2016-05-13 00:42:28 -04:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* fsockopen HTTP transport
|
|
|
|
*
|
|
|
|
* @package Requests
|
|
|
|
* @subpackage Transport
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* fsockopen HTTP transport
|
|
|
|
*
|
|
|
|
* @package Requests
|
|
|
|
* @subpackage Transport
|
|
|
|
*/
|
|
|
|
class Requests_Transport_fsockopen implements Requests_Transport {
|
|
|
|
/**
|
|
|
|
* Second to microsecond conversion
|
|
|
|
*
|
|
|
|
* @var integer
|
|
|
|
*/
|
|
|
|
const SECOND_IN_MICROSECONDS = 1000000;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Raw HTTP data
|
|
|
|
*
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
public $headers = '';
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Stream metadata
|
|
|
|
*
|
2016-06-10 00:50:33 -04:00
|
|
|
* @var array Associative array of properties, see {@see https://secure.php.net/stream_get_meta_data}
|
2016-05-13 00:42:28 -04:00
|
|
|
*/
|
|
|
|
public $info;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* What's the maximum number of bytes we should keep?
|
|
|
|
*
|
|
|
|
* @var int|bool Byte count, or false if no limit.
|
|
|
|
*/
|
|
|
|
protected $max_bytes = false;
|
|
|
|
|
|
|
|
protected $connect_error = '';
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Perform a request
|
|
|
|
*
|
|
|
|
* @throws Requests_Exception On failure to connect to socket (`fsockopenerror`)
|
|
|
|
* @throws Requests_Exception On socket timeout (`timeout`)
|
|
|
|
*
|
|
|
|
* @param string $url URL to request
|
|
|
|
* @param array $headers Associative array of request headers
|
|
|
|
* @param string|array $data Data to send either as the POST body, or as parameters in the URL for a GET/HEAD
|
|
|
|
* @param array $options Request options, see {@see Requests::response()} for documentation
|
|
|
|
* @return string Raw HTTP result
|
|
|
|
*/
|
|
|
|
public function request($url, $headers = array(), $data = array(), $options = array()) {
|
|
|
|
$options['hooks']->dispatch('fsockopen.before_request');
|
|
|
|
|
|
|
|
$url_parts = parse_url($url);
|
|
|
|
if (empty($url_parts)) {
|
|
|
|
throw new Requests_Exception('Invalid URL.', 'invalidurl', $url);
|
|
|
|
}
|
|
|
|
$host = $url_parts['host'];
|
|
|
|
$context = stream_context_create();
|
|
|
|
$verifyname = false;
|
|
|
|
$case_insensitive_headers = new Requests_Utility_CaseInsensitiveDictionary($headers);
|
|
|
|
|
|
|
|
// HTTPS support
|
|
|
|
if (isset($url_parts['scheme']) && strtolower($url_parts['scheme']) === 'https') {
|
|
|
|
$remote_socket = 'ssl://' . $host;
|
2016-10-04 23:24:37 -04:00
|
|
|
if (!isset($url_parts['port'])) {
|
|
|
|
$url_parts['port'] = 443;
|
|
|
|
}
|
2016-05-13 00:42:28 -04:00
|
|
|
|
|
|
|
$context_options = array(
|
|
|
|
'verify_peer' => true,
|
|
|
|
// 'CN_match' => $host,
|
|
|
|
'capture_peer_cert' => true
|
|
|
|
);
|
|
|
|
$verifyname = true;
|
|
|
|
|
|
|
|
// SNI, if enabled (OpenSSL >=0.9.8j)
|
|
|
|
if (defined('OPENSSL_TLSEXT_SERVER_NAME') && OPENSSL_TLSEXT_SERVER_NAME) {
|
|
|
|
$context_options['SNI_enabled'] = true;
|
|
|
|
if (isset($options['verifyname']) && $options['verifyname'] === false) {
|
|
|
|
$context_options['SNI_enabled'] = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (isset($options['verify'])) {
|
|
|
|
if ($options['verify'] === false) {
|
|
|
|
$context_options['verify_peer'] = false;
|
|
|
|
}
|
|
|
|
elseif (is_string($options['verify'])) {
|
|
|
|
$context_options['cafile'] = $options['verify'];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (isset($options['verifyname']) && $options['verifyname'] === false) {
|
2016-10-04 23:24:37 -04:00
|
|
|
$context_options['verify_peer_name'] = false;
|
2016-05-13 00:42:28 -04:00
|
|
|
$verifyname = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
stream_context_set_option($context, array('ssl' => $context_options));
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$remote_socket = 'tcp://' . $host;
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->max_bytes = $options['max_bytes'];
|
|
|
|
|
|
|
|
if (!isset($url_parts['port'])) {
|
|
|
|
$url_parts['port'] = 80;
|
|
|
|
}
|
|
|
|
$remote_socket .= ':' . $url_parts['port'];
|
|
|
|
|
|
|
|
set_error_handler(array($this, 'connect_error_handler'), E_WARNING | E_NOTICE);
|
|
|
|
|
|
|
|
$options['hooks']->dispatch('fsockopen.remote_socket', array(&$remote_socket));
|
|
|
|
|
|
|
|
$socket = stream_socket_client($remote_socket, $errno, $errstr, ceil($options['connect_timeout']), STREAM_CLIENT_CONNECT, $context);
|
|
|
|
|
|
|
|
restore_error_handler();
|
|
|
|
|
|
|
|
if ($verifyname && !$this->verify_certificate_from_context($host, $context)) {
|
|
|
|
throw new Requests_Exception('SSL certificate did not match the requested domain name', 'ssl.no_match');
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!$socket) {
|
|
|
|
if ($errno === 0) {
|
|
|
|
// Connection issue
|
|
|
|
throw new Requests_Exception(rtrim($this->connect_error), 'fsockopen.connect_error');
|
|
|
|
}
|
|
|
|
|
|
|
|
throw new Requests_Exception($errstr, 'fsockopenerror', null, $errno);
|
|
|
|
}
|
|
|
|
|
|
|
|
$data_format = $options['data_format'];
|
|
|
|
|
|
|
|
if ($data_format === 'query') {
|
|
|
|
$path = self::format_get($url_parts, $data);
|
|
|
|
$data = '';
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$path = self::format_get($url_parts, array());
|
|
|
|
}
|
|
|
|
|
|
|
|
$options['hooks']->dispatch('fsockopen.remote_host_path', array(&$path, $url));
|
|
|
|
|
|
|
|
$request_body = '';
|
|
|
|
$out = sprintf("%s %s HTTP/%.1f\r\n", $options['type'], $path, $options['protocol_version']);
|
|
|
|
|
|
|
|
if ($options['type'] !== Requests::TRACE) {
|
|
|
|
if (is_array($data)) {
|
|
|
|
$request_body = http_build_query($data, null, '&');
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$request_body = $data;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!empty($data)) {
|
|
|
|
if (!isset($case_insensitive_headers['Content-Length'])) {
|
|
|
|
$headers['Content-Length'] = strlen($request_body);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!isset($case_insensitive_headers['Content-Type'])) {
|
|
|
|
$headers['Content-Type'] = 'application/x-www-form-urlencoded; charset=UTF-8';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!isset($case_insensitive_headers['Host'])) {
|
|
|
|
$out .= sprintf('Host: %s', $url_parts['host']);
|
|
|
|
|
2016-10-04 23:24:37 -04:00
|
|
|
if (( 'http' === strtolower($url_parts['scheme']) && $url_parts['port'] !== 80 ) || ( 'https' === strtolower($url_parts['scheme']) && $url_parts['port'] !== 443 )) {
|
2016-05-13 00:42:28 -04:00
|
|
|
$out .= ':' . $url_parts['port'];
|
|
|
|
}
|
|
|
|
$out .= "\r\n";
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!isset($case_insensitive_headers['User-Agent'])) {
|
|
|
|
$out .= sprintf("User-Agent: %s\r\n", $options['useragent']);
|
|
|
|
}
|
|
|
|
|
|
|
|
$accept_encoding = $this->accept_encoding();
|
|
|
|
if (!isset($case_insensitive_headers['Accept-Encoding']) && !empty($accept_encoding)) {
|
|
|
|
$out .= sprintf("Accept-Encoding: %s\r\n", $accept_encoding);
|
|
|
|
}
|
|
|
|
|
|
|
|
$headers = Requests::flatten($headers);
|
|
|
|
|
|
|
|
if (!empty($headers)) {
|
|
|
|
$out .= implode($headers, "\r\n") . "\r\n";
|
|
|
|
}
|
|
|
|
|
|
|
|
$options['hooks']->dispatch('fsockopen.after_headers', array(&$out));
|
|
|
|
|
|
|
|
if (substr($out, -2) !== "\r\n") {
|
|
|
|
$out .= "\r\n";
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!isset($case_insensitive_headers['Connection'])) {
|
|
|
|
$out .= "Connection: Close\r\n";
|
|
|
|
}
|
|
|
|
|
|
|
|
$out .= "\r\n" . $request_body;
|
|
|
|
|
|
|
|
$options['hooks']->dispatch('fsockopen.before_send', array(&$out));
|
|
|
|
|
|
|
|
fwrite($socket, $out);
|
|
|
|
$options['hooks']->dispatch('fsockopen.after_send', array($out));
|
|
|
|
|
|
|
|
if (!$options['blocking']) {
|
|
|
|
fclose($socket);
|
|
|
|
$fake_headers = '';
|
|
|
|
$options['hooks']->dispatch('fsockopen.after_request', array(&$fake_headers));
|
|
|
|
return '';
|
|
|
|
}
|
|
|
|
|
|
|
|
$timeout_sec = (int) floor($options['timeout']);
|
|
|
|
if ($timeout_sec == $options['timeout']) {
|
|
|
|
$timeout_msec = 0;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$timeout_msec = self::SECOND_IN_MICROSECONDS * $options['timeout'] % self::SECOND_IN_MICROSECONDS;
|
|
|
|
}
|
|
|
|
stream_set_timeout($socket, $timeout_sec, $timeout_msec);
|
|
|
|
|
|
|
|
$response = $body = $headers = '';
|
|
|
|
$this->info = stream_get_meta_data($socket);
|
|
|
|
$size = 0;
|
|
|
|
$doingbody = false;
|
|
|
|
$download = false;
|
|
|
|
if ($options['filename']) {
|
|
|
|
$download = fopen($options['filename'], 'wb');
|
|
|
|
}
|
|
|
|
|
|
|
|
while (!feof($socket)) {
|
|
|
|
$this->info = stream_get_meta_data($socket);
|
|
|
|
if ($this->info['timed_out']) {
|
|
|
|
throw new Requests_Exception('fsocket timed out', 'timeout');
|
|
|
|
}
|
|
|
|
|
|
|
|
$block = fread($socket, Requests::BUFFER_SIZE);
|
|
|
|
if (!$doingbody) {
|
|
|
|
$response .= $block;
|
|
|
|
if (strpos($response, "\r\n\r\n")) {
|
|
|
|
list($headers, $block) = explode("\r\n\r\n", $response, 2);
|
|
|
|
$doingbody = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Are we in body mode now?
|
|
|
|
if ($doingbody) {
|
|
|
|
$options['hooks']->dispatch('request.progress', array($block, $size, $this->max_bytes));
|
|
|
|
$data_length = strlen($block);
|
|
|
|
if ($this->max_bytes) {
|
|
|
|
// Have we already hit a limit?
|
|
|
|
if ($size === $this->max_bytes) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (($size + $data_length) > $this->max_bytes) {
|
|
|
|
// Limit the length
|
|
|
|
$limited_length = ($this->max_bytes - $size);
|
|
|
|
$block = substr($block, 0, $limited_length);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
$size += strlen($block);
|
|
|
|
if ($download) {
|
|
|
|
fwrite($download, $block);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$body .= $block;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
$this->headers = $headers;
|
|
|
|
|
|
|
|
if ($download) {
|
|
|
|
fclose($download);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$this->headers .= "\r\n\r\n" . $body;
|
|
|
|
}
|
|
|
|
fclose($socket);
|
|
|
|
|
|
|
|
$options['hooks']->dispatch('fsockopen.after_request', array(&$this->headers, &$this->info));
|
|
|
|
return $this->headers;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Send multiple requests simultaneously
|
|
|
|
*
|
|
|
|
* @param array $requests Request data (array of 'url', 'headers', 'data', 'options') as per {@see Requests_Transport::request}
|
|
|
|
* @param array $options Global options, see {@see Requests::response()} for documentation
|
|
|
|
* @return array Array of Requests_Response objects (may contain Requests_Exception or string responses as well)
|
|
|
|
*/
|
|
|
|
public function request_multiple($requests, $options) {
|
|
|
|
$responses = array();
|
|
|
|
$class = get_class($this);
|
|
|
|
foreach ($requests as $id => $request) {
|
|
|
|
try {
|
|
|
|
$handler = new $class();
|
|
|
|
$responses[$id] = $handler->request($request['url'], $request['headers'], $request['data'], $request['options']);
|
|
|
|
|
|
|
|
$request['options']['hooks']->dispatch('transport.internal.parse_response', array(&$responses[$id], $request));
|
|
|
|
}
|
|
|
|
catch (Requests_Exception $e) {
|
|
|
|
$responses[$id] = $e;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!is_string($responses[$id])) {
|
|
|
|
$request['options']['hooks']->dispatch('multiple.request.complete', array(&$responses[$id], $id));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $responses;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Retrieve the encodings we can accept
|
|
|
|
*
|
|
|
|
* @return string Accept-Encoding header value
|
|
|
|
*/
|
|
|
|
protected static function accept_encoding() {
|
|
|
|
$type = array();
|
|
|
|
if (function_exists('gzinflate')) {
|
|
|
|
$type[] = 'deflate;q=1.0';
|
|
|
|
}
|
|
|
|
|
|
|
|
if (function_exists('gzuncompress')) {
|
|
|
|
$type[] = 'compress;q=0.5';
|
|
|
|
}
|
|
|
|
|
|
|
|
$type[] = 'gzip;q=0.5';
|
|
|
|
|
|
|
|
return implode(', ', $type);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Format a URL given GET data
|
|
|
|
*
|
|
|
|
* @param array $url_parts
|
2016-06-10 00:50:33 -04:00
|
|
|
* @param array|object $data Data to build query using, see {@see https://secure.php.net/http_build_query}
|
2016-05-13 00:42:28 -04:00
|
|
|
* @return string URL with data
|
|
|
|
*/
|
|
|
|
protected static function format_get($url_parts, $data) {
|
|
|
|
if (!empty($data)) {
|
|
|
|
if (empty($url_parts['query'])) {
|
|
|
|
$url_parts['query'] = '';
|
|
|
|
}
|
|
|
|
|
|
|
|
$url_parts['query'] .= '&' . http_build_query($data, null, '&');
|
|
|
|
$url_parts['query'] = trim($url_parts['query'], '&');
|
|
|
|
}
|
|
|
|
if (isset($url_parts['path'])) {
|
|
|
|
if (isset($url_parts['query'])) {
|
|
|
|
$get = $url_parts['path'] . '?' . $url_parts['query'];
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$get = $url_parts['path'];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$get = '/';
|
|
|
|
}
|
|
|
|
return $get;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Error handler for stream_socket_client()
|
|
|
|
*
|
|
|
|
* @param int $errno Error number (e.g. E_WARNING)
|
|
|
|
* @param string $errstr Error message
|
|
|
|
*/
|
|
|
|
public function connect_error_handler($errno, $errstr) {
|
|
|
|
// Double-check we can handle it
|
|
|
|
if (($errno & E_WARNING) === 0 && ($errno & E_NOTICE) === 0) {
|
|
|
|
// Return false to indicate the default error handler should engage
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->connect_error .= $errstr . "\n";
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Verify the certificate against common name and subject alternative names
|
|
|
|
*
|
|
|
|
* Unfortunately, PHP doesn't check the certificate against the alternative
|
|
|
|
* names, leading things like 'https://www.github.com/' to be invalid.
|
|
|
|
* Instead
|
|
|
|
*
|
2016-06-10 00:50:33 -04:00
|
|
|
* @see https://tools.ietf.org/html/rfc2818#section-3.1 RFC2818, Section 3.1
|
2016-05-13 00:42:28 -04:00
|
|
|
*
|
|
|
|
* @throws Requests_Exception On failure to connect via TLS (`fsockopen.ssl.connect_error`)
|
|
|
|
* @throws Requests_Exception On not obtaining a match for the host (`fsockopen.ssl.no_match`)
|
|
|
|
* @param string $host Host name to verify against
|
|
|
|
* @param resource $context Stream context
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function verify_certificate_from_context($host, $context) {
|
|
|
|
$meta = stream_context_get_options($context);
|
|
|
|
|
|
|
|
// If we don't have SSL options, then we couldn't make the connection at
|
|
|
|
// all
|
|
|
|
if (empty($meta) || empty($meta['ssl']) || empty($meta['ssl']['peer_certificate'])) {
|
|
|
|
throw new Requests_Exception(rtrim($this->connect_error), 'ssl.connect_error');
|
|
|
|
}
|
|
|
|
|
|
|
|
$cert = openssl_x509_parse($meta['ssl']['peer_certificate']);
|
|
|
|
|
|
|
|
return Requests_SSL::verify_certificate($host, $cert);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Whether this transport is valid
|
|
|
|
*
|
|
|
|
* @codeCoverageIgnore
|
|
|
|
* @return boolean True if the transport is valid, false otherwise.
|
|
|
|
*/
|
|
|
|
public static function test($capabilities = array()) {
|
|
|
|
if (!function_exists('fsockopen')) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If needed, check that streams support SSL
|
|
|
|
if (isset($capabilities['ssl']) && $capabilities['ssl']) {
|
|
|
|
if (!extension_loaded('openssl') || !function_exists('openssl_x509_parse')) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Currently broken, thanks to https://github.com/facebook/hhvm/issues/2156
|
|
|
|
if (defined('HHVM_VERSION')) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|