2010-02-26 22:37:38 -05:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* Simple and uniform HTTP request API.
|
|
|
|
*
|
2010-04-10 07:23:21 -04:00
|
|
|
* Standardizes the HTTP requests for WordPress. Handles cookies, gzip encoding and decoding, chunk
|
|
|
|
* decoding, if HTTP 1.1 and various other difficult HTTP protocol implementations.
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @link http://trac.wordpress.org/ticket/4779 HTTP API Proposal
|
|
|
|
*
|
|
|
|
* @package WordPress
|
|
|
|
* @subpackage HTTP
|
|
|
|
* @since 2.7.0
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* WordPress HTTP Class for managing HTTP Transports and making HTTP requests.
|
|
|
|
*
|
2013-09-03 04:37:10 -04:00
|
|
|
* This class is used to consistently make outgoing HTTP requests easy for developers
|
|
|
|
* while still being compatible with the many PHP configurations under which
|
|
|
|
* WordPress runs.
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* Debugging includes several actions, which pass different variables for debugging the HTTP API.
|
|
|
|
*
|
|
|
|
* @package WordPress
|
|
|
|
* @subpackage HTTP
|
|
|
|
* @since 2.7.0
|
|
|
|
*/
|
|
|
|
class WP_Http {
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Send a HTTP request to a URI.
|
|
|
|
*
|
|
|
|
* The body and headers are part of the arguments. The 'body' argument is for the body and will
|
|
|
|
* accept either a string or an array. The 'headers' argument should be an array, but a string
|
|
|
|
* is acceptable. If the 'body' argument is an array, then it will automatically be escaped
|
|
|
|
* using http_build_query().
|
|
|
|
*
|
|
|
|
* The only URI that are supported in the HTTP Transport implementation are the HTTP and HTTPS
|
2013-09-03 04:37:10 -04:00
|
|
|
* protocols.
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* The defaults are 'method', 'timeout', 'redirection', 'httpversion', 'blocking' and
|
|
|
|
* 'user-agent'.
|
|
|
|
*
|
|
|
|
* Accepted 'method' values are 'GET', 'POST', and 'HEAD', some transports technically allow
|
|
|
|
* others, but should not be assumed. The 'timeout' is used to sent how long the connection
|
|
|
|
* should stay open before failing when no response. 'redirection' is used to track how many
|
|
|
|
* redirects were taken and used to sent the amount for other transports, but not all transports
|
|
|
|
* accept setting that value.
|
|
|
|
*
|
|
|
|
* The 'httpversion' option is used to sent the HTTP version and accepted values are '1.0', and
|
2013-08-28 02:55:09 -04:00
|
|
|
* '1.1' and should be a string. The 'user-agent' option is the user-agent and is used to
|
|
|
|
* replace the default user-agent, which is 'WordPress/WP_Version', where WP_Version is the
|
|
|
|
* value from $wp_version.
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
2013-09-03 04:37:10 -04:00
|
|
|
* The 'blocking' parameter can be used to specify if the calling code requires the result of
|
|
|
|
* the HTTP request. If set to false, the request will be sent to the remote server, and
|
|
|
|
* processing returned to the calling code immediately, the caller will know if the request
|
|
|
|
* suceeded or failed, but will not receive any response from the remote server.
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @since 2.7.0
|
|
|
|
*
|
|
|
|
* @param string $url URI resource.
|
|
|
|
* @param str|array $args Optional. Override the defaults.
|
2011-06-07 20:51:31 -04:00
|
|
|
* @return array|object Array containing 'headers', 'body', 'response', 'cookies', 'filename'. A WP_Error instance upon error
|
2010-02-26 22:37:38 -05:00
|
|
|
*/
|
|
|
|
function request( $url, $args = array() ) {
|
|
|
|
global $wp_version;
|
|
|
|
|
|
|
|
$defaults = array(
|
|
|
|
'method' => 'GET',
|
|
|
|
'timeout' => apply_filters( 'http_request_timeout', 5),
|
|
|
|
'redirection' => apply_filters( 'http_request_redirection_count', 5),
|
|
|
|
'httpversion' => apply_filters( 'http_request_version', '1.0'),
|
2013-06-21 02:07:47 -04:00
|
|
|
'user-agent' => apply_filters( 'http_headers_useragent', 'WordPress/' . $wp_version . '; ' . get_bloginfo( 'url' ) ),
|
2013-07-30 11:37:01 -04:00
|
|
|
'reject_unsafe_urls' => apply_filters( 'http_request_reject_unsafe_urls', false ),
|
2010-02-26 22:37:38 -05:00
|
|
|
'blocking' => true,
|
|
|
|
'headers' => array(),
|
|
|
|
'cookies' => array(),
|
|
|
|
'body' => null,
|
|
|
|
'compress' => false,
|
|
|
|
'decompress' => true,
|
2011-03-24 22:42:20 -04:00
|
|
|
'sslverify' => true,
|
2013-09-04 00:49:12 -04:00
|
|
|
'sslcertificates' => ABSPATH . WPINC . '/certificates/ca-bundle.crt',
|
2011-03-24 22:42:20 -04:00
|
|
|
'stream' => false,
|
2013-03-03 23:24:26 -05:00
|
|
|
'filename' => null,
|
2013-07-22 14:55:05 -04:00
|
|
|
'limit_response_size' => null,
|
2010-02-26 22:37:38 -05:00
|
|
|
);
|
|
|
|
|
2011-03-24 01:18:34 -04:00
|
|
|
// Pre-parse for the HEAD checks.
|
|
|
|
$args = wp_parse_args( $args );
|
|
|
|
|
|
|
|
// By default, Head requests do not cause redirections.
|
|
|
|
if ( isset($args['method']) && 'HEAD' == $args['method'] )
|
|
|
|
$defaults['redirection'] = 0;
|
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
$r = wp_parse_args( $args, $defaults );
|
|
|
|
$r = apply_filters( 'http_request_args', $r, $url );
|
|
|
|
|
2013-03-04 00:17:05 -05:00
|
|
|
// The transports decrement this, store a copy of the original value for loop purposes.
|
|
|
|
if ( ! isset( $r['_redirection'] ) )
|
|
|
|
$r['_redirection'] = $r['redirection'];
|
2011-03-24 01:18:34 -04:00
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
// Allow plugins to short-circuit the request
|
|
|
|
$pre = apply_filters( 'pre_http_request', false, $r, $url );
|
|
|
|
if ( false !== $pre )
|
|
|
|
return $pre;
|
|
|
|
|
2013-06-23 02:02:19 -04:00
|
|
|
if ( function_exists( 'wp_kses_bad_protocol' ) ) {
|
|
|
|
if ( $r['reject_unsafe_urls'] )
|
|
|
|
$url = wp_http_validate_url( $url );
|
2013-06-21 15:05:15 -04:00
|
|
|
$url = wp_kses_bad_protocol( $url, array( 'http', 'https', 'ssl' ) );
|
2013-06-23 02:02:19 -04:00
|
|
|
}
|
2013-06-21 02:07:47 -04:00
|
|
|
|
|
|
|
$arrURL = @parse_url( $url );
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2010-06-19 02:54:21 -04:00
|
|
|
if ( empty( $url ) || empty( $arrURL['scheme'] ) )
|
2010-07-02 03:52:14 -04:00
|
|
|
return new WP_Error('http_request_failed', __('A valid URL was not provided.'));
|
2010-04-18 00:58:19 -04:00
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
if ( $this->block_request( $url ) )
|
2010-06-19 03:02:09 -04:00
|
|
|
return new WP_Error( 'http_request_failed', __( 'User has blocked requests through HTTP.' ) );
|
2010-02-26 22:37:38 -05:00
|
|
|
|
|
|
|
// Determine if this is a https call and pass that on to the transport functions
|
|
|
|
// so that we can blacklist the transports that do not support ssl verification
|
|
|
|
$r['ssl'] = $arrURL['scheme'] == 'https' || $arrURL['scheme'] == 'ssl';
|
|
|
|
|
|
|
|
// Determine if this request is to OUR install of WordPress
|
2010-06-19 03:02:09 -04:00
|
|
|
$homeURL = parse_url( get_bloginfo( 'url' ) );
|
2010-02-26 22:37:38 -05:00
|
|
|
$r['local'] = $homeURL['host'] == $arrURL['host'] || 'localhost' == $arrURL['host'];
|
2010-06-19 03:02:09 -04:00
|
|
|
unset( $homeURL );
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2011-03-24 22:42:20 -04:00
|
|
|
// If we are streaming to a file but no filename was given drop it in the WP temp dir
|
2012-12-20 10:55:32 -05:00
|
|
|
// and pick its name using the basename of the $url
|
2011-03-24 22:42:20 -04:00
|
|
|
if ( $r['stream'] && empty( $r['filename'] ) )
|
|
|
|
$r['filename'] = get_temp_dir() . basename( $url );
|
|
|
|
|
|
|
|
// Force some settings if we are streaming to a file and check for existence and perms of destination directory
|
|
|
|
if ( $r['stream'] ) {
|
|
|
|
$r['blocking'] = true;
|
2013-01-03 03:04:11 -05:00
|
|
|
if ( ! wp_is_writable( dirname( $r['filename'] ) ) )
|
2011-03-24 22:42:20 -04:00
|
|
|
return new WP_Error( 'http_request_failed', __( 'Destination directory for file streaming does not exist or is not writable.' ) );
|
|
|
|
}
|
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
if ( is_null( $r['headers'] ) )
|
|
|
|
$r['headers'] = array();
|
|
|
|
|
2010-06-19 03:02:09 -04:00
|
|
|
if ( ! is_array( $r['headers'] ) ) {
|
2013-08-16 20:34:10 -04:00
|
|
|
$processedHeaders = WP_Http::processHeaders( $r['headers'], $url );
|
2010-07-02 03:52:14 -04:00
|
|
|
$r['headers'] = $processedHeaders['headers'];
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
2010-06-19 03:02:09 -04:00
|
|
|
if ( isset( $r['headers']['User-Agent'] ) ) {
|
2010-02-26 22:37:38 -05:00
|
|
|
$r['user-agent'] = $r['headers']['User-Agent'];
|
2010-06-19 03:02:09 -04:00
|
|
|
unset( $r['headers']['User-Agent'] );
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
2010-06-19 03:02:09 -04:00
|
|
|
if ( isset( $r['headers']['user-agent'] ) ) {
|
2010-02-26 22:37:38 -05:00
|
|
|
$r['user-agent'] = $r['headers']['user-agent'];
|
2010-06-19 03:02:09 -04:00
|
|
|
unset( $r['headers']['user-agent'] );
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
2013-08-28 00:59:09 -04:00
|
|
|
if ( '1.1' == $r['httpversion'] && !isset( $r['headers']['connection'] ) ) {
|
|
|
|
$r['headers']['connection'] = 'close';
|
|
|
|
}
|
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
// Construct Cookie: header if any cookies are set
|
|
|
|
WP_Http::buildCookieHeader( $r );
|
|
|
|
|
2013-09-11 04:13:10 -04:00
|
|
|
// Avoid issues where mbstring.func_overload is enabled
|
|
|
|
mbstring_binary_safe_encoding();
|
|
|
|
|
2013-03-03 22:33:12 -05:00
|
|
|
if ( ! isset( $r['headers']['Accept-Encoding'] ) ) {
|
|
|
|
if ( $encoding = WP_Http_Encoding::accept_encoding( $url, $r ) )
|
|
|
|
$r['headers']['Accept-Encoding'] = $encoding;
|
|
|
|
}
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2012-09-27 06:09:43 -04:00
|
|
|
if ( ( ! is_null( $r['body'] ) && '' != $r['body'] ) || 'POST' == $r['method'] || 'PUT' == $r['method'] ) {
|
2010-02-26 22:37:38 -05:00
|
|
|
if ( is_array( $r['body'] ) || is_object( $r['body'] ) ) {
|
2011-03-23 07:58:09 -04:00
|
|
|
$r['body'] = http_build_query( $r['body'], null, '&' );
|
2012-09-27 02:54:17 -04:00
|
|
|
|
2011-10-19 00:48:00 -04:00
|
|
|
if ( ! isset( $r['headers']['Content-Type'] ) )
|
|
|
|
$r['headers']['Content-Type'] = 'application/x-www-form-urlencoded; charset=' . get_option( 'blog_charset' );
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
2012-09-27 02:54:17 -04:00
|
|
|
if ( '' === $r['body'] )
|
|
|
|
$r['body'] = null;
|
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
if ( ! isset( $r['headers']['Content-Length'] ) && ! isset( $r['headers']['content-length'] ) )
|
2010-06-19 03:02:09 -04:00
|
|
|
$r['headers']['Content-Length'] = strlen( $r['body'] );
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
2013-08-23 23:11:10 -04:00
|
|
|
$response = $this->_dispatch_request( $url, $r );
|
2013-09-11 04:13:10 -04:00
|
|
|
|
|
|
|
reset_mbstring_encoding();
|
|
|
|
|
2013-08-23 23:11:10 -04:00
|
|
|
if ( is_wp_error( $response ) )
|
|
|
|
return $response;
|
2013-08-16 21:20:09 -04:00
|
|
|
|
|
|
|
// Append cookies that were used in this request to the response
|
|
|
|
if ( ! empty( $r['cookies'] ) ) {
|
2013-08-23 23:11:10 -04:00
|
|
|
$cookies_set = wp_list_pluck( $response['cookies'], 'name' );
|
|
|
|
foreach ( $r['cookies'] as $cookie ) {
|
|
|
|
if ( ! in_array( $cookie->name, $cookies_set ) && $cookie->test( $url ) ) {
|
|
|
|
$response['cookies'][] = $cookie;
|
|
|
|
}
|
|
|
|
}
|
2013-08-16 21:20:09 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
return $response;
|
2011-03-23 22:16:13 -04:00
|
|
|
}
|
|
|
|
|
2011-05-13 05:56:59 -04:00
|
|
|
/**
|
2011-05-14 05:50:20 -04:00
|
|
|
* Tests which transports are capable of supporting the request.
|
2011-06-10 19:01:45 -04:00
|
|
|
*
|
2011-05-13 05:56:59 -04:00
|
|
|
* @since 3.2.0
|
|
|
|
* @access private
|
|
|
|
*
|
|
|
|
* @param array $args Request arguments
|
|
|
|
* @param string $url URL to Request
|
|
|
|
*
|
2012-07-09 01:03:53 -04:00
|
|
|
* @return string|bool Class name for the first transport that claims to support the request. False if no transport claims to support the request.
|
2011-05-13 05:56:59 -04:00
|
|
|
*/
|
|
|
|
public function _get_first_available_transport( $args, $url = null ) {
|
2013-09-04 00:50:08 -04:00
|
|
|
$request_order = apply_filters( 'http_api_transports', array( 'curl', 'streams' ), $args, $url );
|
2011-05-13 05:56:59 -04:00
|
|
|
|
|
|
|
// Loop over each transport on each HTTP request looking for one which will serve this request's needs
|
|
|
|
foreach ( $request_order as $transport ) {
|
|
|
|
$class = 'WP_HTTP_' . $transport;
|
|
|
|
|
|
|
|
// Check to see if this transport is a possibility, calls the transport statically
|
|
|
|
if ( !call_user_func( array( $class, 'test' ), $args, $url ) )
|
|
|
|
continue;
|
|
|
|
|
|
|
|
return $class;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2011-03-23 22:16:13 -04:00
|
|
|
/**
|
|
|
|
* Dispatches a HTTP request to a supporting transport.
|
|
|
|
*
|
2011-09-03 12:02:41 -04:00
|
|
|
* Tests each transport in order to find a transport which matches the request arguments.
|
2011-03-23 22:16:13 -04:00
|
|
|
* Also caches the transport instance to be used later.
|
|
|
|
*
|
2013-09-04 00:49:12 -04:00
|
|
|
* The order for requests is cURL, and then PHP Streams.
|
2011-03-23 22:16:13 -04:00
|
|
|
*
|
|
|
|
* @since 3.2.0
|
|
|
|
* @access private
|
|
|
|
*
|
|
|
|
* @param string $url URL to Request
|
|
|
|
* @param array $args Request arguments
|
2011-06-07 20:51:31 -04:00
|
|
|
* @return array|object Array containing 'headers', 'body', 'response', 'cookies', 'filename'. A WP_Error instance upon error
|
2011-03-23 22:16:13 -04:00
|
|
|
*/
|
2011-05-13 05:56:59 -04:00
|
|
|
private function _dispatch_request( $url, $args ) {
|
2011-03-28 05:55:15 -04:00
|
|
|
static $transports = array();
|
2011-03-23 22:16:13 -04:00
|
|
|
|
2011-05-13 05:56:59 -04:00
|
|
|
$class = $this->_get_first_available_transport( $args, $url );
|
|
|
|
if ( !$class )
|
|
|
|
return new WP_Error( 'http_failure', __( 'There are no HTTP transports available which can complete the requested request.' ) );
|
2011-03-23 22:16:13 -04:00
|
|
|
|
2011-05-14 05:50:20 -04:00
|
|
|
// Transport claims to support request, instantiate it and give it a whirl.
|
2011-05-13 05:56:59 -04:00
|
|
|
if ( empty( $transports[$class] ) )
|
|
|
|
$transports[$class] = new $class;
|
2011-03-23 22:16:13 -04:00
|
|
|
|
2011-05-13 05:56:59 -04:00
|
|
|
$response = $transports[$class]->request( $url, $args );
|
2011-03-23 22:16:13 -04:00
|
|
|
|
2011-09-28 21:42:09 -04:00
|
|
|
do_action( 'http_api_debug', $response, 'response', $class, $args, $url );
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2011-05-13 05:56:59 -04:00
|
|
|
if ( is_wp_error( $response ) )
|
|
|
|
return $response;
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2011-05-13 05:56:59 -04:00
|
|
|
return apply_filters( 'http_response', $response, $args, $url );
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Uses the POST HTTP method.
|
|
|
|
*
|
|
|
|
* Used for sending data that is expected to be in the body.
|
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @since 2.7.0
|
|
|
|
*
|
|
|
|
* @param string $url URI resource.
|
|
|
|
* @param str|array $args Optional. Override the defaults.
|
2011-06-07 20:51:31 -04:00
|
|
|
* @return array|object Array containing 'headers', 'body', 'response', 'cookies', 'filename'. A WP_Error instance upon error
|
2010-02-26 22:37:38 -05:00
|
|
|
*/
|
|
|
|
function post($url, $args = array()) {
|
|
|
|
$defaults = array('method' => 'POST');
|
|
|
|
$r = wp_parse_args( $args, $defaults );
|
|
|
|
return $this->request($url, $r);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Uses the GET HTTP method.
|
|
|
|
*
|
|
|
|
* Used for sending data that is expected to be in the body.
|
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @since 2.7.0
|
|
|
|
*
|
|
|
|
* @param string $url URI resource.
|
|
|
|
* @param str|array $args Optional. Override the defaults.
|
2011-06-07 20:51:31 -04:00
|
|
|
* @return array|object Array containing 'headers', 'body', 'response', 'cookies', 'filename'. A WP_Error instance upon error
|
2010-02-26 22:37:38 -05:00
|
|
|
*/
|
|
|
|
function get($url, $args = array()) {
|
|
|
|
$defaults = array('method' => 'GET');
|
|
|
|
$r = wp_parse_args( $args, $defaults );
|
|
|
|
return $this->request($url, $r);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Uses the HEAD HTTP method.
|
|
|
|
*
|
|
|
|
* Used for sending data that is expected to be in the body.
|
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @since 2.7.0
|
|
|
|
*
|
|
|
|
* @param string $url URI resource.
|
|
|
|
* @param str|array $args Optional. Override the defaults.
|
2011-06-07 20:51:31 -04:00
|
|
|
* @return array|object Array containing 'headers', 'body', 'response', 'cookies', 'filename'. A WP_Error instance upon error
|
2010-02-26 22:37:38 -05:00
|
|
|
*/
|
|
|
|
function head($url, $args = array()) {
|
|
|
|
$defaults = array('method' => 'HEAD');
|
|
|
|
$r = wp_parse_args( $args, $defaults );
|
|
|
|
return $this->request($url, $r);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Parses the responses and splits the parts into headers and body.
|
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @static
|
|
|
|
* @since 2.7.0
|
|
|
|
*
|
|
|
|
* @param string $strResponse The full response string
|
|
|
|
* @return array Array with 'headers' and 'body' keys.
|
|
|
|
*/
|
2013-03-03 22:36:08 -05:00
|
|
|
public static function processResponse($strResponse) {
|
2010-03-27 20:56:43 -04:00
|
|
|
$res = explode("\r\n\r\n", $strResponse, 2);
|
2010-05-03 16:26:11 -04:00
|
|
|
|
2011-04-05 02:41:51 -04:00
|
|
|
return array('headers' => $res[0], 'body' => isset($res[1]) ? $res[1] : '');
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Transform header string into an array.
|
|
|
|
*
|
|
|
|
* If an array is given then it is assumed to be raw header data with numeric keys with the
|
|
|
|
* headers as the values. No headers must be passed that were already processed.
|
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @static
|
|
|
|
* @since 2.7.0
|
|
|
|
*
|
|
|
|
* @param string|array $headers
|
2013-08-16 20:34:10 -04:00
|
|
|
* @param string $url The URL that was requested
|
2010-02-26 22:37:38 -05:00
|
|
|
* @return array Processed string headers. If duplicate headers are encountered,
|
|
|
|
* Then a numbered array is returned as the value of that header-key.
|
|
|
|
*/
|
2013-08-29 22:11:09 -04:00
|
|
|
public static function processHeaders( $headers, $url = '' ) {
|
2010-02-26 22:37:38 -05:00
|
|
|
// split headers, one per array element
|
|
|
|
if ( is_string($headers) ) {
|
|
|
|
// tolerate line terminator: CRLF = LF (RFC 2616 19.3)
|
|
|
|
$headers = str_replace("\r\n", "\n", $headers);
|
|
|
|
// unfold folded header fields. LWS = [CRLF] 1*( SP | HT ) <US-ASCII SP, space (32)>, <US-ASCII HT, horizontal-tab (9)> (RFC 2616 2.2)
|
|
|
|
$headers = preg_replace('/\n[ \t]/', ' ', $headers);
|
|
|
|
// create the headers array
|
|
|
|
$headers = explode("\n", $headers);
|
|
|
|
}
|
|
|
|
|
|
|
|
$response = array('code' => 0, 'message' => '');
|
|
|
|
|
|
|
|
// If a redirection has taken place, The headers for each page request may have been passed.
|
|
|
|
// In this case, determine the final HTTP header and parse from there.
|
|
|
|
for ( $i = count($headers)-1; $i >= 0; $i-- ) {
|
2010-03-27 20:56:43 -04:00
|
|
|
if ( !empty($headers[$i]) && false === strpos($headers[$i], ':') ) {
|
2010-02-26 22:37:38 -05:00
|
|
|
$headers = array_splice($headers, $i);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
$cookies = array();
|
|
|
|
$newheaders = array();
|
2011-03-25 23:32:05 -04:00
|
|
|
foreach ( (array) $headers as $tempheader ) {
|
2010-02-26 22:37:38 -05:00
|
|
|
if ( empty($tempheader) )
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if ( false === strpos($tempheader, ':') ) {
|
2011-04-05 02:21:56 -04:00
|
|
|
$stack = explode(' ', $tempheader, 3);
|
|
|
|
$stack[] = '';
|
|
|
|
list( , $response['code'], $response['message']) = $stack;
|
2010-02-26 22:37:38 -05:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
list($key, $value) = explode(':', $tempheader, 2);
|
|
|
|
|
2012-07-08 01:16:26 -04:00
|
|
|
$key = strtolower( $key );
|
|
|
|
$value = trim( $value );
|
|
|
|
|
|
|
|
if ( isset( $newheaders[ $key ] ) ) {
|
|
|
|
if ( ! is_array( $newheaders[ $key ] ) )
|
|
|
|
$newheaders[$key] = array( $newheaders[ $key ] );
|
|
|
|
$newheaders[ $key ][] = $value;
|
|
|
|
} else {
|
|
|
|
$newheaders[ $key ] = $value;
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
2012-07-08 01:16:26 -04:00
|
|
|
if ( 'set-cookie' == $key )
|
2013-08-16 20:34:10 -04:00
|
|
|
$cookies[] = new WP_Http_Cookie( $value, $url );
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
return array('response' => $response, 'headers' => $newheaders, 'cookies' => $cookies);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Takes the arguments for a ::request() and checks for the cookie array.
|
|
|
|
*
|
2013-08-07 22:44:09 -04:00
|
|
|
* If it's found, then it upgrades any basic name => value pairs to WP_Http_Cookie instances,
|
|
|
|
* which are each parsed into strings and added to the Cookie: header (within the arguments array).
|
|
|
|
* Edits the array by reference.
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @version 2.8.0
|
|
|
|
* @static
|
|
|
|
*
|
|
|
|
* @param array $r Full array of args passed into ::request()
|
|
|
|
*/
|
2011-10-31 15:38:46 -04:00
|
|
|
public static function buildCookieHeader( &$r ) {
|
2010-02-26 22:37:38 -05:00
|
|
|
if ( ! empty($r['cookies']) ) {
|
2013-08-07 22:44:09 -04:00
|
|
|
// Upgrade any name => value cookie pairs to WP_HTTP_Cookie instances
|
|
|
|
foreach ( $r['cookies'] as $name => $value ) {
|
|
|
|
if ( ! is_object( $value ) )
|
|
|
|
$r['cookies'][ $name ] = new WP_HTTP_Cookie( array( 'name' => $name, 'value' => $value ) );
|
|
|
|
}
|
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
$cookies_header = '';
|
|
|
|
foreach ( (array) $r['cookies'] as $cookie ) {
|
|
|
|
$cookies_header .= $cookie->getHeaderValue() . '; ';
|
|
|
|
}
|
2013-08-07 22:44:09 -04:00
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
$cookies_header = substr( $cookies_header, 0, -2 );
|
|
|
|
$r['headers']['cookie'] = $cookies_header;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Decodes chunk transfer-encoding, based off the HTTP 1.1 specification.
|
|
|
|
*
|
2013-08-28 02:53:09 -04:00
|
|
|
* Based off the HTTP http_encoding_dechunk function.
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
2012-07-08 01:34:47 -04:00
|
|
|
* @link http://tools.ietf.org/html/rfc2616#section-19.4.6 Process for chunked decoding.
|
|
|
|
*
|
2010-02-26 22:37:38 -05:00
|
|
|
* @access public
|
|
|
|
* @since 2.7.0
|
|
|
|
* @static
|
|
|
|
*
|
|
|
|
* @param string $body Body content
|
|
|
|
* @return string Chunked decoded body on success or raw body on failure.
|
|
|
|
*/
|
2013-08-28 02:53:09 -04:00
|
|
|
public static function chunkTransferDecode( $body ) {
|
|
|
|
// The body is not chunked encoded or is malformed.
|
|
|
|
if ( ! preg_match( '/^([0-9a-f]+)[^\r\n]*\r\n/i', trim( $body ) ) )
|
2010-02-26 22:37:38 -05:00
|
|
|
return $body;
|
|
|
|
|
2013-08-28 02:53:09 -04:00
|
|
|
$parsed_body = '';
|
|
|
|
$body_original = $body; // We'll be altering $body, so need a backup in case of error
|
2010-02-26 22:37:38 -05:00
|
|
|
|
|
|
|
while ( true ) {
|
2013-08-28 03:30:08 -04:00
|
|
|
$has_chunk = (bool) preg_match( '/^([0-9a-f]+)[^\r\n]*\r\n/i', $body, $match );
|
2013-08-28 02:53:09 -04:00
|
|
|
if ( ! $has_chunk || empty( $match[1] ) )
|
|
|
|
return $body_original;
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2013-08-28 02:53:09 -04:00
|
|
|
$length = hexdec( $match[1] );
|
|
|
|
$chunk_length = strlen( $match[0] );
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2013-08-28 02:53:09 -04:00
|
|
|
// Parse out the chunk of data
|
|
|
|
$parsed_body .= substr( $body, $chunk_length, $length );
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2013-08-28 02:53:09 -04:00
|
|
|
// Remove the chunk from the raw data
|
|
|
|
$body = substr( $body, $length + $chunk_length );
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2013-08-28 02:53:09 -04:00
|
|
|
// End of document
|
|
|
|
if ( '0' === trim( $body ) )
|
|
|
|
return $parsed_body;
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Block requests through the proxy.
|
|
|
|
*
|
|
|
|
* Those who are behind a proxy and want to prevent access to certain hosts may do so. This will
|
|
|
|
* prevent plugins from working and core functionality, if you don't include api.wordpress.org.
|
|
|
|
*
|
|
|
|
* You block external URL requests by defining WP_HTTP_BLOCK_EXTERNAL as true in your wp-config.php
|
|
|
|
* file and this will only allow localhost and your blog to make requests. The constant
|
|
|
|
* WP_ACCESSIBLE_HOSTS will allow additional hosts to go through for requests. The format of the
|
2010-10-22 06:27:35 -04:00
|
|
|
* WP_ACCESSIBLE_HOSTS constant is a comma separated list of hostnames to allow, wildcard domains
|
|
|
|
* are supported, eg *.wordpress.org will allow for all subdomains of wordpress.org to be contacted.
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @since 2.8.0
|
|
|
|
* @link http://core.trac.wordpress.org/ticket/8927 Allow preventing external requests.
|
2010-10-22 06:27:35 -04:00
|
|
|
* @link http://core.trac.wordpress.org/ticket/14636 Allow wildcard domains in WP_ACCESSIBLE_HOSTS
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @param string $uri URI of url.
|
|
|
|
* @return bool True to block, false to allow.
|
|
|
|
*/
|
|
|
|
function block_request($uri) {
|
|
|
|
// We don't need to block requests, because nothing is blocked.
|
|
|
|
if ( ! defined( 'WP_HTTP_BLOCK_EXTERNAL' ) || ! WP_HTTP_BLOCK_EXTERNAL )
|
|
|
|
return false;
|
|
|
|
|
2013-09-03 04:37:10 -04:00
|
|
|
$check = parse_url($uri);
|
|
|
|
if ( ! $check )
|
|
|
|
return true;
|
2010-02-26 22:37:38 -05:00
|
|
|
|
|
|
|
$home = parse_url( get_option('siteurl') );
|
|
|
|
|
|
|
|
// Don't block requests back to ourselves by default
|
|
|
|
if ( $check['host'] == 'localhost' || $check['host'] == $home['host'] )
|
|
|
|
return apply_filters('block_local_requests', false);
|
|
|
|
|
|
|
|
if ( !defined('WP_ACCESSIBLE_HOSTS') )
|
|
|
|
return true;
|
|
|
|
|
|
|
|
static $accessible_hosts;
|
2010-10-22 06:27:35 -04:00
|
|
|
static $wildcard_regex = false;
|
|
|
|
if ( null == $accessible_hosts ) {
|
2010-02-26 22:37:38 -05:00
|
|
|
$accessible_hosts = preg_split('|,\s*|', WP_ACCESSIBLE_HOSTS);
|
|
|
|
|
2010-10-22 06:27:35 -04:00
|
|
|
if ( false !== strpos(WP_ACCESSIBLE_HOSTS, '*') ) {
|
|
|
|
$wildcard_regex = array();
|
|
|
|
foreach ( $accessible_hosts as $host )
|
2013-08-28 00:54:09 -04:00
|
|
|
$wildcard_regex[] = str_replace( '\*', '.+', preg_quote( $host, '/' ) );
|
2010-10-22 06:27:35 -04:00
|
|
|
$wildcard_regex = '/^(' . implode('|', $wildcard_regex) . ')$/i';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( !empty($wildcard_regex) )
|
|
|
|
return !preg_match($wildcard_regex, $check['host']);
|
|
|
|
else
|
2012-12-20 10:55:32 -05:00
|
|
|
return !in_array( $check['host'], $accessible_hosts ); //Inverse logic, If it's in the array, then we can't access it.
|
2010-10-22 06:27:35 -04:00
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
2012-05-10 17:32:02 -04:00
|
|
|
|
|
|
|
static function make_absolute_url( $maybe_relative_path, $url ) {
|
|
|
|
if ( empty( $url ) )
|
|
|
|
return $maybe_relative_path;
|
|
|
|
|
|
|
|
// Check for a scheme
|
|
|
|
if ( false !== strpos( $maybe_relative_path, '://' ) )
|
|
|
|
return $maybe_relative_path;
|
|
|
|
|
|
|
|
if ( ! $url_parts = @parse_url( $url ) )
|
|
|
|
return $maybe_relative_path;
|
|
|
|
|
|
|
|
if ( ! $relative_url_parts = @parse_url( $maybe_relative_path ) )
|
|
|
|
return $maybe_relative_path;
|
|
|
|
|
|
|
|
$absolute_path = $url_parts['scheme'] . '://' . $url_parts['host'];
|
|
|
|
if ( isset( $url_parts['port'] ) )
|
|
|
|
$absolute_path .= ':' . $url_parts['port'];
|
|
|
|
|
|
|
|
// Start off with the Absolute URL path
|
|
|
|
$path = ! empty( $url_parts['path'] ) ? $url_parts['path'] : '/';
|
|
|
|
|
2012-12-20 10:55:32 -05:00
|
|
|
// If it's a root-relative path, then great
|
2012-05-10 17:32:02 -04:00
|
|
|
if ( ! empty( $relative_url_parts['path'] ) && '/' == $relative_url_parts['path'][0] ) {
|
|
|
|
$path = $relative_url_parts['path'];
|
|
|
|
|
|
|
|
// Else it's a relative path
|
|
|
|
} elseif ( ! empty( $relative_url_parts['path'] ) ) {
|
|
|
|
// Strip off any file components from the absolute path
|
|
|
|
$path = substr( $path, 0, strrpos( $path, '/' ) + 1 );
|
|
|
|
|
|
|
|
// Build the new path
|
|
|
|
$path .= $relative_url_parts['path'];
|
|
|
|
|
|
|
|
// Strip all /path/../ out of the path
|
|
|
|
while ( strpos( $path, '../' ) > 1 ) {
|
|
|
|
$path = preg_replace( '![^/]+/\.\./!', '', $path );
|
|
|
|
}
|
|
|
|
|
|
|
|
// Strip any final leading ../ from the path
|
|
|
|
$path = preg_replace( '!^/(\.\./)+!', '', $path );
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add the Query string
|
|
|
|
if ( ! empty( $relative_url_parts['query'] ) )
|
|
|
|
$path .= '?' . $relative_url_parts['query'];
|
|
|
|
|
|
|
|
return $absolute_path . '/' . ltrim( $path, '/' );
|
|
|
|
}
|
2013-07-28 21:19:54 -04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Handles HTTP Redirects and follows them if appropriate.
|
|
|
|
*
|
2013-07-30 02:47:03 -04:00
|
|
|
* @since 3.7.0
|
2013-07-28 21:19:54 -04:00
|
|
|
*
|
2013-07-30 02:47:03 -04:00
|
|
|
* @param string $url The URL which was requested.
|
|
|
|
* @param array $args The Arguements which were used to make the request.
|
|
|
|
* @param array $response The Response of the HTTP request.
|
|
|
|
* @return false|object False if no redirect is present, a WP_HTTP or WP_Error result otherwise.
|
2013-07-28 21:19:54 -04:00
|
|
|
*/
|
|
|
|
static function handle_redirects( $url, $args, $response ) {
|
|
|
|
// If no redirects are present, or, redirects were not requested, perform no action.
|
|
|
|
if ( ! isset( $response['headers']['location'] ) || 0 === $args['_redirection'] )
|
|
|
|
return false;
|
|
|
|
|
|
|
|
// Only perform redirections on redirection http codes
|
|
|
|
if ( $response['response']['code'] > 399 || $response['response']['code'] < 300 )
|
|
|
|
return false;
|
|
|
|
|
|
|
|
// Don't redirect if we've run out of redirects
|
|
|
|
if ( $args['redirection']-- <= 0 )
|
|
|
|
return new WP_Error( 'http_request_failed', __('Too many redirects.') );
|
|
|
|
|
2013-07-28 22:11:46 -04:00
|
|
|
$redirect_location = $response['headers']['location'];
|
|
|
|
|
|
|
|
// If there were multiple Location headers, use the last header specified
|
|
|
|
if ( is_array( $redirect_location ) )
|
|
|
|
$redirect_location = array_pop( $redirect_location );
|
|
|
|
|
|
|
|
$redirect_location = WP_HTTP::make_absolute_url( $redirect_location, $url );
|
2013-07-28 21:19:54 -04:00
|
|
|
|
|
|
|
// POST requests should not POST to a redirected location
|
|
|
|
if ( 'POST' == $args['method'] ) {
|
|
|
|
if ( in_array( $response['response']['code'], array( 302, 303 ) ) )
|
|
|
|
$args['method'] = 'GET';
|
|
|
|
}
|
|
|
|
|
2013-08-16 21:20:09 -04:00
|
|
|
// Include valid cookies in the redirect process
|
|
|
|
if ( ! empty( $response['cookies'] ) ) {
|
2013-08-23 23:11:10 -04:00
|
|
|
foreach ( $response['cookies'] as $cookie ) {
|
|
|
|
if ( $cookie->test( $redirect_location ) )
|
|
|
|
$args['cookies'][] = $cookie;
|
2013-08-16 21:20:09 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-24 22:29:52 -04:00
|
|
|
return wp_remote_request( $redirect_location, $args );
|
2013-07-28 21:19:54 -04:00
|
|
|
}
|
2013-09-04 00:49:12 -04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Determines if a specified string represents an IP address or not.
|
|
|
|
*
|
|
|
|
* This function also detects the type of the IP address, returning either
|
|
|
|
* '4' or '6' to represent a IPv4 and IPv6 address respectively.
|
|
|
|
* This does not verify if the IP is a valid IP, only that it appears to be
|
|
|
|
* an IP address.
|
|
|
|
*
|
|
|
|
* @see http://home.deds.nl/~aeron/regex/ for IPv6 regex
|
|
|
|
*
|
|
|
|
* @since 3.7.0
|
|
|
|
* @static
|
|
|
|
*
|
|
|
|
* @param string $maybe_ip A suspected IP address
|
|
|
|
* @return integer|bool Upon success, '4' or '6' to represent a IPv4 or IPv6 address, false upon failure
|
|
|
|
*/
|
|
|
|
static function is_ip_address( $maybe_ip ) {
|
|
|
|
if ( preg_match( '/^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$/', $maybe_ip ) )
|
|
|
|
return 4;
|
|
|
|
|
|
|
|
if ( false !== strpos( $maybe_ip, ':' ) && preg_match( '/^(((?=.*(::))(?!.*\3.+\3))\3?|([\dA-F]{1,4}(\3|:\b|$)|\2))(?4){5}((?4){2}|(((2[0-4]|1\d|[1-9])?\d|25[0-5])\.?\b){4})$/i', trim( $maybe_ip, ' []' ) ) )
|
|
|
|
return 6;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2013-09-04 00:49:12 -04:00
|
|
|
* HTTP request method uses PHP Streams to retrieve the url.
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @package WordPress
|
|
|
|
* @subpackage HTTP
|
2013-09-09 04:10:10 -04:00
|
|
|
*
|
|
|
|
* @since 2.7.0
|
|
|
|
* @since 3.7.0 Combined with the fsockopen transport and switched to stream_socket_client().
|
2010-02-26 22:37:38 -05:00
|
|
|
*/
|
2013-09-04 00:49:12 -04:00
|
|
|
class WP_Http_Streams {
|
2010-02-26 22:37:38 -05:00
|
|
|
/**
|
2013-09-04 00:49:12 -04:00
|
|
|
* Send a HTTP request to a URI using PHP Streams.
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @see WP_Http::request For default options descriptions.
|
|
|
|
*
|
2013-09-09 04:10:10 -04:00
|
|
|
* @since 2.7.0
|
|
|
|
* @since 3.7.0 Combined with the fsockopen transport and switched to stream_socket_client().
|
|
|
|
*
|
2010-02-26 22:37:38 -05:00
|
|
|
* @access public
|
|
|
|
* @param string $url URI resource.
|
2013-09-04 00:49:12 -04:00
|
|
|
* @param string|array $args Optional. Override the defaults.
|
2011-06-07 20:51:31 -04:00
|
|
|
* @return array 'headers', 'body', 'response', 'cookies' and 'filename' keys.
|
2010-02-26 22:37:38 -05:00
|
|
|
*/
|
|
|
|
function request($url, $args = array()) {
|
|
|
|
$defaults = array(
|
|
|
|
'method' => 'GET', 'timeout' => 5,
|
|
|
|
'redirection' => 5, 'httpversion' => '1.0',
|
|
|
|
'blocking' => true,
|
|
|
|
'headers' => array(), 'body' => null, 'cookies' => array()
|
|
|
|
);
|
|
|
|
|
|
|
|
$r = wp_parse_args( $args, $defaults );
|
|
|
|
|
|
|
|
if ( isset($r['headers']['User-Agent']) ) {
|
|
|
|
$r['user-agent'] = $r['headers']['User-Agent'];
|
|
|
|
unset($r['headers']['User-Agent']);
|
2010-07-02 03:52:14 -04:00
|
|
|
} else if ( isset($r['headers']['user-agent']) ) {
|
2010-02-26 22:37:38 -05:00
|
|
|
$r['user-agent'] = $r['headers']['user-agent'];
|
|
|
|
unset($r['headers']['user-agent']);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Construct Cookie: header if any cookies are set
|
|
|
|
WP_Http::buildCookieHeader( $r );
|
|
|
|
|
|
|
|
$arrURL = parse_url($url);
|
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
$connect_host = $arrURL['host'];
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
$secure_transport = ( $arrURL['scheme'] == 'ssl' || $arrURL['scheme'] == 'https' );
|
2010-02-26 22:37:38 -05:00
|
|
|
if ( ! isset( $arrURL['port'] ) ) {
|
2013-09-04 00:49:12 -04:00
|
|
|
if ( $arrURL['scheme'] == 'ssl' || $arrURL['scheme'] == 'https' ) {
|
2010-02-26 22:37:38 -05:00
|
|
|
$arrURL['port'] = 443;
|
|
|
|
$secure_transport = true;
|
|
|
|
} else {
|
|
|
|
$arrURL['port'] = 80;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-07-28 21:47:01 -04:00
|
|
|
if ( isset( $r['headers']['Host'] ) || isset( $r['headers']['host'] ) ) {
|
|
|
|
if ( isset( $r['headers']['Host'] ) )
|
|
|
|
$arrURL['host'] = $r['headers']['Host'];
|
|
|
|
else
|
|
|
|
$arrURL['host'] = $r['headers']['host'];
|
|
|
|
unset( $r['headers']['Host'], $r['headers']['host'] );
|
|
|
|
}
|
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
// Certain versions of PHP have issues with 'localhost' and IPv6, It attempts to connect to ::1,
|
2010-03-17 00:39:50 -04:00
|
|
|
// which fails when the server is not set up for it. For compatibility, always connect to the IPv4 address.
|
2013-09-04 00:49:12 -04:00
|
|
|
if ( 'localhost' == strtolower( $connect_host ) )
|
|
|
|
$connect_host = '127.0.0.1';
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
$connect_host = $secure_transport ? 'ssl://' . $connect_host : 'tcp://' . $connect_host;
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
$is_local = isset( $r['local'] ) && $r['local'];
|
|
|
|
$ssl_verify = isset( $r['sslverify'] ) && $r['sslverify'];
|
|
|
|
if ( $is_local )
|
|
|
|
$ssl_verify = apply_filters( 'https_local_ssl_verify', $ssl_verify );
|
|
|
|
elseif ( ! $is_local )
|
|
|
|
$ssl_verify = apply_filters( 'https_ssl_verify', $ssl_verify );
|
2010-02-26 22:37:38 -05:00
|
|
|
|
|
|
|
$proxy = new WP_HTTP_Proxy();
|
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
$context = stream_context_create( array(
|
|
|
|
'ssl' => array(
|
|
|
|
'verify_peer' => $ssl_verify,
|
2013-09-17 21:51:10 -04:00
|
|
|
//'CN_match' => $arrURL['host'], // This is handled by self::verify_ssl_certificate()
|
2013-09-04 00:49:12 -04:00
|
|
|
'capture_peer_cert' => $ssl_verify,
|
|
|
|
'SNI_enabled' => true,
|
|
|
|
'cafile' => $r['sslcertificates'],
|
|
|
|
'allow_self_signed' => ! $ssl_verify,
|
|
|
|
)
|
|
|
|
) );
|
|
|
|
|
|
|
|
$timeout = (int) floor( $r['timeout'] );
|
|
|
|
$utimeout = $timeout == $r['timeout'] ? 0 : 1000000 * $r['timeout'] % 1000000;
|
|
|
|
$connect_timeout = max( $timeout, 1 );
|
|
|
|
|
|
|
|
$connection_error = null; // Store error number
|
|
|
|
$connection_error_str = null; // Store error string
|
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
if ( !WP_DEBUG ) {
|
2013-09-04 00:49:12 -04:00
|
|
|
// In the event that the SSL connection fails, silence the many PHP Warnings
|
|
|
|
if ( $secure_transport )
|
|
|
|
$error_reporting = error_reporting(0);
|
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
if ( $proxy->is_enabled() && $proxy->send_through_proxy( $url ) )
|
2013-09-04 00:49:12 -04:00
|
|
|
$handle = @stream_socket_client( 'tcp://' . $proxy->host() . ':' . $proxy->port(), $connection_error, $connection_error_str, $connect_timeout, STREAM_CLIENT_CONNECT, $context );
|
2010-02-26 22:37:38 -05:00
|
|
|
else
|
2013-09-04 00:49:12 -04:00
|
|
|
$handle = @stream_socket_client( $connect_host . ':' . $arrURL['port'], $connection_error, $connection_error_str, $connect_timeout, STREAM_CLIENT_CONNECT, $context );
|
|
|
|
|
|
|
|
if ( $secure_transport )
|
|
|
|
error_reporting( $error_reporting );
|
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
} else {
|
|
|
|
if ( $proxy->is_enabled() && $proxy->send_through_proxy( $url ) )
|
2013-09-04 00:49:12 -04:00
|
|
|
$handle = stream_socket_client( 'tcp://' . $proxy->host() . ':' . $proxy->port(), $connection_error, $connection_error_str, $connect_timeout, STREAM_CLIENT_CONNECT, $context );
|
2010-02-26 22:37:38 -05:00
|
|
|
else
|
2013-09-04 00:49:12 -04:00
|
|
|
$handle = stream_socket_client( $connect_host . ':' . $arrURL['port'], $connection_error, $connection_error_str, $connect_timeout, STREAM_CLIENT_CONNECT, $context );
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
if ( false === $handle ) {
|
|
|
|
// SSL connection failed due to expired/invalid cert, or, OpenSSL configuration is broken
|
|
|
|
if ( $secure_transport && 0 === $connection_error && '' === $connection_error_str )
|
2013-10-02 13:40:10 -04:00
|
|
|
return new WP_Error( 'http_request_failed', __( 'The SSL certificate for the host could not be verified.' ) );
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
return new WP_Error('http_request_failed', $connection_error . ': ' . $connection_error_str );
|
|
|
|
}
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
// Verify that the SSL certificate is valid for this request
|
|
|
|
if ( $secure_transport && $ssl_verify && ! $proxy->is_enabled() ) {
|
2013-09-17 21:51:10 -04:00
|
|
|
if ( ! self::verify_ssl_certificate( $handle, $arrURL['host'] ) )
|
2013-10-02 13:40:10 -04:00
|
|
|
return new WP_Error( 'http_request_failed', __( 'The SSL certificate for the host could not be verified.' ) );
|
2013-09-04 00:49:12 -04:00
|
|
|
}
|
2010-02-26 22:37:38 -05:00
|
|
|
|
|
|
|
stream_set_timeout( $handle, $timeout, $utimeout );
|
|
|
|
|
|
|
|
if ( $proxy->is_enabled() && $proxy->send_through_proxy( $url ) ) //Some proxies require full URL in this field.
|
|
|
|
$requestPath = $url;
|
|
|
|
else
|
|
|
|
$requestPath = $arrURL['path'] . ( isset($arrURL['query']) ? '?' . $arrURL['query'] : '' );
|
|
|
|
|
|
|
|
if ( empty($requestPath) )
|
|
|
|
$requestPath .= '/';
|
|
|
|
|
|
|
|
$strHeaders = strtoupper($r['method']) . ' ' . $requestPath . ' HTTP/' . $r['httpversion'] . "\r\n";
|
|
|
|
|
|
|
|
if ( $proxy->is_enabled() && $proxy->send_through_proxy( $url ) )
|
|
|
|
$strHeaders .= 'Host: ' . $arrURL['host'] . ':' . $arrURL['port'] . "\r\n";
|
|
|
|
else
|
|
|
|
$strHeaders .= 'Host: ' . $arrURL['host'] . "\r\n";
|
|
|
|
|
|
|
|
if ( isset($r['user-agent']) )
|
|
|
|
$strHeaders .= 'User-agent: ' . $r['user-agent'] . "\r\n";
|
|
|
|
|
|
|
|
if ( is_array($r['headers']) ) {
|
|
|
|
foreach ( (array) $r['headers'] as $header => $headerValue )
|
|
|
|
$strHeaders .= $header . ': ' . $headerValue . "\r\n";
|
|
|
|
} else {
|
|
|
|
$strHeaders .= $r['headers'];
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( $proxy->use_authentication() )
|
|
|
|
$strHeaders .= $proxy->authentication_header() . "\r\n";
|
|
|
|
|
|
|
|
$strHeaders .= "\r\n";
|
|
|
|
|
|
|
|
if ( ! is_null($r['body']) )
|
|
|
|
$strHeaders .= $r['body'];
|
|
|
|
|
|
|
|
fwrite($handle, $strHeaders);
|
|
|
|
|
|
|
|
if ( ! $r['blocking'] ) {
|
2013-09-04 00:49:12 -04:00
|
|
|
stream_set_blocking( $handle, 0 );
|
|
|
|
fclose( $handle );
|
2010-02-26 22:37:38 -05:00
|
|
|
return array( 'headers' => array(), 'body' => '', 'response' => array('code' => false, 'message' => false), 'cookies' => array() );
|
|
|
|
}
|
|
|
|
|
|
|
|
$strResponse = '';
|
2011-03-24 22:42:20 -04:00
|
|
|
$bodyStarted = false;
|
2013-03-03 23:24:26 -05:00
|
|
|
$keep_reading = true;
|
|
|
|
$block_size = 4096;
|
2013-07-22 14:55:05 -04:00
|
|
|
if ( isset( $r['limit_response_size'] ) )
|
|
|
|
$block_size = min( $block_size, $r['limit_response_size'] );
|
2011-03-24 22:42:20 -04:00
|
|
|
|
|
|
|
// If streaming to a file setup the file handle
|
|
|
|
if ( $r['stream'] ) {
|
|
|
|
if ( ! WP_DEBUG )
|
|
|
|
$stream_handle = @fopen( $r['filename'], 'w+' );
|
|
|
|
else
|
|
|
|
$stream_handle = fopen( $r['filename'], 'w+' );
|
|
|
|
if ( ! $stream_handle )
|
|
|
|
return new WP_Error( 'http_request_failed', sprintf( __( 'Could not open handle for fopen() to %s' ), $r['filename'] ) );
|
|
|
|
|
2013-03-03 23:24:26 -05:00
|
|
|
$bytes_written = 0;
|
|
|
|
while ( ! feof($handle) && $keep_reading ) {
|
|
|
|
$block = fread( $handle, $block_size );
|
|
|
|
if ( ! $bodyStarted ) {
|
2011-03-24 22:42:20 -04:00
|
|
|
$strResponse .= $block;
|
|
|
|
if ( strpos( $strResponse, "\r\n\r\n" ) ) {
|
|
|
|
$process = WP_Http::processResponse( $strResponse );
|
|
|
|
$bodyStarted = true;
|
2013-03-03 23:24:26 -05:00
|
|
|
$block = $process['body'];
|
2011-03-24 22:42:20 -04:00
|
|
|
unset( $strResponse );
|
|
|
|
$process['body'] = '';
|
|
|
|
}
|
|
|
|
}
|
2013-05-20 08:10:58 -04:00
|
|
|
|
2013-09-08 21:18:08 -04:00
|
|
|
$this_block_size = strlen( $block );
|
|
|
|
|
|
|
|
if ( isset( $r['limit_response_size'] ) && ( $bytes_written + $this_block_size ) > $r['limit_response_size'] )
|
2013-07-22 14:55:05 -04:00
|
|
|
$block = substr( $block, 0, ( $r['limit_response_size'] - $bytes_written ) );
|
2013-03-03 23:24:26 -05:00
|
|
|
|
2013-09-08 21:18:08 -04:00
|
|
|
$bytes_written_to_file = fwrite( $stream_handle, $block );
|
|
|
|
|
|
|
|
if ( $bytes_written_to_file != $this_block_size ) {
|
|
|
|
fclose( $handle );
|
|
|
|
fclose( $stream_handle );
|
|
|
|
return new WP_Error( 'http_request_failed', __( 'Failed to write request to temporary file.' ) );
|
|
|
|
}
|
|
|
|
|
|
|
|
$bytes_written += $bytes_written_to_file;
|
2013-05-20 08:10:58 -04:00
|
|
|
|
2013-07-22 14:55:05 -04:00
|
|
|
$keep_reading = !isset( $r['limit_response_size'] ) || $bytes_written < $r['limit_response_size'];
|
2011-03-24 22:42:20 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
fclose( $stream_handle );
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2011-04-19 00:22:59 -04:00
|
|
|
} else {
|
2013-03-03 23:24:26 -05:00
|
|
|
$header_length = 0;
|
|
|
|
while ( ! feof( $handle ) && $keep_reading ) {
|
|
|
|
$block = fread( $handle, $block_size );
|
|
|
|
$strResponse .= $block;
|
|
|
|
if ( ! $bodyStarted && strpos( $strResponse, "\r\n\r\n" ) ) {
|
|
|
|
$header_length = strpos( $strResponse, "\r\n\r\n" ) + 4;
|
|
|
|
$bodyStarted = true;
|
|
|
|
}
|
2013-07-22 14:55:05 -04:00
|
|
|
$keep_reading = ( ! $bodyStarted || !isset( $r['limit_response_size'] ) || strlen( $strResponse ) < ( $header_length + $r['limit_response_size'] ) );
|
2013-03-03 23:24:26 -05:00
|
|
|
}
|
2011-03-24 22:42:20 -04:00
|
|
|
|
|
|
|
$process = WP_Http::processResponse( $strResponse );
|
|
|
|
unset( $strResponse );
|
2013-03-03 23:24:26 -05:00
|
|
|
|
2011-03-24 22:42:20 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
fclose( $handle );
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2013-08-16 20:34:10 -04:00
|
|
|
$arrHeaders = WP_Http::processHeaders( $process['headers'], $url );
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2013-07-28 21:19:54 -04:00
|
|
|
$response = array(
|
|
|
|
'headers' => $arrHeaders['headers'],
|
|
|
|
'body' => null, // Not yet processed
|
|
|
|
'response' => $arrHeaders['response'],
|
|
|
|
'cookies' => $arrHeaders['cookies'],
|
|
|
|
'filename' => $r['filename']
|
|
|
|
);
|
|
|
|
|
|
|
|
// Handle redirects
|
|
|
|
if ( false !== ( $redirect_response = WP_HTTP::handle_redirects( $url, $r, $response ) ) )
|
|
|
|
return $redirect_response;
|
2010-02-26 22:37:38 -05:00
|
|
|
|
|
|
|
// If the body was chunk encoded, then decode it.
|
|
|
|
if ( ! empty( $process['body'] ) && isset( $arrHeaders['headers']['transfer-encoding'] ) && 'chunked' == $arrHeaders['headers']['transfer-encoding'] )
|
|
|
|
$process['body'] = WP_Http::chunkTransferDecode($process['body']);
|
|
|
|
|
|
|
|
if ( true === $r['decompress'] && true === WP_Http_Encoding::should_decode($arrHeaders['headers']) )
|
|
|
|
$process['body'] = WP_Http_Encoding::decompress( $process['body'] );
|
|
|
|
|
2013-07-22 14:55:05 -04:00
|
|
|
if ( isset( $r['limit_response_size'] ) && strlen( $process['body'] ) > $r['limit_response_size'] )
|
|
|
|
$process['body'] = substr( $process['body'], 0, $r['limit_response_size'] );
|
2013-03-03 23:24:26 -05:00
|
|
|
|
2013-07-28 21:19:54 -04:00
|
|
|
$response['body'] = $process['body'];
|
|
|
|
|
|
|
|
return $response;
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2013-09-04 00:49:12 -04:00
|
|
|
* Verifies the received SSL certificate against it's Common Names and subjectAltName fields
|
2013-10-24 22:29:52 -04:00
|
|
|
*
|
2013-09-04 00:49:12 -04:00
|
|
|
* PHP's SSL verifications only verify that it's a valid Certificate, it doesn't verify if
|
|
|
|
* the certificate is valid for the hostname which was requested.
|
|
|
|
* This function verifies the requested hostname against certificate's subjectAltName field,
|
|
|
|
* if that is empty, or contains no DNS entries, a fallback to the Common Name field is used.
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
2013-09-04 00:49:12 -04:00
|
|
|
* IP Address support is included if the request is being made to an IP address.
|
|
|
|
*
|
|
|
|
* @since 3.7.0
|
2010-02-26 22:37:38 -05:00
|
|
|
* @static
|
2013-09-04 00:49:12 -04:00
|
|
|
*
|
|
|
|
* @param stream $stream The PHP Stream which the SSL request is being made over
|
|
|
|
* @param string $host The hostname being requested
|
|
|
|
* @return bool If the cerficiate presented in $stream is valid for $host
|
2010-02-26 22:37:38 -05:00
|
|
|
*/
|
2013-09-17 21:51:10 -04:00
|
|
|
static function verify_ssl_certificate( $stream, $host ) {
|
2013-09-04 00:49:12 -04:00
|
|
|
$context_options = stream_context_get_options( $stream );
|
2011-04-05 02:09:43 -04:00
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
if ( empty( $context_options['ssl']['peer_certificate'] ) )
|
2010-02-26 22:37:38 -05:00
|
|
|
return false;
|
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
$cert = openssl_x509_parse( $context_options['ssl']['peer_certificate'] );
|
|
|
|
if ( ! $cert )
|
2011-04-05 02:09:43 -04:00
|
|
|
return false;
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
// If the request is being made to an IP address, we'll validate against IP fields in the cert (if they exist)
|
|
|
|
$host_type = ( WP_HTTP::is_ip_address( $host ) ? 'ip' : 'dns' );
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
$certificate_hostnames = array();
|
|
|
|
if ( ! empty( $cert['extensions']['subjectAltName'] ) ) {
|
|
|
|
$match_against = preg_split( '/,\s*/', $cert['extensions']['subjectAltName'] );
|
|
|
|
foreach ( $match_against as $match ) {
|
|
|
|
list( $match_type, $match_host ) = explode( ':', $match );
|
|
|
|
if ( $host_type == strtolower( trim( $match_type ) ) ) // IP: or DNS:
|
|
|
|
$certificate_hostnames[] = strtolower( trim( $match_host ) );
|
|
|
|
}
|
|
|
|
} elseif ( !empty( $cert['subject']['CN'] ) ) {
|
|
|
|
// Only use the CN when the certificate includes no subjectAltName extension
|
|
|
|
$certificate_hostnames[] = strtolower( $cert['subject']['CN'] );
|
2011-03-24 22:42:20 -04:00
|
|
|
}
|
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
// Exact hostname/IP matches
|
|
|
|
if ( in_array( strtolower( $host ), $certificate_hostnames ) )
|
|
|
|
return true;
|
2011-03-24 01:18:34 -04:00
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
// IP's can't be wildcards, Stop processing
|
|
|
|
if ( 'ip' == $host_type )
|
|
|
|
return false;
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
// Test to see if the domain is at least 2 deep for wildcard support
|
|
|
|
if ( substr_count( $host, '.' ) < 2 )
|
|
|
|
return false;
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
// Wildcard subdomains certs (*.example.com) are valid for a.example.com but not a.b.example.com
|
|
|
|
$wildcard_host = preg_replace( '/^[^.]+\./', '*.', $host );
|
2013-07-28 21:19:54 -04:00
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
return in_array( strtolower( $wildcard_host ), $certificate_hostnames );
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Whether this class can be used for retrieving an URL.
|
|
|
|
*
|
|
|
|
* @static
|
|
|
|
* @access public
|
2013-09-09 04:10:10 -04:00
|
|
|
* @since 2.7.0
|
|
|
|
* @since 3.7.0 Combined with the fsockopen transport and switched to stream_socket_client().
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @return boolean False means this class can not be used, true means it can.
|
|
|
|
*/
|
2011-10-31 15:38:46 -04:00
|
|
|
public static function test( $args = array() ) {
|
2013-09-04 00:49:12 -04:00
|
|
|
if ( ! function_exists( 'stream_socket_client' ) )
|
2010-02-26 22:37:38 -05:00
|
|
|
return false;
|
|
|
|
|
2011-04-05 02:09:43 -04:00
|
|
|
$is_ssl = isset( $args['ssl'] ) && $args['ssl'];
|
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
if ( $is_ssl ) {
|
|
|
|
if ( ! extension_loaded( 'openssl' ) )
|
|
|
|
return false;
|
|
|
|
if ( ! function_exists( 'openssl_x509_parse' ) )
|
|
|
|
return false;
|
|
|
|
}
|
2011-04-05 02:09:43 -04:00
|
|
|
|
|
|
|
return apply_filters( 'use_streams_transport', true, $args );
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-09-04 00:49:12 -04:00
|
|
|
/**
|
|
|
|
* Deprecated HTTP Transport method which used fsockopen.
|
2013-09-09 04:10:10 -04:00
|
|
|
*
|
2013-09-04 00:49:12 -04:00
|
|
|
* This class is not used, and is included for backwards compatibility only.
|
|
|
|
* All code should make use of WP_HTTP directly through it's API.
|
|
|
|
*
|
|
|
|
* @see WP_HTTP::request
|
|
|
|
*
|
|
|
|
* @package WordPress
|
|
|
|
* @subpackage HTTP
|
2013-09-09 04:10:10 -04:00
|
|
|
*
|
|
|
|
* @since 2.7.0
|
|
|
|
* @deprecated 3.7.0 Please use WP_HTTP::request() directly
|
2013-09-04 00:49:12 -04:00
|
|
|
*/
|
|
|
|
class WP_HTTP_Fsockopen extends WP_HTTP_Streams {
|
|
|
|
// For backwards compatibility for users who are using the class directly
|
|
|
|
}
|
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
/**
|
|
|
|
* HTTP request method uses Curl extension to retrieve the url.
|
|
|
|
*
|
|
|
|
* Requires the Curl extension to be installed.
|
|
|
|
*
|
|
|
|
* @package WordPress
|
|
|
|
* @subpackage HTTP
|
2013-09-04 00:49:12 -04:00
|
|
|
* @since 2.7.0
|
2010-02-26 22:37:38 -05:00
|
|
|
*/
|
|
|
|
class WP_Http_Curl {
|
|
|
|
|
2011-03-24 22:42:20 -04:00
|
|
|
/**
|
2013-03-03 23:24:26 -05:00
|
|
|
* Temporary header storage for during requests.
|
2011-03-24 22:42:20 -04:00
|
|
|
*
|
|
|
|
* @since 3.2.0
|
|
|
|
* @access private
|
|
|
|
* @var string
|
|
|
|
*/
|
2011-03-25 23:32:05 -04:00
|
|
|
private $headers = '';
|
2011-03-24 22:42:20 -04:00
|
|
|
|
2013-03-03 23:24:26 -05:00
|
|
|
/**
|
|
|
|
* Temporary body storage for during requests.
|
|
|
|
*
|
|
|
|
* @since 3.6.0
|
|
|
|
* @access private
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
private $body = '';
|
|
|
|
|
|
|
|
/**
|
|
|
|
* The maximum amount of data to recieve from the remote server
|
|
|
|
*
|
|
|
|
* @since 3.6.0
|
|
|
|
* @access private
|
|
|
|
* @var int
|
|
|
|
*/
|
|
|
|
private $max_body_length = false;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* The file resource used for streaming to file.
|
|
|
|
*
|
|
|
|
* @since 3.6.0
|
|
|
|
* @access private
|
|
|
|
* @var resource
|
|
|
|
*/
|
|
|
|
private $stream_handle = false;
|
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
/**
|
|
|
|
* Send a HTTP request to a URI using cURL extension.
|
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @since 2.7.0
|
|
|
|
*
|
|
|
|
* @param string $url
|
|
|
|
* @param str|array $args Optional. Override the defaults.
|
2011-06-07 20:51:31 -04:00
|
|
|
* @return array 'headers', 'body', 'response', 'cookies' and 'filename' keys.
|
2010-02-26 22:37:38 -05:00
|
|
|
*/
|
|
|
|
function request($url, $args = array()) {
|
|
|
|
$defaults = array(
|
|
|
|
'method' => 'GET', 'timeout' => 5,
|
|
|
|
'redirection' => 5, 'httpversion' => '1.0',
|
|
|
|
'blocking' => true,
|
|
|
|
'headers' => array(), 'body' => null, 'cookies' => array()
|
|
|
|
);
|
|
|
|
|
|
|
|
$r = wp_parse_args( $args, $defaults );
|
|
|
|
|
|
|
|
if ( isset($r['headers']['User-Agent']) ) {
|
|
|
|
$r['user-agent'] = $r['headers']['User-Agent'];
|
|
|
|
unset($r['headers']['User-Agent']);
|
2010-07-02 03:52:14 -04:00
|
|
|
} else if ( isset($r['headers']['user-agent']) ) {
|
2010-02-26 22:37:38 -05:00
|
|
|
$r['user-agent'] = $r['headers']['user-agent'];
|
|
|
|
unset($r['headers']['user-agent']);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Construct Cookie: header if any cookies are set.
|
|
|
|
WP_Http::buildCookieHeader( $r );
|
|
|
|
|
|
|
|
$handle = curl_init();
|
|
|
|
|
|
|
|
// cURL offers really easy proxy support.
|
|
|
|
$proxy = new WP_HTTP_Proxy();
|
|
|
|
|
|
|
|
if ( $proxy->is_enabled() && $proxy->send_through_proxy( $url ) ) {
|
|
|
|
|
2011-03-23 07:58:09 -04:00
|
|
|
curl_setopt( $handle, CURLOPT_PROXYTYPE, CURLPROXY_HTTP );
|
|
|
|
curl_setopt( $handle, CURLOPT_PROXY, $proxy->host() );
|
|
|
|
curl_setopt( $handle, CURLOPT_PROXYPORT, $proxy->port() );
|
2010-02-26 22:37:38 -05:00
|
|
|
|
|
|
|
if ( $proxy->use_authentication() ) {
|
2011-03-23 07:58:09 -04:00
|
|
|
curl_setopt( $handle, CURLOPT_PROXYAUTH, CURLAUTH_ANY );
|
2010-02-26 22:37:38 -05:00
|
|
|
curl_setopt( $handle, CURLOPT_PROXYUSERPWD, $proxy->authentication() );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-03-17 23:12:12 -04:00
|
|
|
$is_local = isset($r['local']) && $r['local'];
|
|
|
|
$ssl_verify = isset($r['sslverify']) && $r['sslverify'];
|
2010-02-26 22:37:38 -05:00
|
|
|
if ( $is_local )
|
|
|
|
$ssl_verify = apply_filters('https_local_ssl_verify', $ssl_verify);
|
|
|
|
elseif ( ! $is_local )
|
|
|
|
$ssl_verify = apply_filters('https_ssl_verify', $ssl_verify);
|
|
|
|
|
2011-12-13 18:45:31 -05:00
|
|
|
// CURLOPT_TIMEOUT and CURLOPT_CONNECTTIMEOUT expect integers. Have to use ceil since
|
2011-09-03 12:02:41 -04:00
|
|
|
// a value of 0 will allow an unlimited timeout.
|
2010-02-26 22:37:38 -05:00
|
|
|
$timeout = (int) ceil( $r['timeout'] );
|
|
|
|
curl_setopt( $handle, CURLOPT_CONNECTTIMEOUT, $timeout );
|
|
|
|
curl_setopt( $handle, CURLOPT_TIMEOUT, $timeout );
|
|
|
|
|
|
|
|
curl_setopt( $handle, CURLOPT_URL, $url);
|
|
|
|
curl_setopt( $handle, CURLOPT_RETURNTRANSFER, true );
|
2011-04-07 04:38:36 -04:00
|
|
|
curl_setopt( $handle, CURLOPT_SSL_VERIFYHOST, ( $ssl_verify === true ) ? 2 : false );
|
2010-02-26 22:37:38 -05:00
|
|
|
curl_setopt( $handle, CURLOPT_SSL_VERIFYPEER, $ssl_verify );
|
2013-09-04 00:49:12 -04:00
|
|
|
curl_setopt( $handle, CURLOPT_CAINFO, $r['sslcertificates'] );
|
2010-02-26 22:37:38 -05:00
|
|
|
curl_setopt( $handle, CURLOPT_USERAGENT, $r['user-agent'] );
|
2012-03-18 01:00:05 -04:00
|
|
|
// The option doesn't work with safe mode or when open_basedir is set, and there's a
|
|
|
|
// bug #17490 with redirected POST requests, so handle redirections outside Curl.
|
|
|
|
curl_setopt( $handle, CURLOPT_FOLLOWLOCATION, false );
|
2013-06-21 02:07:47 -04:00
|
|
|
if ( defined( 'CURLOPT_PROTOCOLS' ) ) // PHP 5.2.10 / cURL 7.19.4
|
|
|
|
curl_setopt( $handle, CURLOPT_PROTOCOLS, CURLPROTO_HTTP | CURLPROTO_HTTPS );
|
2010-02-26 22:37:38 -05:00
|
|
|
|
|
|
|
switch ( $r['method'] ) {
|
|
|
|
case 'HEAD':
|
|
|
|
curl_setopt( $handle, CURLOPT_NOBODY, true );
|
|
|
|
break;
|
|
|
|
case 'POST':
|
|
|
|
curl_setopt( $handle, CURLOPT_POST, true );
|
|
|
|
curl_setopt( $handle, CURLOPT_POSTFIELDS, $r['body'] );
|
|
|
|
break;
|
|
|
|
case 'PUT':
|
|
|
|
curl_setopt( $handle, CURLOPT_CUSTOMREQUEST, 'PUT' );
|
|
|
|
curl_setopt( $handle, CURLOPT_POSTFIELDS, $r['body'] );
|
|
|
|
break;
|
2012-01-06 07:53:44 -05:00
|
|
|
default:
|
|
|
|
curl_setopt( $handle, CURLOPT_CUSTOMREQUEST, $r['method'] );
|
2012-09-27 02:54:17 -04:00
|
|
|
if ( ! is_null( $r['body'] ) )
|
2012-03-15 01:33:38 -04:00
|
|
|
curl_setopt( $handle, CURLOPT_POSTFIELDS, $r['body'] );
|
2012-01-06 07:53:44 -05:00
|
|
|
break;
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
2013-03-03 23:24:26 -05:00
|
|
|
if ( true === $r['blocking'] ) {
|
2012-10-04 16:00:16 -04:00
|
|
|
curl_setopt( $handle, CURLOPT_HEADERFUNCTION, array( $this, 'stream_headers' ) );
|
2013-03-03 23:24:26 -05:00
|
|
|
curl_setopt( $handle, CURLOPT_WRITEFUNCTION, array( $this, 'stream_body' ) );
|
|
|
|
}
|
2011-03-24 22:42:20 -04:00
|
|
|
|
|
|
|
curl_setopt( $handle, CURLOPT_HEADER, false );
|
|
|
|
|
2013-07-22 14:55:05 -04:00
|
|
|
if ( isset( $r['limit_response_size'] ) )
|
|
|
|
$this->max_body_length = intval( $r['limit_response_size'] );
|
2013-03-04 00:40:43 -05:00
|
|
|
else
|
|
|
|
$this->max_body_length = false;
|
2013-03-03 23:24:26 -05:00
|
|
|
|
2011-03-24 22:42:20 -04:00
|
|
|
// If streaming to a file open a file handle, and setup our curl streaming handler
|
|
|
|
if ( $r['stream'] ) {
|
|
|
|
if ( ! WP_DEBUG )
|
2013-03-03 23:24:26 -05:00
|
|
|
$this->stream_handle = @fopen( $r['filename'], 'w+' );
|
2011-03-24 22:42:20 -04:00
|
|
|
else
|
2013-03-03 23:24:26 -05:00
|
|
|
$this->stream_handle = fopen( $r['filename'], 'w+' );
|
|
|
|
if ( ! $this->stream_handle )
|
2011-03-24 22:42:20 -04:00
|
|
|
return new WP_Error( 'http_request_failed', sprintf( __( 'Could not open handle for fopen() to %s' ), $r['filename'] ) );
|
2013-03-04 00:40:43 -05:00
|
|
|
} else {
|
|
|
|
$this->stream_handle = false;
|
2011-03-24 22:42:20 -04:00
|
|
|
}
|
2010-02-26 22:37:38 -05:00
|
|
|
|
|
|
|
if ( !empty( $r['headers'] ) ) {
|
|
|
|
// cURL expects full header strings in each element
|
|
|
|
$headers = array();
|
|
|
|
foreach ( $r['headers'] as $name => $value ) {
|
|
|
|
$headers[] = "{$name}: $value";
|
|
|
|
}
|
|
|
|
curl_setopt( $handle, CURLOPT_HTTPHEADER, $headers );
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( $r['httpversion'] == '1.0' )
|
|
|
|
curl_setopt( $handle, CURLOPT_HTTP_VERSION, CURL_HTTP_VERSION_1_0 );
|
|
|
|
else
|
|
|
|
curl_setopt( $handle, CURLOPT_HTTP_VERSION, CURL_HTTP_VERSION_1_1 );
|
|
|
|
|
|
|
|
// Cookies are not handled by the HTTP API currently. Allow for plugin authors to handle it
|
|
|
|
// themselves... Although, it is somewhat pointless without some reference.
|
|
|
|
do_action_ref_array( 'http_api_curl', array(&$handle) );
|
|
|
|
|
|
|
|
// We don't need to return the body, so don't. Just execute request and return.
|
|
|
|
if ( ! $r['blocking'] ) {
|
|
|
|
curl_exec( $handle );
|
2013-03-03 23:47:39 -05:00
|
|
|
|
|
|
|
if ( $curl_error = curl_error( $handle ) ) {
|
|
|
|
curl_close( $handle );
|
|
|
|
return new WP_Error( 'http_request_failed', $curl_error );
|
|
|
|
}
|
|
|
|
if ( in_array( curl_getinfo( $handle, CURLINFO_HTTP_CODE ), array( 301, 302 ) ) ) {
|
|
|
|
curl_close( $handle );
|
|
|
|
return new WP_Error( 'http_request_failed', __( 'Too many redirects.' ) );
|
|
|
|
}
|
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
curl_close( $handle );
|
|
|
|
return array( 'headers' => array(), 'body' => '', 'response' => array('code' => false, 'message' => false), 'cookies' => array() );
|
|
|
|
}
|
|
|
|
|
|
|
|
$theResponse = curl_exec( $handle );
|
2013-08-16 20:34:10 -04:00
|
|
|
$theHeaders = WP_Http::processHeaders( $this->headers, $url );
|
2013-03-03 23:24:26 -05:00
|
|
|
$theBody = $this->body;
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2013-03-03 23:24:26 -05:00
|
|
|
$this->headers = '';
|
|
|
|
$this->body = '';
|
2011-03-24 22:42:20 -04:00
|
|
|
|
2013-09-08 21:18:08 -04:00
|
|
|
$curl_error = curl_errno( $handle );
|
|
|
|
|
|
|
|
// If an error occured, or, no response
|
|
|
|
if ( $curl_error || ( 0 == strlen( $theBody ) && empty( $theHeaders['headers'] ) ) ) {
|
|
|
|
if ( CURLE_WRITE_ERROR /* 23 */ == $curl_error && $r['stream'] ) {
|
|
|
|
fclose( $this->stream_handle );
|
|
|
|
return new WP_Error( 'http_request_failed', __( 'Failed to write request to temporary file.' ) );
|
|
|
|
}
|
2013-03-03 23:47:39 -05:00
|
|
|
if ( $curl_error = curl_error( $handle ) ) {
|
|
|
|
curl_close( $handle );
|
2012-04-05 07:58:04 -04:00
|
|
|
return new WP_Error( 'http_request_failed', $curl_error );
|
2013-03-03 23:47:39 -05:00
|
|
|
}
|
|
|
|
if ( in_array( curl_getinfo( $handle, CURLINFO_HTTP_CODE ), array( 301, 302 ) ) ) {
|
|
|
|
curl_close( $handle );
|
2012-04-05 07:58:04 -04:00
|
|
|
return new WP_Error( 'http_request_failed', __( 'Too many redirects.' ) );
|
2013-03-03 23:47:39 -05:00
|
|
|
}
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
$response = array();
|
|
|
|
$response['code'] = curl_getinfo( $handle, CURLINFO_HTTP_CODE );
|
|
|
|
$response['message'] = get_status_header_desc($response['code']);
|
|
|
|
|
|
|
|
curl_close( $handle );
|
|
|
|
|
2011-03-24 22:42:20 -04:00
|
|
|
if ( $r['stream'] )
|
2013-03-03 23:24:26 -05:00
|
|
|
fclose( $this->stream_handle );
|
2011-03-24 22:42:20 -04:00
|
|
|
|
2013-07-28 21:19:54 -04:00
|
|
|
$response = array(
|
|
|
|
'headers' => $theHeaders['headers'],
|
|
|
|
'body' => null,
|
|
|
|
'response' => $response,
|
|
|
|
'cookies' => $theHeaders['cookies'],
|
|
|
|
'filename' => $r['filename']
|
|
|
|
);
|
|
|
|
|
|
|
|
// Handle redirects
|
|
|
|
if ( false !== ( $redirect_response = WP_HTTP::handle_redirects( $url, $r, $response ) ) )
|
|
|
|
return $redirect_response;
|
2010-02-26 22:37:38 -05:00
|
|
|
|
|
|
|
if ( true === $r['decompress'] && true === WP_Http_Encoding::should_decode($theHeaders['headers']) )
|
|
|
|
$theBody = WP_Http_Encoding::decompress( $theBody );
|
|
|
|
|
2013-07-28 21:19:54 -04:00
|
|
|
$response['body'] = $theBody;
|
|
|
|
|
|
|
|
return $response;
|
2011-03-24 22:42:20 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Grab the headers of the cURL request
|
|
|
|
*
|
|
|
|
* Each header is sent individually to this callback, so we append to the $header property for temporary storage
|
|
|
|
*
|
|
|
|
* @since 3.2.0
|
|
|
|
* @access private
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
private function stream_headers( $handle, $headers ) {
|
|
|
|
$this->headers .= $headers;
|
|
|
|
return strlen( $headers );
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
2013-03-03 23:24:26 -05:00
|
|
|
/**
|
|
|
|
* Grab the body of the cURL request
|
|
|
|
*
|
|
|
|
* The contents of the document are passed in chunks, so we append to the $body property for temporary storage.
|
|
|
|
* Returning a length shorter than the length of $data passed in will cause cURL to abort the request as "completed"
|
|
|
|
*
|
|
|
|
* @since 3.6.0
|
|
|
|
* @access private
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
private function stream_body( $handle, $data ) {
|
2013-09-08 21:18:08 -04:00
|
|
|
$data_length = strlen( $data );
|
2013-03-03 23:24:26 -05:00
|
|
|
|
2013-09-08 21:18:08 -04:00
|
|
|
if ( $this->max_body_length && ( strlen( $this->body ) + $data_length ) > $this->max_body_length )
|
|
|
|
$data = substr( $data, 0, ( $this->max_body_length - $data_length ) );
|
2013-03-03 23:24:26 -05:00
|
|
|
|
2013-09-08 21:18:08 -04:00
|
|
|
if ( $this->stream_handle ) {
|
|
|
|
$bytes_written = fwrite( $this->stream_handle, $data );
|
|
|
|
} else {
|
|
|
|
$this->body .= $data;
|
|
|
|
$bytes_written = $data_length;
|
|
|
|
}
|
2013-08-18 04:18:10 -04:00
|
|
|
|
2013-09-08 21:18:08 -04:00
|
|
|
// Upon event of this function returning less than strlen( $data ) curl will error with CURLE_WRITE_ERROR
|
|
|
|
return $bytes_written;
|
2013-03-03 23:24:26 -05:00
|
|
|
}
|
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
/**
|
|
|
|
* Whether this class can be used for retrieving an URL.
|
|
|
|
*
|
|
|
|
* @static
|
|
|
|
* @since 2.7.0
|
|
|
|
*
|
|
|
|
* @return boolean False means this class can not be used, true means it can.
|
|
|
|
*/
|
2011-10-31 15:38:46 -04:00
|
|
|
public static function test( $args = array() ) {
|
2011-04-05 02:09:43 -04:00
|
|
|
if ( ! function_exists( 'curl_init' ) || ! function_exists( 'curl_exec' ) )
|
|
|
|
return false;
|
|
|
|
|
|
|
|
$is_ssl = isset( $args['ssl'] ) && $args['ssl'];
|
|
|
|
|
|
|
|
if ( $is_ssl ) {
|
|
|
|
$curl_version = curl_version();
|
|
|
|
if ( ! (CURL_VERSION_SSL & $curl_version['features']) ) // Does this cURL version support SSL requests?
|
|
|
|
return false;
|
|
|
|
}
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2011-04-05 02:09:43 -04:00
|
|
|
return apply_filters( 'use_curl_transport', true, $args );
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Adds Proxy support to the WordPress HTTP API.
|
|
|
|
*
|
|
|
|
* There are caveats to proxy support. It requires that defines be made in the wp-config.php file to
|
|
|
|
* enable proxy support. There are also a few filters that plugins can hook into for some of the
|
|
|
|
* constants.
|
|
|
|
*
|
2010-02-27 23:27:32 -05:00
|
|
|
* Please note that only BASIC authentication is supported by most transports.
|
2011-04-19 00:22:59 -04:00
|
|
|
* cURL MAY support more methods (such as NTLM authentication) depending on your environment.
|
2010-02-27 23:24:04 -05:00
|
|
|
*
|
2010-02-26 22:37:38 -05:00
|
|
|
* The constants are as follows:
|
|
|
|
* <ol>
|
|
|
|
* <li>WP_PROXY_HOST - Enable proxy support and host for connecting.</li>
|
|
|
|
* <li>WP_PROXY_PORT - Proxy port for connection. No default, must be defined.</li>
|
|
|
|
* <li>WP_PROXY_USERNAME - Proxy username, if it requires authentication.</li>
|
|
|
|
* <li>WP_PROXY_PASSWORD - Proxy password, if it requires authentication.</li>
|
|
|
|
* <li>WP_PROXY_BYPASS_HOSTS - Will prevent the hosts in this list from going through the proxy.
|
|
|
|
* You do not need to have localhost and the blog host in this list, because they will not be passed
|
2010-10-22 06:27:35 -04:00
|
|
|
* through the proxy. The list should be presented in a comma separated list, wildcards using * are supported, eg. *.wordpress.org</li>
|
2010-02-26 22:37:38 -05:00
|
|
|
* </ol>
|
|
|
|
*
|
|
|
|
* An example can be as seen below.
|
|
|
|
* <code>
|
|
|
|
* define('WP_PROXY_HOST', '192.168.84.101');
|
|
|
|
* define('WP_PROXY_PORT', '8080');
|
2010-10-22 06:27:35 -04:00
|
|
|
* define('WP_PROXY_BYPASS_HOSTS', 'localhost, www.example.com, *.wordpress.org');
|
2010-02-26 22:37:38 -05:00
|
|
|
* </code>
|
|
|
|
*
|
|
|
|
* @link http://core.trac.wordpress.org/ticket/4011 Proxy support ticket in WordPress.
|
2010-10-22 06:27:35 -04:00
|
|
|
* @link http://core.trac.wordpress.org/ticket/14636 Allow wildcard domains in WP_PROXY_BYPASS_HOSTS
|
2013-12-24 13:57:12 -05:00
|
|
|
* @since 2.8.0
|
2010-02-26 22:37:38 -05:00
|
|
|
*/
|
|
|
|
class WP_HTTP_Proxy {
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Whether proxy connection should be used.
|
|
|
|
*
|
2013-12-24 13:57:12 -05:00
|
|
|
* @since 2.8.0
|
|
|
|
*
|
2010-02-26 22:37:38 -05:00
|
|
|
* @use WP_PROXY_HOST
|
|
|
|
* @use WP_PROXY_PORT
|
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
function is_enabled() {
|
|
|
|
return defined('WP_PROXY_HOST') && defined('WP_PROXY_PORT');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Whether authentication should be used.
|
|
|
|
*
|
2013-12-24 13:57:12 -05:00
|
|
|
* @since 2.8.0
|
|
|
|
*
|
2010-02-26 22:37:38 -05:00
|
|
|
* @use WP_PROXY_USERNAME
|
|
|
|
* @use WP_PROXY_PASSWORD
|
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
function use_authentication() {
|
|
|
|
return defined('WP_PROXY_USERNAME') && defined('WP_PROXY_PASSWORD');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Retrieve the host for the proxy server.
|
|
|
|
*
|
2013-12-24 13:57:12 -05:00
|
|
|
* @since 2.8.0
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
function host() {
|
|
|
|
if ( defined('WP_PROXY_HOST') )
|
|
|
|
return WP_PROXY_HOST;
|
|
|
|
|
|
|
|
return '';
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Retrieve the port for the proxy server.
|
|
|
|
*
|
2013-12-24 13:57:12 -05:00
|
|
|
* @since 2.8.0
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
function port() {
|
|
|
|
if ( defined('WP_PROXY_PORT') )
|
|
|
|
return WP_PROXY_PORT;
|
|
|
|
|
|
|
|
return '';
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Retrieve the username for proxy authentication.
|
|
|
|
*
|
2013-12-24 13:57:12 -05:00
|
|
|
* @since 2.8.0
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
function username() {
|
|
|
|
if ( defined('WP_PROXY_USERNAME') )
|
|
|
|
return WP_PROXY_USERNAME;
|
|
|
|
|
|
|
|
return '';
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Retrieve the password for proxy authentication.
|
|
|
|
*
|
2013-12-24 13:57:12 -05:00
|
|
|
* @since 2.8.0
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
function password() {
|
|
|
|
if ( defined('WP_PROXY_PASSWORD') )
|
|
|
|
return WP_PROXY_PASSWORD;
|
|
|
|
|
|
|
|
return '';
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Retrieve authentication string for proxy authentication.
|
|
|
|
*
|
2013-12-24 13:57:12 -05:00
|
|
|
* @since 2.8.0
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
function authentication() {
|
|
|
|
return $this->username() . ':' . $this->password();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Retrieve header string for proxy authentication.
|
|
|
|
*
|
2013-12-24 13:57:12 -05:00
|
|
|
* @since 2.8.0
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
function authentication_header() {
|
2010-04-18 00:01:19 -04:00
|
|
|
return 'Proxy-Authorization: Basic ' . base64_encode( $this->authentication() );
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Whether URL should be sent through the proxy server.
|
|
|
|
*
|
|
|
|
* We want to keep localhost and the blog URL from being sent through the proxy server, because
|
|
|
|
* some proxies can not handle this. We also have the constant available for defining other
|
|
|
|
* hosts that won't be sent through the proxy.
|
|
|
|
*
|
|
|
|
* @uses WP_PROXY_BYPASS_HOSTS
|
2010-12-01 14:24:38 -05:00
|
|
|
* @since 2.8.0
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @param string $uri URI to check.
|
|
|
|
* @return bool True, to send through the proxy and false if, the proxy should not be used.
|
|
|
|
*/
|
|
|
|
function send_through_proxy( $uri ) {
|
|
|
|
// parse_url() only handles http, https type URLs, and will emit E_WARNING on failure.
|
|
|
|
// This will be displayed on blogs, which is not reasonable.
|
|
|
|
$check = @parse_url($uri);
|
|
|
|
|
|
|
|
// Malformed URL, can not process, but this could mean ssl, so let through anyway.
|
|
|
|
if ( $check === false )
|
|
|
|
return true;
|
|
|
|
|
|
|
|
$home = parse_url( get_option('siteurl') );
|
|
|
|
|
2012-07-06 22:27:13 -04:00
|
|
|
$result = apply_filters( 'pre_http_send_through_proxy', null, $uri, $check, $home );
|
|
|
|
if ( ! is_null( $result ) )
|
|
|
|
return $result;
|
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
if ( $check['host'] == 'localhost' || $check['host'] == $home['host'] )
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if ( !defined('WP_PROXY_BYPASS_HOSTS') )
|
|
|
|
return true;
|
|
|
|
|
|
|
|
static $bypass_hosts;
|
2010-10-22 06:27:35 -04:00
|
|
|
static $wildcard_regex = false;
|
|
|
|
if ( null == $bypass_hosts ) {
|
2010-02-26 22:37:38 -05:00
|
|
|
$bypass_hosts = preg_split('|,\s*|', WP_PROXY_BYPASS_HOSTS);
|
|
|
|
|
2010-10-22 06:27:35 -04:00
|
|
|
if ( false !== strpos(WP_PROXY_BYPASS_HOSTS, '*') ) {
|
|
|
|
$wildcard_regex = array();
|
|
|
|
foreach ( $bypass_hosts as $host )
|
2013-08-28 00:54:09 -04:00
|
|
|
$wildcard_regex[] = str_replace( '\*', '.+', preg_quote( $host, '/' ) );
|
2010-10-22 06:27:35 -04:00
|
|
|
$wildcard_regex = '/^(' . implode('|', $wildcard_regex) . ')$/i';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( !empty($wildcard_regex) )
|
|
|
|
return !preg_match($wildcard_regex, $check['host']);
|
|
|
|
else
|
|
|
|
return !in_array( $check['host'], $bypass_hosts );
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
/**
|
|
|
|
* Internal representation of a single cookie.
|
|
|
|
*
|
|
|
|
* Returned cookies are represented using this class, and when cookies are set, if they are not
|
|
|
|
* already a WP_Http_Cookie() object, then they are turned into one.
|
|
|
|
*
|
|
|
|
* @todo The WordPress convention is to use underscores instead of camelCase for function and method
|
|
|
|
* names. Need to switch to use underscores instead for the methods.
|
|
|
|
*
|
|
|
|
* @package WordPress
|
|
|
|
* @subpackage HTTP
|
|
|
|
* @since 2.8.0
|
|
|
|
*/
|
|
|
|
class WP_Http_Cookie {
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Cookie name.
|
|
|
|
*
|
|
|
|
* @since 2.8.0
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
var $name;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Cookie value.
|
|
|
|
*
|
|
|
|
* @since 2.8.0
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
var $value;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* When the cookie expires.
|
|
|
|
*
|
|
|
|
* @since 2.8.0
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
var $expires;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Cookie URL path.
|
|
|
|
*
|
|
|
|
* @since 2.8.0
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
var $path;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Cookie Domain.
|
|
|
|
*
|
|
|
|
* @since 2.8.0
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
var $domain;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sets up this cookie object.
|
|
|
|
*
|
|
|
|
* The parameter $data should be either an associative array containing the indices names below
|
|
|
|
* or a header string detailing it.
|
|
|
|
*
|
|
|
|
* If it's an array, it should include the following elements:
|
|
|
|
* <ol>
|
|
|
|
* <li>Name</li>
|
|
|
|
* <li>Value - should NOT be urlencoded already.</li>
|
|
|
|
* <li>Expires - (optional) String or int (UNIX timestamp).</li>
|
|
|
|
* <li>Path (optional)</li>
|
|
|
|
* <li>Domain (optional)</li>
|
2013-08-16 20:34:10 -04:00
|
|
|
* <li>Port (optional)</li>
|
2010-02-26 22:37:38 -05:00
|
|
|
* </ol>
|
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @since 2.8.0
|
|
|
|
*
|
|
|
|
* @param string|array $data Raw cookie data.
|
2013-08-16 20:34:10 -04:00
|
|
|
* @param string $requested_url The URL which the cookie was set on, used for default 'domain' and 'port' values
|
2010-02-26 22:37:38 -05:00
|
|
|
*/
|
2013-08-16 20:34:10 -04:00
|
|
|
function __construct( $data, $requested_url = '' ) {
|
2013-08-29 22:11:09 -04:00
|
|
|
if ( $requested_url )
|
|
|
|
$arrURL = @parse_url( $requested_url );
|
2013-08-16 20:34:10 -04:00
|
|
|
if ( isset( $arrURL['host'] ) )
|
|
|
|
$this->domain = $arrURL['host'];
|
|
|
|
$this->path = isset( $arrURL['path'] ) ? $arrURL['path'] : '/';
|
|
|
|
if ( '/' != substr( $this->path, -1 ) )
|
|
|
|
$this->path = dirname( $this->path ) . '/';
|
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
if ( is_string( $data ) ) {
|
|
|
|
// Assume it's a header string direct from a previous request
|
|
|
|
$pairs = explode( ';', $data );
|
|
|
|
|
|
|
|
// Special handling for first pair; name=value. Also be careful of "=" in value
|
|
|
|
$name = trim( substr( $pairs[0], 0, strpos( $pairs[0], '=' ) ) );
|
|
|
|
$value = substr( $pairs[0], strpos( $pairs[0], '=' ) + 1 );
|
|
|
|
$this->name = $name;
|
|
|
|
$this->value = urldecode( $value );
|
|
|
|
array_shift( $pairs ); //Removes name=value from items.
|
|
|
|
|
|
|
|
// Set everything else as a property
|
|
|
|
foreach ( $pairs as $pair ) {
|
2010-03-30 06:22:30 -04:00
|
|
|
$pair = rtrim($pair);
|
2010-02-26 22:37:38 -05:00
|
|
|
if ( empty($pair) ) //Handles the cookie ending in ; which results in a empty final pair
|
|
|
|
continue;
|
|
|
|
|
|
|
|
list( $key, $val ) = strpos( $pair, '=' ) ? explode( '=', $pair ) : array( $pair, '' );
|
|
|
|
$key = strtolower( trim( $key ) );
|
|
|
|
if ( 'expires' == $key )
|
|
|
|
$val = strtotime( $val );
|
|
|
|
$this->$key = $val;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if ( !isset( $data['name'] ) )
|
|
|
|
return false;
|
|
|
|
|
|
|
|
// Set properties based directly on parameters
|
2013-08-16 20:34:10 -04:00
|
|
|
foreach ( array( 'name', 'value', 'path', 'domain', 'port' ) as $field ) {
|
|
|
|
if ( isset( $data[ $field ] ) )
|
|
|
|
$this->$field = $data[ $field ];
|
|
|
|
}
|
2010-02-26 22:37:38 -05:00
|
|
|
|
|
|
|
if ( isset( $data['expires'] ) )
|
|
|
|
$this->expires = is_int( $data['expires'] ) ? $data['expires'] : strtotime( $data['expires'] );
|
|
|
|
else
|
|
|
|
$this->expires = null;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Confirms that it's OK to send this cookie to the URL checked against.
|
|
|
|
*
|
|
|
|
* Decision is based on RFC 2109/2965, so look there for details on validity.
|
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @since 2.8.0
|
|
|
|
*
|
|
|
|
* @param string $url URL you intend to send this cookie to
|
2012-01-05 15:50:54 -05:00
|
|
|
* @return boolean true if allowed, false otherwise.
|
2010-02-26 22:37:38 -05:00
|
|
|
*/
|
|
|
|
function test( $url ) {
|
2013-08-16 20:34:10 -04:00
|
|
|
if ( is_null( $this->name ) )
|
|
|
|
return false;
|
|
|
|
|
2010-02-26 22:37:38 -05:00
|
|
|
// Expires - if expired then nothing else matters
|
2012-07-07 00:23:49 -04:00
|
|
|
if ( isset( $this->expires ) && time() > $this->expires )
|
2010-02-26 22:37:38 -05:00
|
|
|
return false;
|
|
|
|
|
|
|
|
// Get details on the URL we're thinking about sending to
|
|
|
|
$url = parse_url( $url );
|
2013-08-16 20:34:10 -04:00
|
|
|
$url['port'] = isset( $url['port'] ) ? $url['port'] : ( 'https' == $url['scheme'] ? 443 : 80 );
|
2010-02-26 22:37:38 -05:00
|
|
|
$url['path'] = isset( $url['path'] ) ? $url['path'] : '/';
|
|
|
|
|
|
|
|
// Values to use for comparison against the URL
|
|
|
|
$path = isset( $this->path ) ? $this->path : '/';
|
2013-08-16 20:34:10 -04:00
|
|
|
$port = isset( $this->port ) ? $this->port : null;
|
2010-02-26 22:37:38 -05:00
|
|
|
$domain = isset( $this->domain ) ? strtolower( $this->domain ) : strtolower( $url['host'] );
|
|
|
|
if ( false === stripos( $domain, '.' ) )
|
|
|
|
$domain .= '.local';
|
|
|
|
|
|
|
|
// Host - very basic check that the request URL ends with the domain restriction (minus leading dot)
|
|
|
|
$domain = substr( $domain, 0, 1 ) == '.' ? substr( $domain, 1 ) : $domain;
|
|
|
|
if ( substr( $url['host'], -strlen( $domain ) ) != $domain )
|
|
|
|
return false;
|
|
|
|
|
|
|
|
// Port - supports "port-lists" in the format: "80,8000,8080"
|
2013-08-16 20:34:10 -04:00
|
|
|
if ( !empty( $port ) && !in_array( $url['port'], explode( ',', $port) ) )
|
2010-02-26 22:37:38 -05:00
|
|
|
return false;
|
|
|
|
|
|
|
|
// Path - request path must start with path restriction
|
|
|
|
if ( substr( $url['path'], 0, strlen( $path ) ) != $path )
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Convert cookie name and value back to header string.
|
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @since 2.8.0
|
|
|
|
*
|
|
|
|
* @return string Header encoded cookie name and value.
|
|
|
|
*/
|
|
|
|
function getHeaderValue() {
|
2012-07-07 08:06:09 -04:00
|
|
|
if ( ! isset( $this->name ) || ! isset( $this->value ) )
|
2010-02-26 22:37:38 -05:00
|
|
|
return '';
|
|
|
|
|
2012-04-05 11:34:28 -04:00
|
|
|
return $this->name . '=' . apply_filters( 'wp_http_cookie_value', $this->value, $this->name );
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Retrieve cookie header for usage in the rest of the WordPress HTTP API.
|
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @since 2.8.0
|
|
|
|
*
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
function getFullHeader() {
|
|
|
|
return 'Cookie: ' . $this->getHeaderValue();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Implementation for deflate and gzip transfer encodings.
|
|
|
|
*
|
|
|
|
* Includes RFC 1950, RFC 1951, and RFC 1952.
|
|
|
|
*
|
2013-12-24 13:57:12 -05:00
|
|
|
* @since 2.8.0
|
2010-02-26 22:37:38 -05:00
|
|
|
* @package WordPress
|
|
|
|
* @subpackage HTTP
|
|
|
|
*/
|
|
|
|
class WP_Http_Encoding {
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Compress raw string using the deflate format.
|
|
|
|
*
|
|
|
|
* Supports the RFC 1951 standard.
|
|
|
|
*
|
2013-12-24 13:57:12 -05:00
|
|
|
* @since 2.8.0
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @param string $raw String to compress.
|
|
|
|
* @param int $level Optional, default is 9. Compression level, 9 is highest.
|
|
|
|
* @param string $supports Optional, not used. When implemented it will choose the right compression based on what the server supports.
|
|
|
|
* @return string|bool False on failure.
|
|
|
|
*/
|
2011-10-31 15:38:46 -04:00
|
|
|
public static function compress( $raw, $level = 9, $supports = null ) {
|
2010-02-26 22:37:38 -05:00
|
|
|
return gzdeflate( $raw, $level );
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Decompression of deflated string.
|
|
|
|
*
|
|
|
|
* Will attempt to decompress using the RFC 1950 standard, and if that fails
|
|
|
|
* then the RFC 1951 standard deflate will be attempted. Finally, the RFC
|
|
|
|
* 1952 standard gzip decode will be attempted. If all fail, then the
|
|
|
|
* original compressed string will be returned.
|
|
|
|
*
|
2013-12-24 13:57:12 -05:00
|
|
|
* @since 2.8.0
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @param string $compressed String to decompress.
|
|
|
|
* @param int $length The optional length of the compressed data.
|
|
|
|
* @return string|bool False on failure.
|
|
|
|
*/
|
2011-10-31 15:38:46 -04:00
|
|
|
public static function decompress( $compressed, $length = null ) {
|
2010-02-26 22:37:38 -05:00
|
|
|
|
|
|
|
if ( empty($compressed) )
|
|
|
|
return $compressed;
|
|
|
|
|
|
|
|
if ( false !== ( $decompressed = @gzinflate( $compressed ) ) )
|
|
|
|
return $decompressed;
|
|
|
|
|
|
|
|
if ( false !== ( $decompressed = WP_Http_Encoding::compatible_gzinflate( $compressed ) ) )
|
|
|
|
return $decompressed;
|
|
|
|
|
|
|
|
if ( false !== ( $decompressed = @gzuncompress( $compressed ) ) )
|
|
|
|
return $decompressed;
|
|
|
|
|
|
|
|
if ( function_exists('gzdecode') ) {
|
|
|
|
$decompressed = @gzdecode( $compressed );
|
|
|
|
|
|
|
|
if ( false !== $decompressed )
|
|
|
|
return $decompressed;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $compressed;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Decompression of deflated string while staying compatible with the majority of servers.
|
|
|
|
*
|
2012-07-20 11:09:11 -04:00
|
|
|
* Certain Servers will return deflated data with headers which PHP's gzinflate()
|
2011-10-24 15:13:23 -04:00
|
|
|
* function cannot handle out of the box. The following function has been created from
|
|
|
|
* various snippets on the gzinflate() PHP documentation.
|
2011-09-28 22:10:35 -04:00
|
|
|
*
|
|
|
|
* Warning: Magic numbers within. Due to the potential different formats that the compressed
|
|
|
|
* data may be returned in, some "magic offsets" are needed to ensure proper decompression
|
2011-10-24 15:13:23 -04:00
|
|
|
* takes place. For a simple progmatic way to determine the magic offset in use, see:
|
2011-09-28 22:10:35 -04:00
|
|
|
* http://core.trac.wordpress.org/ticket/18273
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @since 2.8.1
|
2011-09-28 22:10:35 -04:00
|
|
|
* @link http://core.trac.wordpress.org/ticket/18273
|
|
|
|
* @link http://au2.php.net/manual/en/function.gzinflate.php#70875
|
2010-02-26 22:37:38 -05:00
|
|
|
* @link http://au2.php.net/manual/en/function.gzinflate.php#77336
|
|
|
|
*
|
|
|
|
* @param string $gzData String to decompress.
|
|
|
|
* @return string|bool False on failure.
|
|
|
|
*/
|
2011-10-31 15:38:46 -04:00
|
|
|
public static function compatible_gzinflate($gzData) {
|
2011-09-19 10:43:43 -04:00
|
|
|
|
|
|
|
// Compressed data might contain a full header, if so strip it for gzinflate()
|
2010-02-26 22:37:38 -05:00
|
|
|
if ( substr($gzData, 0, 3) == "\x1f\x8b\x08" ) {
|
|
|
|
$i = 10;
|
|
|
|
$flg = ord( substr($gzData, 3, 1) );
|
|
|
|
if ( $flg > 0 ) {
|
|
|
|
if ( $flg & 4 ) {
|
|
|
|
list($xlen) = unpack('v', substr($gzData, $i, 2) );
|
|
|
|
$i = $i + 2 + $xlen;
|
|
|
|
}
|
|
|
|
if ( $flg & 8 )
|
|
|
|
$i = strpos($gzData, "\0", $i) + 1;
|
|
|
|
if ( $flg & 16 )
|
|
|
|
$i = strpos($gzData, "\0", $i) + 1;
|
|
|
|
if ( $flg & 2 )
|
|
|
|
$i = $i + 2;
|
|
|
|
}
|
2011-09-19 10:43:43 -04:00
|
|
|
$decompressed = @gzinflate( substr($gzData, $i, -8) );
|
|
|
|
if ( false !== $decompressed )
|
|
|
|
return $decompressed;
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
2011-09-19 10:43:43 -04:00
|
|
|
|
|
|
|
// Compressed data from java.util.zip.Deflater amongst others.
|
|
|
|
$decompressed = @gzinflate( substr($gzData, 2) );
|
|
|
|
if ( false !== $decompressed )
|
|
|
|
return $decompressed;
|
|
|
|
|
|
|
|
return false;
|
2010-02-26 22:37:38 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* What encoding types to accept and their priority values.
|
|
|
|
*
|
2013-12-24 13:57:12 -05:00
|
|
|
* @since 2.8.0
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @return string Types of encoding to accept.
|
|
|
|
*/
|
2013-03-03 22:33:12 -05:00
|
|
|
public static function accept_encoding( $url, $args ) {
|
2010-02-26 22:37:38 -05:00
|
|
|
$type = array();
|
2013-03-03 22:33:12 -05:00
|
|
|
$compression_enabled = WP_Http_Encoding::is_available();
|
|
|
|
|
|
|
|
if ( ! $args['decompress'] ) // decompression specifically disabled
|
|
|
|
$compression_enabled = false;
|
|
|
|
elseif ( $args['stream'] ) // disable when streaming to file
|
|
|
|
$compression_enabled = false;
|
2013-07-22 14:55:05 -04:00
|
|
|
elseif ( isset( $args['limit_response_size'] ) ) // If only partial content is being requested, we won't be able to decompress it
|
2013-03-03 23:24:26 -05:00
|
|
|
$compression_enabled = false;
|
2013-03-03 22:33:12 -05:00
|
|
|
|
|
|
|
if ( $compression_enabled ) {
|
|
|
|
if ( function_exists( 'gzinflate' ) )
|
|
|
|
$type[] = 'deflate;q=1.0';
|
|
|
|
|
|
|
|
if ( function_exists( 'gzuncompress' ) )
|
|
|
|
$type[] = 'compress;q=0.5';
|
2013-05-20 08:10:58 -04:00
|
|
|
|
2013-03-03 22:33:12 -05:00
|
|
|
if ( function_exists( 'gzdecode' ) )
|
|
|
|
$type[] = 'gzip;q=0.5';
|
|
|
|
}
|
2010-02-26 22:37:38 -05:00
|
|
|
|
2013-03-03 22:33:12 -05:00
|
|
|
$type = apply_filters( 'wp_http_accept_encoding', $type, $url, $args );
|
2010-02-26 22:37:38 -05:00
|
|
|
|
|
|
|
return implode(', ', $type);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2011-09-03 12:02:41 -04:00
|
|
|
* What encoding the content used when it was compressed to send in the headers.
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
2013-12-24 13:57:12 -05:00
|
|
|
* @since 2.8.0
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @return string Content-Encoding string to send in the header.
|
|
|
|
*/
|
2011-10-31 15:38:46 -04:00
|
|
|
public static function content_encoding() {
|
2010-02-26 22:37:38 -05:00
|
|
|
return 'deflate';
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Whether the content be decoded based on the headers.
|
|
|
|
*
|
2013-12-24 13:57:12 -05:00
|
|
|
* @since 2.8.0
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @param array|string $headers All of the available headers.
|
|
|
|
* @return bool
|
|
|
|
*/
|
2011-10-31 15:38:46 -04:00
|
|
|
public static function should_decode($headers) {
|
2010-02-26 22:37:38 -05:00
|
|
|
if ( is_array( $headers ) ) {
|
|
|
|
if ( array_key_exists('content-encoding', $headers) && ! empty( $headers['content-encoding'] ) )
|
|
|
|
return true;
|
|
|
|
} else if ( is_string( $headers ) ) {
|
|
|
|
return ( stripos($headers, 'content-encoding:') !== false );
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Whether decompression and compression are supported by the PHP version.
|
|
|
|
*
|
|
|
|
* Each function is tested instead of checking for the zlib extension, to
|
|
|
|
* ensure that the functions all exist in the PHP version and aren't
|
|
|
|
* disabled.
|
|
|
|
*
|
2013-12-24 13:57:12 -05:00
|
|
|
* @since 2.8.0
|
2010-02-26 22:37:38 -05:00
|
|
|
*
|
|
|
|
* @return bool
|
|
|
|
*/
|
2011-10-31 15:38:46 -04:00
|
|
|
public static function is_available() {
|
2010-02-26 22:37:38 -05:00
|
|
|
return ( function_exists('gzuncompress') || function_exists('gzdeflate') || function_exists('gzinflate') );
|
|
|
|
}
|
2010-05-04 00:57:22 -04:00
|
|
|
}
|