2011-01-16 22:51:39 +01:00
|
|
|
<?php
|
|
|
|
|
|
|
|
/*
|
2012-01-11 01:42:00 +01:00
|
|
|
* Copyright 2012 Facebook, Inc.
|
2011-01-16 22:51:39 +01:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2011-05-21 06:15:00 +02:00
|
|
|
$__start__ = microtime(true);
|
2011-04-30 05:10:00 +02:00
|
|
|
|
2011-02-03 07:38:42 +01:00
|
|
|
error_reporting(E_ALL | E_STRICT);
|
Detect obviously erroneous "memory_limit" configurations
Summary: See comment. ALSO: THIS DIFF IS AMAZING.
Test Plan: Changed my memory limit to something absurd, got yelled at.
Reviewed By: mroch
Reviewers: colmdoyle, jungejason, aran, tuomaspelkonen, codeblock, tomo, mroch,
hsb
CC: aran, mroch, epriestley
Differential Revision: 657
2011-07-13 00:42:14 +02:00
|
|
|
|
|
|
|
phabricator_detect_insane_memory_limit();
|
|
|
|
|
2011-03-31 07:08:41 +02:00
|
|
|
ini_set('memory_limit', -1);
|
2011-02-03 07:38:42 +01:00
|
|
|
|
2011-02-24 23:52:57 +01:00
|
|
|
$env = getenv('PHABRICATOR_ENV'); // Apache
|
2011-02-27 05:57:21 +01:00
|
|
|
if (!$env) {
|
|
|
|
if (isset($_ENV['PHABRICATOR_ENV'])) {
|
|
|
|
$env = $_ENV['PHABRICATOR_ENV'];
|
|
|
|
}
|
|
|
|
}
|
2011-02-24 23:52:57 +01:00
|
|
|
|
|
|
|
if (!$env) {
|
|
|
|
phabricator_fatal_config_error(
|
2011-01-31 20:55:26 +01:00
|
|
|
"The 'PHABRICATOR_ENV' environmental variable is not defined. Modify ".
|
|
|
|
"your httpd.conf to include 'SetEnv PHABRICATOR_ENV <env>', where '<env>' ".
|
|
|
|
"is one of 'development', 'production', or a custom environment.");
|
|
|
|
}
|
|
|
|
|
2011-02-08 05:55:33 +01:00
|
|
|
if (!function_exists('mysql_connect')) {
|
2011-02-24 23:52:57 +01:00
|
|
|
phabricator_fatal_config_error(
|
|
|
|
"The PHP MySQL extension is not installed. This extension is required.");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!isset($_REQUEST['__path__'])) {
|
|
|
|
phabricator_fatal_config_error(
|
|
|
|
"__path__ is not set. Your rewrite rules are not configured correctly.");
|
2011-02-08 05:55:33 +01:00
|
|
|
}
|
|
|
|
|
2011-04-30 05:10:00 +02:00
|
|
|
if (get_magic_quotes_gpc()) {
|
|
|
|
phabricator_fatal_config_error(
|
|
|
|
"Your server is configured with PHP 'magic_quotes_gpc' enabled. This ".
|
|
|
|
"feature is 'highly discouraged' by PHP's developers and you must ".
|
|
|
|
"disable it to run Phabricator. Consult the PHP manual for instructions.");
|
|
|
|
}
|
|
|
|
|
2011-07-16 16:49:04 +02:00
|
|
|
register_shutdown_function('phabricator_shutdown');
|
|
|
|
|
2011-02-11 22:17:06 +01:00
|
|
|
require_once dirname(dirname(__FILE__)).'/conf/__init_conf__.php';
|
|
|
|
|
2011-04-05 19:48:36 +02:00
|
|
|
try {
|
Improve error messages for PHABRICATOR_ENV
Summary:
- Allow user to specify "myconf" (recommended) or "myconf.conf.php" (less
surprising).
- Make sure syntax errors and other problems are surfaced.
- If the configuration value isn't valid, give them a list of all valid
values.
Test Plan:
- Added a syntax error, got a useful error.
- Set PHABRICATOR_ENV to a silly value, got a list of valid values.
- Set PHABRICATOR_ENV to have .conf.php suffix, site still worked.
Reviewed By: kevinwallace
Reviewers: kevinwallace, codeblock, aran, jungejason, tuomaspelkonen
CC: aran, epriestley, kevinwallace
Differential Revision: 381
2011-05-31 04:52:51 +02:00
|
|
|
setup_aphront_basics();
|
|
|
|
|
2011-04-05 19:48:36 +02:00
|
|
|
$conf = phabricator_read_config_file($env);
|
|
|
|
$conf['phabricator.env'] = $env;
|
2011-01-31 20:55:26 +01:00
|
|
|
|
2011-04-05 19:48:36 +02:00
|
|
|
phutil_require_module('phabricator', 'infrastructure/env');
|
|
|
|
PhabricatorEnv::setEnvConfig($conf);
|
2011-01-31 20:55:26 +01:00
|
|
|
|
2011-04-05 19:48:36 +02:00
|
|
|
phutil_require_module('phabricator', 'aphront/console/plugin/xhprof/api');
|
|
|
|
DarkConsoleXHProfPluginAPI::hookProfiler();
|
2011-02-02 22:48:52 +01:00
|
|
|
|
2011-04-05 19:48:36 +02:00
|
|
|
phutil_require_module('phabricator', 'aphront/console/plugin/errorlog/api');
|
2011-05-11 16:20:04 +02:00
|
|
|
|
|
|
|
PhutilErrorHandler::initialize();
|
|
|
|
|
2011-04-05 19:48:36 +02:00
|
|
|
} catch (Exception $ex) {
|
2011-07-16 16:49:04 +02:00
|
|
|
phabricator_fatal("[Initialization Exception] ".$ex->getMessage());
|
2011-04-05 19:48:36 +02:00
|
|
|
}
|
2011-02-03 07:38:42 +01:00
|
|
|
|
2011-04-03 02:21:16 +02:00
|
|
|
$tz = PhabricatorEnv::getEnvConfig('phabricator.timezone');
|
|
|
|
if ($tz) {
|
|
|
|
date_default_timezone_set($tz);
|
|
|
|
}
|
2011-04-05 21:24:21 +02:00
|
|
|
phutil_require_module('phabricator', 'aphront/console/plugin/errorlog/api');
|
|
|
|
phutil_require_module('phutil', 'error');
|
|
|
|
|
|
|
|
PhutilErrorHandler::setErrorListener(
|
|
|
|
array('DarkConsoleErrorLogPluginAPI', 'handleErrors'));
|
2011-04-03 02:21:16 +02:00
|
|
|
|
2011-02-24 23:52:57 +01:00
|
|
|
foreach (PhabricatorEnv::getEnvConfig('load-libraries') as $library) {
|
|
|
|
phutil_load_library($library);
|
|
|
|
}
|
|
|
|
|
2011-05-05 20:00:05 +02:00
|
|
|
if (PhabricatorEnv::getEnvConfig('phabricator.setup')) {
|
|
|
|
PhabricatorSetup::runSetup();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-01-11 01:42:00 +01:00
|
|
|
phabricator_detect_bad_base_uri();
|
2011-02-24 23:52:57 +01:00
|
|
|
|
2011-01-16 22:51:39 +01:00
|
|
|
$host = $_SERVER['HTTP_HOST'];
|
|
|
|
$path = $_REQUEST['__path__'];
|
|
|
|
|
|
|
|
switch ($host) {
|
|
|
|
default:
|
2011-02-24 23:52:57 +01:00
|
|
|
$config_key = 'aphront.default-application-configuration-class';
|
|
|
|
$config_class = PhabricatorEnv::getEnvConfig($config_key);
|
|
|
|
PhutilSymbolLoader::loadClass($config_class);
|
|
|
|
$application = newv($config_class, array());
|
2011-01-16 22:51:39 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2011-04-05 21:24:21 +02:00
|
|
|
|
2011-01-16 22:51:39 +01:00
|
|
|
$application->setHost($host);
|
|
|
|
$application->setPath($path);
|
2011-02-02 22:48:52 +01:00
|
|
|
$application->willBuildRequest();
|
2011-01-16 22:51:39 +01:00
|
|
|
$request = $application->buildRequest();
|
Create AphrontWriteGuard, a backup mechanism for CSRF validation
Summary:
Provide a catchall mechanism to find unprotected writes.
- Depends on D758.
- Similar to WriteOnHTTPGet stuff from Facebook's stack.
- Since we have a small number of storage mechanisms and highly structured
read/write pathways, we can explicitly answer the question "is this page
performing a write?".
- Never allow writes without CSRF checks.
- This will probably break some things. That's fine: they're CSRF
vulnerabilities or weird edge cases that we can fix. But don't push to Facebook
for a few days unless you're prepared to deal with this.
- **>>> MEGADERP: All Conduit write APIs are currently vulnerable to CSRF!
<<<**
Test Plan:
- Ran some scripts that perform writes (scripts/search indexers), no issues.
- Performed normal CSRF submits.
- Added writes to an un-CSRF'd page, got an exception.
- Executed conduit methods.
- Did login/logout (this works because the logged-out user validates the
logged-out csrf "token").
- Did OAuth login.
- Did OAuth registration.
Reviewers: pedram, andrewjcg, erling, jungejason, tuomaspelkonen, aran,
codeblock
Commenters: pedram
CC: aran, epriestley, pedram
Differential Revision: 777
2011-08-03 20:49:27 +02:00
|
|
|
|
|
|
|
$write_guard = new AphrontWriteGuard($request);
|
2011-08-31 22:25:13 +02:00
|
|
|
PhabricatorEventEngine::initialize();
|
Create AphrontWriteGuard, a backup mechanism for CSRF validation
Summary:
Provide a catchall mechanism to find unprotected writes.
- Depends on D758.
- Similar to WriteOnHTTPGet stuff from Facebook's stack.
- Since we have a small number of storage mechanisms and highly structured
read/write pathways, we can explicitly answer the question "is this page
performing a write?".
- Never allow writes without CSRF checks.
- This will probably break some things. That's fine: they're CSRF
vulnerabilities or weird edge cases that we can fix. But don't push to Facebook
for a few days unless you're prepared to deal with this.
- **>>> MEGADERP: All Conduit write APIs are currently vulnerable to CSRF!
<<<**
Test Plan:
- Ran some scripts that perform writes (scripts/search indexers), no issues.
- Performed normal CSRF submits.
- Added writes to an un-CSRF'd page, got an exception.
- Executed conduit methods.
- Did login/logout (this works because the logged-out user validates the
logged-out csrf "token").
- Did OAuth login.
- Did OAuth registration.
Reviewers: pedram, andrewjcg, erling, jungejason, tuomaspelkonen, aran,
codeblock
Commenters: pedram
CC: aran, epriestley, pedram
Differential Revision: 777
2011-08-03 20:49:27 +02:00
|
|
|
|
2011-01-16 22:51:39 +01:00
|
|
|
$application->setRequest($request);
|
|
|
|
list($controller, $uri_data) = $application->buildController();
|
|
|
|
try {
|
2011-03-08 04:29:51 +01:00
|
|
|
$response = $controller->willBeginExecution();
|
|
|
|
if (!$response) {
|
|
|
|
$controller->willProcessRequest($uri_data);
|
|
|
|
$response = $controller->processRequest();
|
|
|
|
}
|
2011-01-26 22:21:12 +01:00
|
|
|
} catch (AphrontRedirectException $ex) {
|
|
|
|
$response = id(new AphrontRedirectResponse())
|
|
|
|
->setURI($ex->getURI());
|
2011-01-16 22:51:39 +01:00
|
|
|
} catch (Exception $ex) {
|
|
|
|
$response = $application->handleException($ex);
|
|
|
|
}
|
|
|
|
|
2011-07-16 16:49:04 +02:00
|
|
|
try {
|
|
|
|
$response = $application->willSendResponse($response);
|
|
|
|
$response->setRequest($request);
|
|
|
|
$response_string = $response->buildResponseString();
|
|
|
|
} catch (Exception $ex) {
|
Create AphrontWriteGuard, a backup mechanism for CSRF validation
Summary:
Provide a catchall mechanism to find unprotected writes.
- Depends on D758.
- Similar to WriteOnHTTPGet stuff from Facebook's stack.
- Since we have a small number of storage mechanisms and highly structured
read/write pathways, we can explicitly answer the question "is this page
performing a write?".
- Never allow writes without CSRF checks.
- This will probably break some things. That's fine: they're CSRF
vulnerabilities or weird edge cases that we can fix. But don't push to Facebook
for a few days unless you're prepared to deal with this.
- **>>> MEGADERP: All Conduit write APIs are currently vulnerable to CSRF!
<<<**
Test Plan:
- Ran some scripts that perform writes (scripts/search indexers), no issues.
- Performed normal CSRF submits.
- Added writes to an un-CSRF'd page, got an exception.
- Executed conduit methods.
- Did login/logout (this works because the logged-out user validates the
logged-out csrf "token").
- Did OAuth login.
- Did OAuth registration.
Reviewers: pedram, andrewjcg, erling, jungejason, tuomaspelkonen, aran,
codeblock
Commenters: pedram
CC: aran, epriestley, pedram
Differential Revision: 777
2011-08-03 20:49:27 +02:00
|
|
|
$write_guard->dispose();
|
2011-07-16 16:49:04 +02:00
|
|
|
phabricator_fatal('[Rendering Exception] '.$ex->getMessage());
|
|
|
|
}
|
2011-01-30 17:44:28 +01:00
|
|
|
|
Create AphrontWriteGuard, a backup mechanism for CSRF validation
Summary:
Provide a catchall mechanism to find unprotected writes.
- Depends on D758.
- Similar to WriteOnHTTPGet stuff from Facebook's stack.
- Since we have a small number of storage mechanisms and highly structured
read/write pathways, we can explicitly answer the question "is this page
performing a write?".
- Never allow writes without CSRF checks.
- This will probably break some things. That's fine: they're CSRF
vulnerabilities or weird edge cases that we can fix. But don't push to Facebook
for a few days unless you're prepared to deal with this.
- **>>> MEGADERP: All Conduit write APIs are currently vulnerable to CSRF!
<<<**
Test Plan:
- Ran some scripts that perform writes (scripts/search indexers), no issues.
- Performed normal CSRF submits.
- Added writes to an un-CSRF'd page, got an exception.
- Executed conduit methods.
- Did login/logout (this works because the logged-out user validates the
logged-out csrf "token").
- Did OAuth login.
- Did OAuth registration.
Reviewers: pedram, andrewjcg, erling, jungejason, tuomaspelkonen, aran,
codeblock
Commenters: pedram
CC: aran, epriestley, pedram
Differential Revision: 777
2011-08-03 20:49:27 +02:00
|
|
|
$write_guard->dispose();
|
|
|
|
|
2012-02-14 23:51:51 +01:00
|
|
|
// TODO: Share the $sink->writeResponse() pathway here?
|
|
|
|
|
2012-02-06 18:59:34 +01:00
|
|
|
$sink = new AphrontPHPHTTPSink();
|
|
|
|
$sink->writeHTTPStatus($response->getHTTPResponseCode());
|
2011-01-30 17:44:28 +01:00
|
|
|
|
2011-01-16 22:51:39 +01:00
|
|
|
$headers = $response->getCacheHeaders();
|
|
|
|
$headers = array_merge($headers, $response->getHeaders());
|
2011-02-02 22:48:52 +01:00
|
|
|
|
2012-02-06 18:59:34 +01:00
|
|
|
$sink->writeHeaders($headers);
|
2011-04-05 21:24:21 +02:00
|
|
|
|
2011-02-24 23:52:57 +01:00
|
|
|
// TODO: This shouldn't be possible in a production-configured environment.
|
2011-02-02 22:48:52 +01:00
|
|
|
if (isset($_REQUEST['__profile__']) &&
|
|
|
|
($_REQUEST['__profile__'] == 'all')) {
|
|
|
|
$profile = DarkConsoleXHProfPluginAPI::stopProfiler();
|
2011-02-03 07:38:42 +01:00
|
|
|
$profile =
|
2011-02-03 01:14:23 +01:00
|
|
|
'<div style="text-align: center; background: #ff00ff; padding: 1em;
|
|
|
|
font-size: 24px; font-weight: bold;">'.
|
|
|
|
'<a href="/xhprof/profile/'.$profile.'/">'.
|
|
|
|
'>>> View Profile <<<'.
|
|
|
|
'</a>'.
|
|
|
|
'</div>';
|
2011-02-02 22:48:52 +01:00
|
|
|
if (strpos($response_string, '<body>') !== false) {
|
|
|
|
$response_string = str_replace(
|
|
|
|
'<body>',
|
|
|
|
'<body>'.$profile,
|
|
|
|
$response_string);
|
2011-02-03 01:14:23 +01:00
|
|
|
} else {
|
2012-02-06 18:59:34 +01:00
|
|
|
$sink->writeData($profile);
|
2011-02-02 22:48:52 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-02-06 18:59:34 +01:00
|
|
|
$sink->writeData($response_string);
|
2011-01-16 22:51:39 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @group aphront
|
|
|
|
*/
|
|
|
|
function setup_aphront_basics() {
|
|
|
|
$aphront_root = dirname(dirname(__FILE__));
|
|
|
|
$libraries_root = dirname($aphront_root);
|
|
|
|
|
2011-02-26 03:58:37 +01:00
|
|
|
$root = null;
|
|
|
|
if (!empty($_SERVER['PHUTIL_LIBRARY_ROOT'])) {
|
|
|
|
$root = $_SERVER['PHUTIL_LIBRARY_ROOT'];
|
|
|
|
}
|
|
|
|
|
2011-02-24 23:52:57 +01:00
|
|
|
ini_set('include_path', $libraries_root.':'.ini_get('include_path'));
|
2011-02-26 03:58:37 +01:00
|
|
|
@include_once $root.'libphutil/src/__phutil_library_init__.php';
|
2011-01-16 22:51:39 +01:00
|
|
|
if (!@constant('__LIBPHUTIL__')) {
|
|
|
|
echo "ERROR: Unable to load libphutil. Update your PHP 'include_path' to ".
|
|
|
|
"include the parent directory of libphutil/.\n";
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
2011-02-24 23:52:57 +01:00
|
|
|
// Load Phabricator itself using the absolute path, so we never end up doing
|
|
|
|
// anything surprising (loading index.php and libraries from different
|
|
|
|
// directories).
|
2011-01-16 22:51:39 +01:00
|
|
|
phutil_load_library($aphront_root.'/src');
|
2011-02-24 23:52:57 +01:00
|
|
|
phutil_load_library('arcanist/src');
|
2011-07-16 16:49:04 +02:00
|
|
|
|
2011-01-16 22:51:39 +01:00
|
|
|
}
|
|
|
|
|
2011-02-24 23:52:57 +01:00
|
|
|
function phabricator_fatal_config_error($msg) {
|
2011-07-16 16:49:04 +02:00
|
|
|
phabricator_fatal("CONFIG ERROR: ".$msg."\n");
|
2012-01-11 01:42:00 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
function phabricator_detect_bad_base_uri() {
|
|
|
|
$conf = PhabricatorEnv::getEnvConfig('phabricator.base-uri');
|
|
|
|
$uri = new PhutilURI($conf);
|
|
|
|
switch ($uri->getProtocol()) {
|
|
|
|
case 'http':
|
|
|
|
case 'https':
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
phabricator_fatal_config_error(
|
|
|
|
"'phabricator.base-uri' is set to '{$conf}', which is invalid. ".
|
|
|
|
"The URI must start with 'http://' or 'https://'.");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (strpos($uri->getDomain(), '.') === false) {
|
|
|
|
phabricator_fatal_config_error(
|
|
|
|
"'phabricator.base-uri' is set to '{$conf}', which is invalid. The URI ".
|
|
|
|
"must contain a dot ('.'), like 'http://example.com/', not just ".
|
|
|
|
"'http://example/'. Some web browsers will not set cookies on domains ".
|
2012-01-12 02:47:32 +01:00
|
|
|
"with no TLD, and Phabricator requires cookies for login. ".
|
|
|
|
"If you are using localhost, create an entry in the hosts file like ".
|
|
|
|
"'127.0.0.1 example.com', and access the localhost with ".
|
|
|
|
"'http://example.com/'.");
|
2012-01-11 01:42:00 +01:00
|
|
|
}
|
2011-02-24 23:52:57 +01:00
|
|
|
}
|
Detect obviously erroneous "memory_limit" configurations
Summary: See comment. ALSO: THIS DIFF IS AMAZING.
Test Plan: Changed my memory limit to something absurd, got yelled at.
Reviewed By: mroch
Reviewers: colmdoyle, jungejason, aran, tuomaspelkonen, codeblock, tomo, mroch,
hsb
CC: aran, mroch, epriestley
Differential Revision: 657
2011-07-13 00:42:14 +02:00
|
|
|
|
|
|
|
function phabricator_detect_insane_memory_limit() {
|
|
|
|
$memory_limit = ini_get('memory_limit');
|
|
|
|
$char_limit = 12;
|
|
|
|
if (strlen($memory_limit) <= $char_limit) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// colmdoyle ran into an issue on an Ubuntu box with Suhosin where his
|
|
|
|
// 'memory_limit' was set to:
|
|
|
|
//
|
|
|
|
// 3232323232323232323232323232323232323232323232323232323232323232M
|
|
|
|
//
|
|
|
|
// Not a typo. A wizard did it.
|
|
|
|
//
|
|
|
|
// Anyway, with this 'memory_limit', the machine would immediately fatal
|
|
|
|
// when executing the ini_set() later. I wasn't able to reproduce this on my
|
|
|
|
// EC2 Ubuntu + Suhosin box, but verified that it caused the problem on his
|
|
|
|
// machine and that setting it to a more sensible value fixed it. Since I
|
|
|
|
// have no idea how to actually trigger the issue, we look for a coarse
|
|
|
|
// approximation of it (a memory_limit setting more than 12 characters in
|
|
|
|
// length).
|
|
|
|
|
|
|
|
phabricator_fatal_config_error(
|
|
|
|
"Your PHP 'memory_limit' is set to something ridiculous ".
|
|
|
|
"(\"{$memory_limit}\"). Set it to a more reasonable value (it must be no ".
|
|
|
|
"more than {$char_limit} characters long).");
|
|
|
|
}
|
2011-07-16 16:49:04 +02:00
|
|
|
|
|
|
|
function phabricator_shutdown() {
|
|
|
|
$event = error_get_last();
|
|
|
|
|
|
|
|
if (!$event) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2011-09-03 02:20:14 +02:00
|
|
|
if ($event['type'] != E_ERROR && $event['type'] != E_PARSE) {
|
2011-07-16 16:49:04 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
$msg = ">>> UNRECOVERABLE FATAL ERROR <<<\n\n";
|
|
|
|
if ($event) {
|
|
|
|
// Even though we should be emitting this as text-plain, escape things just
|
|
|
|
// to be sure since we can't really be sure what the program state is when
|
|
|
|
// we get here.
|
|
|
|
$msg .= phutil_escape_html($event['message'])."\n\n";
|
|
|
|
$msg .= phutil_escape_html($event['file'].':'.$event['line']);
|
|
|
|
}
|
|
|
|
|
|
|
|
// flip dem tables
|
|
|
|
$msg .= "\n\n\n";
|
|
|
|
$msg .= "\xe2\x94\xbb\xe2\x94\x81\xe2\x94\xbb\x20\xef\xb8\xb5\x20\xc2\xaf".
|
|
|
|
"\x5c\x5f\x28\xe3\x83\x84\x29\x5f\x2f\xc2\xaf\x20\xef\xb8\xb5\x20".
|
|
|
|
"\xe2\x94\xbb\xe2\x94\x81\xe2\x94\xbb";
|
|
|
|
|
|
|
|
phabricator_fatal($msg);
|
|
|
|
}
|
|
|
|
|
|
|
|
function phabricator_fatal($msg) {
|
|
|
|
header(
|
|
|
|
'Content-Type: text/plain; charset=utf-8',
|
|
|
|
$replace = true,
|
|
|
|
$http_error = 500);
|
|
|
|
|
|
|
|
error_log($msg);
|
|
|
|
echo $msg;
|
|
|
|
|
|
|
|
exit(1);
|
|
|
|
}
|