From bd648b7618e57ed2264eef12aa39b8999fe8779a Mon Sep 17 00:00:00 2001 From: Marc Egger <marc.egger@uzh.ch> Date: Wed, 16 Sep 2020 16:51:04 +0200 Subject: [PATCH] small doku fix --- Documentation/Report.rst | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/Documentation/Report.rst b/Documentation/Report.rst index 3365712bb..c4b79b585 100644 --- a/Documentation/Report.rst +++ b/Documentation/Report.rst @@ -1412,17 +1412,17 @@ Run a php function defined in an external script. * The second argument (here called $qfq) is an object which acts as an interface to QFQ functionality. * The script has access to the following qfq functions using this interface: * $qfq::apiCall($method, $url, $data = [], $header = [], $timeout = 5) - * string $method PUT/POST/GET/DELETE + * string $method can be PUT/POST/GET/DELETE * string $url - * array $data json string, will be added as GET parameters or as POST fields respectively. - * array $header of the form ['Content-type: text/plain', 'Content-length: 100'] - * int $timeout number of seconds to wait until call is aborted. + * array $data a json string which will be added as GET parameters or as POST fields respectively. + * array $header is of the form ['Content-type: text/plain', 'Content-length: 100'] + * int $timeout is the number of seconds to wait until call is aborted. * $qfq::getVar($key, $useStores = 'FSRVD', $sanitizeClass = '', &$foundInStore = '', $typeMessageViolate = 'c') - * string $key name of qfq variable - * string $useStores Stores in which variable is searched (in order from left to right). see :ref:`store`. - * string $sanitizeClass see :ref:`sanitize-class` + * string $key is the name of qfq variable + * string $useStores are the stores in which variable is searched (in order from left to right). see :ref:`store`. + * string $sanitizeClass (see :ref:`sanitize-class`) * string $foundInStore is filled with the name of the store in which the variable was found. - * string $typeMessageViolate what to return if the sanitize class was violated: + * string $typeMessageViolate defines what to return if the sanitize class was violated: * 'c': return '!!<sanitize class>!!' * '0': return '0' * 'e': return '' -- GitLab