSION] = \CURL_SSLVERSION_TLSv1_3;
+ } else {
+ throw new \InvalidArgumentException('Invalid crypto_method request option: unknown version provided');
+ }
+ }
+
+ if (isset($options['cert'])) {
+ $cert = $options['cert'];
+ if (\is_array($cert)) {
+ $conf[\CURLOPT_SSLCERTPASSWD] = $cert[1];
+ $cert = $cert[0];
+ }
+ if (!\file_exists($cert)) {
+ throw new \InvalidArgumentException("SSL certificate not found: {$cert}");
+ }
+ // OpenSSL (versions 0.9.3 and later) also support "P12" for PKCS#12-encoded files.
+ // see https://curl.se/libcurl/c/CURLOPT_SSLCERTTYPE.html
+ $ext = pathinfo($cert, \PATHINFO_EXTENSION);
+ if (preg_match('#^(der|p12)$#i', $ext)) {
+ $conf[\CURLOPT_SSLCERTTYPE] = strtoupper($ext);
+ }
+ $conf[\CURLOPT_SSLCERT] = $cert;
+ }
+
+ if (isset($options['ssl_key'])) {
+ if (\is_array($options['ssl_key'])) {
+ if (\count($options['ssl_key']) === 2) {
+ [$sslKey, $conf[\CURLOPT_SSLKEYPASSWD]] = $options['ssl_key'];
+ } else {
+ [$sslKey] = $options['ssl_key'];
+ }
+ }
+
+ $sslKey = $sslKey ?? $options['ssl_key'];
+
+ if (!\file_exists($sslKey)) {
+ throw new \InvalidArgumentException("SSL private key not found: {$sslKey}");
+ }
+ $conf[\CURLOPT_SSLKEY] = $sslKey;
+ }
+
+ if (isset($options['progress'])) {
+ $progress = $options['progress'];
+ if (!\is_callable($progress)) {
+ throw new \InvalidArgumentException('progress client option must be callable');
+ }
+ $conf[\CURLOPT_NOPROGRESS] = false;
+ $conf[\CURLOPT_PROGRESSFUNCTION] = static function ($resource, int $downloadSize, int $downloaded, int $uploadSize, int $uploaded) use ($progress) {
+ $progress($downloadSize, $downloaded, $uploadSize, $uploaded);
+ };
+ }
+
+ if (!empty($options['debug'])) {
+ $conf[\CURLOPT_STDERR] = Utils::debugResource($options['debug']);
+ $conf[\CURLOPT_VERBOSE] = true;
+ }
+ }
+
+ /**
+ * This function ensures that a response was set on a transaction. If one
+ * was not set, then the request is retried if possible. This error
+ * typically means you are sending a payload, curl encountered a
+ * "Connection died, retrying a fresh connect" error, tried to rewind the
+ * stream, and then encountered a "necessary data rewind wasn't possible"
+ * error, causing the request to be sent through curl_multi_info_read()
+ * without an error status.
+ *
+ * @param callable(RequestInterface, array): PromiseInterface $handler
+ */
+ private static function retryFailedRewind(callable $handler, EasyHandle $easy, array $ctx): PromiseInterface
+ {
+ try {
+ // Only rewind if the body has been read from.
+ $body = $easy->request->getBody();
+ if ($body->tell() > 0) {
+ $body->rewind();
+ }
+ } catch (\RuntimeException $e) {
+ $ctx['error'] = 'The connection unexpectedly failed without '
+ .'providing an error. The request would have been retried, '
+ .'but attempting to rewind the request body failed. '
+ .'Exception: '.$e;
+
+ return self::createRejection($easy, $ctx);
+ }
+
+ // Retry no more than 3 times before giving up.
+ if (!isset($easy->options['_curl_retries'])) {
+ $easy->options['_curl_retries'] = 1;
+ } elseif ($easy->options['_curl_retries'] == 2) {
+ $ctx['error'] = 'The cURL request was retried 3 times '
+ .'and did not succeed. The most likely reason for the failure '
+ .'is that cURL was unable to rewind the body of the request '
+ .'and subsequent retries resulted in the same error. Turn on '
+ .'the debug option to see what went wrong. See '
+ .'https://bugs.php.net/bug.php?id=47204 for more information.';
+
+ return self::createRejection($easy, $ctx);
+ } else {
+ ++$easy->options['_curl_retries'];
+ }
+
+ return $handler($easy->request, $easy->options);
+ }
+
+ private function createHeaderFn(EasyHandle $easy): callable
+ {
+ if (isset($easy->options['on_headers'])) {
+ $onHeaders = $easy->options['on_headers'];
+
+ if (!\is_callable($onHeaders)) {
+ throw new \InvalidArgumentException('on_headers must be callable');
+ }
+ } else {
+ $onHeaders = null;
+ }
+
+ return static function ($ch, $h) use (
+ $onHeaders,
+ $easy,
+ &$startingResponse
+ ) {
+ $value = \trim($h);
+ if ($value === '') {
+ $startingResponse = true;
+ try {
+ $easy->createResponse();
+ } catch (\Exception $e) {
+ $easy->createResponseException = $e;
+
+ return -1;
+ }
+ if ($onHeaders !== null) {
+ try {
+ $onHeaders($easy->response);
+ } catch (\Exception $e) {
+ // Associate the exception with the handle and trigger
+ // a curl header write error by returning 0.
+ $easy->onHeadersException = $e;
+
+ return -1;
+ }
+ }
+ } elseif ($startingResponse) {
+ $startingResponse = false;
+ $easy->headers = [$value];
+ } else {
+ $easy->headers[] = $value;
+ }
+
+ return \strlen($h);
+ };
+ }
+
+ public function __destruct()
+ {
+ foreach ($this->handles as $id => $handle) {
+ \curl_close($handle);
+ unset($this->handles[$id]);
+ }
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Handler/CurlFactoryInterface.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Handler/CurlFactoryInterface.php
new file mode 100644
index 0000000000..fe57ed5d57
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Handler/CurlFactoryInterface.php
@@ -0,0 +1,25 @@
+factory = $options['handle_factory']
+ ?? new CurlFactory(3);
+ }
+
+ public function __invoke(RequestInterface $request, array $options): PromiseInterface
+ {
+ if (isset($options['delay'])) {
+ \usleep($options['delay'] * 1000);
+ }
+
+ $easy = $this->factory->create($request, $options);
+ \curl_exec($easy->handle);
+ $easy->errno = \curl_errno($easy->handle);
+
+ return CurlFactory::finish($this, $easy, $this->factory);
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Handler/CurlMultiHandler.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Handler/CurlMultiHandler.php
new file mode 100644
index 0000000000..73a6abe333
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Handler/CurlMultiHandler.php
@@ -0,0 +1,284 @@
+ An array of delay times, indexed by handle id in `addRequest`.
+ *
+ * @see CurlMultiHandler::addRequest
+ */
+ private $delays = [];
+
+ /**
+ * @var array An associative array of CURLMOPT_* options and corresponding values for curl_multi_setopt()
+ */
+ private $options = [];
+
+ /** @var resource|\CurlMultiHandle */
+ private $_mh;
+
+ /**
+ * This handler accepts the following options:
+ *
+ * - handle_factory: An optional factory used to create curl handles
+ * - select_timeout: Optional timeout (in seconds) to block before timing
+ * out while selecting curl handles. Defaults to 1 second.
+ * - options: An associative array of CURLMOPT_* options and
+ * corresponding values for curl_multi_setopt()
+ */
+ public function __construct(array $options = [])
+ {
+ $this->factory = $options['handle_factory'] ?? new CurlFactory(50);
+
+ if (isset($options['select_timeout'])) {
+ $this->selectTimeout = $options['select_timeout'];
+ } elseif ($selectTimeout = Utils::getenv('GUZZLE_CURL_SELECT_TIMEOUT')) {
+ @trigger_error('Since guzzlehttp/guzzle 7.2.0: Using environment variable GUZZLE_CURL_SELECT_TIMEOUT is deprecated. Use option "select_timeout" instead.', \E_USER_DEPRECATED);
+ $this->selectTimeout = (int) $selectTimeout;
+ } else {
+ $this->selectTimeout = 1;
+ }
+
+ $this->options = $options['options'] ?? [];
+
+ // unsetting the property forces the first access to go through
+ // __get().
+ unset($this->_mh);
+ }
+
+ /**
+ * @param string $name
+ *
+ * @return resource|\CurlMultiHandle
+ *
+ * @throws \BadMethodCallException when another field as `_mh` will be gotten
+ * @throws \RuntimeException when curl can not initialize a multi handle
+ */
+ public function __get($name)
+ {
+ if ($name !== '_mh') {
+ throw new \BadMethodCallException("Can not get other property as '_mh'.");
+ }
+
+ $multiHandle = \curl_multi_init();
+
+ if (false === $multiHandle) {
+ throw new \RuntimeException('Can not initialize curl multi handle.');
+ }
+
+ $this->_mh = $multiHandle;
+
+ foreach ($this->options as $option => $value) {
+ // A warning is raised in case of a wrong option.
+ curl_multi_setopt($this->_mh, $option, $value);
+ }
+
+ return $this->_mh;
+ }
+
+ public function __destruct()
+ {
+ if (isset($this->_mh)) {
+ \curl_multi_close($this->_mh);
+ unset($this->_mh);
+ }
+ }
+
+ public function __invoke(RequestInterface $request, array $options): PromiseInterface
+ {
+ $easy = $this->factory->create($request, $options);
+ $id = (int) $easy->handle;
+
+ $promise = new Promise(
+ [$this, 'execute'],
+ function () use ($id) {
+ return $this->cancel($id);
+ }
+ );
+
+ $this->addRequest(['easy' => $easy, 'deferred' => $promise]);
+
+ return $promise;
+ }
+
+ /**
+ * Ticks the curl event loop.
+ */
+ public function tick(): void
+ {
+ // Add any delayed handles if needed.
+ if ($this->delays) {
+ $currentTime = Utils::currentTime();
+ foreach ($this->delays as $id => $delay) {
+ if ($currentTime >= $delay) {
+ unset($this->delays[$id]);
+ \curl_multi_add_handle(
+ $this->_mh,
+ $this->handles[$id]['easy']->handle
+ );
+ }
+ }
+ }
+
+ // Run curl_multi_exec in the queue to enable other async tasks to run
+ P\Utils::queue()->add(Closure::fromCallable([$this, 'tickInQueue']));
+
+ // Step through the task queue which may add additional requests.
+ P\Utils::queue()->run();
+
+ if ($this->active && \curl_multi_select($this->_mh, $this->selectTimeout) === -1) {
+ // Perform a usleep if a select returns -1.
+ // See: https://bugs.php.net/bug.php?id=61141
+ \usleep(250);
+ }
+
+ while (\curl_multi_exec($this->_mh, $this->active) === \CURLM_CALL_MULTI_PERFORM) {
+ // Prevent busy looping for slow HTTP requests.
+ \curl_multi_select($this->_mh, $this->selectTimeout);
+ }
+
+ $this->processMessages();
+ }
+
+ /**
+ * Runs \curl_multi_exec() inside the event loop, to prevent busy looping
+ */
+ private function tickInQueue(): void
+ {
+ if (\curl_multi_exec($this->_mh, $this->active) === \CURLM_CALL_MULTI_PERFORM) {
+ \curl_multi_select($this->_mh, 0);
+ P\Utils::queue()->add(Closure::fromCallable([$this, 'tickInQueue']));
+ }
+ }
+
+ /**
+ * Runs until all outstanding connections have completed.
+ */
+ public function execute(): void
+ {
+ $queue = P\Utils::queue();
+
+ while ($this->handles || !$queue->isEmpty()) {
+ // If there are no transfers, then sleep for the next delay
+ if (!$this->active && $this->delays) {
+ \usleep($this->timeToNext());
+ }
+ $this->tick();
+ }
+ }
+
+ private function addRequest(array $entry): void
+ {
+ $easy = $entry['easy'];
+ $id = (int) $easy->handle;
+ $this->handles[$id] = $entry;
+ if (empty($easy->options['delay'])) {
+ \curl_multi_add_handle($this->_mh, $easy->handle);
+ } else {
+ $this->delays[$id] = Utils::currentTime() + ($easy->options['delay'] / 1000);
+ }
+ }
+
+ /**
+ * Cancels a handle from sending and removes references to it.
+ *
+ * @param int $id Handle ID to cancel and remove.
+ *
+ * @return bool True on success, false on failure.
+ */
+ private function cancel($id): bool
+ {
+ if (!is_int($id)) {
+ trigger_deprecation('guzzlehttp/guzzle', '7.4', 'Not passing an integer to %s::%s() is deprecated and will cause an error in 8.0.', __CLASS__, __FUNCTION__);
+ }
+
+ // Cannot cancel if it has been processed.
+ if (!isset($this->handles[$id])) {
+ return false;
+ }
+
+ $handle = $this->handles[$id]['easy']->handle;
+ unset($this->delays[$id], $this->handles[$id]);
+ \curl_multi_remove_handle($this->_mh, $handle);
+ \curl_close($handle);
+
+ return true;
+ }
+
+ private function processMessages(): void
+ {
+ while ($done = \curl_multi_info_read($this->_mh)) {
+ if ($done['msg'] !== \CURLMSG_DONE) {
+ // if it's not done, then it would be premature to remove the handle. ref https://github.com/guzzle/guzzle/pull/2892#issuecomment-945150216
+ continue;
+ }
+ $id = (int) $done['handle'];
+ \curl_multi_remove_handle($this->_mh, $done['handle']);
+
+ if (!isset($this->handles[$id])) {
+ // Probably was cancelled.
+ continue;
+ }
+
+ $entry = $this->handles[$id];
+ unset($this->handles[$id], $this->delays[$id]);
+ $entry['easy']->errno = $done['result'];
+ $entry['deferred']->resolve(
+ CurlFactory::finish($this, $entry['easy'], $this->factory)
+ );
+ }
+ }
+
+ private function timeToNext(): int
+ {
+ $currentTime = Utils::currentTime();
+ $nextTime = \PHP_INT_MAX;
+ foreach ($this->delays as $time) {
+ if ($time < $nextTime) {
+ $nextTime = $time;
+ }
+ }
+
+ return ((int) \max(0, $nextTime - $currentTime)) * 1000000;
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Handler/EasyHandle.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Handler/EasyHandle.php
new file mode 100644
index 0000000000..1bc39f4b4b
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Handler/EasyHandle.php
@@ -0,0 +1,112 @@
+headers);
+
+ $normalizedKeys = Utils::normalizeHeaderKeys($headers);
+
+ if (!empty($this->options['decode_content']) && isset($normalizedKeys['content-encoding'])) {
+ $headers['x-encoded-content-encoding'] = $headers[$normalizedKeys['content-encoding']];
+ unset($headers[$normalizedKeys['content-encoding']]);
+ if (isset($normalizedKeys['content-length'])) {
+ $headers['x-encoded-content-length'] = $headers[$normalizedKeys['content-length']];
+
+ $bodyLength = (int) $this->sink->getSize();
+ if ($bodyLength) {
+ $headers[$normalizedKeys['content-length']] = $bodyLength;
+ } else {
+ unset($headers[$normalizedKeys['content-length']]);
+ }
+ }
+ }
+
+ // Attach a response to the easy handle with the parsed headers.
+ $this->response = new Response(
+ $status,
+ $headers,
+ $this->sink,
+ $ver,
+ $reason
+ );
+ }
+
+ /**
+ * @param string $name
+ *
+ * @return void
+ *
+ * @throws \BadMethodCallException
+ */
+ public function __get($name)
+ {
+ $msg = $name === 'handle' ? 'The EasyHandle has been released' : 'Invalid property: '.$name;
+ throw new \BadMethodCallException($msg);
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Handler/HeaderProcessor.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Handler/HeaderProcessor.php
new file mode 100644
index 0000000000..5554b8fa9f
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Handler/HeaderProcessor.php
@@ -0,0 +1,42 @@
+|null $queue The parameters to be passed to the append function, as an indexed array.
+ * @param callable|null $onFulfilled Callback to invoke when the return value is fulfilled.
+ * @param callable|null $onRejected Callback to invoke when the return value is rejected.
+ */
+ public function __construct(?array $queue = null, ?callable $onFulfilled = null, ?callable $onRejected = null)
+ {
+ $this->onFulfilled = $onFulfilled;
+ $this->onRejected = $onRejected;
+
+ if ($queue) {
+ // array_values included for BC
+ $this->append(...array_values($queue));
+ }
+ }
+
+ public function __invoke(RequestInterface $request, array $options): PromiseInterface
+ {
+ if (!$this->queue) {
+ throw new \OutOfBoundsException('Mock queue is empty');
+ }
+
+ if (isset($options['delay']) && \is_numeric($options['delay'])) {
+ \usleep((int) $options['delay'] * 1000);
+ }
+
+ $this->lastRequest = $request;
+ $this->lastOptions = $options;
+ $response = \array_shift($this->queue);
+
+ if (isset($options['on_headers'])) {
+ if (!\is_callable($options['on_headers'])) {
+ throw new \InvalidArgumentException('on_headers must be callable');
+ }
+ try {
+ $options['on_headers']($response);
+ } catch (\Exception $e) {
+ $msg = 'An error was encountered during the on_headers event';
+ $response = new RequestException($msg, $request, $response, $e);
+ }
+ }
+
+ if (\is_callable($response)) {
+ $response = $response($request, $options);
+ }
+
+ $response = $response instanceof \Throwable
+ ? P\Create::rejectionFor($response)
+ : P\Create::promiseFor($response);
+
+ return $response->then(
+ function (?ResponseInterface $value) use ($request, $options) {
+ $this->invokeStats($request, $options, $value);
+ if ($this->onFulfilled) {
+ ($this->onFulfilled)($value);
+ }
+
+ if ($value !== null && isset($options['sink'])) {
+ $contents = (string) $value->getBody();
+ $sink = $options['sink'];
+
+ if (\is_resource($sink)) {
+ \fwrite($sink, $contents);
+ } elseif (\is_string($sink)) {
+ \file_put_contents($sink, $contents);
+ } elseif ($sink instanceof StreamInterface) {
+ $sink->write($contents);
+ }
+ }
+
+ return $value;
+ },
+ function ($reason) use ($request, $options) {
+ $this->invokeStats($request, $options, null, $reason);
+ if ($this->onRejected) {
+ ($this->onRejected)($reason);
+ }
+
+ return P\Create::rejectionFor($reason);
+ }
+ );
+ }
+
+ /**
+ * Adds one or more variadic requests, exceptions, callables, or promises
+ * to the queue.
+ *
+ * @param mixed ...$values
+ */
+ public function append(...$values): void
+ {
+ foreach ($values as $value) {
+ if ($value instanceof ResponseInterface
+ || $value instanceof \Throwable
+ || $value instanceof PromiseInterface
+ || \is_callable($value)
+ ) {
+ $this->queue[] = $value;
+ } else {
+ throw new \TypeError('Expected a Response, Promise, Throwable or callable. Found '.Utils::describeType($value));
+ }
+ }
+ }
+
+ /**
+ * Get the last received request.
+ */
+ public function getLastRequest(): ?RequestInterface
+ {
+ return $this->lastRequest;
+ }
+
+ /**
+ * Get the last received request options.
+ */
+ public function getLastOptions(): array
+ {
+ return $this->lastOptions;
+ }
+
+ /**
+ * Returns the number of remaining items in the queue.
+ */
+ public function count(): int
+ {
+ return \count($this->queue);
+ }
+
+ public function reset(): void
+ {
+ $this->queue = [];
+ }
+
+ /**
+ * @param mixed $reason Promise or reason.
+ */
+ private function invokeStats(
+ RequestInterface $request,
+ array $options,
+ ?ResponseInterface $response = null,
+ $reason = null
+ ): void {
+ if (isset($options['on_stats'])) {
+ $transferTime = $options['transfer_time'] ?? 0;
+ $stats = new TransferStats($request, $response, $transferTime, $reason);
+ ($options['on_stats'])($stats);
+ }
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Handler/Proxy.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Handler/Proxy.php
new file mode 100644
index 0000000000..f045b526c5
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Handler/Proxy.php
@@ -0,0 +1,51 @@
+getProtocolVersion();
+
+ if ('1.0' !== $protocolVersion && '1.1' !== $protocolVersion) {
+ throw new ConnectException(sprintf('HTTP/%s is not supported by the stream handler.', $protocolVersion), $request);
+ }
+
+ $startTime = isset($options['on_stats']) ? Utils::currentTime() : null;
+
+ try {
+ // Does not support the expect header.
+ $request = $request->withoutHeader('Expect');
+
+ // Append a content-length header if body size is zero to match
+ // cURL's behavior.
+ if (0 === $request->getBody()->getSize()) {
+ $request = $request->withHeader('Content-Length', '0');
+ }
+
+ return $this->createResponse(
+ $request,
+ $options,
+ $this->createStream($request, $options),
+ $startTime
+ );
+ } catch (\InvalidArgumentException $e) {
+ throw $e;
+ } catch (\Exception $e) {
+ // Determine if the error was a networking error.
+ $message = $e->getMessage();
+ // This list can probably get more comprehensive.
+ if (false !== \strpos($message, 'getaddrinfo') // DNS lookup failed
+ || false !== \strpos($message, 'Connection refused')
+ || false !== \strpos($message, "couldn't connect to host") // error on HHVM
+ || false !== \strpos($message, 'connection attempt failed')
+ ) {
+ $e = new ConnectException($e->getMessage(), $request, $e);
+ } else {
+ $e = RequestException::wrapException($request, $e);
+ }
+ $this->invokeStats($options, $request, $startTime, null, $e);
+
+ return P\Create::rejectionFor($e);
+ }
+ }
+
+ private function invokeStats(
+ array $options,
+ RequestInterface $request,
+ ?float $startTime,
+ ?ResponseInterface $response = null,
+ ?\Throwable $error = null
+ ): void {
+ if (isset($options['on_stats'])) {
+ $stats = new TransferStats($request, $response, Utils::currentTime() - $startTime, $error, []);
+ ($options['on_stats'])($stats);
+ }
+ }
+
+ /**
+ * @param resource $stream
+ */
+ private function createResponse(RequestInterface $request, array $options, $stream, ?float $startTime): PromiseInterface
+ {
+ $hdrs = $this->lastHeaders;
+ $this->lastHeaders = [];
+
+ try {
+ [$ver, $status, $reason, $headers] = HeaderProcessor::parseHeaders($hdrs);
+ } catch (\Exception $e) {
+ return P\Create::rejectionFor(
+ new RequestException('An error was encountered while creating the response', $request, null, $e)
+ );
+ }
+
+ [$stream, $headers] = $this->checkDecode($options, $headers, $stream);
+ $stream = Psr7\Utils::streamFor($stream);
+ $sink = $stream;
+
+ if (\strcasecmp('HEAD', $request->getMethod())) {
+ $sink = $this->createSink($stream, $options);
+ }
+
+ try {
+ $response = new Psr7\Response($status, $headers, $sink, $ver, $reason);
+ } catch (\Exception $e) {
+ return P\Create::rejectionFor(
+ new RequestException('An error was encountered while creating the response', $request, null, $e)
+ );
+ }
+
+ if (isset($options['on_headers'])) {
+ try {
+ $options['on_headers']($response);
+ } catch (\Exception $e) {
+ return P\Create::rejectionFor(
+ new RequestException('An error was encountered during the on_headers event', $request, $response, $e)
+ );
+ }
+ }
+
+ // Do not drain when the request is a HEAD request because they have
+ // no body.
+ if ($sink !== $stream) {
+ $this->drain($stream, $sink, $response->getHeaderLine('Content-Length'));
+ }
+
+ $this->invokeStats($options, $request, $startTime, $response, null);
+
+ return new FulfilledPromise($response);
+ }
+
+ private function createSink(StreamInterface $stream, array $options): StreamInterface
+ {
+ if (!empty($options['stream'])) {
+ return $stream;
+ }
+
+ $sink = $options['sink'] ?? Psr7\Utils::tryFopen('php://temp', 'r+');
+
+ return \is_string($sink) ? new Psr7\LazyOpenStream($sink, 'w+') : Psr7\Utils::streamFor($sink);
+ }
+
+ /**
+ * @param resource $stream
+ */
+ private function checkDecode(array $options, array $headers, $stream): array
+ {
+ // Automatically decode responses when instructed.
+ if (!empty($options['decode_content'])) {
+ $normalizedKeys = Utils::normalizeHeaderKeys($headers);
+ if (isset($normalizedKeys['content-encoding'])) {
+ $encoding = $headers[$normalizedKeys['content-encoding']];
+ if ($encoding[0] === 'gzip' || $encoding[0] === 'deflate') {
+ $stream = new Psr7\InflateStream(Psr7\Utils::streamFor($stream));
+ $headers['x-encoded-content-encoding'] = $headers[$normalizedKeys['content-encoding']];
+
+ // Remove content-encoding header
+ unset($headers[$normalizedKeys['content-encoding']]);
+
+ // Fix content-length header
+ if (isset($normalizedKeys['content-length'])) {
+ $headers['x-encoded-content-length'] = $headers[$normalizedKeys['content-length']];
+ $length = (int) $stream->getSize();
+ if ($length === 0) {
+ unset($headers[$normalizedKeys['content-length']]);
+ } else {
+ $headers[$normalizedKeys['content-length']] = [$length];
+ }
+ }
+ }
+ }
+ }
+
+ return [$stream, $headers];
+ }
+
+ /**
+ * Drains the source stream into the "sink" client option.
+ *
+ * @param string $contentLength Header specifying the amount of
+ * data to read.
+ *
+ * @throws \RuntimeException when the sink option is invalid.
+ */
+ private function drain(StreamInterface $source, StreamInterface $sink, string $contentLength): StreamInterface
+ {
+ // If a content-length header is provided, then stop reading once
+ // that number of bytes has been read. This can prevent infinitely
+ // reading from a stream when dealing with servers that do not honor
+ // Connection: Close headers.
+ Psr7\Utils::copyToStream(
+ $source,
+ $sink,
+ (\strlen($contentLength) > 0 && (int) $contentLength > 0) ? (int) $contentLength : -1
+ );
+
+ $sink->seek(0);
+ $source->close();
+
+ return $sink;
+ }
+
+ /**
+ * Create a resource and check to ensure it was created successfully
+ *
+ * @param callable $callback Callable that returns stream resource
+ *
+ * @return resource
+ *
+ * @throws \RuntimeException on error
+ */
+ private function createResource(callable $callback)
+ {
+ $errors = [];
+ \set_error_handler(static function ($_, $msg, $file, $line) use (&$errors): bool {
+ $errors[] = [
+ 'message' => $msg,
+ 'file' => $file,
+ 'line' => $line,
+ ];
+
+ return true;
+ });
+
+ try {
+ $resource = $callback();
+ } finally {
+ \restore_error_handler();
+ }
+
+ if (!$resource) {
+ $message = 'Error creating resource: ';
+ foreach ($errors as $err) {
+ foreach ($err as $key => $value) {
+ $message .= "[$key] $value".\PHP_EOL;
+ }
+ }
+ throw new \RuntimeException(\trim($message));
+ }
+
+ return $resource;
+ }
+
+ /**
+ * @return resource
+ */
+ private function createStream(RequestInterface $request, array $options)
+ {
+ static $methods;
+ if (!$methods) {
+ $methods = \array_flip(\get_class_methods(__CLASS__));
+ }
+
+ if (!\in_array($request->getUri()->getScheme(), ['http', 'https'])) {
+ throw new RequestException(\sprintf("The scheme '%s' is not supported.", $request->getUri()->getScheme()), $request);
+ }
+
+ // HTTP/1.1 streams using the PHP stream wrapper require a
+ // Connection: close header
+ if ($request->getProtocolVersion() === '1.1'
+ && !$request->hasHeader('Connection')
+ ) {
+ $request = $request->withHeader('Connection', 'close');
+ }
+
+ // Ensure SSL is verified by default
+ if (!isset($options['verify'])) {
+ $options['verify'] = true;
+ }
+
+ $params = [];
+ $context = $this->getDefaultContext($request);
+
+ if (isset($options['on_headers']) && !\is_callable($options['on_headers'])) {
+ throw new \InvalidArgumentException('on_headers must be callable');
+ }
+
+ if (!empty($options)) {
+ foreach ($options as $key => $value) {
+ $method = "add_{$key}";
+ if (isset($methods[$method])) {
+ $this->{$method}($request, $context, $value, $params);
+ }
+ }
+ }
+
+ if (isset($options['stream_context'])) {
+ if (!\is_array($options['stream_context'])) {
+ throw new \InvalidArgumentException('stream_context must be an array');
+ }
+ $context = \array_replace_recursive($context, $options['stream_context']);
+ }
+
+ // Microsoft NTLM authentication only supported with curl handler
+ if (isset($options['auth'][2]) && 'ntlm' === $options['auth'][2]) {
+ throw new \InvalidArgumentException('Microsoft NTLM authentication only supported with curl handler');
+ }
+
+ $uri = $this->resolveHost($request, $options);
+
+ $contextResource = $this->createResource(
+ static function () use ($context, $params) {
+ return \stream_context_create($context, $params);
+ }
+ );
+
+ return $this->createResource(
+ function () use ($uri, &$http_response_header, $contextResource, $context, $options, $request) {
+ $resource = @\fopen((string) $uri, 'r', false, $contextResource);
+ $this->lastHeaders = $http_response_header ?? [];
+
+ if (false === $resource) {
+ throw new ConnectException(sprintf('Connection refused for URI %s', $uri), $request, null, $context);
+ }
+
+ if (isset($options['read_timeout'])) {
+ $readTimeout = $options['read_timeout'];
+ $sec = (int) $readTimeout;
+ $usec = ($readTimeout - $sec) * 100000;
+ \stream_set_timeout($resource, $sec, $usec);
+ }
+
+ return $resource;
+ }
+ );
+ }
+
+ private function resolveHost(RequestInterface $request, array $options): UriInterface
+ {
+ $uri = $request->getUri();
+
+ if (isset($options['force_ip_resolve']) && !\filter_var($uri->getHost(), \FILTER_VALIDATE_IP)) {
+ if ('v4' === $options['force_ip_resolve']) {
+ $records = \dns_get_record($uri->getHost(), \DNS_A);
+ if (false === $records || !isset($records[0]['ip'])) {
+ throw new ConnectException(\sprintf("Could not resolve IPv4 address for host '%s'", $uri->getHost()), $request);
+ }
+
+ return $uri->withHost($records[0]['ip']);
+ }
+ if ('v6' === $options['force_ip_resolve']) {
+ $records = \dns_get_record($uri->getHost(), \DNS_AAAA);
+ if (false === $records || !isset($records[0]['ipv6'])) {
+ throw new ConnectException(\sprintf("Could not resolve IPv6 address for host '%s'", $uri->getHost()), $request);
+ }
+
+ return $uri->withHost('['.$records[0]['ipv6'].']');
+ }
+ }
+
+ return $uri;
+ }
+
+ private function getDefaultContext(RequestInterface $request): array
+ {
+ $headers = '';
+ foreach ($request->getHeaders() as $name => $value) {
+ foreach ($value as $val) {
+ $headers .= "$name: $val\r\n";
+ }
+ }
+
+ $context = [
+ 'http' => [
+ 'method' => $request->getMethod(),
+ 'header' => $headers,
+ 'protocol_version' => $request->getProtocolVersion(),
+ 'ignore_errors' => true,
+ 'follow_location' => 0,
+ ],
+ 'ssl' => [
+ 'peer_name' => $request->getUri()->getHost(),
+ ],
+ ];
+
+ $body = (string) $request->getBody();
+
+ if ('' !== $body) {
+ $context['http']['content'] = $body;
+ // Prevent the HTTP handler from adding a Content-Type header.
+ if (!$request->hasHeader('Content-Type')) {
+ $context['http']['header'] .= "Content-Type:\r\n";
+ }
+ }
+
+ $context['http']['header'] = \rtrim($context['http']['header']);
+
+ return $context;
+ }
+
+ /**
+ * @param mixed $value as passed via Request transfer options.
+ */
+ private function add_proxy(RequestInterface $request, array &$options, $value, array &$params): void
+ {
+ $uri = null;
+
+ if (!\is_array($value)) {
+ $uri = $value;
+ } else {
+ $scheme = $request->getUri()->getScheme();
+ if (isset($value[$scheme])) {
+ if (!isset($value['no']) || !Utils::isHostInNoProxy($request->getUri()->getHost(), $value['no'])) {
+ $uri = $value[$scheme];
+ }
+ }
+ }
+
+ if (!$uri) {
+ return;
+ }
+
+ $parsed = $this->parse_proxy($uri);
+ $options['http']['proxy'] = $parsed['proxy'];
+
+ if ($parsed['auth']) {
+ if (!isset($options['http']['header'])) {
+ $options['http']['header'] = [];
+ }
+ $options['http']['header'] .= "\r\nProxy-Authorization: {$parsed['auth']}";
+ }
+ }
+
+ /**
+ * Parses the given proxy URL to make it compatible with the format PHP's stream context expects.
+ */
+ private function parse_proxy(string $url): array
+ {
+ $parsed = \parse_url($url);
+
+ if ($parsed !== false && isset($parsed['scheme']) && $parsed['scheme'] === 'http') {
+ if (isset($parsed['host']) && isset($parsed['port'])) {
+ $auth = null;
+ if (isset($parsed['user']) && isset($parsed['pass'])) {
+ $auth = \base64_encode("{$parsed['user']}:{$parsed['pass']}");
+ }
+
+ return [
+ 'proxy' => "tcp://{$parsed['host']}:{$parsed['port']}",
+ 'auth' => $auth ? "Basic {$auth}" : null,
+ ];
+ }
+ }
+
+ // Return proxy as-is.
+ return [
+ 'proxy' => $url,
+ 'auth' => null,
+ ];
+ }
+
+ /**
+ * @param mixed $value as passed via Request transfer options.
+ */
+ private function add_timeout(RequestInterface $request, array &$options, $value, array &$params): void
+ {
+ if ($value > 0) {
+ $options['http']['timeout'] = $value;
+ }
+ }
+
+ /**
+ * @param mixed $value as passed via Request transfer options.
+ */
+ private function add_crypto_method(RequestInterface $request, array &$options, $value, array &$params): void
+ {
+ if (
+ $value === \STREAM_CRYPTO_METHOD_TLSv1_0_CLIENT
+ || $value === \STREAM_CRYPTO_METHOD_TLSv1_1_CLIENT
+ || $value === \STREAM_CRYPTO_METHOD_TLSv1_2_CLIENT
+ || (defined('STREAM_CRYPTO_METHOD_TLSv1_3_CLIENT') && $value === \STREAM_CRYPTO_METHOD_TLSv1_3_CLIENT)
+ ) {
+ $options['http']['crypto_method'] = $value;
+
+ return;
+ }
+
+ throw new \InvalidArgumentException('Invalid crypto_method request option: unknown version provided');
+ }
+
+ /**
+ * @param mixed $value as passed via Request transfer options.
+ */
+ private function add_verify(RequestInterface $request, array &$options, $value, array &$params): void
+ {
+ if ($value === false) {
+ $options['ssl']['verify_peer'] = false;
+ $options['ssl']['verify_peer_name'] = false;
+
+ return;
+ }
+
+ if (\is_string($value)) {
+ $options['ssl']['cafile'] = $value;
+ if (!\file_exists($value)) {
+ throw new \RuntimeException("SSL CA bundle not found: $value");
+ }
+ } elseif ($value !== true) {
+ throw new \InvalidArgumentException('Invalid verify request option');
+ }
+
+ $options['ssl']['verify_peer'] = true;
+ $options['ssl']['verify_peer_name'] = true;
+ $options['ssl']['allow_self_signed'] = false;
+ }
+
+ /**
+ * @param mixed $value as passed via Request transfer options.
+ */
+ private function add_cert(RequestInterface $request, array &$options, $value, array &$params): void
+ {
+ if (\is_array($value)) {
+ $options['ssl']['passphrase'] = $value[1];
+ $value = $value[0];
+ }
+
+ if (!\file_exists($value)) {
+ throw new \RuntimeException("SSL certificate not found: {$value}");
+ }
+
+ $options['ssl']['local_cert'] = $value;
+ }
+
+ /**
+ * @param mixed $value as passed via Request transfer options.
+ */
+ private function add_progress(RequestInterface $request, array &$options, $value, array &$params): void
+ {
+ self::addNotification(
+ $params,
+ static function ($code, $a, $b, $c, $transferred, $total) use ($value) {
+ if ($code == \STREAM_NOTIFY_PROGRESS) {
+ // The upload progress cannot be determined. Use 0 for cURL compatibility:
+ // https://curl.se/libcurl/c/CURLOPT_PROGRESSFUNCTION.html
+ $value($total, $transferred, 0, 0);
+ }
+ }
+ );
+ }
+
+ /**
+ * @param mixed $value as passed via Request transfer options.
+ */
+ private function add_debug(RequestInterface $request, array &$options, $value, array &$params): void
+ {
+ if ($value === false) {
+ return;
+ }
+
+ static $map = [
+ \STREAM_NOTIFY_CONNECT => 'CONNECT',
+ \STREAM_NOTIFY_AUTH_REQUIRED => 'AUTH_REQUIRED',
+ \STREAM_NOTIFY_AUTH_RESULT => 'AUTH_RESULT',
+ \STREAM_NOTIFY_MIME_TYPE_IS => 'MIME_TYPE_IS',
+ \STREAM_NOTIFY_FILE_SIZE_IS => 'FILE_SIZE_IS',
+ \STREAM_NOTIFY_REDIRECTED => 'REDIRECTED',
+ \STREAM_NOTIFY_PROGRESS => 'PROGRESS',
+ \STREAM_NOTIFY_FAILURE => 'FAILURE',
+ \STREAM_NOTIFY_COMPLETED => 'COMPLETED',
+ \STREAM_NOTIFY_RESOLVE => 'RESOLVE',
+ ];
+ static $args = ['severity', 'message', 'message_code', 'bytes_transferred', 'bytes_max'];
+
+ $value = Utils::debugResource($value);
+ $ident = $request->getMethod().' '.$request->getUri()->withFragment('');
+ self::addNotification(
+ $params,
+ static function (int $code, ...$passed) use ($ident, $value, $map, $args): void {
+ \fprintf($value, '<%s> [%s] ', $ident, $map[$code]);
+ foreach (\array_filter($passed) as $i => $v) {
+ \fwrite($value, $args[$i].': "'.$v.'" ');
+ }
+ \fwrite($value, "\n");
+ }
+ );
+ }
+
+ private static function addNotification(array &$params, callable $notify): void
+ {
+ // Wrap the existing function if needed.
+ if (!isset($params['notification'])) {
+ $params['notification'] = $notify;
+ } else {
+ $params['notification'] = self::callArray([
+ $params['notification'],
+ $notify,
+ ]);
+ }
+ }
+
+ private static function callArray(array $functions): callable
+ {
+ return static function (...$args) use ($functions) {
+ foreach ($functions as $fn) {
+ $fn(...$args);
+ }
+ };
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/HandlerStack.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/HandlerStack.php
new file mode 100644
index 0000000000..03f9a18ffd
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/HandlerStack.php
@@ -0,0 +1,275 @@
+push(Middleware::httpErrors(), 'http_errors');
+ $stack->push(Middleware::redirect(), 'allow_redirects');
+ $stack->push(Middleware::cookies(), 'cookies');
+ $stack->push(Middleware::prepareBody(), 'prepare_body');
+
+ return $stack;
+ }
+
+ /**
+ * @param (callable(RequestInterface, array): PromiseInterface)|null $handler Underlying HTTP handler.
+ */
+ public function __construct(?callable $handler = null)
+ {
+ $this->handler = $handler;
+ }
+
+ /**
+ * Invokes the handler stack as a composed handler
+ *
+ * @return ResponseInterface|PromiseInterface
+ */
+ public function __invoke(RequestInterface $request, array $options)
+ {
+ $handler = $this->resolve();
+
+ return $handler($request, $options);
+ }
+
+ /**
+ * Dumps a string representation of the stack.
+ *
+ * @return string
+ */
+ public function __toString()
+ {
+ $depth = 0;
+ $stack = [];
+
+ if ($this->handler !== null) {
+ $stack[] = '0) Handler: '.$this->debugCallable($this->handler);
+ }
+
+ $result = '';
+ foreach (\array_reverse($this->stack) as $tuple) {
+ ++$depth;
+ $str = "{$depth}) Name: '{$tuple[1]}', ";
+ $str .= 'Function: '.$this->debugCallable($tuple[0]);
+ $result = "> {$str}\n{$result}";
+ $stack[] = $str;
+ }
+
+ foreach (\array_keys($stack) as $k) {
+ $result .= "< {$stack[$k]}\n";
+ }
+
+ return $result;
+ }
+
+ /**
+ * Set the HTTP handler that actually returns a promise.
+ *
+ * @param callable(RequestInterface, array): PromiseInterface $handler Accepts a request and array of options and
+ * returns a Promise.
+ */
+ public function setHandler(callable $handler): void
+ {
+ $this->handler = $handler;
+ $this->cached = null;
+ }
+
+ /**
+ * Returns true if the builder has a handler.
+ */
+ public function hasHandler(): bool
+ {
+ return $this->handler !== null;
+ }
+
+ /**
+ * Unshift a middleware to the bottom of the stack.
+ *
+ * @param callable(callable): callable $middleware Middleware function
+ * @param string $name Name to register for this middleware.
+ */
+ public function unshift(callable $middleware, ?string $name = null): void
+ {
+ \array_unshift($this->stack, [$middleware, $name]);
+ $this->cached = null;
+ }
+
+ /**
+ * Push a middleware to the top of the stack.
+ *
+ * @param callable(callable): callable $middleware Middleware function
+ * @param string $name Name to register for this middleware.
+ */
+ public function push(callable $middleware, string $name = ''): void
+ {
+ $this->stack[] = [$middleware, $name];
+ $this->cached = null;
+ }
+
+ /**
+ * Add a middleware before another middleware by name.
+ *
+ * @param string $findName Middleware to find
+ * @param callable(callable): callable $middleware Middleware function
+ * @param string $withName Name to register for this middleware.
+ */
+ public function before(string $findName, callable $middleware, string $withName = ''): void
+ {
+ $this->splice($findName, $withName, $middleware, true);
+ }
+
+ /**
+ * Add a middleware after another middleware by name.
+ *
+ * @param string $findName Middleware to find
+ * @param callable(callable): callable $middleware Middleware function
+ * @param string $withName Name to register for this middleware.
+ */
+ public function after(string $findName, callable $middleware, string $withName = ''): void
+ {
+ $this->splice($findName, $withName, $middleware, false);
+ }
+
+ /**
+ * Remove a middleware by instance or name from the stack.
+ *
+ * @param callable|string $remove Middleware to remove by instance or name.
+ */
+ public function remove($remove): void
+ {
+ if (!is_string($remove) && !is_callable($remove)) {
+ trigger_deprecation('guzzlehttp/guzzle', '7.4', 'Not passing a callable or string to %s::%s() is deprecated and will cause an error in 8.0.', __CLASS__, __FUNCTION__);
+ }
+
+ $this->cached = null;
+ $idx = \is_callable($remove) ? 0 : 1;
+ $this->stack = \array_values(\array_filter(
+ $this->stack,
+ static function ($tuple) use ($idx, $remove) {
+ return $tuple[$idx] !== $remove;
+ }
+ ));
+ }
+
+ /**
+ * Compose the middleware and handler into a single callable function.
+ *
+ * @return callable(RequestInterface, array): PromiseInterface
+ */
+ public function resolve(): callable
+ {
+ if ($this->cached === null) {
+ if (($prev = $this->handler) === null) {
+ throw new \LogicException('No handler has been specified');
+ }
+
+ foreach (\array_reverse($this->stack) as $fn) {
+ /** @var callable(RequestInterface, array): PromiseInterface $prev */
+ $prev = $fn[0]($prev);
+ }
+
+ $this->cached = $prev;
+ }
+
+ return $this->cached;
+ }
+
+ private function findByName(string $name): int
+ {
+ foreach ($this->stack as $k => $v) {
+ if ($v[1] === $name) {
+ return $k;
+ }
+ }
+
+ throw new \InvalidArgumentException("Middleware not found: $name");
+ }
+
+ /**
+ * Splices a function into the middleware list at a specific position.
+ */
+ private function splice(string $findName, string $withName, callable $middleware, bool $before): void
+ {
+ $this->cached = null;
+ $idx = $this->findByName($findName);
+ $tuple = [$middleware, $withName];
+
+ if ($before) {
+ if ($idx === 0) {
+ \array_unshift($this->stack, $tuple);
+ } else {
+ $replacement = [$tuple, $this->stack[$idx]];
+ \array_splice($this->stack, $idx, 1, $replacement);
+ }
+ } elseif ($idx === \count($this->stack) - 1) {
+ $this->stack[] = $tuple;
+ } else {
+ $replacement = [$this->stack[$idx], $tuple];
+ \array_splice($this->stack, $idx, 1, $replacement);
+ }
+ }
+
+ /**
+ * Provides a debug string for a given callable.
+ *
+ * @param callable|string $fn Function to write as a string.
+ */
+ private function debugCallable($fn): string
+ {
+ if (\is_string($fn)) {
+ return "callable({$fn})";
+ }
+
+ if (\is_array($fn)) {
+ return \is_string($fn[0])
+ ? "callable({$fn[0]}::{$fn[1]})"
+ : "callable(['".\get_class($fn[0])."', '{$fn[1]}'])";
+ }
+
+ /** @var object $fn */
+ return 'callable('.\spl_object_hash($fn).')';
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/MessageFormatter.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/MessageFormatter.php
new file mode 100644
index 0000000000..9b77eee832
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/MessageFormatter.php
@@ -0,0 +1,199 @@
+>>>>>>>\n{request}\n<<<<<<<<\n{response}\n--------\n{error}";
+ public const SHORT = '[{ts}] "{method} {target} HTTP/{version}" {code}';
+
+ /**
+ * @var string Template used to format log messages
+ */
+ private $template;
+
+ /**
+ * @param string $template Log message template
+ */
+ public function __construct(?string $template = self::CLF)
+ {
+ $this->template = $template ?: self::CLF;
+ }
+
+ /**
+ * Returns a formatted message string.
+ *
+ * @param RequestInterface $request Request that was sent
+ * @param ResponseInterface|null $response Response that was received
+ * @param \Throwable|null $error Exception that was received
+ */
+ public function format(RequestInterface $request, ?ResponseInterface $response = null, ?\Throwable $error = null): string
+ {
+ $cache = [];
+
+ /** @var string */
+ return \preg_replace_callback(
+ '/{\s*([A-Za-z_\-\.0-9]+)\s*}/',
+ function (array $matches) use ($request, $response, $error, &$cache) {
+ if (isset($cache[$matches[1]])) {
+ return $cache[$matches[1]];
+ }
+
+ $result = '';
+ switch ($matches[1]) {
+ case 'request':
+ $result = Psr7\Message::toString($request);
+ break;
+ case 'response':
+ $result = $response ? Psr7\Message::toString($response) : '';
+ break;
+ case 'req_headers':
+ $result = \trim($request->getMethod()
+ .' '.$request->getRequestTarget())
+ .' HTTP/'.$request->getProtocolVersion()."\r\n"
+ .$this->headers($request);
+ break;
+ case 'res_headers':
+ $result = $response ?
+ \sprintf(
+ 'HTTP/%s %d %s',
+ $response->getProtocolVersion(),
+ $response->getStatusCode(),
+ $response->getReasonPhrase()
+ )."\r\n".$this->headers($response)
+ : 'NULL';
+ break;
+ case 'req_body':
+ $result = $request->getBody()->__toString();
+ break;
+ case 'res_body':
+ if (!$response instanceof ResponseInterface) {
+ $result = 'NULL';
+ break;
+ }
+
+ $body = $response->getBody();
+
+ if (!$body->isSeekable()) {
+ $result = 'RESPONSE_NOT_LOGGEABLE';
+ break;
+ }
+
+ $result = $response->getBody()->__toString();
+ break;
+ case 'ts':
+ case 'date_iso_8601':
+ $result = \gmdate('c');
+ break;
+ case 'date_common_log':
+ $result = \date('d/M/Y:H:i:s O');
+ break;
+ case 'method':
+ $result = $request->getMethod();
+ break;
+ case 'version':
+ $result = $request->getProtocolVersion();
+ break;
+ case 'uri':
+ case 'url':
+ $result = $request->getUri()->__toString();
+ break;
+ case 'target':
+ $result = $request->getRequestTarget();
+ break;
+ case 'req_version':
+ $result = $request->getProtocolVersion();
+ break;
+ case 'res_version':
+ $result = $response
+ ? $response->getProtocolVersion()
+ : 'NULL';
+ break;
+ case 'host':
+ $result = $request->getHeaderLine('Host');
+ break;
+ case 'hostname':
+ $result = \gethostname();
+ break;
+ case 'code':
+ $result = $response ? $response->getStatusCode() : 'NULL';
+ break;
+ case 'phrase':
+ $result = $response ? $response->getReasonPhrase() : 'NULL';
+ break;
+ case 'error':
+ $result = $error ? $error->getMessage() : 'NULL';
+ break;
+ default:
+ // handle prefixed dynamic headers
+ if (\strpos($matches[1], 'req_header_') === 0) {
+ $result = $request->getHeaderLine(\substr($matches[1], 11));
+ } elseif (\strpos($matches[1], 'res_header_') === 0) {
+ $result = $response
+ ? $response->getHeaderLine(\substr($matches[1], 11))
+ : 'NULL';
+ }
+ }
+
+ $cache[$matches[1]] = $result;
+
+ return $result;
+ },
+ $this->template
+ );
+ }
+
+ /**
+ * Get headers from message as string
+ */
+ private function headers(MessageInterface $message): string
+ {
+ $result = '';
+ foreach ($message->getHeaders() as $name => $values) {
+ $result .= $name.': '.\implode(', ', $values)."\r\n";
+ }
+
+ return \trim($result);
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/MessageFormatterInterface.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/MessageFormatterInterface.php
new file mode 100644
index 0000000000..a39ac248ee
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/MessageFormatterInterface.php
@@ -0,0 +1,18 @@
+withCookieHeader($request);
+
+ return $handler($request, $options)
+ ->then(
+ static function (ResponseInterface $response) use ($cookieJar, $request): ResponseInterface {
+ $cookieJar->extractCookies($request, $response);
+
+ return $response;
+ }
+ );
+ };
+ };
+ }
+
+ /**
+ * Middleware that throws exceptions for 4xx or 5xx responses when the
+ * "http_errors" request option is set to true.
+ *
+ * @param BodySummarizerInterface|null $bodySummarizer The body summarizer to use in exception messages.
+ *
+ * @return callable(callable): callable Returns a function that accepts the next handler.
+ */
+ public static function httpErrors(?BodySummarizerInterface $bodySummarizer = null): callable
+ {
+ return static function (callable $handler) use ($bodySummarizer): callable {
+ return static function ($request, array $options) use ($handler, $bodySummarizer) {
+ if (empty($options['http_errors'])) {
+ return $handler($request, $options);
+ }
+
+ return $handler($request, $options)->then(
+ static function (ResponseInterface $response) use ($request, $bodySummarizer) {
+ $code = $response->getStatusCode();
+ if ($code < 400) {
+ return $response;
+ }
+ throw RequestException::create($request, $response, null, [], $bodySummarizer);
+ }
+ );
+ };
+ };
+ }
+
+ /**
+ * Middleware that pushes history data to an ArrayAccess container.
+ *
+ * @param array|\ArrayAccess $container Container to hold the history (by reference).
+ *
+ * @return callable(callable): callable Returns a function that accepts the next handler.
+ *
+ * @throws \InvalidArgumentException if container is not an array or ArrayAccess.
+ */
+ public static function history(&$container): callable
+ {
+ if (!\is_array($container) && !$container instanceof \ArrayAccess) {
+ throw new \InvalidArgumentException('history container must be an array or object implementing ArrayAccess');
+ }
+
+ return static function (callable $handler) use (&$container): callable {
+ return static function (RequestInterface $request, array $options) use ($handler, &$container) {
+ return $handler($request, $options)->then(
+ static function ($value) use ($request, &$container, $options) {
+ $container[] = [
+ 'request' => $request,
+ 'response' => $value,
+ 'error' => null,
+ 'options' => $options,
+ ];
+
+ return $value;
+ },
+ static function ($reason) use ($request, &$container, $options) {
+ $container[] = [
+ 'request' => $request,
+ 'response' => null,
+ 'error' => $reason,
+ 'options' => $options,
+ ];
+
+ return P\Create::rejectionFor($reason);
+ }
+ );
+ };
+ };
+ }
+
+ /**
+ * Middleware that invokes a callback before and after sending a request.
+ *
+ * The provided listener cannot modify or alter the response. It simply
+ * "taps" into the chain to be notified before returning the promise. The
+ * before listener accepts a request and options array, and the after
+ * listener accepts a request, options array, and response promise.
+ *
+ * @param callable $before Function to invoke before forwarding the request.
+ * @param callable $after Function invoked after forwarding.
+ *
+ * @return callable Returns a function that accepts the next handler.
+ */
+ public static function tap(?callable $before = null, ?callable $after = null): callable
+ {
+ return static function (callable $handler) use ($before, $after): callable {
+ return static function (RequestInterface $request, array $options) use ($handler, $before, $after) {
+ if ($before) {
+ $before($request, $options);
+ }
+ $response = $handler($request, $options);
+ if ($after) {
+ $after($request, $options, $response);
+ }
+
+ return $response;
+ };
+ };
+ }
+
+ /**
+ * Middleware that handles request redirects.
+ *
+ * @return callable Returns a function that accepts the next handler.
+ */
+ public static function redirect(): callable
+ {
+ return static function (callable $handler): RedirectMiddleware {
+ return new RedirectMiddleware($handler);
+ };
+ }
+
+ /**
+ * Middleware that retries requests based on the boolean result of
+ * invoking the provided "decider" function.
+ *
+ * If no delay function is provided, a simple implementation of exponential
+ * backoff will be utilized.
+ *
+ * @param callable $decider Function that accepts the number of retries,
+ * a request, [response], and [exception] and
+ * returns true if the request is to be retried.
+ * @param callable $delay Function that accepts the number of retries and
+ * returns the number of milliseconds to delay.
+ *
+ * @return callable Returns a function that accepts the next handler.
+ */
+ public static function retry(callable $decider, ?callable $delay = null): callable
+ {
+ return static function (callable $handler) use ($decider, $delay): RetryMiddleware {
+ return new RetryMiddleware($decider, $handler, $delay);
+ };
+ }
+
+ /**
+ * Middleware that logs requests, responses, and errors using a message
+ * formatter.
+ *
+ * @phpstan-param \Psr\Log\LogLevel::* $logLevel Level at which to log requests.
+ *
+ * @param LoggerInterface $logger Logs messages.
+ * @param MessageFormatterInterface|MessageFormatter $formatter Formatter used to create message strings.
+ * @param string $logLevel Level at which to log requests.
+ *
+ * @return callable Returns a function that accepts the next handler.
+ */
+ public static function log(LoggerInterface $logger, $formatter, string $logLevel = 'info'): callable
+ {
+ // To be compatible with Guzzle 7.1.x we need to allow users to pass a MessageFormatter
+ if (!$formatter instanceof MessageFormatter && !$formatter instanceof MessageFormatterInterface) {
+ throw new \LogicException(sprintf('Argument 2 to %s::log() must be of type %s', self::class, MessageFormatterInterface::class));
+ }
+
+ return static function (callable $handler) use ($logger, $formatter, $logLevel): callable {
+ return static function (RequestInterface $request, array $options = []) use ($handler, $logger, $formatter, $logLevel) {
+ return $handler($request, $options)->then(
+ static function ($response) use ($logger, $request, $formatter, $logLevel): ResponseInterface {
+ $message = $formatter->format($request, $response);
+ $logger->log($logLevel, $message);
+
+ return $response;
+ },
+ static function ($reason) use ($logger, $request, $formatter): PromiseInterface {
+ $response = $reason instanceof RequestException ? $reason->getResponse() : null;
+ $message = $formatter->format($request, $response, P\Create::exceptionFor($reason));
+ $logger->error($message);
+
+ return P\Create::rejectionFor($reason);
+ }
+ );
+ };
+ };
+ }
+
+ /**
+ * This middleware adds a default content-type if possible, a default
+ * content-length or transfer-encoding header, and the expect header.
+ */
+ public static function prepareBody(): callable
+ {
+ return static function (callable $handler): PrepareBodyMiddleware {
+ return new PrepareBodyMiddleware($handler);
+ };
+ }
+
+ /**
+ * Middleware that applies a map function to the request before passing to
+ * the next handler.
+ *
+ * @param callable $fn Function that accepts a RequestInterface and returns
+ * a RequestInterface.
+ */
+ public static function mapRequest(callable $fn): callable
+ {
+ return static function (callable $handler) use ($fn): callable {
+ return static function (RequestInterface $request, array $options) use ($handler, $fn) {
+ return $handler($fn($request), $options);
+ };
+ };
+ }
+
+ /**
+ * Middleware that applies a map function to the resolved promise's
+ * response.
+ *
+ * @param callable $fn Function that accepts a ResponseInterface and
+ * returns a ResponseInterface.
+ */
+ public static function mapResponse(callable $fn): callable
+ {
+ return static function (callable $handler) use ($fn): callable {
+ return static function (RequestInterface $request, array $options) use ($handler, $fn) {
+ return $handler($request, $options)->then($fn);
+ };
+ };
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Pool.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Pool.php
new file mode 100644
index 0000000000..6277c61fbc
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Pool.php
@@ -0,0 +1,125 @@
+ $rfn) {
+ if ($rfn instanceof RequestInterface) {
+ yield $key => $client->sendAsync($rfn, $opts);
+ } elseif (\is_callable($rfn)) {
+ yield $key => $rfn($opts);
+ } else {
+ throw new \InvalidArgumentException('Each value yielded by the iterator must be a Psr7\Http\Message\RequestInterface or a callable that returns a promise that fulfills with a Psr7\Message\Http\ResponseInterface object.');
+ }
+ }
+ };
+
+ $this->each = new EachPromise($requests(), $config);
+ }
+
+ /**
+ * Get promise
+ */
+ public function promise(): PromiseInterface
+ {
+ return $this->each->promise();
+ }
+
+ /**
+ * Sends multiple requests concurrently and returns an array of responses
+ * and exceptions that uses the same ordering as the provided requests.
+ *
+ * IMPORTANT: This method keeps every request and response in memory, and
+ * as such, is NOT recommended when sending a large number or an
+ * indeterminate number of requests concurrently.
+ *
+ * @param ClientInterface $client Client used to send the requests
+ * @param array|\Iterator $requests Requests to send concurrently.
+ * @param array $options Passes through the options available in
+ * {@see \GuzzleHttp\Pool::__construct}
+ *
+ * @return array Returns an array containing the response or an exception
+ * in the same order that the requests were sent.
+ *
+ * @throws \InvalidArgumentException if the event format is incorrect.
+ */
+ public static function batch(ClientInterface $client, $requests, array $options = []): array
+ {
+ $res = [];
+ self::cmpCallback($options, 'fulfilled', $res);
+ self::cmpCallback($options, 'rejected', $res);
+ $pool = new static($client, $requests, $options);
+ $pool->promise()->wait();
+ \ksort($res);
+
+ return $res;
+ }
+
+ /**
+ * Execute callback(s)
+ */
+ private static function cmpCallback(array &$options, string $name, array &$results): void
+ {
+ if (!isset($options[$name])) {
+ $options[$name] = static function ($v, $k) use (&$results) {
+ $results[$k] = $v;
+ };
+ } else {
+ $currentFn = $options[$name];
+ $options[$name] = static function ($v, $k) use (&$results, $currentFn) {
+ $currentFn($v, $k);
+ $results[$k] = $v;
+ };
+ }
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/PrepareBodyMiddleware.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/PrepareBodyMiddleware.php
new file mode 100644
index 0000000000..7dde6c5f46
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/PrepareBodyMiddleware.php
@@ -0,0 +1,105 @@
+nextHandler = $nextHandler;
+ }
+
+ public function __invoke(RequestInterface $request, array $options): PromiseInterface
+ {
+ $fn = $this->nextHandler;
+
+ // Don't do anything if the request has no body.
+ if ($request->getBody()->getSize() === 0) {
+ return $fn($request, $options);
+ }
+
+ $modify = [];
+
+ // Add a default content-type if possible.
+ if (!$request->hasHeader('Content-Type')) {
+ if ($uri = $request->getBody()->getMetadata('uri')) {
+ if (is_string($uri) && $type = Psr7\MimeType::fromFilename($uri)) {
+ $modify['set_headers']['Content-Type'] = $type;
+ }
+ }
+ }
+
+ // Add a default content-length or transfer-encoding header.
+ if (!$request->hasHeader('Content-Length')
+ && !$request->hasHeader('Transfer-Encoding')
+ ) {
+ $size = $request->getBody()->getSize();
+ if ($size !== null) {
+ $modify['set_headers']['Content-Length'] = $size;
+ } else {
+ $modify['set_headers']['Transfer-Encoding'] = 'chunked';
+ }
+ }
+
+ // Add the expect header if needed.
+ $this->addExpectHeader($request, $options, $modify);
+
+ return $fn(Psr7\Utils::modifyRequest($request, $modify), $options);
+ }
+
+ /**
+ * Add expect header
+ */
+ private function addExpectHeader(RequestInterface $request, array $options, array &$modify): void
+ {
+ // Determine if the Expect header should be used
+ if ($request->hasHeader('Expect')) {
+ return;
+ }
+
+ $expect = $options['expect'] ?? null;
+
+ // Return if disabled or using HTTP/1.0
+ if ($expect === false || $request->getProtocolVersion() === '1.0') {
+ return;
+ }
+
+ // The expect header is unconditionally enabled
+ if ($expect === true) {
+ $modify['set_headers']['Expect'] = '100-Continue';
+
+ return;
+ }
+
+ // By default, send the expect header when the payload is > 1mb
+ if ($expect === null) {
+ $expect = 1048576;
+ }
+
+ // Always add if the body cannot be rewound, the size cannot be
+ // determined, or the size is greater than the cutoff threshold
+ $body = $request->getBody();
+ $size = $body->getSize();
+
+ if ($size === null || $size >= (int) $expect || !$body->isSeekable()) {
+ $modify['set_headers']['Expect'] = '100-Continue';
+ }
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/RedirectMiddleware.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/RedirectMiddleware.php
new file mode 100644
index 0000000000..7aa21a6232
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/RedirectMiddleware.php
@@ -0,0 +1,228 @@
+ 5,
+ 'protocols' => ['http', 'https'],
+ 'strict' => false,
+ 'referer' => false,
+ 'track_redirects' => false,
+ ];
+
+ /**
+ * @var callable(RequestInterface, array): PromiseInterface
+ */
+ private $nextHandler;
+
+ /**
+ * @param callable(RequestInterface, array): PromiseInterface $nextHandler Next handler to invoke.
+ */
+ public function __construct(callable $nextHandler)
+ {
+ $this->nextHandler = $nextHandler;
+ }
+
+ public function __invoke(RequestInterface $request, array $options): PromiseInterface
+ {
+ $fn = $this->nextHandler;
+
+ if (empty($options['allow_redirects'])) {
+ return $fn($request, $options);
+ }
+
+ if ($options['allow_redirects'] === true) {
+ $options['allow_redirects'] = self::$defaultSettings;
+ } elseif (!\is_array($options['allow_redirects'])) {
+ throw new \InvalidArgumentException('allow_redirects must be true, false, or array');
+ } else {
+ // Merge the default settings with the provided settings
+ $options['allow_redirects'] += self::$defaultSettings;
+ }
+
+ if (empty($options['allow_redirects']['max'])) {
+ return $fn($request, $options);
+ }
+
+ return $fn($request, $options)
+ ->then(function (ResponseInterface $response) use ($request, $options) {
+ return $this->checkRedirect($request, $options, $response);
+ });
+ }
+
+ /**
+ * @return ResponseInterface|PromiseInterface
+ */
+ public function checkRedirect(RequestInterface $request, array $options, ResponseInterface $response)
+ {
+ if (\strpos((string) $response->getStatusCode(), '3') !== 0
+ || !$response->hasHeader('Location')
+ ) {
+ return $response;
+ }
+
+ $this->guardMax($request, $response, $options);
+ $nextRequest = $this->modifyRequest($request, $options, $response);
+
+ // If authorization is handled by curl, unset it if URI is cross-origin.
+ if (Psr7\UriComparator::isCrossOrigin($request->getUri(), $nextRequest->getUri()) && defined('\CURLOPT_HTTPAUTH')) {
+ unset(
+ $options['curl'][\CURLOPT_HTTPAUTH],
+ $options['curl'][\CURLOPT_USERPWD]
+ );
+ }
+
+ if (isset($options['allow_redirects']['on_redirect'])) {
+ ($options['allow_redirects']['on_redirect'])(
+ $request,
+ $response,
+ $nextRequest->getUri()
+ );
+ }
+
+ $promise = $this($nextRequest, $options);
+
+ // Add headers to be able to track history of redirects.
+ if (!empty($options['allow_redirects']['track_redirects'])) {
+ return $this->withTracking(
+ $promise,
+ (string) $nextRequest->getUri(),
+ $response->getStatusCode()
+ );
+ }
+
+ return $promise;
+ }
+
+ /**
+ * Enable tracking on promise.
+ */
+ private function withTracking(PromiseInterface $promise, string $uri, int $statusCode): PromiseInterface
+ {
+ return $promise->then(
+ static function (ResponseInterface $response) use ($uri, $statusCode) {
+ // Note that we are pushing to the front of the list as this
+ // would be an earlier response than what is currently present
+ // in the history header.
+ $historyHeader = $response->getHeader(self::HISTORY_HEADER);
+ $statusHeader = $response->getHeader(self::STATUS_HISTORY_HEADER);
+ \array_unshift($historyHeader, $uri);
+ \array_unshift($statusHeader, (string) $statusCode);
+
+ return $response->withHeader(self::HISTORY_HEADER, $historyHeader)
+ ->withHeader(self::STATUS_HISTORY_HEADER, $statusHeader);
+ }
+ );
+ }
+
+ /**
+ * Check for too many redirects.
+ *
+ * @throws TooManyRedirectsException Too many redirects.
+ */
+ private function guardMax(RequestInterface $request, ResponseInterface $response, array &$options): void
+ {
+ $current = $options['__redirect_count']
+ ?? 0;
+ $options['__redirect_count'] = $current + 1;
+ $max = $options['allow_redirects']['max'];
+
+ if ($options['__redirect_count'] > $max) {
+ throw new TooManyRedirectsException("Will not follow more than {$max} redirects", $request, $response);
+ }
+ }
+
+ public function modifyRequest(RequestInterface $request, array $options, ResponseInterface $response): RequestInterface
+ {
+ // Request modifications to apply.
+ $modify = [];
+ $protocols = $options['allow_redirects']['protocols'];
+
+ // Use a GET request if this is an entity enclosing request and we are
+ // not forcing RFC compliance, but rather emulating what all browsers
+ // would do.
+ $statusCode = $response->getStatusCode();
+ if ($statusCode == 303
+ || ($statusCode <= 302 && !$options['allow_redirects']['strict'])
+ ) {
+ $safeMethods = ['GET', 'HEAD', 'OPTIONS'];
+ $requestMethod = $request->getMethod();
+
+ $modify['method'] = in_array($requestMethod, $safeMethods) ? $requestMethod : 'GET';
+ $modify['body'] = '';
+ }
+
+ $uri = self::redirectUri($request, $response, $protocols);
+ if (isset($options['idn_conversion']) && ($options['idn_conversion'] !== false)) {
+ $idnOptions = ($options['idn_conversion'] === true) ? \IDNA_DEFAULT : $options['idn_conversion'];
+ $uri = Utils::idnUriConvert($uri, $idnOptions);
+ }
+
+ $modify['uri'] = $uri;
+ Psr7\Message::rewindBody($request);
+
+ // Add the Referer header if it is told to do so and only
+ // add the header if we are not redirecting from https to http.
+ if ($options['allow_redirects']['referer']
+ && $modify['uri']->getScheme() === $request->getUri()->getScheme()
+ ) {
+ $uri = $request->getUri()->withUserInfo('');
+ $modify['set_headers']['Referer'] = (string) $uri;
+ } else {
+ $modify['remove_headers'][] = 'Referer';
+ }
+
+ // Remove Authorization and Cookie headers if URI is cross-origin.
+ if (Psr7\UriComparator::isCrossOrigin($request->getUri(), $modify['uri'])) {
+ $modify['remove_headers'][] = 'Authorization';
+ $modify['remove_headers'][] = 'Cookie';
+ }
+
+ return Psr7\Utils::modifyRequest($request, $modify);
+ }
+
+ /**
+ * Set the appropriate URL on the request based on the location header.
+ */
+ private static function redirectUri(
+ RequestInterface $request,
+ ResponseInterface $response,
+ array $protocols
+ ): UriInterface {
+ $location = Psr7\UriResolver::resolve(
+ $request->getUri(),
+ new Psr7\Uri($response->getHeaderLine('Location'))
+ );
+
+ // Ensure that the redirect URI is allowed based on the protocols.
+ if (!\in_array($location->getScheme(), $protocols)) {
+ throw new BadResponseException(\sprintf('Redirect URI, %s, does not use one of the allowed redirect protocols: %s', $location, \implode(', ', $protocols)), $request, $response);
+ }
+
+ return $location;
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/RequestOptions.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/RequestOptions.php
new file mode 100644
index 0000000000..84a3500e44
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/RequestOptions.php
@@ -0,0 +1,274 @@
+decider = $decider;
+ $this->nextHandler = $nextHandler;
+ $this->delay = $delay ?: __CLASS__.'::exponentialDelay';
+ }
+
+ /**
+ * Default exponential backoff delay function.
+ *
+ * @return int milliseconds.
+ */
+ public static function exponentialDelay(int $retries): int
+ {
+ return (int) 2 ** ($retries - 1) * 1000;
+ }
+
+ public function __invoke(RequestInterface $request, array $options): PromiseInterface
+ {
+ if (!isset($options['retries'])) {
+ $options['retries'] = 0;
+ }
+
+ $fn = $this->nextHandler;
+
+ return $fn($request, $options)
+ ->then(
+ $this->onFulfilled($request, $options),
+ $this->onRejected($request, $options)
+ );
+ }
+
+ /**
+ * Execute fulfilled closure
+ */
+ private function onFulfilled(RequestInterface $request, array $options): callable
+ {
+ return function ($value) use ($request, $options) {
+ if (!($this->decider)(
+ $options['retries'],
+ $request,
+ $value,
+ null
+ )) {
+ return $value;
+ }
+
+ return $this->doRetry($request, $options, $value);
+ };
+ }
+
+ /**
+ * Execute rejected closure
+ */
+ private function onRejected(RequestInterface $req, array $options): callable
+ {
+ return function ($reason) use ($req, $options) {
+ if (!($this->decider)(
+ $options['retries'],
+ $req,
+ null,
+ $reason
+ )) {
+ return P\Create::rejectionFor($reason);
+ }
+
+ return $this->doRetry($req, $options);
+ };
+ }
+
+ private function doRetry(RequestInterface $request, array $options, ?ResponseInterface $response = null): PromiseInterface
+ {
+ $options['delay'] = ($this->delay)(++$options['retries'], $response, $request);
+
+ return $this($request, $options);
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/TransferStats.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/TransferStats.php
new file mode 100644
index 0000000000..93fa334c8d
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/TransferStats.php
@@ -0,0 +1,133 @@
+request = $request;
+ $this->response = $response;
+ $this->transferTime = $transferTime;
+ $this->handlerErrorData = $handlerErrorData;
+ $this->handlerStats = $handlerStats;
+ }
+
+ public function getRequest(): RequestInterface
+ {
+ return $this->request;
+ }
+
+ /**
+ * Returns the response that was received (if any).
+ */
+ public function getResponse(): ?ResponseInterface
+ {
+ return $this->response;
+ }
+
+ /**
+ * Returns true if a response was received.
+ */
+ public function hasResponse(): bool
+ {
+ return $this->response !== null;
+ }
+
+ /**
+ * Gets handler specific error data.
+ *
+ * This might be an exception, a integer representing an error code, or
+ * anything else. Relying on this value assumes that you know what handler
+ * you are using.
+ *
+ * @return mixed
+ */
+ public function getHandlerErrorData()
+ {
+ return $this->handlerErrorData;
+ }
+
+ /**
+ * Get the effective URI the request was sent to.
+ */
+ public function getEffectiveUri(): UriInterface
+ {
+ return $this->request->getUri();
+ }
+
+ /**
+ * Get the estimated time the request was being transferred by the handler.
+ *
+ * @return float|null Time in seconds.
+ */
+ public function getTransferTime(): ?float
+ {
+ return $this->transferTime;
+ }
+
+ /**
+ * Gets an array of all of the handler specific transfer data.
+ */
+ public function getHandlerStats(): array
+ {
+ return $this->handlerStats;
+ }
+
+ /**
+ * Get a specific handler statistic from the handler by name.
+ *
+ * @param string $stat Handler specific transfer stat to retrieve.
+ *
+ * @return mixed|null
+ */
+ public function getHandlerStat(string $stat)
+ {
+ return $this->handlerStats[$stat] ?? null;
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Utils.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Utils.php
new file mode 100644
index 0000000000..df529270e1
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/Utils.php
@@ -0,0 +1,384 @@
+= 0) {
+ if (\function_exists('curl_multi_exec') && \function_exists('curl_exec')) {
+ $handler = Proxy::wrapSync(new CurlMultiHandler(), new CurlHandler());
+ } elseif (\function_exists('curl_exec')) {
+ $handler = new CurlHandler();
+ } elseif (\function_exists('curl_multi_exec')) {
+ $handler = new CurlMultiHandler();
+ }
+ }
+
+ if (\ini_get('allow_url_fopen')) {
+ $handler = $handler
+ ? Proxy::wrapStreaming($handler, new StreamHandler())
+ : new StreamHandler();
+ } elseif (!$handler) {
+ throw new \RuntimeException('GuzzleHttp requires cURL, the allow_url_fopen ini setting, or a custom HTTP handler.');
+ }
+
+ return $handler;
+ }
+
+ /**
+ * Get the default User-Agent string to use with Guzzle.
+ */
+ public static function defaultUserAgent(): string
+ {
+ return sprintf('GuzzleHttp/%d', ClientInterface::MAJOR_VERSION);
+ }
+
+ /**
+ * Returns the default cacert bundle for the current system.
+ *
+ * First, the openssl.cafile and curl.cainfo php.ini settings are checked.
+ * If those settings are not configured, then the common locations for
+ * bundles found on Red Hat, CentOS, Fedora, Ubuntu, Debian, FreeBSD, OS X
+ * and Windows are checked. If any of these file locations are found on
+ * disk, they will be utilized.
+ *
+ * Note: the result of this function is cached for subsequent calls.
+ *
+ * @throws \RuntimeException if no bundle can be found.
+ *
+ * @deprecated Utils::defaultCaBundle will be removed in guzzlehttp/guzzle:8.0. This method is not needed in PHP 5.6+.
+ */
+ public static function defaultCaBundle(): string
+ {
+ static $cached = null;
+ static $cafiles = [
+ // Red Hat, CentOS, Fedora (provided by the ca-certificates package)
+ '/etc/pki/tls/certs/ca-bundle.crt',
+ // Ubuntu, Debian (provided by the ca-certificates package)
+ '/etc/ssl/certs/ca-certificates.crt',
+ // FreeBSD (provided by the ca_root_nss package)
+ '/usr/local/share/certs/ca-root-nss.crt',
+ // SLES 12 (provided by the ca-certificates package)
+ '/var/lib/ca-certificates/ca-bundle.pem',
+ // OS X provided by homebrew (using the default path)
+ '/usr/local/etc/openssl/cert.pem',
+ // Google app engine
+ '/etc/ca-certificates.crt',
+ // Windows?
+ 'C:\\windows\\system32\\curl-ca-bundle.crt',
+ 'C:\\windows\\curl-ca-bundle.crt',
+ ];
+
+ if ($cached) {
+ return $cached;
+ }
+
+ if ($ca = \ini_get('openssl.cafile')) {
+ return $cached = $ca;
+ }
+
+ if ($ca = \ini_get('curl.cainfo')) {
+ return $cached = $ca;
+ }
+
+ foreach ($cafiles as $filename) {
+ if (\file_exists($filename)) {
+ return $cached = $filename;
+ }
+ }
+
+ throw new \RuntimeException(
+ <<< EOT
+No system CA bundle could be found in any of the the common system locations.
+PHP versions earlier than 5.6 are not properly configured to use the system's
+CA bundle by default. In order to verify peer certificates, you will need to
+supply the path on disk to a certificate bundle to the 'verify' request
+option: https://docs.guzzlephp.org/en/latest/request-options.html#verify. If
+you do not need a specific certificate bundle, then Mozilla provides a commonly
+used CA bundle which can be downloaded here (provided by the maintainer of
+cURL): https://curl.haxx.se/ca/cacert.pem. Once you have a CA bundle available
+on disk, you can set the 'openssl.cafile' PHP ini setting to point to the path
+to the file, allowing you to omit the 'verify' request option. See
+https://curl.haxx.se/docs/sslcerts.html for more information.
+EOT
+ );
+ }
+
+ /**
+ * Creates an associative array of lowercase header names to the actual
+ * header casing.
+ */
+ public static function normalizeHeaderKeys(array $headers): array
+ {
+ $result = [];
+ foreach (\array_keys($headers) as $key) {
+ $result[\strtolower($key)] = $key;
+ }
+
+ return $result;
+ }
+
+ /**
+ * Returns true if the provided host matches any of the no proxy areas.
+ *
+ * This method will strip a port from the host if it is present. Each pattern
+ * can be matched with an exact match (e.g., "foo.com" == "foo.com") or a
+ * partial match: (e.g., "foo.com" == "baz.foo.com" and ".foo.com" ==
+ * "baz.foo.com", but ".foo.com" != "foo.com").
+ *
+ * Areas are matched in the following cases:
+ * 1. "*" (without quotes) always matches any hosts.
+ * 2. An exact match.
+ * 3. The area starts with "." and the area is the last part of the host. e.g.
+ * '.mit.edu' will match any host that ends with '.mit.edu'.
+ *
+ * @param string $host Host to check against the patterns.
+ * @param string[] $noProxyArray An array of host patterns.
+ *
+ * @throws InvalidArgumentException
+ */
+ public static function isHostInNoProxy(string $host, array $noProxyArray): bool
+ {
+ if (\strlen($host) === 0) {
+ throw new InvalidArgumentException('Empty host provided');
+ }
+
+ // Strip port if present.
+ [$host] = \explode(':', $host, 2);
+
+ foreach ($noProxyArray as $area) {
+ // Always match on wildcards.
+ if ($area === '*') {
+ return true;
+ }
+
+ if (empty($area)) {
+ // Don't match on empty values.
+ continue;
+ }
+
+ if ($area === $host) {
+ // Exact matches.
+ return true;
+ }
+ // Special match if the area when prefixed with ".". Remove any
+ // existing leading "." and add a new leading ".".
+ $area = '.'.\ltrim($area, '.');
+ if (\substr($host, -\strlen($area)) === $area) {
+ return true;
+ }
+ }
+
+ return false;
+ }
+
+ /**
+ * Wrapper for json_decode that throws when an error occurs.
+ *
+ * @param string $json JSON data to parse
+ * @param bool $assoc When true, returned objects will be converted
+ * into associative arrays.
+ * @param int $depth User specified recursion depth.
+ * @param int $options Bitmask of JSON decode options.
+ *
+ * @return object|array|string|int|float|bool|null
+ *
+ * @throws InvalidArgumentException if the JSON cannot be decoded.
+ *
+ * @see https://www.php.net/manual/en/function.json-decode.php
+ */
+ public static function jsonDecode(string $json, bool $assoc = false, int $depth = 512, int $options = 0)
+ {
+ $data = \json_decode($json, $assoc, $depth, $options);
+ if (\JSON_ERROR_NONE !== \json_last_error()) {
+ throw new InvalidArgumentException('json_decode error: '.\json_last_error_msg());
+ }
+
+ return $data;
+ }
+
+ /**
+ * Wrapper for JSON encoding that throws when an error occurs.
+ *
+ * @param mixed $value The value being encoded
+ * @param int $options JSON encode option bitmask
+ * @param int $depth Set the maximum depth. Must be greater than zero.
+ *
+ * @throws InvalidArgumentException if the JSON cannot be encoded.
+ *
+ * @see https://www.php.net/manual/en/function.json-encode.php
+ */
+ public static function jsonEncode($value, int $options = 0, int $depth = 512): string
+ {
+ $json = \json_encode($value, $options, $depth);
+ if (\JSON_ERROR_NONE !== \json_last_error()) {
+ throw new InvalidArgumentException('json_encode error: '.\json_last_error_msg());
+ }
+
+ /** @var string */
+ return $json;
+ }
+
+ /**
+ * Wrapper for the hrtime() or microtime() functions
+ * (depending on the PHP version, one of the two is used)
+ *
+ * @return float UNIX timestamp
+ *
+ * @internal
+ */
+ public static function currentTime(): float
+ {
+ return (float) \function_exists('hrtime') ? \hrtime(true) / 1e9 : \microtime(true);
+ }
+
+ /**
+ * @throws InvalidArgumentException
+ *
+ * @internal
+ */
+ public static function idnUriConvert(UriInterface $uri, int $options = 0): UriInterface
+ {
+ if ($uri->getHost()) {
+ $asciiHost = self::idnToAsci($uri->getHost(), $options, $info);
+ if ($asciiHost === false) {
+ $errorBitSet = $info['errors'] ?? 0;
+
+ $errorConstants = array_filter(array_keys(get_defined_constants()), static function (string $name): bool {
+ return substr($name, 0, 11) === 'IDNA_ERROR_';
+ });
+
+ $errors = [];
+ foreach ($errorConstants as $errorConstant) {
+ if ($errorBitSet & constant($errorConstant)) {
+ $errors[] = $errorConstant;
+ }
+ }
+
+ $errorMessage = 'IDN conversion failed';
+ if ($errors) {
+ $errorMessage .= ' (errors: '.implode(', ', $errors).')';
+ }
+
+ throw new InvalidArgumentException($errorMessage);
+ }
+ if ($uri->getHost() !== $asciiHost) {
+ // Replace URI only if the ASCII version is different
+ $uri = $uri->withHost($asciiHost);
+ }
+ }
+
+ return $uri;
+ }
+
+ /**
+ * @internal
+ */
+ public static function getenv(string $name): ?string
+ {
+ if (isset($_SERVER[$name])) {
+ return (string) $_SERVER[$name];
+ }
+
+ if (\PHP_SAPI === 'cli' && ($value = \getenv($name)) !== false && $value !== null) {
+ return (string) $value;
+ }
+
+ return null;
+ }
+
+ /**
+ * @return string|false
+ */
+ private static function idnToAsci(string $domain, int $options, ?array &$info = [])
+ {
+ if (\function_exists('idn_to_ascii') && \defined('INTL_IDNA_VARIANT_UTS46')) {
+ return \idn_to_ascii($domain, $options, \INTL_IDNA_VARIANT_UTS46, $info);
+ }
+
+ throw new \Error('ext-idn or symfony/polyfill-intl-idn not loaded or too old');
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/functions.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/functions.php
new file mode 100644
index 0000000000..5edc66ab1c
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/src/functions.php
@@ -0,0 +1,167 @@
+ 0])]);
+ $response = $client->get(Server::$url);
+ self::assertSame(200, $response->getStatusCode());
+ }
+
+ public function testValidatesArgsForMagicMethods()
+ {
+ $client = new Client();
+
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('Magic request methods require a URI and optional options array');
+ $client->options();
+ }
+
+ public function testCanSendAsyncGetRequests()
+ {
+ $client = new Client();
+ Server::flush();
+ Server::enqueue([new Response(200, ['Content-Length' => 2], 'hi')]);
+ $p = $client->getAsync(Server::$url, ['query' => ['test' => 'foo']]);
+ self::assertInstanceOf(PromiseInterface::class, $p);
+ self::assertSame(200, $p->wait()->getStatusCode());
+ $received = Server::received(true);
+ self::assertCount(1, $received);
+ self::assertSame('test=foo', $received[0]->getUri()->getQuery());
+ }
+
+ public function testCanSendSynchronously()
+ {
+ $client = new Client(['handler' => new MockHandler([new Response()])]);
+ $request = new Request('GET', 'http://example.com');
+ $r = $client->send($request);
+ self::assertInstanceOf(ResponseInterface::class, $r);
+ self::assertSame(200, $r->getStatusCode());
+ }
+
+ public function testClientHasOptions()
+ {
+ $client = new Client([
+ 'base_uri' => 'http://foo.com',
+ 'timeout' => 2,
+ 'headers' => ['bar' => 'baz'],
+ 'handler' => new MockHandler(),
+ ]);
+ $config = Helpers::readObjectAttribute($client, 'config');
+ self::assertArrayHasKey('base_uri', $config);
+ self::assertInstanceOf(Uri::class, $config['base_uri']);
+ self::assertSame('http://foo.com', (string) $config['base_uri']);
+ self::assertArrayHasKey('handler', $config);
+ self::assertNotNull($config['handler']);
+ self::assertArrayHasKey('timeout', $config);
+ self::assertSame(2, $config['timeout']);
+ }
+
+ public function testCanMergeOnBaseUri()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client([
+ 'base_uri' => 'http://foo.com/bar/',
+ 'handler' => $mock,
+ ]);
+ $client->get('baz');
+ self::assertSame(
+ 'http://foo.com/bar/baz',
+ (string) $mock->getLastRequest()->getUri()
+ );
+ }
+
+ public function testCanMergeOnBaseUriWithRequest()
+ {
+ $mock = new MockHandler([new Response(), new Response()]);
+ $client = new Client([
+ 'handler' => $mock,
+ 'base_uri' => 'http://foo.com/bar/',
+ ]);
+ $client->request('GET', new Uri('baz'));
+ self::assertSame(
+ 'http://foo.com/bar/baz',
+ (string) $mock->getLastRequest()->getUri()
+ );
+
+ $client->request('GET', new Uri('baz'), ['base_uri' => 'http://example.com/foo/']);
+ self::assertSame(
+ 'http://example.com/foo/baz',
+ (string) $mock->getLastRequest()->getUri(),
+ 'Can overwrite the base_uri through the request options'
+ );
+ }
+
+ public function testCanUseRelativeUriWithSend()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client([
+ 'handler' => $mock,
+ 'base_uri' => 'http://bar.com',
+ ]);
+ $config = Helpers::readObjectAttribute($client, 'config');
+ self::assertSame('http://bar.com', (string) $config['base_uri']);
+ $request = new Request('GET', '/baz');
+ $client->send($request);
+ self::assertSame(
+ 'http://bar.com/baz',
+ (string) $mock->getLastRequest()->getUri()
+ );
+ }
+
+ public function testMergesDefaultOptionsAndDoesNotOverwriteUa()
+ {
+ $client = new Client(['headers' => ['User-agent' => 'foo']]);
+ $config = Helpers::readObjectAttribute($client, 'config');
+ self::assertSame(['User-agent' => 'foo'], $config['headers']);
+ self::assertIsArray($config['allow_redirects']);
+ self::assertTrue($config['http_errors']);
+ self::assertTrue($config['decode_content']);
+ self::assertTrue($config['verify']);
+ }
+
+ public function testDoesNotOverwriteHeaderWithDefault()
+ {
+ $mock = new MockHandler([new Response()]);
+ $c = new Client([
+ 'headers' => ['User-agent' => 'foo'],
+ 'handler' => $mock,
+ ]);
+ $c->get('http://example.com', ['headers' => ['User-Agent' => 'bar']]);
+ self::assertSame('bar', $mock->getLastRequest()->getHeaderLine('User-Agent'));
+ }
+
+ public function testDoesNotOverwriteHeaderWithDefaultInRequest()
+ {
+ $mock = new MockHandler([new Response()]);
+ $c = new Client([
+ 'headers' => ['User-agent' => 'foo'],
+ 'handler' => $mock,
+ ]);
+ $request = new Request('GET', Server::$url, ['User-Agent' => 'bar']);
+ $c->send($request);
+ self::assertSame('bar', $mock->getLastRequest()->getHeaderLine('User-Agent'));
+ }
+
+ public function testDoesOverwriteHeaderWithSetRequestOption()
+ {
+ $mock = new MockHandler([new Response()]);
+ $c = new Client([
+ 'headers' => ['User-agent' => 'foo'],
+ 'handler' => $mock,
+ ]);
+ $request = new Request('GET', Server::$url, ['User-Agent' => 'bar']);
+ $c->send($request, ['headers' => ['User-Agent' => 'YO']]);
+ self::assertSame('YO', $mock->getLastRequest()->getHeaderLine('User-Agent'));
+ }
+
+ public function testCanUnsetRequestOptionWithNull()
+ {
+ $mock = new MockHandler([new Response()]);
+ $c = new Client([
+ 'headers' => ['foo' => 'bar'],
+ 'handler' => $mock,
+ ]);
+ $c->get('http://example.com', ['headers' => null]);
+ self::assertFalse($mock->getLastRequest()->hasHeader('foo'));
+ }
+
+ public function testAllowRedirectsCanBeTrue()
+ {
+ $mock = new MockHandler([new Response(200, [], 'foo')]);
+ $handler = HandlerStack::create($mock);
+ $client = new Client(['handler' => $handler]);
+ $client->get('http://foo.com', ['allow_redirects' => true]);
+ self::assertIsArray($mock->getLastOptions()['allow_redirects']);
+ }
+
+ public function testValidatesAllowRedirects()
+ {
+ $mock = new MockHandler([new Response(200, [], 'foo')]);
+ $handler = HandlerStack::create($mock);
+ $client = new Client(['handler' => $handler]);
+
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('allow_redirects must be true, false, or array');
+ $client->get('http://foo.com', ['allow_redirects' => 'foo']);
+ }
+
+ public function testThrowsHttpErrorsByDefault()
+ {
+ $mock = new MockHandler([new Response(404)]);
+ $handler = HandlerStack::create($mock);
+ $client = new Client(['handler' => $handler]);
+
+ $this->expectException(\GuzzleHttp\Exception\ClientException::class);
+ $client->get('http://foo.com');
+ }
+
+ public function testValidatesCookies()
+ {
+ $mock = new MockHandler([new Response(200, [], 'foo')]);
+ $handler = HandlerStack::create($mock);
+ $client = new Client(['handler' => $handler]);
+
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('cookies must be an instance of GuzzleHttp\\Cookie\\CookieJarInterface');
+ $client->get('http://foo.com', ['cookies' => 'foo']);
+ }
+
+ public function testSetCookieToTrueUsesSharedJar()
+ {
+ $mock = new MockHandler([
+ new Response(200, ['Set-Cookie' => 'foo=bar']),
+ new Response(),
+ ]);
+ $handler = HandlerStack::create($mock);
+ $client = new Client(['handler' => $handler, 'cookies' => true]);
+ $client->get('http://foo.com');
+ $client->get('http://foo.com');
+ self::assertSame('foo=bar', $mock->getLastRequest()->getHeaderLine('Cookie'));
+ }
+
+ public function testSetCookieToJar()
+ {
+ $mock = new MockHandler([
+ new Response(200, ['Set-Cookie' => 'foo=bar']),
+ new Response(),
+ ]);
+ $handler = HandlerStack::create($mock);
+ $client = new Client(['handler' => $handler]);
+ $jar = new CookieJar();
+ $client->get('http://foo.com', ['cookies' => $jar]);
+ $client->get('http://foo.com', ['cookies' => $jar]);
+ self::assertSame('foo=bar', $mock->getLastRequest()->getHeaderLine('Cookie'));
+ }
+
+ public function testCanDisableContentDecoding()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $client->get('http://foo.com', ['decode_content' => false]);
+ $last = $mock->getLastRequest();
+ self::assertFalse($last->hasHeader('Accept-Encoding'));
+ self::assertFalse($mock->getLastOptions()['decode_content']);
+ }
+
+ public function testCanSetContentDecodingToValue()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $client->get('http://foo.com', ['decode_content' => 'gzip']);
+ $last = $mock->getLastRequest();
+ self::assertSame('gzip', $last->getHeaderLine('Accept-Encoding'));
+ self::assertSame('gzip', $mock->getLastOptions()['decode_content']);
+ }
+
+ public function testAddsAcceptEncodingbyCurl()
+ {
+ $client = new Client(['curl' => [\CURLOPT_ENCODING => '']]);
+
+ Server::flush();
+ Server::enqueue([new Response()]);
+ $client->get(Server::$url);
+ $sent = Server::received()[0];
+ self::assertTrue($sent->hasHeader('Accept-Encoding'));
+
+ $mock = new MockHandler([new Response()]);
+ $client->get('http://foo.com', ['handler' => $mock]);
+ self::assertSame([\CURLOPT_ENCODING => ''], $mock->getLastOptions()['curl']);
+ }
+
+ public function testValidatesHeaders()
+ {
+ $mock = new MockHandler();
+ $client = new Client(['handler' => $mock]);
+
+ $this->expectException(\InvalidArgumentException::class);
+ $client->get('http://foo.com', ['headers' => 'foo']);
+ }
+
+ public function testAddsBody()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $request = new Request('PUT', 'http://foo.com');
+ $client->send($request, ['body' => 'foo']);
+ $last = $mock->getLastRequest();
+ self::assertSame('foo', (string) $last->getBody());
+ }
+
+ public function testValidatesQuery()
+ {
+ $mock = new MockHandler();
+ $client = new Client(['handler' => $mock]);
+ $request = new Request('PUT', 'http://foo.com');
+
+ $this->expectException(\InvalidArgumentException::class);
+ $client->send($request, ['query' => false]);
+ }
+
+ public function testQueryCanBeString()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $request = new Request('PUT', 'http://foo.com');
+ $client->send($request, ['query' => 'foo']);
+ self::assertSame('foo', $mock->getLastRequest()->getUri()->getQuery());
+ }
+
+ public function testQueryCanBeArray()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $request = new Request('PUT', 'http://foo.com');
+ $client->send($request, ['query' => ['foo' => 'bar baz']]);
+ self::assertSame('foo=bar%20baz', $mock->getLastRequest()->getUri()->getQuery());
+ }
+
+ public function testCanAddJsonData()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $request = new Request('PUT', 'http://foo.com');
+ $client->send($request, ['json' => ['foo' => 'bar']]);
+ $last = $mock->getLastRequest();
+ self::assertSame('{"foo":"bar"}', (string) $mock->getLastRequest()->getBody());
+ self::assertSame('application/json', $last->getHeaderLine('Content-Type'));
+ }
+
+ public function testCanAddJsonDataWithoutOverwritingContentType()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $request = new Request('PUT', 'http://foo.com');
+ $client->send($request, [
+ 'headers' => ['content-type' => 'foo'],
+ 'json' => 'a',
+ ]);
+ $last = $mock->getLastRequest();
+ self::assertSame('"a"', (string) $mock->getLastRequest()->getBody());
+ self::assertSame('foo', $last->getHeaderLine('Content-Type'));
+ }
+
+ public function testCanAddJsonDataWithNullHeader()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $request = new Request('PUT', 'http://foo.com');
+ $client->send($request, [
+ 'headers' => null,
+ 'json' => 'a',
+ ]);
+ $last = $mock->getLastRequest();
+ self::assertSame('"a"', (string) $mock->getLastRequest()->getBody());
+ self::assertSame('application/json', $last->getHeaderLine('Content-Type'));
+ }
+
+ public function testAuthCanBeTrue()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $client->get('http://foo.com', ['auth' => false]);
+ $last = $mock->getLastRequest();
+ self::assertFalse($last->hasHeader('Authorization'));
+ }
+
+ public function testAuthCanBeArrayForBasicAuth()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $client->get('http://foo.com', ['auth' => ['a', 'b']]);
+ $last = $mock->getLastRequest();
+ self::assertSame('Basic YTpi', $last->getHeaderLine('Authorization'));
+ }
+
+ public function testAuthCanBeArrayForDigestAuth()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $client->get('http://foo.com', ['auth' => ['a', 'b', 'digest']]);
+ $last = $mock->getLastOptions();
+ self::assertSame([
+ \CURLOPT_HTTPAUTH => 2,
+ \CURLOPT_USERPWD => 'a:b',
+ ], $last['curl']);
+ }
+
+ public function testAuthCanBeArrayForNtlmAuth()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $client->get('http://foo.com', ['auth' => ['a', 'b', 'ntlm']]);
+ $last = $mock->getLastOptions();
+ self::assertSame([
+ \CURLOPT_HTTPAUTH => 8,
+ \CURLOPT_USERPWD => 'a:b',
+ ], $last['curl']);
+ }
+
+ public function testAuthCanBeCustomType()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $client->get('http://foo.com', ['auth' => 'foo']);
+ $last = $mock->getLastOptions();
+ self::assertSame('foo', $last['auth']);
+ }
+
+ public function testCanAddFormParams()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $client->post('http://foo.com', [
+ 'form_params' => [
+ 'foo' => 'bar bam',
+ 'baz' => ['boo' => 'qux'],
+ ],
+ ]);
+ $last = $mock->getLastRequest();
+ self::assertSame(
+ 'application/x-www-form-urlencoded',
+ $last->getHeaderLine('Content-Type')
+ );
+ self::assertSame(
+ 'foo=bar+bam&baz%5Bboo%5D=qux',
+ (string) $last->getBody()
+ );
+ }
+
+ public function testFormParamsEncodedProperly()
+ {
+ $separator = \ini_get('arg_separator.output');
+ \ini_set('arg_separator.output', '&');
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $client->post('http://foo.com', [
+ 'form_params' => [
+ 'foo' => 'bar bam',
+ 'baz' => ['boo' => 'qux'],
+ ],
+ ]);
+ $last = $mock->getLastRequest();
+ self::assertSame(
+ 'foo=bar+bam&baz%5Bboo%5D=qux',
+ (string) $last->getBody()
+ );
+
+ \ini_set('arg_separator.output', $separator);
+ }
+
+ public function testEnsuresThatFormParamsAndMultipartAreExclusive()
+ {
+ $client = new Client(['handler' => static function () {
+ }]);
+
+ $this->expectException(\InvalidArgumentException::class);
+ $client->post('http://foo.com', [
+ 'form_params' => ['foo' => 'bar bam'],
+ 'multipart' => [],
+ ]);
+ }
+
+ public function testCanSendMultipart()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $client->post('http://foo.com', [
+ 'multipart' => [
+ [
+ 'name' => 'foo',
+ 'contents' => 'bar',
+ ],
+ [
+ 'name' => 'test',
+ 'contents' => \fopen(__FILE__, 'r'),
+ ],
+ ],
+ ]);
+
+ $last = $mock->getLastRequest();
+ self::assertStringContainsString(
+ 'multipart/form-data; boundary=',
+ $last->getHeaderLine('Content-Type')
+ );
+
+ self::assertStringContainsString(
+ 'Content-Disposition: form-data; name="foo"',
+ (string) $last->getBody()
+ );
+
+ self::assertStringContainsString('bar', (string) $last->getBody());
+ self::assertStringContainsString(
+ 'Content-Disposition: form-data; name="foo"'."\r\n",
+ (string) $last->getBody()
+ );
+ self::assertStringContainsString(
+ 'Content-Disposition: form-data; name="test"; filename="ClientTest.php"',
+ (string) $last->getBody()
+ );
+ }
+
+ public function testCanSendMultipartWithExplicitBody()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $client->send(
+ new Request(
+ 'POST',
+ 'http://foo.com',
+ [],
+ new Psr7\MultipartStream(
+ [
+ [
+ 'name' => 'foo',
+ 'contents' => 'bar',
+ ],
+ [
+ 'name' => 'test',
+ 'contents' => \fopen(__FILE__, 'r'),
+ ],
+ ]
+ )
+ )
+ );
+
+ $last = $mock->getLastRequest();
+ self::assertStringContainsString(
+ 'multipart/form-data; boundary=',
+ $last->getHeaderLine('Content-Type')
+ );
+
+ self::assertStringContainsString(
+ 'Content-Disposition: form-data; name="foo"',
+ (string) $last->getBody()
+ );
+
+ self::assertStringContainsString('bar', (string) $last->getBody());
+ self::assertStringContainsString(
+ 'Content-Disposition: form-data; name="foo"'."\r\n",
+ (string) $last->getBody()
+ );
+ self::assertStringContainsString(
+ 'Content-Disposition: form-data; name="test"; filename="ClientTest.php"',
+ (string) $last->getBody()
+ );
+ }
+
+ public function testUsesProxyEnvironmentVariables()
+ {
+ unset($_SERVER['HTTP_PROXY'], $_SERVER['HTTPS_PROXY'], $_SERVER['NO_PROXY']);
+ \putenv('HTTP_PROXY=');
+ \putenv('HTTPS_PROXY=');
+ \putenv('NO_PROXY=');
+
+ try {
+ $client = new Client();
+ $config = Helpers::readObjectAttribute($client, 'config');
+ self::assertArrayNotHasKey('proxy', $config);
+
+ \putenv('HTTP_PROXY=127.0.0.1');
+ $client = new Client();
+ $config = Helpers::readObjectAttribute($client, 'config');
+ self::assertArrayHasKey('proxy', $config);
+ self::assertSame(['http' => '127.0.0.1'], $config['proxy']);
+
+ \putenv('HTTPS_PROXY=127.0.0.2');
+ \putenv('NO_PROXY=127.0.0.3, 127.0.0.4');
+ $client = new Client();
+ $config = Helpers::readObjectAttribute($client, 'config');
+ self::assertArrayHasKey('proxy', $config);
+ self::assertSame(
+ ['http' => '127.0.0.1', 'https' => '127.0.0.2', 'no' => ['127.0.0.3', '127.0.0.4']],
+ $config['proxy']
+ );
+ } finally {
+ \putenv('HTTP_PROXY=');
+ \putenv('HTTPS_PROXY=');
+ \putenv('NO_PROXY=');
+ }
+ }
+
+ public function testRequestSendsWithSync()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $client->request('GET', 'http://foo.com');
+ self::assertTrue($mock->getLastOptions()['synchronous']);
+ }
+
+ public function testSendSendsWithSync()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $client->send(new Request('GET', 'http://foo.com'));
+ self::assertTrue($mock->getLastOptions()['synchronous']);
+ }
+
+ public function testSendWithInvalidHeader()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $request = new Request('GET', 'http://foo.com');
+
+ $this->expectException(\GuzzleHttp\Exception\InvalidArgumentException::class);
+ $client->send($request, ['headers' => ['X-Foo: Bar']]);
+ }
+
+ public function testSendWithInvalidHeaders()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $request = new Request('GET', 'http://foo.com');
+
+ $this->expectException(\GuzzleHttp\Exception\InvalidArgumentException::class);
+ $client->send($request, ['headers' => ['X-Foo: Bar', 'X-Test: Fail']]);
+ }
+
+ public function testCanSetCustomHandler()
+ {
+ $mock = new MockHandler([new Response(500)]);
+ $client = new Client(['handler' => $mock]);
+ $mock2 = new MockHandler([new Response(200)]);
+ self::assertSame(
+ 200,
+ $client->send(new Request('GET', 'http://foo.com'), [
+ 'handler' => $mock2,
+ ])->getStatusCode()
+ );
+ }
+
+ public function testProperlyBuildsQuery()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mock]);
+ $request = new Request('PUT', 'http://foo.com');
+ $client->send($request, ['query' => ['foo' => 'bar', 'john' => 'doe']]);
+ self::assertSame('foo=bar&john=doe', $mock->getLastRequest()->getUri()->getQuery());
+ }
+
+ public function testSendSendsWithIpAddressAndPortAndHostHeaderInRequestTheHostShouldBePreserved()
+ {
+ $mockHandler = new MockHandler([new Response()]);
+ $client = new Client(['base_uri' => 'http://127.0.0.1:8585', 'handler' => $mockHandler]);
+ $request = new Request('GET', '/test', ['Host' => 'foo.com']);
+
+ $client->send($request);
+
+ self::assertSame('foo.com', $mockHandler->getLastRequest()->getHeader('Host')[0]);
+ }
+
+ public function testSendSendsWithDomainAndHostHeaderInRequestTheHostShouldBePreserved()
+ {
+ $mockHandler = new MockHandler([new Response()]);
+ $client = new Client(['base_uri' => 'http://foo2.com', 'handler' => $mockHandler]);
+ $request = new Request('GET', '/test', ['Host' => 'foo.com']);
+
+ $client->send($request);
+
+ self::assertSame('foo.com', $mockHandler->getLastRequest()->getHeader('Host')[0]);
+ }
+
+ public function testValidatesSink()
+ {
+ $mockHandler = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mockHandler]);
+
+ $this->expectException(\InvalidArgumentException::class);
+ $client->get('http://test.com', ['sink' => true]);
+ }
+
+ public function testHttpDefaultSchemeIfUriHasNone()
+ {
+ $mockHandler = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mockHandler]);
+
+ $client->request('GET', '//example.org/test');
+
+ self::assertSame('http://example.org/test', (string) $mockHandler->getLastRequest()->getUri());
+ }
+
+ public function testOnlyAddSchemeWhenHostIsPresent()
+ {
+ $mockHandler = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mockHandler]);
+
+ $client->request('GET', 'baz');
+ self::assertSame(
+ 'baz',
+ (string) $mockHandler->getLastRequest()->getUri()
+ );
+ }
+
+ public function testThatVersionIsOverwrittenWhenSendingARequest()
+ {
+ $mockHandler = new MockHandler([new Response(), new Response()]);
+ $client = new Client(['handler' => $mockHandler]);
+
+ $request = new Request('get', '/bar', [], null, '1.1');
+ $client->send($request, [RequestOptions::VERSION => '1.0']);
+ self::assertSame(
+ '1.0',
+ $mockHandler->getLastRequest()->getProtocolVersion()
+ );
+
+ $request = new Request('get', '/bar', [], null, '1.0');
+ $client->send($request, [RequestOptions::VERSION => '1.1']);
+ self::assertSame(
+ '1.1',
+ $mockHandler->getLastRequest()->getProtocolVersion()
+ );
+ }
+
+ public function testHandlerIsCallable()
+ {
+ $this->expectException(\InvalidArgumentException::class);
+
+ new Client(['handler' => 'not_cllable']);
+ }
+
+ public function testResponseBodyAsString()
+ {
+ $responseBody = '{ "package": "guzzle" }';
+ $mock = new MockHandler([new Response(200, ['Content-Type' => 'application/json'], $responseBody)]);
+ $client = new Client(['handler' => $mock]);
+ $request = new Request('GET', 'http://foo.com');
+ $response = $client->send($request, ['json' => ['a' => 'b']]);
+
+ self::assertSame($responseBody, (string) $response->getBody());
+ }
+
+ public function testResponseContent()
+ {
+ $responseBody = '{ "package": "guzzle" }';
+ $mock = new MockHandler([new Response(200, ['Content-Type' => 'application/json'], $responseBody)]);
+ $client = new Client(['handler' => $mock]);
+ $request = new Request('POST', 'http://foo.com');
+ $response = $client->send($request, ['json' => ['a' => 'b']]);
+
+ self::assertSame($responseBody, $response->getBody()->getContents());
+ }
+
+ public function testIdnSupportDefaultValue()
+ {
+ $mockHandler = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mockHandler]);
+
+ $config = Helpers::readObjectAttribute($client, 'config');
+
+ self::assertFalse($config['idn_conversion']);
+ }
+
+ /**
+ * @requires extension idn
+ */
+ public function testIdnIsTranslatedToAsciiWhenConversionIsEnabled()
+ {
+ $mockHandler = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mockHandler]);
+
+ $client->request('GET', 'https://яндекс.рф/images', ['idn_conversion' => true]);
+
+ $request = $mockHandler->getLastRequest();
+
+ self::assertSame('https://xn--d1acpjx3f.xn--p1ai/images', (string) $request->getUri());
+ self::assertSame('xn--d1acpjx3f.xn--p1ai', (string) $request->getHeaderLine('Host'));
+ }
+
+ public function testIdnStaysTheSameWhenConversionIsDisabled()
+ {
+ $mockHandler = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mockHandler]);
+
+ $client->request('GET', 'https://яндекс.рф/images', ['idn_conversion' => false]);
+
+ $request = $mockHandler->getLastRequest();
+
+ self::assertSame('https://яндекс.рф/images', (string) $request->getUri());
+ self::assertSame('яндекс.рф', (string) $request->getHeaderLine('Host'));
+ }
+
+ /**
+ * @requires extension idn
+ */
+ public function testExceptionOnInvalidIdn()
+ {
+ $mockHandler = new MockHandler([new Response()]);
+ $client = new Client(['handler' => $mockHandler]);
+
+ $this->expectException(\GuzzleHttp\Exception\InvalidArgumentException::class);
+ $this->expectExceptionMessage('IDN conversion failed');
+ $client->request('GET', 'https://-яндекс.рф/images', ['idn_conversion' => true]);
+ }
+
+ /**
+ * @depends testCanUseRelativeUriWithSend
+ *
+ * @requires extension idn
+ */
+ public function testIdnBaseUri()
+ {
+ $mock = new MockHandler([new Response()]);
+ $client = new Client([
+ 'handler' => $mock,
+ 'base_uri' => 'http://яндекс.рф',
+ 'idn_conversion' => true,
+ ]);
+ $config = Helpers::readObjectAttribute($client, 'config');
+ self::assertSame('http://яндекс.рф', (string) $config['base_uri']);
+ $request = new Request('GET', '/baz');
+ $client->send($request);
+ self::assertSame('http://xn--d1acpjx3f.xn--p1ai/baz', (string) $mock->getLastRequest()->getUri());
+ self::assertSame('xn--d1acpjx3f.xn--p1ai', (string) $mock->getLastRequest()->getHeaderLine('Host'));
+ }
+
+ /**
+ * @requires extension idn
+ */
+ public function testIdnWithRedirect()
+ {
+ $mockHandler = new MockHandler([
+ new Response(302, ['Location' => 'http://www.tést.com/whatever']),
+ new Response(),
+ ]);
+ $handler = HandlerStack::create($mockHandler);
+ $requests = [];
+ $handler->push(Middleware::history($requests));
+ $client = new Client(['handler' => $handler]);
+
+ $client->request('GET', 'https://яндекс.рф/images', [
+ RequestOptions::ALLOW_REDIRECTS => [
+ 'referer' => true,
+ 'track_redirects' => true,
+ ],
+ 'idn_conversion' => true,
+ ]);
+
+ $request = $mockHandler->getLastRequest();
+
+ self::assertSame('http://www.xn--tst-bma.com/whatever', (string) $request->getUri());
+ self::assertSame('www.xn--tst-bma.com', (string) $request->getHeaderLine('Host'));
+
+ $request = $requests[0]['request'];
+ self::assertSame('https://xn--d1acpjx3f.xn--p1ai/images', (string) $request->getUri());
+ self::assertSame('xn--d1acpjx3f.xn--p1ai', (string) $request->getHeaderLine('Host'));
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Cookie/CookieJarTest.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Cookie/CookieJarTest.php
new file mode 100644
index 0000000000..87d95bd9c4
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Cookie/CookieJarTest.php
@@ -0,0 +1,507 @@
+jar = new CookieJar();
+ }
+
+ protected function getTestCookies()
+ {
+ return [
+ new SetCookie(['Name' => 'foo', 'Value' => 'bar', 'Domain' => 'foo.com', 'Path' => '/', 'Discard' => true]),
+ new SetCookie(['Name' => 'test', 'Value' => '123', 'Domain' => 'baz.com', 'Path' => '/foo', 'Expires' => 2]),
+ new SetCookie(['Name' => 'you', 'Value' => '123', 'Domain' => 'bar.com', 'Path' => '/boo', 'Expires' => \time() + 1000]),
+ ];
+ }
+
+ public function testCreatesFromArray()
+ {
+ $jar = CookieJar::fromArray([
+ 'foo' => 'bar',
+ 'baz' => 'bam',
+ ], 'example.com');
+ self::assertCount(2, $jar);
+ }
+
+ public function testEmptyJarIsCountable()
+ {
+ self::assertCount(0, new CookieJar());
+ }
+
+ public function testGetsCookiesByName()
+ {
+ $cookies = $this->getTestCookies();
+ foreach ($this->getTestCookies() as $cookie) {
+ $this->jar->setCookie($cookie);
+ }
+
+ $testCookie = $cookies[0];
+ self::assertEquals($testCookie, $this->jar->getCookieByName($testCookie->getName()));
+ self::assertNull($this->jar->getCookieByName('doesnotexist'));
+ self::assertNull($this->jar->getCookieByName(''));
+ }
+
+ /**
+ * Provides test data for cookie cookieJar retrieval
+ */
+ public function getCookiesDataProvider()
+ {
+ return [
+ [['foo', 'baz', 'test', 'muppet', 'googoo'], '', '', '', false],
+ [['foo', 'baz', 'muppet', 'googoo'], '', '', '', true],
+ [['googoo'], 'www.example.com', '', '', false],
+ [['muppet', 'googoo'], 'test.y.example.com', '', '', false],
+ [['foo', 'baz'], 'example.com', '', '', false],
+ [['muppet'], 'x.y.example.com', '/acme/', '', false],
+ [['muppet'], 'x.y.example.com', '/acme/test/', '', false],
+ [['googoo'], 'x.y.example.com', '/test/acme/test/', '', false],
+ [['foo', 'baz'], 'example.com', '', '', false],
+ [['baz'], 'example.com', '', 'baz', false],
+ ];
+ }
+
+ public function testStoresAndRetrievesCookies()
+ {
+ $cookies = $this->getTestCookies();
+ foreach ($cookies as $cookie) {
+ self::assertTrue($this->jar->setCookie($cookie));
+ }
+
+ self::assertCount(3, $this->jar);
+ self::assertCount(3, $this->jar->getIterator());
+ self::assertEquals($cookies, $this->jar->getIterator()->getArrayCopy());
+ }
+
+ public function testRemovesTemporaryCookies()
+ {
+ $cookies = $this->getTestCookies();
+ foreach ($this->getTestCookies() as $cookie) {
+ $this->jar->setCookie($cookie);
+ }
+ $this->jar->clearSessionCookies();
+ self::assertEquals(
+ [$cookies[1], $cookies[2]],
+ $this->jar->getIterator()->getArrayCopy()
+ );
+ }
+
+ public function testRemovesSelectively()
+ {
+ foreach ($this->getTestCookies() as $cookie) {
+ $this->jar->setCookie($cookie);
+ }
+
+ // Remove foo.com cookies
+ $this->jar->clear('foo.com');
+ self::assertCount(2, $this->jar);
+ // Try again, removing no further cookies
+ $this->jar->clear('foo.com');
+ self::assertCount(2, $this->jar);
+
+ // Remove bar.com cookies with path of /boo
+ $this->jar->clear('bar.com', '/boo');
+ self::assertCount(1, $this->jar);
+
+ // Remove cookie by name
+ $this->jar->clear(null, null, 'test');
+ self::assertCount(0, $this->jar);
+ }
+
+ public static function providesIncompleteCookies(): array
+ {
+ return [
+ [
+ [],
+ ],
+ [
+ [
+ 'Name' => 'foo',
+ ],
+ ],
+ [
+ [
+ 'Name' => false,
+ ],
+ ],
+ [
+ [
+ 'Name' => true,
+ ],
+ ],
+ [
+ [
+ 'Name' => 'foo',
+ 'Domain' => 'foo.com',
+ ],
+ ],
+ ];
+ }
+
+ /**
+ * @dataProvider providesIncompleteCookies
+ */
+ public function testDoesNotAddIncompleteCookies(array $cookie)
+ {
+ self::assertFalse($this->jar->setCookie(new SetCookie($cookie)));
+ }
+
+ public static function providesEmptyCookies(): array
+ {
+ return [
+ [
+ [
+ 'Name' => '',
+ 'Domain' => 'foo.com',
+ 'Value' => 0,
+ ],
+ ],
+ [
+ [
+ 'Name' => null,
+ 'Domain' => 'foo.com',
+ 'Value' => 0,
+ ],
+ ],
+ ];
+ }
+
+ /**
+ * @dataProvider providesEmptyCookies
+ */
+ public function testDoesNotAddEmptyCookies(array $cookie)
+ {
+ self::assertFalse($this->jar->setCookie(new SetCookie($cookie)));
+ }
+
+ public static function providesValidCookies(): array
+ {
+ return [
+ [
+ [
+ 'Name' => '0',
+ 'Domain' => 'foo.com',
+ 'Value' => 0,
+ ],
+ ],
+ [
+ [
+ 'Name' => 'foo',
+ 'Domain' => 'foo.com',
+ 'Value' => 0,
+ ],
+ ],
+ [
+ [
+ 'Name' => 'foo',
+ 'Domain' => 'foo.com',
+ 'Value' => 0.0,
+ ],
+ ],
+ [
+ [
+ 'Name' => 'foo',
+ 'Domain' => 'foo.com',
+ 'Value' => '0',
+ ],
+ ],
+ ];
+ }
+
+ /**
+ * @dataProvider providesValidCookies
+ */
+ public function testDoesAddValidCookies(array $cookie)
+ {
+ self::assertTrue($this->jar->setCookie(new SetCookie($cookie)));
+ }
+
+ public function testOverwritesCookiesThatAreOlderOrDiscardable()
+ {
+ $t = \time() + 1000;
+ $data = [
+ 'Name' => 'foo',
+ 'Value' => 'bar',
+ 'Domain' => '.example.com',
+ 'Path' => '/',
+ 'Max-Age' => '86400',
+ 'Secure' => true,
+ 'Discard' => true,
+ 'Expires' => $t,
+ ];
+
+ // Make sure that the discard cookie is overridden with the non-discard
+ self::assertTrue($this->jar->setCookie(new SetCookie($data)));
+ self::assertCount(1, $this->jar);
+
+ $data['Discard'] = false;
+ self::assertTrue($this->jar->setCookie(new SetCookie($data)));
+ self::assertCount(1, $this->jar);
+
+ $c = $this->jar->getIterator()->getArrayCopy();
+ self::assertFalse($c[0]->getDiscard());
+
+ // Make sure it doesn't duplicate the cookie
+ $this->jar->setCookie(new SetCookie($data));
+ self::assertCount(1, $this->jar);
+
+ // Make sure the more future-ful expiration date supersede the other
+ $data['Expires'] = \time() + 2000;
+ self::assertTrue($this->jar->setCookie(new SetCookie($data)));
+ self::assertCount(1, $this->jar);
+ $c = $this->jar->getIterator()->getArrayCopy();
+ self::assertNotEquals($t, $c[0]->getExpires());
+ }
+
+ public function testOverwritesCookiesThatHaveChanged()
+ {
+ $t = \time() + 1000;
+ $data = [
+ 'Name' => 'foo',
+ 'Value' => 'bar',
+ 'Domain' => '.example.com',
+ 'Path' => '/',
+ 'Max-Age' => '86400',
+ 'Secure' => true,
+ 'Discard' => true,
+ 'Expires' => $t,
+ ];
+
+ // Make sure that the discard cookie is overridden with the non-discard
+ self::assertTrue($this->jar->setCookie(new SetCookie($data)));
+
+ $data['Value'] = 'boo';
+ self::assertTrue($this->jar->setCookie(new SetCookie($data)));
+ self::assertCount(1, $this->jar);
+
+ // Changing the value plus a parameter also must overwrite the existing one
+ $data['Value'] = 'zoo';
+ $data['Secure'] = false;
+ self::assertTrue($this->jar->setCookie(new SetCookie($data)));
+ self::assertCount(1, $this->jar);
+
+ $c = $this->jar->getIterator()->getArrayCopy();
+ self::assertSame('zoo', $c[0]->getValue());
+ }
+
+ public function testAddsCookiesFromResponseWithRequest()
+ {
+ $response = new Response(200, [
+ 'Set-Cookie' => 'fpc=d=.Hm.yh4.1XmJWjJfs4orLQzKzPImxklQoxXSHOZATHUSEFciRueW_7704iYUtsXNEXq0M92Px2glMdWypmJ7HIQl6XIUvrZimWjQ3vIdeuRbI.FNQMAfcxu_XN1zSx7l.AcPdKL6guHc2V7hIQFhnjRW0rxm2oHY1P4bGQxFNz7f.tHm12ZD3DbdMDiDy7TBXsuP4DM-&v=2; expires=Fri, 02-Mar-2019 02:17:40 GMT;',
+ ]);
+ $request = new Request('GET', 'http://www.example.com');
+ $this->jar->extractCookies($request, $response);
+ self::assertCount(1, $this->jar);
+ }
+
+ public function getMatchingCookiesDataProvider()
+ {
+ return [
+ ['https://example.com', 'foo=bar; baz=foobar'],
+ ['http://example.com', ''],
+ ['https://example.com:8912', 'foo=bar; baz=foobar'],
+ ['https://foo.example.com', 'foo=bar; baz=foobar'],
+ ['http://foo.example.com/test/acme/', 'googoo=gaga'],
+ ];
+ }
+
+ /**
+ * @dataProvider getMatchingCookiesDataProvider
+ */
+ public function testReturnsCookiesMatchingRequests(string $url, string $cookies)
+ {
+ $bag = [
+ new SetCookie([
+ 'Name' => 'foo',
+ 'Value' => 'bar',
+ 'Domain' => 'example.com',
+ 'Path' => '/',
+ 'Max-Age' => '86400',
+ 'Secure' => true,
+ ]),
+ new SetCookie([
+ 'Name' => 'baz',
+ 'Value' => 'foobar',
+ 'Domain' => 'example.com',
+ 'Path' => '/',
+ 'Max-Age' => '86400',
+ 'Secure' => true,
+ ]),
+ new SetCookie([
+ 'Name' => 'test',
+ 'Value' => '123',
+ 'Domain' => 'www.foobar.com',
+ 'Path' => '/path/',
+ 'Discard' => true,
+ ]),
+ new SetCookie([
+ 'Name' => 'muppet',
+ 'Value' => 'cookie_monster',
+ 'Domain' => '.y.example.com',
+ 'Path' => '/acme/',
+ 'Expires' => \time() + 86400,
+ ]),
+ new SetCookie([
+ 'Name' => 'googoo',
+ 'Value' => 'gaga',
+ 'Domain' => '.example.com',
+ 'Path' => '/test/acme/',
+ 'Max-Age' => 1500,
+ ]),
+ ];
+
+ foreach ($bag as $cookie) {
+ $this->jar->setCookie($cookie);
+ }
+
+ $request = new Request('GET', $url);
+ $request = $this->jar->withCookieHeader($request);
+ self::assertSame($cookies, $request->getHeaderLine('Cookie'));
+ }
+
+ public function testThrowsExceptionWithStrictMode()
+ {
+ $a = new CookieJar(true);
+ $this->expectException(\RuntimeException::class);
+ $this->expectExceptionMessage('Invalid cookie: Cookie name must not contain invalid characters: ASCII Control characters (0-31;127), space, tab and the following characters: ()<>@,;:\\"/?={}');
+ $a->setCookie(new SetCookie(['Name' => "abc\n", 'Value' => 'foo', 'Domain' => 'bar']));
+ }
+
+ public function testDeletesCookiesByName()
+ {
+ $cookies = $this->getTestCookies();
+ $cookies[] = new SetCookie([
+ 'Name' => 'other',
+ 'Value' => '123',
+ 'Domain' => 'bar.com',
+ 'Path' => '/boo',
+ 'Expires' => \time() + 1000,
+ ]);
+ $jar = new CookieJar();
+ foreach ($cookies as $cookie) {
+ $jar->setCookie($cookie);
+ }
+ self::assertCount(4, $jar);
+ $jar->clear('bar.com', '/boo', 'other');
+ self::assertCount(3, $jar);
+ $names = \array_map(static function (SetCookie $c) {
+ return $c->getName();
+ }, $jar->getIterator()->getArrayCopy());
+ self::assertSame(['foo', 'test', 'you'], $names);
+ }
+
+ public function testCanConvertToAndLoadFromArray()
+ {
+ $jar = new CookieJar(true);
+ foreach ($this->getTestCookies() as $cookie) {
+ $jar->setCookie($cookie);
+ }
+ self::assertCount(3, $jar);
+ $arr = $jar->toArray();
+ self::assertCount(3, $arr);
+ $newCookieJar = new CookieJar(false, $arr);
+ self::assertCount(3, $newCookieJar);
+ self::assertSame($jar->toArray(), $newCookieJar->toArray());
+ }
+
+ public function testAddsCookiesWithEmptyPathFromResponse()
+ {
+ $response = new Response(200, [
+ 'Set-Cookie' => "fpc=foobar; expires={$this->futureExpirationDate()}; path=;",
+ ]);
+ $request = new Request('GET', 'http://www.example.com');
+ $this->jar->extractCookies($request, $response);
+ $newRequest = $this->jar->withCookieHeader(new Request('GET', 'http://www.example.com/foo'));
+ self::assertTrue($newRequest->hasHeader('Cookie'));
+ }
+
+ public function getCookiePathsDataProvider()
+ {
+ return [
+ ['', '/'],
+ ['/', '/'],
+ ['/foo', '/'],
+ ['/foo/bar', '/foo'],
+ ['/foo/bar/', '/foo/bar'],
+ ];
+ }
+
+ /**
+ * @dataProvider getCookiePathsDataProvider
+ */
+ public function testCookiePathWithEmptySetCookiePath(string $uriPath, string $cookiePath)
+ {
+ $response = (new Response(200))
+ ->withAddedHeader(
+ 'Set-Cookie',
+ "foo=bar; expires={$this->futureExpirationDate()}; domain=www.example.com; path=;"
+ )
+ ->withAddedHeader(
+ 'Set-Cookie',
+ "bar=foo; expires={$this->futureExpirationDate()}; domain=www.example.com; path=foobar;"
+ )
+ ;
+ $request = (new Request('GET', "https://www.example.com{$uriPath}"));
+ $this->jar->extractCookies($request, $response);
+
+ self::assertSame($cookiePath, $this->jar->toArray()[0]['Path']);
+ self::assertSame($cookiePath, $this->jar->toArray()[1]['Path']);
+ }
+
+ public function getDomainMatchesProvider()
+ {
+ return [
+ ['www.example.com', 'www.example.com', true],
+ ['www.example.com', 'www.EXAMPLE.com', true],
+ ['www.example.com', 'www.example.net', false],
+ ['www.example.com', 'ftp.example.com', false],
+ ['www.example.com', 'example.com', true],
+ ['www.example.com', 'EXAMPLE.com', true],
+ ['fra.de.example.com', 'EXAMPLE.com', true],
+ ['www.EXAMPLE.com', 'www.example.com', true],
+ ['www.EXAMPLE.com', 'www.example.COM', true],
+ ];
+ }
+
+ /**
+ * @dataProvider getDomainMatchesProvider
+ */
+ public function testIgnoresCookiesForMismatchingDomains(string $requestHost, string $domainAttribute, bool $matches)
+ {
+ $response = (new Response(200))
+ ->withAddedHeader(
+ 'Set-Cookie',
+ "foo=bar; expires={$this->futureExpirationDate()}; domain={$domainAttribute}; path=/;"
+ )
+ ;
+ $request = (new Request('GET', "https://{$requestHost}/"));
+ $this->jar->extractCookies($request, $response);
+
+ self::assertCount($matches ? 1 : 0, $this->jar->toArray());
+ }
+
+ private function futureExpirationDate()
+ {
+ return (new DateTimeImmutable())->add(new DateInterval('P1D'))->format(DateTime::COOKIE);
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Cookie/FileCookieJarTest.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Cookie/FileCookieJarTest.php
new file mode 100644
index 0000000000..3ee2dd09fe
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Cookie/FileCookieJarTest.php
@@ -0,0 +1,148 @@
+file = \tempnam(\sys_get_temp_dir(), 'file-cookies');
+ }
+
+ /**
+ * @dataProvider invalidCookieJarContent
+ */
+ public function testValidatesCookieFile($invalidCookieJarContent)
+ {
+ \file_put_contents($this->file, json_encode($invalidCookieJarContent));
+
+ $this->expectException(\RuntimeException::class);
+ new FileCookieJar($this->file);
+ }
+
+ public function testLoadsFromFile()
+ {
+ $jar = new FileCookieJar($this->file);
+ self::assertSame([], $jar->getIterator()->getArrayCopy());
+ \unlink($this->file);
+ }
+
+ /**
+ * @dataProvider providerPersistsToFileFileParameters
+ */
+ public function testPersistsToFile($testSaveSessionCookie = false)
+ {
+ $jar = new FileCookieJar($this->file, $testSaveSessionCookie);
+ $jar->setCookie(new SetCookie([
+ 'Name' => 'foo',
+ 'Value' => 'bar',
+ 'Domain' => 'foo.com',
+ 'Expires' => \time() + 1000,
+ ]));
+ $jar->setCookie(new SetCookie([
+ 'Name' => 'baz',
+ 'Value' => 'bar',
+ 'Domain' => 'foo.com',
+ 'Expires' => \time() + 1000,
+ ]));
+ $jar->setCookie(new SetCookie([
+ 'Name' => 'boo',
+ 'Value' => 'bar',
+ 'Domain' => 'foo.com',
+ ]));
+
+ self::assertCount(3, $jar);
+ unset($jar);
+
+ // Make sure it wrote to the file
+ $contents = \file_get_contents($this->file);
+ self::assertNotEmpty($contents);
+
+ // Load the cookieJar from the file
+ $jar = new FileCookieJar($this->file);
+
+ if ($testSaveSessionCookie) {
+ self::assertCount(3, $jar);
+ } else {
+ // Weeds out temporary and session cookies
+ self::assertCount(2, $jar);
+ }
+
+ unset($jar);
+ \unlink($this->file);
+ }
+
+ public function testRemovesCookie()
+ {
+ $jar = new FileCookieJar($this->file);
+ $jar->setCookie(new SetCookie([
+ 'Name' => 'foo',
+ 'Value' => 'bar',
+ 'Domain' => 'foo.com',
+ 'Expires' => \time() + 1000,
+ ]));
+
+ self::assertCount(1, $jar);
+
+ // Remove the cookie.
+ $jar->clear('foo.com', '/', 'foo');
+
+ // Confirm that the cookie was removed.
+ self::assertCount(0, $jar);
+
+ \unlink($this->file);
+ }
+
+ public function testUpdatesCookie()
+ {
+ $jar = new FileCookieJar($this->file);
+ $jar->setCookie(new SetCookie([
+ 'Name' => 'foo',
+ 'Value' => 'bar',
+ 'Domain' => 'foo.com',
+ 'Expires' => \time() + 1000,
+ ]));
+
+ self::assertCount(1, $jar);
+
+ // Update the cookie value.
+ $jar->setCookie(new SetCookie([
+ 'Name' => 'foo',
+ 'Value' => 'new_value',
+ 'Domain' => 'foo.com',
+ 'Expires' => \time() + 1000,
+ ]));
+
+ $cookies = $jar->getIterator()->getArrayCopy();
+
+ // Confirm that the cookie was updated.
+ self::assertEquals('new_value', $cookies[0]->getValue());
+
+ \unlink($this->file);
+ }
+
+ public function providerPersistsToFileFileParameters()
+ {
+ return [
+ [false],
+ [true],
+ ];
+ }
+
+ public function invalidCookieJarContent(): array
+ {
+ return [
+ [true],
+ ['invalid-data'],
+ ];
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Cookie/SessionCookieJarTest.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Cookie/SessionCookieJarTest.php
new file mode 100644
index 0000000000..30a4b10175
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Cookie/SessionCookieJarTest.php
@@ -0,0 +1,92 @@
+sessionVar = 'sessionKey';
+
+ if (!isset($_SESSION)) {
+ $_SESSION = [];
+ }
+ }
+
+ public function testValidatesCookieSession()
+ {
+ $_SESSION[$this->sessionVar] = 'true';
+
+ $this->expectException(\RuntimeException::class);
+ new SessionCookieJar($this->sessionVar);
+ }
+
+ public function testLoadsFromSession()
+ {
+ $jar = new SessionCookieJar($this->sessionVar);
+ self::assertSame([], $jar->getIterator()->getArrayCopy());
+ unset($_SESSION[$this->sessionVar]);
+ }
+
+ /**
+ * @dataProvider providerPersistsToSessionParameters
+ */
+ public function testPersistsToSession($testSaveSessionCookie = false)
+ {
+ $jar = new SessionCookieJar($this->sessionVar, $testSaveSessionCookie);
+ $jar->setCookie(new SetCookie([
+ 'Name' => 'foo',
+ 'Value' => 'bar',
+ 'Domain' => 'foo.com',
+ 'Expires' => \time() + 1000,
+ ]));
+ $jar->setCookie(new SetCookie([
+ 'Name' => 'baz',
+ 'Value' => 'bar',
+ 'Domain' => 'foo.com',
+ 'Expires' => \time() + 1000,
+ ]));
+ $jar->setCookie(new SetCookie([
+ 'Name' => 'boo',
+ 'Value' => 'bar',
+ 'Domain' => 'foo.com',
+ ]));
+
+ self::assertCount(3, $jar);
+ unset($jar);
+
+ // Make sure it wrote to the sessionVar in $_SESSION
+ $contents = $_SESSION[$this->sessionVar];
+ self::assertNotEmpty($contents);
+
+ // Load the cookieJar from the file
+ $jar = new SessionCookieJar($this->sessionVar);
+
+ if ($testSaveSessionCookie) {
+ self::assertCount(3, $jar);
+ } else {
+ // Weeds out temporary and session cookies
+ self::assertCount(2, $jar);
+ }
+
+ unset($jar);
+ unset($_SESSION[$this->sessionVar]);
+ }
+
+ public function providerPersistsToSessionParameters()
+ {
+ return [
+ [false],
+ [true],
+ ];
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Cookie/SetCookieTest.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Cookie/SetCookieTest.php
new file mode 100644
index 0000000000..55d4e7fc3a
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Cookie/SetCookieTest.php
@@ -0,0 +1,492 @@
+getPath());
+ }
+
+ public function testConvertsDateTimeMaxAgeToUnixTimestamp()
+ {
+ $cookie = new SetCookie(['Expires' => 'November 20, 1984']);
+ self::assertIsInt($cookie->getExpires());
+ }
+
+ public function testAddsExpiresBasedOnMaxAge()
+ {
+ $t = \time();
+ $cookie = new SetCookie(['Max-Age' => 100]);
+ self::assertEquals($t + 100, $cookie->getExpires());
+ }
+
+ public function testHoldsValues()
+ {
+ $t = \time();
+ $data = [
+ 'Name' => 'foo',
+ 'Value' => 'baz',
+ 'Path' => '/bar',
+ 'Domain' => 'baz.com',
+ 'Expires' => $t,
+ 'Max-Age' => 100,
+ 'Secure' => true,
+ 'Discard' => true,
+ 'HttpOnly' => true,
+ 'foo' => 'baz',
+ 'bar' => 'bam',
+ ];
+
+ $cookie = new SetCookie($data);
+ self::assertEquals($data, $cookie->toArray());
+
+ self::assertSame('foo', $cookie->getName());
+ self::assertSame('baz', $cookie->getValue());
+ self::assertSame('baz.com', $cookie->getDomain());
+ self::assertSame('/bar', $cookie->getPath());
+ self::assertSame($t, $cookie->getExpires());
+ self::assertSame(100, $cookie->getMaxAge());
+ self::assertTrue($cookie->getSecure());
+ self::assertTrue($cookie->getDiscard());
+ self::assertTrue($cookie->getHttpOnly());
+ self::assertSame('baz', $cookie->toArray()['foo']);
+ self::assertSame('bam', $cookie->toArray()['bar']);
+
+ $cookie->setName('a');
+ $cookie->setValue('b');
+ $cookie->setPath('c');
+ $cookie->setDomain('bar.com');
+ $cookie->setExpires(10);
+ $cookie->setMaxAge(200);
+ $cookie->setSecure(false);
+ $cookie->setHttpOnly(false);
+ $cookie->setDiscard(false);
+
+ self::assertSame('a', $cookie->getName());
+ self::assertSame('b', $cookie->getValue());
+ self::assertSame('c', $cookie->getPath());
+ self::assertSame('bar.com', $cookie->getDomain());
+ self::assertSame(10, $cookie->getExpires());
+ self::assertSame(200, $cookie->getMaxAge());
+ self::assertFalse($cookie->getSecure());
+ self::assertFalse($cookie->getDiscard());
+ self::assertFalse($cookie->getHttpOnly());
+ }
+
+ public function testDeterminesIfExpired()
+ {
+ $c = new SetCookie();
+ $c->setExpires(10);
+ self::assertTrue($c->isExpired());
+ $c->setExpires(\time() + 10000);
+ self::assertFalse($c->isExpired());
+ }
+
+ public function testMatchesDomain()
+ {
+ $cookie = new SetCookie();
+ self::assertTrue($cookie->matchesDomain('baz.com'));
+
+ $cookie->setDomain('baz.com');
+ self::assertTrue($cookie->matchesDomain('baz.com'));
+ self::assertFalse($cookie->matchesDomain('bar.com'));
+
+ $cookie->setDomain('.baz.com');
+ self::assertTrue($cookie->matchesDomain('.baz.com'));
+ self::assertTrue($cookie->matchesDomain('foo.baz.com'));
+ self::assertFalse($cookie->matchesDomain('baz.bar.com'));
+ self::assertTrue($cookie->matchesDomain('baz.com'));
+
+ $cookie->setDomain('.127.0.0.1');
+ self::assertTrue($cookie->matchesDomain('127.0.0.1'));
+
+ $cookie->setDomain('127.0.0.1');
+ self::assertTrue($cookie->matchesDomain('127.0.0.1'));
+
+ $cookie->setDomain('.com.');
+ self::assertFalse($cookie->matchesDomain('baz.com'));
+
+ $cookie->setDomain('.local');
+ self::assertTrue($cookie->matchesDomain('example.local'));
+
+ $cookie->setDomain('example.com/'); // malformed domain
+ self::assertFalse($cookie->matchesDomain('example.com'));
+ }
+
+ public function pathMatchProvider()
+ {
+ return [
+ ['/foo', '/foo', true],
+ ['/foo', '/Foo', false],
+ ['/foo', '/fo', false],
+ ['/foo', '/foo/bar', true],
+ ['/foo', '/foo/bar/baz', true],
+ ['/foo', '/foo/bar//baz', true],
+ ['/foo', '/foobar', false],
+ ['/foo/bar', '/foo', false],
+ ['/foo/bar', '/foobar', false],
+ ['/foo/bar', '/foo/bar', true],
+ ['/foo/bar', '/foo/bar/', true],
+ ['/foo/bar', '/foo/bar/baz', true],
+ ['/foo/bar/', '/foo/bar', false],
+ ['/foo/bar/', '/foo/bar/', true],
+ ['/foo/bar/', '/foo/bar/baz', true],
+ ];
+ }
+
+ /**
+ * @dataProvider pathMatchProvider
+ */
+ public function testMatchesPath($cookiePath, $requestPath, $isMatch)
+ {
+ $cookie = new SetCookie();
+ $cookie->setPath($cookiePath);
+ self::assertSame($isMatch, $cookie->matchesPath($requestPath));
+ }
+
+ public function cookieValidateProvider()
+ {
+ return [
+ ['foo', 'baz', 'bar', true],
+ ['0', '0', '0', true],
+ ['foo[bar]', 'baz', 'bar', true],
+ ['foo', '', 'bar', true],
+ ['', 'baz', 'bar', 'The cookie name must not be empty'],
+ ['foo', null, 'bar', 'The cookie value must not be empty'],
+ ['foo', 'baz', '', 'The cookie domain must not be empty'],
+ ["foo\r", 'baz', '0', 'Cookie name must not contain invalid characters: ASCII Control characters (0-31;127), space, tab and the following characters: ()<>@,;:\"/?={}'],
+ ];
+ }
+
+ /**
+ * @dataProvider cookieValidateProvider
+ */
+ public function testValidatesCookies($name, $value, $domain, $result)
+ {
+ $cookie = new SetCookie([
+ 'Name' => $name,
+ 'Value' => $value,
+ 'Domain' => $domain,
+ ]);
+ self::assertSame($result, $cookie->validate());
+ }
+
+ public function testDoesNotMatchIp()
+ {
+ $cookie = new SetCookie(['Domain' => '192.168.16.']);
+ self::assertFalse($cookie->matchesDomain('192.168.16.121'));
+ }
+
+ public function testConvertsToString()
+ {
+ $t = 1382916008;
+ $cookie = new SetCookie([
+ 'Name' => 'test',
+ 'Value' => '123',
+ 'Domain' => 'foo.com',
+ 'Expires' => $t,
+ 'Path' => '/abc',
+ 'HttpOnly' => true,
+ 'Secure' => true,
+ ]);
+ self::assertSame(
+ 'test=123; Domain=foo.com; Path=/abc; Expires=Sun, 27 Oct 2013 23:20:08 GMT; Secure; HttpOnly',
+ (string) $cookie
+ );
+ }
+
+ /**
+ * Provides the parsed information from a cookie
+ *
+ * @return array
+ */
+ public function cookieParserDataProvider()
+ {
+ return [
+ [
+ 'ASIHTTPRequestTestCookie=This+is+the+value; expires=Sat, 26-Jul-2008 17:00:42 GMT; path=/tests; domain=allseeing-i.com; PHPSESSID=6c951590e7a9359bcedde25cda73e43c; path=/;',
+ [
+ 'Domain' => 'allseeing-i.com',
+ 'Path' => '/',
+ 'PHPSESSID' => '6c951590e7a9359bcedde25cda73e43c',
+ 'Max-Age' => null,
+ 'Expires' => 'Sat, 26-Jul-2008 17:00:42 GMT',
+ 'Secure' => null,
+ 'Discard' => null,
+ 'Name' => 'ASIHTTPRequestTestCookie',
+ 'Value' => 'This+is+the+value',
+ 'HttpOnly' => false,
+ ],
+ ],
+ ['', []],
+ ['foo', []],
+ ['; foo', []],
+ [
+ 'foo="bar"',
+ [
+ 'Name' => 'foo',
+ 'Value' => '"bar"',
+ 'Discard' => null,
+ 'Domain' => null,
+ 'Expires' => null,
+ 'Max-Age' => null,
+ 'Path' => '/',
+ 'Secure' => null,
+ 'HttpOnly' => false,
+ ],
+ ],
+ // Test setting a blank value for a cookie
+ [[
+ 'foo=', 'foo =', 'foo =;', 'foo= ;', 'foo =', 'foo= ', ],
+ [
+ 'Name' => 'foo',
+ 'Value' => '',
+ 'Discard' => null,
+ 'Domain' => null,
+ 'Expires' => null,
+ 'Max-Age' => null,
+ 'Path' => '/',
+ 'Secure' => null,
+ 'HttpOnly' => false,
+ ],
+ ],
+ // Test setting a value and removing quotes
+ [[
+ 'foo=1', 'foo =1', 'foo =1;', 'foo=1 ;', 'foo =1', 'foo= 1', 'foo = 1 ;', ],
+ [
+ 'Name' => 'foo',
+ 'Value' => '1',
+ 'Discard' => null,
+ 'Domain' => null,
+ 'Expires' => null,
+ 'Max-Age' => null,
+ 'Path' => '/',
+ 'Secure' => null,
+ 'HttpOnly' => false,
+ ],
+ ],
+ // Some of the following tests are based on https://github.com/zendframework/zf1/blob/master/tests/Zend/Http/CookieTest.php
+ [
+ 'justacookie=foo; domain=example.com',
+ [
+ 'Name' => 'justacookie',
+ 'Value' => 'foo',
+ 'Domain' => 'example.com',
+ 'Discard' => null,
+ 'Expires' => null,
+ 'Max-Age' => null,
+ 'Path' => '/',
+ 'Secure' => null,
+ 'HttpOnly' => false,
+ ],
+ ],
+ [
+ 'expires=tomorrow; secure; path=/Space Out/; expires=Tue, 21-Nov-2006 08:33:44 GMT; domain=.example.com',
+ [
+ 'Name' => 'expires',
+ 'Value' => 'tomorrow',
+ 'Domain' => '.example.com',
+ 'Path' => '/Space Out/',
+ 'Expires' => 'Tue, 21-Nov-2006 08:33:44 GMT',
+ 'Discard' => null,
+ 'Secure' => true,
+ 'Max-Age' => null,
+ 'HttpOnly' => false,
+ ],
+ ],
+ [
+ 'domain=unittests; expires=Tue, 21-Nov-2006 08:33:44 GMT; domain=example.com; path=/some value/',
+ [
+ 'Name' => 'domain',
+ 'Value' => 'unittests',
+ 'Domain' => 'example.com',
+ 'Path' => '/some value/',
+ 'Expires' => 'Tue, 21-Nov-2006 08:33:44 GMT',
+ 'Secure' => false,
+ 'Discard' => null,
+ 'Max-Age' => null,
+ 'HttpOnly' => false,
+ ],
+ ],
+ [
+ 'path=indexAction; path=/; domain=.foo.com; expires=Tue, 21-Nov-2006 08:33:44 GMT',
+ [
+ 'Name' => 'path',
+ 'Value' => 'indexAction',
+ 'Domain' => '.foo.com',
+ 'Path' => '/',
+ 'Expires' => 'Tue, 21-Nov-2006 08:33:44 GMT',
+ 'Secure' => false,
+ 'Discard' => null,
+ 'Max-Age' => null,
+ 'HttpOnly' => false,
+ ],
+ ],
+ [
+ 'secure=sha1; secure; SECURE; domain=some.really.deep.domain.com; version=1; Max-Age=86400',
+ [
+ 'Name' => 'secure',
+ 'Value' => 'sha1',
+ 'Domain' => 'some.really.deep.domain.com',
+ 'Path' => '/',
+ 'Secure' => true,
+ 'Discard' => null,
+ 'Expires' => \time() + 86400,
+ 'Max-Age' => 86400,
+ 'HttpOnly' => false,
+ 'version' => '1',
+ ],
+ ],
+ [
+ 'PHPSESSID=123456789+abcd%2Cef; secure; discard; domain=.localdomain; path=/foo/baz; expires=Tue, 21-Nov-2006 08:33:44 GMT;',
+ [
+ 'Name' => 'PHPSESSID',
+ 'Value' => '123456789+abcd%2Cef',
+ 'Domain' => '.localdomain',
+ 'Path' => '/foo/baz',
+ 'Expires' => 'Tue, 21-Nov-2006 08:33:44 GMT',
+ 'Secure' => true,
+ 'Discard' => true,
+ 'Max-Age' => null,
+ 'HttpOnly' => false,
+ ],
+ ],
+ [
+ 'fr=synced; Max-Age=604800 Expires=Mon, 12 Dec 2022 13:27:50 GMT; Domain=.example.com; Path=/; SameSite=None; Secure; HttpOnly',
+ [
+ 'Name' => 'fr',
+ 'Value' => 'synced',
+ 'Domain' => '.example.com',
+ 'Path' => '/',
+ 'Expires' => null,
+ 'Secure' => true,
+ 'Discard' => false,
+ 'Max-Age' => null,
+ 'HttpOnly' => true,
+ 'SameSite' => 'None',
+ ],
+ ],
+ [
+ 'SESS3a6f27284c4d8b34b6f4ff98cb87703e=Ts-5YeSyvOCMS%2CzkEb9eDfW4C4ZNFOcRYdu-3JpEAXIm58aH; expires=Wed, 07-Jun-2023 15:56:35 GMT; Max-Age=2000000; path=/; domain=.example.com; HttpOnly; SameSite=Lax',
+ [
+ 'Name' => 'SESS3a6f27284c4d8b34b6f4ff98cb87703e',
+ 'Value' => 'Ts-5YeSyvOCMS%2CzkEb9eDfW4C4ZNFOcRYdu-3JpEAXIm58aH',
+ 'Domain' => '.example.com',
+ 'Path' => '/',
+ 'Expires' => 'Wed, 07-Jun-2023 15:56:35 GMT',
+ 'Secure' => false,
+ 'Discard' => false,
+ 'Max-Age' => 2000000,
+ 'HttpOnly' => true,
+ 'SameSite' => 'Lax',
+ ],
+ ],
+ [
+ 'SESS3a6f27284c4d8b34b6f4ff98cb87703e=Ts-5YeSyvOCMS%2CzkEb9eDfW4C4ZNFOcRYdu-3JpEAXIm58aH; expires=Wed, 07-Jun-2023 15:56:35 GMT; Max-Age=qwerty; path=/; domain=.example.com; HttpOnly; SameSite=Lax',
+ [
+ 'Name' => 'SESS3a6f27284c4d8b34b6f4ff98cb87703e',
+ 'Value' => 'Ts-5YeSyvOCMS%2CzkEb9eDfW4C4ZNFOcRYdu-3JpEAXIm58aH',
+ 'Domain' => '.example.com',
+ 'Path' => '/',
+ 'Expires' => 'Wed, 07-Jun-2023 15:56:35 GMT',
+ 'Secure' => false,
+ 'Discard' => false,
+ 'Max-Age' => null,
+ 'HttpOnly' => true,
+ 'SameSite' => 'Lax',
+ ],
+ ],
+ ];
+ }
+
+ /**
+ * @dataProvider cookieParserDataProvider
+ */
+ public function testParseCookie($cookie, $parsed)
+ {
+ foreach ((array) $cookie as $v) {
+ $c = SetCookie::fromString($v);
+ $p = $c->toArray();
+
+ if (isset($p['Expires'])) {
+ $delta = 40;
+ $parsedExpires = \is_numeric($parsed['Expires']) ? $parsed['Expires'] : \strtotime($parsed['Expires']);
+ self::assertLessThan($delta, \abs($p['Expires'] - $parsedExpires), 'Comparing Expires '.\var_export($p['Expires'], true).' : '.\var_export($parsed, true).' | '.\var_export($p, true));
+ unset($p['Expires']);
+ unset($parsed['Expires']);
+ }
+
+ if (!empty($parsed)) {
+ foreach ($parsed as $key => $value) {
+ self::assertEquals($parsed[$key], $p[$key], 'Comparing '.$key.' '.\var_export($value, true).' : '.\var_export($parsed, true).' | '.\var_export($p, true));
+ }
+ foreach ($p as $key => $value) {
+ self::assertEquals($p[$key], $parsed[$key], 'Comparing '.$key.' '.\var_export($value, true).' : '.\var_export($parsed, true).' | '.\var_export($p, true));
+ }
+ } else {
+ self::assertSame([
+ 'Name' => null,
+ 'Value' => null,
+ 'Domain' => null,
+ 'Path' => '/',
+ 'Max-Age' => null,
+ 'Expires' => null,
+ 'Secure' => false,
+ 'Discard' => false,
+ 'HttpOnly' => false,
+ ], $p);
+ }
+ }
+ }
+
+ /**
+ * Provides the data for testing isExpired
+ *
+ * @return array
+ */
+ public function isExpiredProvider()
+ {
+ return [
+ [
+ 'FOO=bar; expires=Thu, 01 Jan 1970 00:00:00 GMT;',
+ true,
+ ],
+ [
+ 'FOO=bar; expires=Thu, 01 Jan 1970 00:00:01 GMT;',
+ true,
+ ],
+ [
+ 'FOO=bar; expires='.\date(\DateTime::RFC1123, \time() + 10).';',
+ false,
+ ],
+ [
+ 'FOO=bar; expires='.\date(\DateTime::RFC1123, \time() - 10).';',
+ true,
+ ],
+ [
+ 'FOO=bar;',
+ false,
+ ],
+ ];
+ }
+
+ /**
+ * @dataProvider isExpiredProvider
+ */
+ public function testIsExpired($cookie, $expired)
+ {
+ self::assertSame(
+ $expired,
+ SetCookie::fromString($cookie)->isExpired()
+ );
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Exception/BadResponseExceptionTest.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Exception/BadResponseExceptionTest.php
new file mode 100644
index 0000000000..dced34d1de
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Exception/BadResponseExceptionTest.php
@@ -0,0 +1,24 @@
+getRequest());
+ self::assertSame($response, $e->getResponse());
+ self::assertTrue($e->hasResponse());
+ self::assertSame('foo', $e->getMessage());
+ self::assertSame($prev, $e->getPrevious());
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Exception/ConnectExceptionTest.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Exception/ConnectExceptionTest.php
new file mode 100644
index 0000000000..5b9d06e134
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Exception/ConnectExceptionTest.php
@@ -0,0 +1,28 @@
+ 'bar']);
+ self::assertInstanceOf(NetworkExceptionInterface::class, $e);
+ self::assertNotInstanceOf(RequestExceptionInterface::class, $e);
+ self::assertSame($req, $e->getRequest());
+ self::assertSame('foo', $e->getMessage());
+ self::assertSame('bar', $e->getHandlerContext()['foo']);
+ self::assertSame($prev, $e->getPrevious());
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Exception/RequestExceptionTest.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Exception/RequestExceptionTest.php
new file mode 100644
index 0000000000..a17ff7fab0
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Exception/RequestExceptionTest.php
@@ -0,0 +1,196 @@
+getRequest());
+ self::assertSame($res, $e->getResponse());
+ self::assertTrue($e->hasResponse());
+ self::assertSame('foo', $e->getMessage());
+ }
+
+ public function testCreatesGenerateException()
+ {
+ $e = RequestException::create(new Request('GET', '/'));
+ self::assertSame('Error completing request', $e->getMessage());
+ self::assertInstanceOf(RequestException::class, $e);
+ }
+
+ public function testCreatesClientErrorResponseException()
+ {
+ $e = RequestException::create(new Request('GET', '/'), new Response(400));
+ self::assertStringContainsString(
+ 'GET /',
+ $e->getMessage()
+ );
+ self::assertStringContainsString(
+ '400 Bad Request',
+ $e->getMessage()
+ );
+ self::assertInstanceOf(ClientException::class, $e);
+ }
+
+ public function testCreatesServerErrorResponseException()
+ {
+ $e = RequestException::create(new Request('GET', '/'), new Response(500));
+ self::assertStringContainsString(
+ 'GET /',
+ $e->getMessage()
+ );
+ self::assertStringContainsString(
+ '500 Internal Server Error',
+ $e->getMessage()
+ );
+ self::assertInstanceOf(ServerException::class, $e);
+ }
+
+ public function testCreatesGenericErrorResponseException()
+ {
+ $e = RequestException::create(new Request('GET', '/'), new Response(300));
+ self::assertStringContainsString(
+ 'GET /',
+ $e->getMessage()
+ );
+ self::assertStringContainsString(
+ '300 ',
+ $e->getMessage()
+ );
+ self::assertInstanceOf(RequestException::class, $e);
+ }
+
+ public function testThrowsInvalidArgumentExceptionOnOutOfBoundsResponseCode()
+ {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('Status code must be an integer value between 1xx and 5xx.');
+
+ throw RequestException::create(new Request('GET', '/'), new Response(600));
+ }
+
+ public function dataPrintableResponses()
+ {
+ return [
+ ['You broke the test!'],
+ ['
zlomený zkouška
'],
+ ['{"tester": "Philépe Gonzalez"}'],
+ ["\n\tYour friendly test\n"],
+ ['document.body.write("here comes a test");'],
+ ["body:before {\n\tcontent: 'test style';\n}"],
+ ];
+ }
+
+ /**
+ * @dataProvider dataPrintableResponses
+ */
+ public function testCreatesExceptionWithPrintableBodySummary($content)
+ {
+ $response = new Response(
+ 500,
+ [],
+ $content
+ );
+ $e = RequestException::create(new Request('GET', '/'), $response);
+ self::assertStringContainsString(
+ $content,
+ $e->getMessage()
+ );
+ self::assertInstanceOf(RequestException::class, $e);
+ }
+
+ public function testCreatesExceptionWithTruncatedSummary()
+ {
+ $content = \str_repeat('+', 121);
+ $response = new Response(500, [], $content);
+ $e = RequestException::create(new Request('GET', '/'), $response);
+ $expected = \str_repeat('+', 120).' (truncated...)';
+ self::assertStringContainsString($expected, $e->getMessage());
+ }
+
+ public function testExceptionMessageIgnoresEmptyBody()
+ {
+ $e = RequestException::create(new Request('GET', '/'), new Response(500));
+ self::assertStringEndsWith('response', $e->getMessage());
+ }
+
+ public function testHasStatusCodeAsExceptionCode()
+ {
+ $e = RequestException::create(new Request('GET', '/'), new Response(442));
+ self::assertSame(442, $e->getCode());
+ }
+
+ public function testWrapsRequestExceptions()
+ {
+ $e = new \Exception('foo');
+ $r = new Request('GET', 'http://www.oo.com');
+ $ex = RequestException::wrapException($r, $e);
+ self::assertInstanceOf(RequestException::class, $ex);
+ self::assertSame($e, $ex->getPrevious());
+ }
+
+ public function testDoesNotWrapExistingRequestExceptions()
+ {
+ $r = new Request('GET', 'http://www.oo.com');
+ $e = new RequestException('foo', $r);
+ $e2 = RequestException::wrapException($r, $e);
+ self::assertSame($e, $e2);
+ }
+
+ public function testCanProvideHandlerContext()
+ {
+ $r = new Request('GET', 'http://www.oo.com');
+ $e = new RequestException('foo', $r, null, null, ['bar' => 'baz']);
+ self::assertSame(['bar' => 'baz'], $e->getHandlerContext());
+ }
+
+ public function testObfuscateUrlWithUsername()
+ {
+ $r = new Request('GET', 'http://username@www.oo.com');
+ $e = RequestException::create($r, new Response(500));
+ self::assertStringContainsString('http://username@www.oo.com', $e->getMessage());
+ }
+
+ public function testObfuscateUrlWithUsernameAndPassword()
+ {
+ $r = new Request('GET', 'http://user:password@www.oo.com');
+ $e = RequestException::create($r, new Response(500));
+ self::assertStringContainsString('http://user:***@www.oo.com', $e->getMessage());
+ }
+}
+
+final class ReadSeekOnlyStream extends Stream
+{
+ public function __construct()
+ {
+ parent::__construct(\fopen('php://memory', 'wb'));
+ }
+
+ public function isSeekable(): bool
+ {
+ return true;
+ }
+
+ public function isReadable(): bool
+ {
+ return false;
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/CurlFactoryTest.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/CurlFactoryTest.php
new file mode 100644
index 0000000000..a5b8f3f68e
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/CurlFactoryTest.php
@@ -0,0 +1,946 @@
+ 'Bar',
+ 'Baz' => 'bam',
+ 'Content-Length' => 2,
+ ], 'hi'),
+ ]);
+ $stream = Psr7\Utils::streamFor();
+ $request = new Psr7\Request('PUT', Server::$url, [
+ 'Hi' => ' 123',
+ 'Content-Length' => '7',
+ ], 'testing');
+ $f = new CurlFactory(3);
+ $result = $f->create($request, ['sink' => $stream]);
+ self::assertInstanceOf(EasyHandle::class, $result);
+ if (\PHP_VERSION_ID >= 80000) {
+ self::assertInstanceOf(\CurlHandle::class, $result->handle);
+ } else {
+ self::assertIsResource($result->handle);
+ }
+ self::assertIsArray($result->headers);
+ self::assertSame($stream, $result->sink);
+ \curl_close($result->handle);
+ self::assertSame('PUT', $_SERVER['_curl'][\CURLOPT_CUSTOMREQUEST]);
+ self::assertSame(
+ 'http://127.0.0.1:8126/',
+ $_SERVER['_curl'][\CURLOPT_URL]
+ );
+ // Sends via post fields when the request is small enough
+ self::assertSame('testing', $_SERVER['_curl'][\CURLOPT_POSTFIELDS]);
+ self::assertEquals(0, $_SERVER['_curl'][\CURLOPT_RETURNTRANSFER]);
+ self::assertEquals(0, $_SERVER['_curl'][\CURLOPT_HEADER]);
+ self::assertSame(300, $_SERVER['_curl'][\CURLOPT_CONNECTTIMEOUT]);
+ self::assertInstanceOf('Closure', $_SERVER['_curl'][\CURLOPT_HEADERFUNCTION]);
+ if (\defined('CURLOPT_PROTOCOLS')) {
+ self::assertSame(
+ \CURLPROTO_HTTP | \CURLPROTO_HTTPS,
+ $_SERVER['_curl'][\CURLOPT_PROTOCOLS]
+ );
+ }
+ self::assertContains('Expect:', $_SERVER['_curl'][\CURLOPT_HTTPHEADER]);
+ self::assertContains('Accept:', $_SERVER['_curl'][\CURLOPT_HTTPHEADER]);
+ self::assertContains('Content-Type:', $_SERVER['_curl'][\CURLOPT_HTTPHEADER]);
+ self::assertContains('Hi: 123', $_SERVER['_curl'][\CURLOPT_HTTPHEADER]);
+ self::assertContains('Host: 127.0.0.1:8126', $_SERVER['_curl'][\CURLOPT_HTTPHEADER]);
+ }
+
+ public function testSendsHeadRequests()
+ {
+ Server::flush();
+ Server::enqueue([new Psr7\Response()]);
+ $a = new Handler\CurlMultiHandler();
+ $response = $a(new Psr7\Request('HEAD', Server::$url), []);
+ $response->wait();
+ self::assertTrue($_SERVER['_curl'][\CURLOPT_NOBODY]);
+ $checks = [\CURLOPT_READFUNCTION, \CURLOPT_FILE, \CURLOPT_INFILE];
+ foreach ($checks as $check) {
+ self::assertArrayNotHasKey($check, $_SERVER['_curl']);
+ }
+ self::assertEquals('HEAD', Server::received()[0]->getMethod());
+ }
+
+ public function testCanAddCustomCurlOptions()
+ {
+ Server::flush();
+ Server::enqueue([new Psr7\Response()]);
+ $a = new Handler\CurlMultiHandler();
+ $req = new Psr7\Request('GET', Server::$url);
+ $a($req, ['curl' => [\CURLOPT_LOW_SPEED_LIMIT => 10]]);
+ self::assertEquals(10, $_SERVER['_curl'][\CURLOPT_LOW_SPEED_LIMIT]);
+ }
+
+ public function testCanChangeCurlOptions()
+ {
+ Server::flush();
+ Server::enqueue([new Psr7\Response()]);
+ $a = new Handler\CurlMultiHandler();
+ $req = new Psr7\Request('GET', Server::$url);
+ $a($req, ['curl' => [\CURLOPT_HTTP_VERSION => \CURL_HTTP_VERSION_1_0]]);
+ self::assertEquals(\CURL_HTTP_VERSION_1_0, $_SERVER['_curl'][\CURLOPT_HTTP_VERSION]);
+ }
+
+ public function testValidatesVerify()
+ {
+ $f = new CurlFactory(3);
+
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('SSL CA bundle not found: /does/not/exist');
+ $f->create(new Psr7\Request('GET', Server::$url), ['verify' => '/does/not/exist']);
+ }
+
+ public function testCanSetVerifyToFile()
+ {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', 'http://foo.com'), ['verify' => __FILE__]);
+ self::assertEquals(__FILE__, $_SERVER['_curl'][\CURLOPT_CAINFO]);
+ self::assertEquals(2, $_SERVER['_curl'][\CURLOPT_SSL_VERIFYHOST]);
+ self::assertTrue($_SERVER['_curl'][\CURLOPT_SSL_VERIFYPEER]);
+ }
+
+ public function testCanSetVerifyToDir()
+ {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', 'http://foo.com'), ['verify' => __DIR__]);
+ self::assertEquals(__DIR__, $_SERVER['_curl'][\CURLOPT_CAPATH]);
+ self::assertEquals(2, $_SERVER['_curl'][\CURLOPT_SSL_VERIFYHOST]);
+ self::assertTrue($_SERVER['_curl'][\CURLOPT_SSL_VERIFYPEER]);
+ }
+
+ public function testAddsVerifyAsTrue()
+ {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', Server::$url), ['verify' => true]);
+ self::assertEquals(2, $_SERVER['_curl'][\CURLOPT_SSL_VERIFYHOST]);
+ self::assertTrue($_SERVER['_curl'][\CURLOPT_SSL_VERIFYPEER]);
+ self::assertArrayNotHasKey(\CURLOPT_CAINFO, $_SERVER['_curl']);
+ }
+
+ public function testCanDisableVerify()
+ {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', Server::$url), ['verify' => false]);
+ self::assertEquals(0, $_SERVER['_curl'][\CURLOPT_SSL_VERIFYHOST]);
+ self::assertFalse($_SERVER['_curl'][\CURLOPT_SSL_VERIFYPEER]);
+ }
+
+ public function testAddsProxy()
+ {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', Server::$url), ['proxy' => 'http://bar.com']);
+ self::assertEquals('http://bar.com', $_SERVER['_curl'][\CURLOPT_PROXY]);
+ }
+
+ public function testAddsViaScheme()
+ {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', Server::$url), [
+ 'proxy' => ['http' => 'http://bar.com', 'https' => 'https://t'],
+ ]);
+ self::assertEquals('http://bar.com', $_SERVER['_curl'][\CURLOPT_PROXY]);
+ $this->checkNoProxyForHost('http://test.test.com', ['test.test.com'], false);
+ $this->checkNoProxyForHost('http://test.test.com', ['.test.com'], false);
+ $this->checkNoProxyForHost('http://test.test.com', ['*.test.com'], true);
+ $this->checkNoProxyForHost('http://test.test.com', ['*'], false);
+ $this->checkNoProxyForHost('http://127.0.0.1', ['127.0.0.*'], true);
+ }
+
+ private function checkNoProxyForHost($url, $noProxy, $assertUseProxy)
+ {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', $url), [
+ 'proxy' => [
+ 'http' => 'http://bar.com',
+ 'https' => 'https://t',
+ 'no' => $noProxy,
+ ],
+ ]);
+ if ($assertUseProxy) {
+ self::assertArrayHasKey(\CURLOPT_PROXY, $_SERVER['_curl']);
+ } else {
+ self::assertArrayNotHasKey(\CURLOPT_PROXY, $_SERVER['_curl']);
+ }
+ }
+
+ public function testUsesProxy()
+ {
+ Server::flush();
+ Server::enqueue([
+ new Psr7\Response(200, [
+ 'Foo' => 'Bar',
+ 'Baz' => 'bam',
+ 'Content-Length' => 2,
+ ], 'hi'),
+ ]);
+
+ $handler = new Handler\CurlMultiHandler();
+ $request = new Psr7\Request('GET', 'http://www.example.com', [], null, '1.0');
+ $promise = $handler($request, [
+ 'proxy' => Server::$url,
+ ]);
+ $response = $promise->wait();
+ self::assertSame(200, $response->getStatusCode());
+ self::assertSame('Bar', $response->getHeaderLine('Foo'));
+ self::assertSame('2', $response->getHeaderLine('Content-Length'));
+ self::assertSame('hi', (string) $response->getBody());
+ }
+
+ public function testValidatesCryptoMethodInvalidMethod()
+ {
+ $f = new CurlFactory(3);
+
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('Invalid crypto_method request option: unknown version provided');
+ $f->create(new Psr7\Request('GET', Server::$url), ['crypto_method' => 123]);
+ }
+
+ public function testAddsCryptoMethodTls10()
+ {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', Server::$url), ['crypto_method' => \STREAM_CRYPTO_METHOD_TLSv1_0_CLIENT]);
+ self::assertEquals(\CURL_SSLVERSION_TLSv1_0, $_SERVER['_curl'][\CURLOPT_SSLVERSION]);
+ }
+
+ public function testAddsCryptoMethodTls11()
+ {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', Server::$url), ['crypto_method' => \STREAM_CRYPTO_METHOD_TLSv1_1_CLIENT]);
+ self::assertEquals(\CURL_SSLVERSION_TLSv1_1, $_SERVER['_curl'][\CURLOPT_SSLVERSION]);
+ }
+
+ public function testAddsCryptoMethodTls12()
+ {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', Server::$url), ['crypto_method' => \STREAM_CRYPTO_METHOD_TLSv1_2_CLIENT]);
+ self::assertEquals(\CURL_SSLVERSION_TLSv1_2, $_SERVER['_curl'][\CURLOPT_SSLVERSION]);
+ }
+
+ /**
+ * @requires PHP >= 7.4
+ */
+ public function testAddsCryptoMethodTls13()
+ {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', Server::$url), ['crypto_method' => \STREAM_CRYPTO_METHOD_TLSv1_3_CLIENT]);
+ self::assertEquals(\CURL_SSLVERSION_TLSv1_3, $_SERVER['_curl'][\CURLOPT_SSLVERSION]);
+ }
+
+ public function testValidatesSslKey()
+ {
+ $f = new CurlFactory(3);
+
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('SSL private key not found: /does/not/exist');
+ $f->create(new Psr7\Request('GET', Server::$url), ['ssl_key' => '/does/not/exist']);
+ }
+
+ public function testAddsSslKey()
+ {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', Server::$url), ['ssl_key' => __FILE__]);
+ self::assertEquals(__FILE__, $_SERVER['_curl'][\CURLOPT_SSLKEY]);
+ }
+
+ public function testAddsSslKeyWithPassword()
+ {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', Server::$url), ['ssl_key' => [__FILE__, 'test']]);
+ self::assertEquals(__FILE__, $_SERVER['_curl'][\CURLOPT_SSLKEY]);
+ self::assertEquals('test', $_SERVER['_curl'][\CURLOPT_SSLKEYPASSWD]);
+ }
+
+ public function testAddsSslKeyWhenUsingArraySyntaxButNoPassword()
+ {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', Server::$url), ['ssl_key' => [__FILE__]]);
+
+ self::assertEquals(__FILE__, $_SERVER['_curl'][\CURLOPT_SSLKEY]);
+ }
+
+ public function testValidatesCert()
+ {
+ $f = new CurlFactory(3);
+
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('SSL certificate not found: /does/not/exist');
+ $f->create(new Psr7\Request('GET', Server::$url), ['cert' => '/does/not/exist']);
+ }
+
+ public function testAddsCert()
+ {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', Server::$url), ['cert' => __FILE__]);
+ self::assertEquals(__FILE__, $_SERVER['_curl'][\CURLOPT_SSLCERT]);
+ }
+
+ public function testAddsCertWithPassword()
+ {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', Server::$url), ['cert' => [__FILE__, 'test']]);
+ self::assertEquals(__FILE__, $_SERVER['_curl'][\CURLOPT_SSLCERT]);
+ self::assertEquals('test', $_SERVER['_curl'][\CURLOPT_SSLCERTPASSWD]);
+ }
+
+ public function testAddsDerCert()
+ {
+ $certFile = tempnam(sys_get_temp_dir(), 'mock_test_cert');
+ rename($certFile, $certFile .= '.der');
+ try {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', Server::$url), ['cert' => $certFile]);
+ self::assertArrayHasKey(\CURLOPT_SSLCERTTYPE, $_SERVER['_curl']);
+ self::assertEquals('DER', $_SERVER['_curl'][\CURLOPT_SSLCERTTYPE]);
+ } finally {
+ @\unlink($certFile);
+ }
+ }
+
+ public function testAddsP12Cert()
+ {
+ $certFile = tempnam(sys_get_temp_dir(), 'mock_test_cert');
+ rename($certFile, $certFile .= '.p12');
+ try {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', Server::$url), ['cert' => $certFile]);
+ self::assertArrayHasKey(\CURLOPT_SSLCERTTYPE, $_SERVER['_curl']);
+ self::assertEquals('P12', $_SERVER['_curl'][\CURLOPT_SSLCERTTYPE]);
+ } finally {
+ @\unlink($certFile);
+ }
+ }
+
+ public function testValidatesProgress()
+ {
+ $f = new CurlFactory(3);
+
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('progress client option must be callable');
+ $f->create(new Psr7\Request('GET', Server::$url), ['progress' => 'foo']);
+ }
+
+ public function testEmitsDebugInfoToStream()
+ {
+ $res = \fopen('php://temp', 'r+');
+ Server::flush();
+ Server::enqueue([new Psr7\Response()]);
+ $a = new Handler\CurlMultiHandler();
+ $response = $a(new Psr7\Request('HEAD', Server::$url), ['debug' => $res]);
+ $response->wait();
+ \rewind($res);
+ $output = \str_replace("\r", '', \stream_get_contents($res));
+ self::assertStringContainsString('> HEAD / HTTP/1.1', $output);
+ self::assertStringContainsString('< HTTP/1.1 200', $output);
+ \fclose($res);
+ }
+
+ public function testEmitsProgressToFunction()
+ {
+ Server::flush();
+ Server::enqueue([new Psr7\Response()]);
+ $a = new Handler\CurlMultiHandler();
+ $called = [];
+ $request = new Psr7\Request('HEAD', Server::$url);
+ $response = $a($request, [
+ 'progress' => static function (...$args) use (&$called) {
+ $called[] = $args;
+ },
+ ]);
+ $response->wait();
+ self::assertNotEmpty($called);
+ foreach ($called as $call) {
+ self::assertCount(4, $call);
+ }
+ }
+
+ private function addDecodeResponse($withEncoding = true)
+ {
+ $content = \gzencode('test');
+ $headers = ['Content-Length' => \strlen($content)];
+ if ($withEncoding) {
+ $headers['Content-Encoding'] = 'gzip';
+ }
+ $response = new Psr7\Response(200, $headers, $content);
+ Server::flush();
+ Server::enqueue([$response]);
+
+ return $content;
+ }
+
+ public function testDecodesGzippedResponses()
+ {
+ $this->addDecodeResponse();
+ $handler = new Handler\CurlMultiHandler();
+ $request = new Psr7\Request('GET', Server::$url);
+ $response = $handler($request, ['decode_content' => true]);
+ $response = $response->wait();
+ self::assertEquals('test', (string) $response->getBody());
+ self::assertEquals('', $_SERVER['_curl'][\CURLOPT_ENCODING]);
+ $sent = Server::received()[0];
+ self::assertFalse($sent->hasHeader('Accept-Encoding'));
+ }
+
+ public function testReportsOriginalSizeAndContentEncodingAfterDecoding()
+ {
+ $this->addDecodeResponse();
+ $handler = new Handler\CurlMultiHandler();
+ $request = new Psr7\Request('GET', Server::$url);
+ $response = $handler($request, ['decode_content' => true]);
+ $response = $response->wait();
+ self::assertSame(
+ 'gzip',
+ $response->getHeaderLine('x-encoded-content-encoding')
+ );
+ self::assertSame(
+ \strlen(\gzencode('test')),
+ (int) $response->getHeaderLine('x-encoded-content-length')
+ );
+ }
+
+ public function testDecodesGzippedResponsesWithHeader()
+ {
+ $this->addDecodeResponse();
+ $handler = new Handler\CurlMultiHandler();
+ $request = new Psr7\Request('GET', Server::$url, ['Accept-Encoding' => 'gzip']);
+ $response = $handler($request, ['decode_content' => true]);
+ $response = $response->wait();
+ self::assertEquals('gzip', $_SERVER['_curl'][\CURLOPT_ENCODING]);
+ $sent = Server::received()[0];
+ self::assertEquals('gzip', $sent->getHeaderLine('Accept-Encoding'));
+ self::assertEquals('test', (string) $response->getBody());
+ self::assertFalse($response->hasHeader('content-encoding'));
+ self::assertTrue(
+ !$response->hasHeader('content-length')
+ || $response->getHeaderLine('content-length') == $response->getBody()->getSize()
+ );
+ }
+
+ /**
+ * https://github.com/guzzle/guzzle/issues/2799
+ */
+ public function testDecodesGzippedResponsesWithHeaderForHeadRequest()
+ {
+ $this->addDecodeResponse();
+ $handler = new Handler\CurlMultiHandler();
+ $request = new Psr7\Request('HEAD', Server::$url, ['Accept-Encoding' => 'gzip']);
+ $response = $handler($request, ['decode_content' => true]);
+ $response = $response->wait();
+ self::assertEquals('gzip', $_SERVER['_curl'][\CURLOPT_ENCODING]);
+ $sent = Server::received()[0];
+ self::assertEquals('gzip', $sent->getHeaderLine('Accept-Encoding'));
+
+ // Verify that the content-length matches the encoded size.
+ self::assertTrue(
+ !$response->hasHeader('content-length')
+ || $response->getHeaderLine('content-length') == \strlen(\gzencode('test'))
+ );
+ }
+
+ public function testDoesNotForceDecode()
+ {
+ $content = $this->addDecodeResponse();
+ $handler = new Handler\CurlMultiHandler();
+ $request = new Psr7\Request('GET', Server::$url);
+ $response = $handler($request, ['decode_content' => false]);
+ $response = $response->wait();
+ $sent = Server::received()[0];
+ self::assertFalse($sent->hasHeader('Accept-Encoding'));
+ self::assertEquals($content, (string) $response->getBody());
+ }
+
+ public function testProtocolVersion()
+ {
+ Server::flush();
+ Server::enqueue([new Psr7\Response()]);
+ $a = new Handler\CurlMultiHandler();
+ $request = new Psr7\Request('GET', Server::$url, [], null, '1.0');
+ $a($request, []);
+ self::assertEquals(\CURL_HTTP_VERSION_1_0, $_SERVER['_curl'][\CURLOPT_HTTP_VERSION]);
+ }
+
+ public function testSavesToStream()
+ {
+ $stream = \fopen('php://memory', 'r+');
+ $this->addDecodeResponse();
+ $handler = new Handler\CurlMultiHandler();
+ $request = new Psr7\Request('GET', Server::$url);
+ $response = $handler($request, [
+ 'decode_content' => true,
+ 'sink' => $stream,
+ ]);
+ $response->wait();
+ \rewind($stream);
+ self::assertEquals('test', \stream_get_contents($stream));
+ }
+
+ public function testSavesToGuzzleStream()
+ {
+ $stream = Psr7\Utils::streamFor();
+ $this->addDecodeResponse();
+ $handler = new Handler\CurlMultiHandler();
+ $request = new Psr7\Request('GET', Server::$url);
+ $response = $handler($request, [
+ 'decode_content' => true,
+ 'sink' => $stream,
+ ]);
+ $response->wait();
+ self::assertEquals('test', (string) $stream);
+ }
+
+ public function testSavesToFileOnDisk()
+ {
+ $tmpfile = \tempnam(\sys_get_temp_dir(), 'testfile');
+ $this->addDecodeResponse();
+ $handler = new Handler\CurlMultiHandler();
+ $request = new Psr7\Request('GET', Server::$url);
+ $response = $handler($request, [
+ 'decode_content' => true,
+ 'sink' => $tmpfile,
+ ]);
+ $response->wait();
+ self::assertStringEqualsFile($tmpfile, 'test');
+ @\unlink($tmpfile);
+ }
+
+ public function testDoesNotAddMultipleContentLengthHeaders()
+ {
+ $this->addDecodeResponse();
+ $handler = new Handler\CurlMultiHandler();
+ $request = new Psr7\Request('PUT', Server::$url, ['Content-Length' => 3], 'foo');
+ $response = $handler($request, []);
+ $response->wait();
+ $sent = Server::received()[0];
+ self::assertEquals(3, $sent->getHeaderLine('Content-Length'));
+ self::assertFalse($sent->hasHeader('Transfer-Encoding'));
+ self::assertEquals('foo', (string) $sent->getBody());
+ }
+
+ public function testSendsPostWithNoBodyOrDefaultContentType()
+ {
+ Server::flush();
+ Server::enqueue([new Psr7\Response()]);
+ $handler = new Handler\CurlMultiHandler();
+ $request = new Psr7\Request('POST', Server::$url);
+ $response = $handler($request, []);
+ $response->wait();
+ $received = Server::received()[0];
+ self::assertEquals('POST', $received->getMethod());
+ self::assertFalse($received->hasHeader('content-type'));
+ self::assertSame('0', $received->getHeaderLine('content-length'));
+ }
+
+ public function testFailsWhenCannotRewindRetryAfterNoResponse()
+ {
+ $factory = new CurlFactory(1);
+ $stream = Psr7\Utils::streamFor('abc');
+ $stream->read(1);
+ $stream = new Psr7\NoSeekStream($stream);
+ $request = new Psr7\Request('PUT', Server::$url, [], $stream);
+ $fn = static function ($request, $options) use (&$fn, $factory) {
+ $easy = $factory->create($request, $options);
+
+ return CurlFactory::finish($fn, $easy, $factory);
+ };
+
+ $this->expectException(RequestException::class);
+ $this->expectExceptionMessage('but attempting to rewind the request body failed');
+ $fn($request, [])->wait();
+ }
+
+ public function testRetriesWhenBodyCanBeRewound()
+ {
+ $callHandler = $called = false;
+
+ $fn = static function ($r, $options) use (&$callHandler) {
+ $callHandler = true;
+
+ return P\Create::promiseFor(new Psr7\Response());
+ };
+
+ $bd = Psr7\FnStream::decorate(Psr7\Utils::streamFor('test'), [
+ 'tell' => static function () {
+ return 1;
+ },
+ 'rewind' => static function () use (&$called) {
+ $called = true;
+ },
+ ]);
+
+ $factory = new CurlFactory(1);
+ $req = new Psr7\Request('PUT', Server::$url, [], $bd);
+ $easy = $factory->create($req, []);
+ $res = CurlFactory::finish($fn, $easy, $factory);
+ $res = $res->wait();
+ self::assertTrue($callHandler);
+ self::assertTrue($called);
+ self::assertEquals('200', $res->getStatusCode());
+ }
+
+ public function testFailsWhenRetryMoreThanThreeTimes()
+ {
+ $factory = new CurlFactory(1);
+ $call = 0;
+ $fn = static function ($request, $options) use (&$mock, &$call, $factory) {
+ ++$call;
+ $easy = $factory->create($request, $options);
+
+ return CurlFactory::finish($mock, $easy, $factory);
+ };
+ $mock = new Handler\MockHandler([$fn, $fn, $fn]);
+ $p = $mock(new Psr7\Request('PUT', Server::$url, [], 'test'), []);
+ $p->wait(false);
+ self::assertEquals(3, $call);
+
+ $this->expectException(RequestException::class);
+ $this->expectExceptionMessage('The cURL request was retried 3 times');
+ $p->wait(true);
+ }
+
+ public function testHandles100Continue()
+ {
+ Server::flush();
+ Server::enqueue([
+ new Psr7\Response(200, ['Test' => 'Hello', 'Content-Length' => 4], 'test'),
+ ]);
+ $request = new Psr7\Request('PUT', Server::$url, [
+ 'Expect' => '100-Continue',
+ ], 'test');
+ $handler = new Handler\CurlMultiHandler();
+ $response = $handler($request, [])->wait();
+ self::assertSame(200, $response->getStatusCode());
+ self::assertSame('OK', $response->getReasonPhrase());
+ self::assertSame('Hello', $response->getHeaderLine('Test'));
+ self::assertSame('4', $response->getHeaderLine('Content-Length'));
+ self::assertSame('test', (string) $response->getBody());
+ }
+
+ public function testCreatesConnectException()
+ {
+ $m = new \ReflectionMethod(CurlFactory::class, 'finishError');
+ $m->setAccessible(true);
+ $factory = new CurlFactory(1);
+ $easy = $factory->create(new Psr7\Request('GET', Server::$url), []);
+ $easy->errno = \CURLE_COULDNT_CONNECT;
+ $response = $m->invoke(
+ null,
+ static function () {
+ },
+ $easy,
+ $factory
+ );
+
+ $this->expectException(ConnectException::class);
+ $response->wait();
+ }
+
+ public function testAddsTimeouts()
+ {
+ $f = new CurlFactory(3);
+ $f->create(new Psr7\Request('GET', Server::$url), [
+ 'timeout' => 0.1,
+ 'connect_timeout' => 0.2,
+ ]);
+ self::assertEquals(100, $_SERVER['_curl'][\CURLOPT_TIMEOUT_MS]);
+ self::assertEquals(200, $_SERVER['_curl'][\CURLOPT_CONNECTTIMEOUT_MS]);
+ }
+
+ public function testAddsStreamingBody()
+ {
+ $f = new CurlFactory(3);
+ $bd = Psr7\FnStream::decorate(Psr7\Utils::streamFor('foo'), [
+ 'getSize' => static function () {
+ return null;
+ },
+ ]);
+ $request = new Psr7\Request('PUT', Server::$url, [], $bd);
+ $f->create($request, []);
+ self::assertEquals(1, $_SERVER['_curl'][\CURLOPT_UPLOAD]);
+ self::assertIsCallable($_SERVER['_curl'][\CURLOPT_READFUNCTION]);
+ }
+
+ public function testEnsuresDirExistsBeforeThrowingWarning()
+ {
+ $f = new CurlFactory(3);
+
+ $this->expectException(\RuntimeException::class);
+ $this->expectExceptionMessage('Directory /does/not/exist/so does not exist for sink value of /does/not/exist/so/error.txt');
+ $f->create(new Psr7\Request('GET', Server::$url), [
+ 'sink' => '/does/not/exist/so/error.txt',
+ ]);
+ }
+
+ public function testClosesIdleHandles()
+ {
+ $f = new CurlFactory(3);
+ $req = new Psr7\Request('GET', Server::$url);
+ $easy = $f->create($req, []);
+ $h1 = $easy->handle;
+ $f->release($easy);
+ self::assertCount(1, Helpers::readObjectAttribute($f, 'handles'));
+ $easy = $f->create($req, []);
+ self::assertSame($easy->handle, $h1);
+ $easy2 = $f->create($req, []);
+ $easy3 = $f->create($req, []);
+ $easy4 = $f->create($req, []);
+ $f->release($easy);
+ self::assertCount(1, Helpers::readObjectAttribute($f, 'handles'));
+ $f->release($easy2);
+ self::assertCount(2, Helpers::readObjectAttribute($f, 'handles'));
+ $f->release($easy3);
+ self::assertCount(3, Helpers::readObjectAttribute($f, 'handles'));
+ $f->release($easy4);
+ self::assertCount(3, Helpers::readObjectAttribute($f, 'handles'));
+ }
+
+ public function testRejectsPromiseWhenCreateResponseFails()
+ {
+ Server::flush();
+ Server::enqueueRaw(999, 'Incorrect', ['X-Foo' => 'bar'], 'abc 123');
+
+ $req = new Psr7\Request('GET', Server::$url);
+ $handler = new Handler\CurlHandler();
+ $promise = $handler($req, []);
+
+ $this->expectException(RequestException::class);
+ $this->expectExceptionMessage('An error was encountered while creating the response');
+ $promise->wait();
+ }
+
+ public function testEnsuresOnHeadersIsCallable()
+ {
+ $req = new Psr7\Request('GET', Server::$url);
+ $handler = new Handler\CurlHandler();
+
+ $this->expectException(\InvalidArgumentException::class);
+ $handler($req, ['on_headers' => 'error!']);
+ }
+
+ public function testRejectsPromiseWhenOnHeadersFails()
+ {
+ Server::flush();
+ Server::enqueue([
+ new Psr7\Response(200, ['X-Foo' => 'bar'], 'abc 123'),
+ ]);
+ $req = new Psr7\Request('GET', Server::$url);
+ $handler = new Handler\CurlHandler();
+ $promise = $handler($req, [
+ 'on_headers' => static function () {
+ throw new \Exception('test');
+ },
+ ]);
+
+ $this->expectException(RequestException::class);
+ $this->expectExceptionMessage('An error was encountered during the on_headers event');
+ $promise->wait();
+ }
+
+ public function testSuccessfullyCallsOnHeadersBeforeWritingToSink()
+ {
+ Server::flush();
+ Server::enqueue([
+ new Psr7\Response(200, ['X-Foo' => 'bar'], 'abc 123'),
+ ]);
+ $req = new Psr7\Request('GET', Server::$url);
+ $got = null;
+
+ $stream = Psr7\Utils::streamFor();
+ $stream = Psr7\FnStream::decorate($stream, [
+ 'write' => static function ($data) use ($stream, &$got) {
+ self::assertNotNull($got);
+
+ return $stream->write($data);
+ },
+ ]);
+
+ $handler = new Handler\CurlHandler();
+ $promise = $handler($req, [
+ 'sink' => $stream,
+ 'on_headers' => static function (ResponseInterface $res) use (&$got) {
+ $got = $res;
+ self::assertEquals('bar', $res->getHeaderLine('X-Foo'));
+ },
+ ]);
+
+ $response = $promise->wait();
+ self::assertSame(200, $response->getStatusCode());
+ self::assertSame('bar', $response->getHeaderLine('X-Foo'));
+ self::assertSame('abc 123', (string) $response->getBody());
+ }
+
+ public function testInvokesOnStatsOnSuccess()
+ {
+ Server::flush();
+ Server::enqueue([new Psr7\Response(200)]);
+ $req = new Psr7\Request('GET', Server::$url);
+ $gotStats = null;
+ $handler = new Handler\CurlHandler();
+ $promise = $handler($req, [
+ 'on_stats' => static function (TransferStats $stats) use (&$gotStats) {
+ $gotStats = $stats;
+ },
+ ]);
+ $response = $promise->wait();
+ self::assertSame(200, $response->getStatusCode());
+ self::assertSame(200, $gotStats->getResponse()->getStatusCode());
+ self::assertSame(
+ Server::$url,
+ (string) $gotStats->getEffectiveUri()
+ );
+ self::assertSame(
+ Server::$url,
+ (string) $gotStats->getRequest()->getUri()
+ );
+ self::assertGreaterThan(0, $gotStats->getTransferTime());
+ self::assertArrayHasKey('appconnect_time', $gotStats->getHandlerStats());
+ }
+
+ public function testInvokesOnStatsOnError()
+ {
+ $req = new Psr7\Request('GET', 'http://127.0.0.1:123');
+ $gotStats = null;
+ $handler = new Handler\CurlHandler();
+ $promise = $handler($req, [
+ 'connect_timeout' => 0.001,
+ 'timeout' => 0.001,
+ 'on_stats' => static function (TransferStats $stats) use (&$gotStats) {
+ $gotStats = $stats;
+ },
+ ]);
+ $promise->wait(false);
+ self::assertFalse($gotStats->hasResponse());
+ self::assertSame(
+ 'http://127.0.0.1:123',
+ (string) $gotStats->getEffectiveUri()
+ );
+ self::assertSame(
+ 'http://127.0.0.1:123',
+ (string) $gotStats->getRequest()->getUri()
+ );
+ self::assertIsFloat($gotStats->getTransferTime());
+ self::assertIsInt($gotStats->getHandlerErrorData());
+ self::assertArrayHasKey('appconnect_time', $gotStats->getHandlerStats());
+ }
+
+ public function testRewindsBodyIfPossible()
+ {
+ $body = Psr7\Utils::streamFor(\str_repeat('x', 1024 * 1024 * 2));
+ $body->seek(1024 * 1024);
+ self::assertSame(1024 * 1024, $body->tell());
+
+ $req = new Psr7\Request('POST', 'https://www.example.com', [
+ 'Content-Length' => 1024 * 1024 * 2,
+ ], $body);
+ $factory = new CurlFactory(1);
+ $factory->create($req, []);
+
+ self::assertSame(0, $body->tell());
+ }
+
+ public function testDoesNotRewindUnseekableBody()
+ {
+ $body = Psr7\Utils::streamFor(\str_repeat('x', 1024 * 1024 * 2));
+ $body->seek(1024 * 1024);
+ $body = new Psr7\NoSeekStream($body);
+ self::assertSame(1024 * 1024, $body->tell());
+
+ $req = new Psr7\Request('POST', 'https://www.example.com', [
+ 'Content-Length' => 1024 * 1024,
+ ], $body);
+ $factory = new CurlFactory(1);
+ $factory->create($req, []);
+
+ self::assertSame(1024 * 1024, $body->tell());
+ }
+
+ public function testRelease()
+ {
+ $factory = new CurlFactory(1);
+ $easyHandle = new EasyHandle();
+ $easyHandle->handle = \curl_init();
+
+ self::assertEmpty($factory->release($easyHandle));
+ }
+
+ /**
+ * https://github.com/guzzle/guzzle/issues/2735
+ */
+ public function testBodyEofOnWindows()
+ {
+ $expectedLength = 4097;
+
+ Server::flush();
+ Server::enqueue([
+ new Psr7\Response(200, [
+ 'Content-Length' => $expectedLength,
+ ], \str_repeat('x', $expectedLength)),
+ ]);
+
+ $handler = new Handler\CurlMultiHandler();
+ $request = new Psr7\Request('GET', Server::$url);
+ $promise = $handler($request, []);
+ $response = $promise->wait();
+ $body = $response->getBody();
+
+ $actualLength = 0;
+ while (!$body->eof()) {
+ $chunk = $body->read(4096);
+ $actualLength += \strlen($chunk);
+ }
+ self::assertSame($expectedLength, $actualLength);
+ }
+
+ public function testHandlesGarbageHttpServerGracefully()
+ {
+ $a = new Handler\CurlMultiHandler();
+
+ $this->expectException(RequestException::class);
+ $this->expectExceptionMessage('cURL error 1: Received HTTP/0.9 when not allowed');
+
+ $a(new Psr7\Request('GET', Server::$url.'guzzle-server/garbage'), [])->wait();
+ }
+
+ public function testHandlesInvalidStatusCodeGracefully()
+ {
+ $a = new Handler\CurlMultiHandler();
+
+ $this->expectException(RequestException::class);
+ $this->expectExceptionMessage('An error was encountered while creating the response');
+
+ $a(new Psr7\Request('GET', Server::$url.'guzzle-server/bad-status'), [])->wait();
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/CurlHandlerTest.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/CurlHandlerTest.php
new file mode 100644
index 0000000000..c4a77efffe
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/CurlHandlerTest.php
@@ -0,0 +1,101 @@
+expectException(ConnectException::class);
+ $this->expectExceptionMessage('cURL');
+ $handler($request, ['timeout' => 0.001, 'connect_timeout' => 0.001])->wait();
+ }
+
+ public function testRedactsUserInfoInErrors()
+ {
+ $handler = new CurlHandler();
+ $request = new Request('GET', 'http://my_user:secretPass@localhost:123');
+
+ try {
+ $handler($request, ['timeout' => 0.001, 'connect_timeout' => 0.001])->wait();
+ $this->fail('Must throw an Exception.');
+ } catch (\Throwable $e) {
+ $this->assertStringNotContainsString('secretPass', $e->getMessage());
+ }
+ }
+
+ public function testReusesHandles()
+ {
+ Server::flush();
+ $response = new Response(200);
+ Server::enqueue([$response, $response]);
+ $a = new CurlHandler();
+ $request = new Request('GET', Server::$url);
+ self::assertInstanceOf(FulfilledPromise::class, $a($request, []));
+ self::assertInstanceOf(FulfilledPromise::class, $a($request, []));
+ }
+
+ public function testDoesSleep()
+ {
+ $response = new Response(200);
+ Server::enqueue([$response]);
+ $a = new CurlHandler();
+ $request = new Request('GET', Server::$url);
+ $s = Utils::currentTime();
+ $a($request, ['delay' => 0.1])->wait();
+ self::assertGreaterThan(0.0001, Utils::currentTime() - $s);
+ }
+
+ public function testCreatesCurlErrorsWithContext()
+ {
+ $handler = new CurlHandler();
+ $request = new Request('GET', 'http://localhost:123');
+ $called = false;
+ $p = $handler($request, ['timeout' => 0.001, 'connect_timeout' => 0.001])
+ ->otherwise(static function (ConnectException $e) use (&$called) {
+ $called = true;
+ self::assertArrayHasKey('errno', $e->getHandlerContext());
+ });
+ $p->wait();
+ self::assertTrue($called);
+ }
+
+ public function testUsesContentLengthWhenOverInMemorySize()
+ {
+ Server::flush();
+ Server::enqueue([new Response()]);
+ $stream = Psr7\Utils::streamFor(\str_repeat('.', 1000000));
+ $handler = new CurlHandler();
+ $request = new Request(
+ 'PUT',
+ Server::$url,
+ ['Content-Length' => 1000000],
+ $stream
+ );
+ $handler($request, [])->wait();
+ $received = Server::received()[0];
+ self::assertEquals(1000000, $received->getHeaderLine('Content-Length'));
+ self::assertFalse($received->hasHeader('Transfer-Encoding'));
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/CurlMultiHandlerTest.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/CurlMultiHandlerTest.php
new file mode 100644
index 0000000000..e829af2727
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/CurlMultiHandlerTest.php
@@ -0,0 +1,130 @@
+ [
+ \CURLMOPT_MAXCONNECTS => 5,
+ ]]);
+ $request = new Request('GET', Server::$url);
+ $a($request, []);
+ self::assertEquals(5, $_SERVER['_curl_multi'][\CURLMOPT_MAXCONNECTS]);
+ }
+
+ public function testSendsRequest()
+ {
+ Server::enqueue([new Response()]);
+ $a = new CurlMultiHandler();
+ $request = new Request('GET', Server::$url);
+ $response = $a($request, [])->wait();
+ self::assertSame(200, $response->getStatusCode());
+ }
+
+ public function testCreatesExceptions()
+ {
+ $a = new CurlMultiHandler();
+
+ $this->expectException(ConnectException::class);
+ $this->expectExceptionMessage('cURL error');
+ $a(new Request('GET', 'http://localhost:123'), [])->wait();
+ }
+
+ public function testCanSetSelectTimeout()
+ {
+ $a = new CurlMultiHandler(['select_timeout' => 2]);
+ self::assertEquals(2, Helpers::readObjectAttribute($a, 'selectTimeout'));
+ }
+
+ public function testCanCancel()
+ {
+ Server::flush();
+ $response = new Response(200);
+ Server::enqueue(\array_fill_keys(\range(0, 10), $response));
+ $a = new CurlMultiHandler();
+ $responses = [];
+ for ($i = 0; $i < 10; ++$i) {
+ $response = $a(new Request('GET', Server::$url), []);
+ $response->cancel();
+ $responses[] = $response;
+ }
+
+ foreach ($responses as $r) {
+ self::assertTrue(P\Is::rejected($r));
+ }
+ }
+
+ public function testCannotCancelFinished()
+ {
+ Server::flush();
+ Server::enqueue([new Response(200)]);
+ $a = new CurlMultiHandler();
+ $response = $a(new Request('GET', Server::$url), []);
+ $response->wait();
+ $response->cancel();
+ self::assertTrue(P\Is::fulfilled($response));
+ }
+
+ public function testDelaysConcurrently()
+ {
+ Server::flush();
+ Server::enqueue([new Response()]);
+ $a = new CurlMultiHandler();
+ $expected = Utils::currentTime() + (100 / 1000);
+ $response = $a(new Request('GET', Server::$url), ['delay' => 100]);
+ $response->wait();
+ self::assertGreaterThanOrEqual($expected, Utils::currentTime());
+ }
+
+ public function testUsesTimeoutEnvironmentVariables()
+ {
+ unset($_SERVER['GUZZLE_CURL_SELECT_TIMEOUT']);
+ \putenv('GUZZLE_CURL_SELECT_TIMEOUT=');
+
+ try {
+ $a = new CurlMultiHandler();
+ // Default if no options are given and no environment variable is set
+ self::assertEquals(1, Helpers::readObjectAttribute($a, 'selectTimeout'));
+
+ \putenv('GUZZLE_CURL_SELECT_TIMEOUT=3');
+ $a = new CurlMultiHandler();
+ // Handler reads from the environment if no options are given
+ self::assertEquals(3, Helpers::readObjectAttribute($a, 'selectTimeout'));
+ } finally {
+ \putenv('GUZZLE_CURL_SELECT_TIMEOUT=');
+ }
+ }
+
+ public function throwsWhenAccessingInvalidProperty()
+ {
+ $h = new CurlMultiHandler();
+
+ $this->expectException(\BadMethodCallException::class);
+ $h->foo;
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/EasyHandleTest.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/EasyHandleTest.php
new file mode 100644
index 0000000000..e9ad4e90fa
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/EasyHandleTest.php
@@ -0,0 +1,22 @@
+handle);
+
+ $this->expectException(\BadMethodCallException::class);
+ $this->expectExceptionMessage('The EasyHandle has been released');
+ $easy->handle;
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/MockHandlerTest.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/MockHandlerTest.php
new file mode 100644
index 0000000000..842c68021e
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/MockHandlerTest.php
@@ -0,0 +1,262 @@
+wait());
+ }
+
+ public function testIsCountable()
+ {
+ $res = new Response();
+ $mock = new MockHandler([$res, $res]);
+ self::assertCount(2, $mock);
+ }
+
+ public function testEmptyHandlerIsCountable()
+ {
+ self::assertCount(0, new MockHandler());
+ }
+
+ public function testEnsuresEachAppendOnCreationIsValid()
+ {
+ $this->expectException(\TypeError::class);
+ new MockHandler(['a']);
+ }
+
+ public function testEnsuresEachAppendIsValid()
+ {
+ $mock = new MockHandler();
+ $this->expectException(\TypeError::class);
+ $mock->append(['a']);
+ }
+
+ public function testCanQueueExceptions()
+ {
+ $e = new \Exception('a');
+ $mock = new MockHandler([$e]);
+ $request = new Request('GET', 'http://example.com');
+ $p = $mock($request, []);
+ try {
+ $p->wait();
+ self::fail();
+ } catch (\Exception $e2) {
+ self::assertSame($e, $e2);
+ }
+ }
+
+ public function testCanGetLastRequestAndOptions()
+ {
+ $res = new Response();
+ $mock = new MockHandler([$res]);
+ $request = new Request('GET', 'http://example.com');
+ $mock($request, ['foo' => 'bar']);
+ self::assertSame($request, $mock->getLastRequest());
+ self::assertSame(['foo' => 'bar'], $mock->getLastOptions());
+ }
+
+ public function testSinkFilename()
+ {
+ $filename = \sys_get_temp_dir().'/mock_test_'.\uniqid();
+ $res = new Response(200, [], 'TEST CONTENT');
+ $mock = new MockHandler([$res]);
+ $request = new Request('GET', '/');
+ $p = $mock($request, ['sink' => $filename]);
+ $p->wait();
+
+ self::assertFileExists($filename);
+ self::assertStringEqualsFile($filename, 'TEST CONTENT');
+
+ \unlink($filename);
+ }
+
+ public function testSinkResource()
+ {
+ $file = \tmpfile();
+ $meta = \stream_get_meta_data($file);
+ $res = new Response(200, [], 'TEST CONTENT');
+ $mock = new MockHandler([$res]);
+ $request = new Request('GET', '/');
+ $p = $mock($request, ['sink' => $file]);
+ $p->wait();
+
+ self::assertFileExists($meta['uri']);
+ self::assertStringEqualsFile($meta['uri'], 'TEST CONTENT');
+ }
+
+ public function testSinkStream()
+ {
+ $stream = new Stream(\tmpfile());
+ $res = new Response(200, [], 'TEST CONTENT');
+ $mock = new MockHandler([$res]);
+ $request = new Request('GET', '/');
+ $p = $mock($request, ['sink' => $stream]);
+ $p->wait();
+
+ self::assertFileExists($stream->getMetadata('uri'));
+ self::assertStringEqualsFile($stream->getMetadata('uri'), 'TEST CONTENT');
+ }
+
+ public function testCanEnqueueCallables()
+ {
+ $r = new Response();
+ $fn = static function ($req, $o) use ($r) {
+ return $r;
+ };
+ $mock = new MockHandler([$fn]);
+ $request = new Request('GET', 'http://example.com');
+ $p = $mock($request, ['foo' => 'bar']);
+ self::assertSame($r, $p->wait());
+ }
+
+ public function testEnsuresOnHeadersIsCallable()
+ {
+ $res = new Response();
+ $mock = new MockHandler([$res]);
+ $request = new Request('GET', 'http://example.com');
+
+ $this->expectException(\InvalidArgumentException::class);
+ $mock($request, ['on_headers' => 'error!']);
+ }
+
+ public function testRejectsPromiseWhenOnHeadersFails()
+ {
+ $res = new Response();
+ $mock = new MockHandler([$res]);
+ $request = new Request('GET', 'http://example.com');
+ $promise = $mock($request, [
+ 'on_headers' => static function () {
+ throw new \Exception('test');
+ },
+ ]);
+
+ $this->expectException(RequestException::class);
+ $this->expectExceptionMessage('An error was encountered during the on_headers event');
+ $promise->wait();
+ }
+
+ public function testInvokesOnFulfilled()
+ {
+ $res = new Response();
+ $mock = new MockHandler([$res], static function ($v) use (&$c) {
+ $c = $v;
+ });
+ $request = new Request('GET', 'http://example.com');
+ $mock($request, [])->wait();
+ self::assertSame($res, $c);
+ }
+
+ public function testInvokesOnRejected()
+ {
+ $e = new \Exception('a');
+ $c = null;
+ $mock = new MockHandler([$e], null, static function ($v) use (&$c) {
+ $c = $v;
+ });
+ $request = new Request('GET', 'http://example.com');
+ $mock($request, [])->wait(false);
+ self::assertSame($e, $c);
+ }
+
+ public function testThrowsWhenNoMoreResponses()
+ {
+ $mock = new MockHandler();
+ $request = new Request('GET', 'http://example.com');
+
+ $this->expectException(\OutOfBoundsException::class);
+ $mock($request, []);
+ }
+
+ public function testCanCreateWithDefaultMiddleware()
+ {
+ $r = new Response(500);
+ $mock = MockHandler::createWithMiddleware([$r]);
+ $request = new Request('GET', 'http://example.com');
+
+ $this->expectException(BadResponseException::class);
+ $mock($request, ['http_errors' => true])->wait();
+ }
+
+ public function testInvokesOnStatsFunctionForResponse()
+ {
+ $res = new Response();
+ $mock = new MockHandler([$res]);
+ $request = new Request('GET', 'http://example.com');
+ /** @var TransferStats|null $stats */
+ $stats = null;
+ $onStats = static function (TransferStats $s) use (&$stats) {
+ $stats = $s;
+ };
+ $p = $mock($request, ['on_stats' => $onStats]);
+ $p->wait();
+ self::assertSame($res, $stats->getResponse());
+ self::assertSame($request, $stats->getRequest());
+ }
+
+ public function testInvokesOnStatsFunctionForError()
+ {
+ $e = new \Exception('a');
+ $c = null;
+ $mock = new MockHandler([$e], null, static function ($v) use (&$c) {
+ $c = $v;
+ });
+ $request = new Request('GET', 'http://example.com');
+
+ /** @var TransferStats|null $stats */
+ $stats = null;
+ $onStats = static function (TransferStats $s) use (&$stats) {
+ $stats = $s;
+ };
+ $mock($request, ['on_stats' => $onStats])->wait(false);
+ self::assertSame($e, $stats->getHandlerErrorData());
+ self::assertNull($stats->getResponse());
+ self::assertSame($request, $stats->getRequest());
+ }
+
+ public function testTransferTime()
+ {
+ $e = new \Exception('a');
+ $c = null;
+ $mock = new MockHandler([$e], null, static function ($v) use (&$c) {
+ $c = $v;
+ });
+ $request = new Request('GET', 'http://example.com');
+ $stats = null;
+ $onStats = static function (TransferStats $s) use (&$stats) {
+ $stats = $s;
+ };
+ $mock($request, ['on_stats' => $onStats, 'transfer_time' => 0.4])->wait(false);
+ self::assertEquals(0.4, $stats->getTransferTime());
+ }
+
+ public function testResetQueue()
+ {
+ $mock = new MockHandler([new Response(200), new Response(204)]);
+ self::assertCount(2, $mock);
+
+ $mock->reset();
+ self::assertEmpty($mock);
+
+ $mock->append(new Response(500));
+ self::assertCount(1, $mock);
+ }
+}
diff --git a/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/Network/StreamHandlerTest.php b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/Network/StreamHandlerTest.php
new file mode 100644
index 0000000000..c3fc11753a
--- /dev/null
+++ b/code/web/Drivers/oauth2_client_php_league/guzzlehttp/guzzle/tests/Handler/Network/StreamHandlerTest.php
@@ -0,0 +1,71 @@
+ true,
+ ]
+ )->wait();
+
+ self::assertSame(200, $response->getStatusCode());
+ self::assertStringContainsString('
+ {if empty($newMaterialsRequestSummary)}
+ {translate text='If you cannot find a title in our catalog, you can request the title via this form. Please enter as much information as possible so we can find the exact title you are looking for. For example, if you are looking for a specific season of a TV show, please include that information.' isPublicFacing=true}
+ {else}
+ {translate text=$newMaterialsRequestSummary isPublicFacing=true isAdminEnteredData=true}
+ {/if}
+
+ {$oclcRSFGForm}
+ {/if}
+
+
+
\ No newline at end of file
diff --git a/code/web/interface/themes/responsive/MyAccount/account-sidebar.tpl b/code/web/interface/themes/responsive/MyAccount/account-sidebar.tpl
index 06f4c7b6fc..97ecf795b2 100644
--- a/code/web/interface/themes/responsive/MyAccount/account-sidebar.tpl
+++ b/code/web/interface/themes/responsive/MyAccount/account-sidebar.tpl
@@ -95,7 +95,7 @@
{/if}
- {if $user->getInterlibraryLoanType() == 'vdx'}
+ {if $user->getInterlibraryLoanType() == 'vdx' || $user->getInterlibraryLoanType() == 'oclc_resource_sharing_for_groups'}
+{/strip}
\ No newline at end of file
diff --git a/code/web/interface/themes/responsive/OCLCRSFG/oclc-rsfg-request-details.tpl b/code/web/interface/themes/responsive/OCLCRSFG/oclc-rsfg-request-details.tpl
new file mode 100644
index 0000000000..d8a05e9080
--- /dev/null
+++ b/code/web/interface/themes/responsive/OCLCRSFG/oclc-rsfg-request-details.tpl
@@ -0,0 +1,106 @@
+{strip}
+
+
+ {* TODO: if possible, fetch and display permitted actions *}
+
+
+{/strip}
diff --git a/code/web/interface/themes/responsive/Record/oclc-rsfg-request-popup.tpl b/code/web/interface/themes/responsive/Record/oclc-rsfg-request-popup.tpl
new file mode 100644
index 0000000000..7133461d36
--- /dev/null
+++ b/code/web/interface/themes/responsive/Record/oclc-rsfg-request-popup.tpl
@@ -0,0 +1,8 @@
+{strip}
+
+ {if !empty($fromHoldError)}
+
{translate text='Sorry, we could not place a hold on that title for you. Would you like to make an Interlibrary Loan Request instead?' isPublicFacing='true'}
+ {/if}
+ {$rsfgFormFields}
+
+{/strip}
\ No newline at end of file
diff --git a/code/web/interface/themes/responsive/Search/list-none.tpl b/code/web/interface/themes/responsive/Search/list-none.tpl
index 4cf5afe492..f793793a7e 100644
--- a/code/web/interface/themes/responsive/Search/list-none.tpl
+++ b/code/web/interface/themes/responsive/Search/list-none.tpl
@@ -130,6 +130,13 @@