OwlCyberSecurity - MANAGER
Edit File: bug70913.phpt
--TEST-- Bug #70913 (Segfault while new Yaf_Controller) --SKIPIF-- <?php if (!extension_loaded("yaf")) print "skip"; ?> --INI-- yaf.use_spl_autoload=1 yaf.lowcase_path=0 yaf.throw_exception=0 yaf.catch_exception=1 yaf.use_namespace=0 --FILE-- <?php require "build.inc"; startup(); $config = array( "application" => array( "directory" => APPLICATION_PATH, ), ); file_put_contents(APPLICATION_PATH . "/controllers/Index.php", <<<PHP <?php class IndexController extends Yaf_Controller_Abstract { public function indexAction() { new SecondController(\$this->getRequest(), \$this->getResponse(), \$this->getView()); } } PHP ); file_put_contents(APPLICATION_PATH . "/controllers/Second.php", <<<PHP <?php class SecondController extends Yaf_Controller_Abstract { public function __construct(\$request, \$response, \$view) {} } PHP ); file_put_contents(APPLICATION_PATH . "/views/index/index.phtml", "Okey\n"); $app = new Yaf_Application($config); $response = $app->run(); print_r($response); ?> --CLEAN-- <?php require "build.inc"; shutdown(); ?> --EXPECT-- Okey Yaf_Response_Cli Object ( [response_code:protected] => 0 [header_sent:protected] => )