Amir Khoshbakht
Amir Khoshbakht
@clue > @my-random-username Thank for reporting. PRs to provide a reproducible test case and fix would be much appreciated! ``` $loop = Loop::get(); putenv('RATCHET_DISABLE_XDEBUG_WARN=false'); $app = new \Ratchet\App('localhost', 8000, '0.0.0.0',...
Aside from fundamental syntax problem in guzzle psr7 class , the user can send any malicious data as header and the https://github.com/ratchetphp/Ratchet/blob/5012dc954541b40c5599d286fd40653f5716a38f/src/Ratchet/Http/HttpRequestParser.php#L61 will easily fail !
[](https://github.com/guzzle/psr7/blob/13388f00956b1503577598873fffb5ae994b5737/src/Message.php#L179) guzzle library solved the issue of its library. currently any problem that arises _causes the server failure_. But by changing **OverflowException** to **Throwable** only the connection will be cut...
by the version "1" I mean 1.0. How is it that this is done completely in async in node.js but not possible in php?
add this to your "app.module.ts" in the **_imports_** array: ` ConfigModule.forRoot({ isGlobal: true }), `
> > by the version "1" I mean 1.0. > > That's just a label we assign to a tag providing certain expectations. > > > How is it that...
same problem .It took me almost 1 hour to reach this page
also take a look at this: ```ts as typeof authSlice.reducer, ``` ```ts export const store = configureStore({ reducer: { auth: persistReducer(persistConfig, authSlice.reducer) as typeof authSlice.reducer, [authApi.reducerPath]: authApi.reducer, }, // devTools:...