From dad4debae54fccd64264cd0c287bb2382097a5e2 Mon Sep 17 00:00:00 2001 From: "mkanat%bugzilla.org" Date: Tue, 13 Jul 2010 23:27:05 +0000 Subject: [PATCH] Bug 577765: Allow XML-RPC to accept multiple positional parameters r=ghendricks, a=mkanat git-svn-id: svn://10.0.0.236/branches/BUGZILLA-4_0-BRANCH@260758 18797224-902f-48f8-a5cc-f745e15eee43 --- .../bugzilla/Bugzilla/WebService/Server/XMLRPC.pm | 14 ++++++++------ .../webtools/bugzilla/Bugzilla/WebService/Util.pm | 8 ++++---- 2 files changed, 12 insertions(+), 10 deletions(-) diff --git a/mozilla/webtools/bugzilla/Bugzilla/WebService/Server/XMLRPC.pm b/mozilla/webtools/bugzilla/Bugzilla/WebService/Server/XMLRPC.pm index 6eb09dc221e..18757c0ecfa 100644 --- a/mozilla/webtools/bugzilla/Bugzilla/WebService/Server/XMLRPC.pm +++ b/mozilla/webtools/bugzilla/Bugzilla/WebService/Server/XMLRPC.pm @@ -152,13 +152,15 @@ use Bugzilla::WebService::Util qw(taint_data); sub paramsin { my $self = shift; - return $self->{bz_params_in} if $self->{bz_params_in}; - my $params = $self->SUPER::paramsin(@_); - if ($self->{_bz_do_taint}) { - taint_data($params); + if (!$self->{bz_params_in}) { + my @params = $self->SUPER::paramsin(@_); + if ($self->{_bz_do_taint}) { + taint_data(@params); + } + $self->{bz_params_in} = \@params; } - $self->{bz_params_in} = $params; - return $self->{bz_params_in}; + my $params = $self->{bz_params_in}; + return wantarray ? @$params : $params->[0]; } 1; diff --git a/mozilla/webtools/bugzilla/Bugzilla/WebService/Util.pm b/mozilla/webtools/bugzilla/Bugzilla/WebService/Util.pm index 8ff608c3acd..41e4c1d2639 100644 --- a/mozilla/webtools/bugzilla/Bugzilla/WebService/Util.pm +++ b/mozilla/webtools/bugzilla/Bugzilla/WebService/Util.pm @@ -52,13 +52,13 @@ sub filter ($$) { } sub taint_data { - my $params = shift; - return if !$params; + my @params = @_; + return if !@params; # Though this is a private function, it hasn't changed since 2004 and # should be safe to use, and prevents us from having to write it ourselves # or require another module to do it. - Test::Taint::_deeply_traverse(\&_delete_bad_keys, $params); - Test::Taint::taint_deeply($params); + Test::Taint::_deeply_traverse(\&_delete_bad_keys, \@params); + Test::Taint::taint_deeply(\@params); } sub _delete_bad_keys {