Annotation of embedaddon/php/ext/standard/http_fopen_wrapper.c, revision 1.1.1.2
1.1 misho 1: /*
2: +----------------------------------------------------------------------+
3: | PHP Version 5 |
4: +----------------------------------------------------------------------+
5: | Copyright (c) 1997-2012 The PHP Group |
6: +----------------------------------------------------------------------+
7: | This source file is subject to version 3.01 of the PHP license, |
8: | that is bundled with this package in the file LICENSE, and is |
9: | available through the world-wide-web at the following url: |
10: | http://www.php.net/license/3_01.txt |
11: | If you did not receive a copy of the PHP license and are unable to |
12: | obtain it through the world-wide-web, please send a note to |
13: | license@php.net so we can mail you a copy immediately. |
14: +----------------------------------------------------------------------+
15: | Authors: Rasmus Lerdorf <rasmus@php.net> |
16: | Jim Winstead <jimw@php.net> |
17: | Hartmut Holzgraefe <hholzgra@php.net> |
18: | Wez Furlong <wez@thebrainroom.com> |
19: | Sara Golemon <pollita@php.net> |
20: +----------------------------------------------------------------------+
21: */
1.1.1.2 ! misho 22: /* $Id$ */
1.1 misho 23:
24: #include "php.h"
25: #include "php_globals.h"
26: #include "php_streams.h"
27: #include "php_network.h"
28: #include "php_ini.h"
29: #include "ext/standard/basic_functions.h"
30: #include "ext/standard/php_smart_str.h"
31:
32: #include <stdio.h>
33: #include <stdlib.h>
34: #include <errno.h>
35: #include <sys/types.h>
36: #include <sys/stat.h>
37: #include <fcntl.h>
38:
39: #ifdef PHP_WIN32
40: #define O_RDONLY _O_RDONLY
41: #include "win32/param.h"
42: #else
43: #include <sys/param.h>
44: #endif
45:
46: #include "php_standard.h"
47:
48: #include <sys/types.h>
49: #if HAVE_SYS_SOCKET_H
50: #include <sys/socket.h>
51: #endif
52:
53: #ifdef PHP_WIN32
54: #include <winsock2.h>
55: #elif defined(NETWARE) && defined(USE_WINSOCK)
56: #include <novsock2.h>
57: #else
58: #include <netinet/in.h>
59: #include <netdb.h>
60: #if HAVE_ARPA_INET_H
61: #include <arpa/inet.h>
62: #endif
63: #endif
64:
65: #if defined(PHP_WIN32) || defined(__riscos__) || defined(NETWARE)
66: #undef AF_UNIX
67: #endif
68:
69: #if defined(AF_UNIX)
70: #include <sys/un.h>
71: #endif
72:
73: #include "php_fopen_wrappers.h"
74:
75: #define HTTP_HEADER_BLOCK_SIZE 1024
76: #define PHP_URL_REDIRECT_MAX 20
77: #define HTTP_HEADER_USER_AGENT 1
78: #define HTTP_HEADER_HOST 2
79: #define HTTP_HEADER_AUTH 4
80: #define HTTP_HEADER_FROM 8
81: #define HTTP_HEADER_CONTENT_LENGTH 16
82: #define HTTP_HEADER_TYPE 32
83:
84: #define HTTP_WRAPPER_HEADER_INIT 1
85: #define HTTP_WRAPPER_REDIRECTED 2
86:
87: php_stream *php_stream_url_wrap_http_ex(php_stream_wrapper *wrapper, char *path, char *mode, int options, char **opened_path, php_stream_context *context, int redirect_max, int flags STREAMS_DC TSRMLS_DC) /* {{{ */
88: {
89: php_stream *stream = NULL;
90: php_url *resource = NULL;
91: int use_ssl;
92: int use_proxy = 0;
93: char *scratch = NULL;
94: char *tmp = NULL;
95: char *ua_str = NULL;
96: zval **ua_zval = NULL, **tmpzval = NULL;
97: int scratch_len = 0;
98: int body = 0;
99: char location[HTTP_HEADER_BLOCK_SIZE];
100: zval *response_header = NULL;
101: int reqok = 0;
102: char *http_header_line = NULL;
103: char tmp_line[128];
104: size_t chunk_size = 0, file_size = 0;
105: int eol_detect = 0;
106: char *transport_string, *errstr = NULL;
107: int transport_len, have_header = 0, request_fulluri = 0, ignore_errors = 0;
108: char *protocol_version = NULL;
109: int protocol_version_len = 3; /* Default: "1.0" */
110: struct timeval timeout;
111: char *user_headers = NULL;
112: int header_init = ((flags & HTTP_WRAPPER_HEADER_INIT) != 0);
113: int redirected = ((flags & HTTP_WRAPPER_REDIRECTED) != 0);
114: int follow_location = 1;
115: php_stream_filter *transfer_encoding = NULL;
116:
117: tmp_line[0] = '\0';
118:
119: if (redirect_max < 1) {
120: php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "Redirection limit reached, aborting");
121: return NULL;
122: }
123:
124: resource = php_url_parse(path);
125: if (resource == NULL) {
126: return NULL;
127: }
128:
129: if (strncasecmp(resource->scheme, "http", sizeof("http")) && strncasecmp(resource->scheme, "https", sizeof("https"))) {
130: if (!context ||
131: php_stream_context_get_option(context, wrapper->wops->label, "proxy", &tmpzval) == FAILURE ||
132: Z_TYPE_PP(tmpzval) != IS_STRING ||
133: Z_STRLEN_PP(tmpzval) <= 0) {
134: php_url_free(resource);
1.1.1.2 ! misho 135: return php_stream_open_wrapper_ex(path, mode, REPORT_ERRORS, NULL, context);
1.1 misho 136: }
137: /* Called from a non-http wrapper with http proxying requested (i.e. ftp) */
138: request_fulluri = 1;
139: use_ssl = 0;
140: use_proxy = 1;
141:
142: transport_len = Z_STRLEN_PP(tmpzval);
143: transport_string = estrndup(Z_STRVAL_PP(tmpzval), Z_STRLEN_PP(tmpzval));
144: } else {
145: /* Normal http request (possibly with proxy) */
146:
147: if (strpbrk(mode, "awx+")) {
148: php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "HTTP wrapper does not support writeable connections");
149: php_url_free(resource);
150: return NULL;
151: }
152:
153: use_ssl = resource->scheme && (strlen(resource->scheme) > 4) && resource->scheme[4] == 's';
154: /* choose default ports */
155: if (use_ssl && resource->port == 0)
156: resource->port = 443;
157: else if (resource->port == 0)
158: resource->port = 80;
159:
160: if (context &&
161: php_stream_context_get_option(context, wrapper->wops->label, "proxy", &tmpzval) == SUCCESS &&
162: Z_TYPE_PP(tmpzval) == IS_STRING &&
163: Z_STRLEN_PP(tmpzval) > 0) {
164: use_proxy = 1;
165: transport_len = Z_STRLEN_PP(tmpzval);
166: transport_string = estrndup(Z_STRVAL_PP(tmpzval), Z_STRLEN_PP(tmpzval));
167: } else {
168: transport_len = spprintf(&transport_string, 0, "%s://%s:%d", use_ssl ? "ssl" : "tcp", resource->host, resource->port);
169: }
170: }
171:
172: if (context && php_stream_context_get_option(context, wrapper->wops->label, "timeout", &tmpzval) == SUCCESS) {
173: SEPARATE_ZVAL(tmpzval);
174: convert_to_double_ex(tmpzval);
175: timeout.tv_sec = (time_t) Z_DVAL_PP(tmpzval);
176: timeout.tv_usec = (size_t) ((Z_DVAL_PP(tmpzval) - timeout.tv_sec) * 1000000);
177: } else {
178: timeout.tv_sec = FG(default_socket_timeout);
179: timeout.tv_usec = 0;
180: }
181:
182: stream = php_stream_xport_create(transport_string, transport_len, options,
183: STREAM_XPORT_CLIENT | STREAM_XPORT_CONNECT,
184: NULL, &timeout, context, &errstr, NULL);
185:
186: if (stream) {
187: php_stream_set_option(stream, PHP_STREAM_OPTION_READ_TIMEOUT, 0, &timeout);
188: }
189:
190: if (errstr) {
191: php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "%s", errstr);
192: efree(errstr);
193: errstr = NULL;
194: }
195:
196: efree(transport_string);
197:
198: if (stream && use_proxy && use_ssl) {
199: smart_str header = {0};
200:
201: smart_str_appendl(&header, "CONNECT ", sizeof("CONNECT ")-1);
202: smart_str_appends(&header, resource->host);
203: smart_str_appendc(&header, ':');
204: smart_str_append_unsigned(&header, resource->port);
205: smart_str_appendl(&header, " HTTP/1.0\r\n", sizeof(" HTTP/1.0\r\n")-1);
206:
207: /* check if we have Proxy-Authorization header */
208: if (context && php_stream_context_get_option(context, "http", "header", &tmpzval) == SUCCESS) {
209: char *s, *p;
210:
211: if (Z_TYPE_PP(tmpzval) == IS_ARRAY) {
212: HashPosition pos;
213: zval **tmpheader = NULL;
214:
215: for (zend_hash_internal_pointer_reset_ex(Z_ARRVAL_PP(tmpzval), &pos);
216: SUCCESS == zend_hash_get_current_data_ex(Z_ARRVAL_PP(tmpzval), (void *)&tmpheader, &pos);
217: zend_hash_move_forward_ex(Z_ARRVAL_PP(tmpzval), &pos)) {
218: if (Z_TYPE_PP(tmpheader) == IS_STRING) {
219: s = Z_STRVAL_PP(tmpheader);
220: do {
221: while (*s == ' ' || *s == '\t') s++;
222: p = s;
223: while (*p != 0 && *p != ':' && *p != '\r' && *p !='\n') p++;
224: if (*p == ':') {
225: p++;
226: if (p - s == sizeof("Proxy-Authorization:") - 1 &&
227: zend_binary_strcasecmp(s, sizeof("Proxy-Authorization:") - 1,
228: "Proxy-Authorization:", sizeof("Proxy-Authorization:") - 1) == 0) {
229: while (*p != 0 && *p != '\r' && *p !='\n') p++;
230: smart_str_appendl(&header, s, p - s);
231: smart_str_appendl(&header, "\r\n", sizeof("\r\n")-1);
232: goto finish;
233: } else {
234: while (*p != 0 && *p != '\r' && *p !='\n') p++;
235: }
236: }
237: s = p;
238: while (*s == '\r' || *s == '\n') s++;
239: } while (*s != 0);
240: }
241: }
242: } else if (Z_TYPE_PP(tmpzval) == IS_STRING && Z_STRLEN_PP(tmpzval)) {
243: s = Z_STRVAL_PP(tmpzval);
244: do {
245: while (*s == ' ' || *s == '\t') s++;
246: p = s;
247: while (*p != 0 && *p != ':' && *p != '\r' && *p !='\n') p++;
248: if (*p == ':') {
249: p++;
250: if (p - s == sizeof("Proxy-Authorization:") - 1 &&
251: zend_binary_strcasecmp(s, sizeof("Proxy-Authorization:") - 1,
252: "Proxy-Authorization:", sizeof("Proxy-Authorization:") - 1) == 0) {
253: while (*p != 0 && *p != '\r' && *p !='\n') p++;
254: smart_str_appendl(&header, s, p - s);
255: smart_str_appendl(&header, "\r\n", sizeof("\r\n")-1);
256: goto finish;
257: } else {
258: while (*p != 0 && *p != '\r' && *p !='\n') p++;
259: }
260: }
261: s = p;
262: while (*s == '\r' || *s == '\n') s++;
263: } while (*s != 0);
264: }
265: }
266: finish:
267: smart_str_appendl(&header, "\r\n", sizeof("\r\n")-1);
268:
269: if (php_stream_write(stream, header.c, header.len) != header.len) {
270: php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "Cannot connect to HTTPS server through proxy");
271: php_stream_close(stream);
272: stream = NULL;
273: }
274: smart_str_free(&header);
275:
276: if (stream) {
277: char header_line[HTTP_HEADER_BLOCK_SIZE];
278:
279: /* get response header */
280: while (php_stream_gets(stream, header_line, HTTP_HEADER_BLOCK_SIZE-1) != NULL) {
281: if (header_line[0] == '\n' ||
282: header_line[0] == '\r' ||
283: header_line[0] == '\0') {
284: break;
285: }
286: }
287: }
288:
289: /* enable SSL transport layer */
290: if (stream) {
291: if (php_stream_xport_crypto_setup(stream, STREAM_CRYPTO_METHOD_SSLv23_CLIENT, NULL TSRMLS_CC) < 0 ||
292: php_stream_xport_crypto_enable(stream, 1 TSRMLS_CC) < 0) {
293: php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "Cannot connect to HTTPS server through proxy");
294: php_stream_close(stream);
295: stream = NULL;
296: }
297: }
298: }
299:
300: if (stream == NULL)
301: goto out;
302:
303: /* avoid buffering issues while reading header */
304: if (options & STREAM_WILL_CAST)
305: chunk_size = php_stream_set_chunk_size(stream, 1);
306:
307: /* avoid problems with auto-detecting when reading the headers -> the headers
308: * are always in canonical \r\n format */
309: eol_detect = stream->flags & (PHP_STREAM_FLAG_DETECT_EOL | PHP_STREAM_FLAG_EOL_MAC);
310: stream->flags &= ~(PHP_STREAM_FLAG_DETECT_EOL | PHP_STREAM_FLAG_EOL_MAC);
311:
312: php_stream_context_set(stream, context);
313:
314: php_stream_notify_info(context, PHP_STREAM_NOTIFY_CONNECT, NULL, 0);
315:
316: if (header_init && context && php_stream_context_get_option(context, "http", "max_redirects", &tmpzval) == SUCCESS) {
317: SEPARATE_ZVAL(tmpzval);
318: convert_to_long_ex(tmpzval);
319: redirect_max = Z_LVAL_PP(tmpzval);
320: }
321:
322: if (context && php_stream_context_get_option(context, "http", "method", &tmpzval) == SUCCESS) {
323: if (Z_TYPE_PP(tmpzval) == IS_STRING && Z_STRLEN_PP(tmpzval) > 0) {
324: /* As per the RFC, automatically redirected requests MUST NOT use other methods than
325: * GET and HEAD unless it can be confirmed by the user */
326: if (!redirected
327: || (Z_STRLEN_PP(tmpzval) == 3 && memcmp("GET", Z_STRVAL_PP(tmpzval), 3) == 0)
328: || (Z_STRLEN_PP(tmpzval) == 4 && memcmp("HEAD",Z_STRVAL_PP(tmpzval), 4) == 0)
329: ) {
330: scratch_len = strlen(path) + 29 + Z_STRLEN_PP(tmpzval);
331: scratch = emalloc(scratch_len);
332: strlcpy(scratch, Z_STRVAL_PP(tmpzval), Z_STRLEN_PP(tmpzval) + 1);
333: strncat(scratch, " ", 1);
334: }
335: }
336: }
337:
338: if (context && php_stream_context_get_option(context, "http", "protocol_version", &tmpzval) == SUCCESS) {
339: SEPARATE_ZVAL(tmpzval);
340: convert_to_double_ex(tmpzval);
341: protocol_version_len = spprintf(&protocol_version, 0, "%.1F", Z_DVAL_PP(tmpzval));
342: }
343:
344: if (!scratch) {
345: scratch_len = strlen(path) + 29 + protocol_version_len;
346: scratch = emalloc(scratch_len);
347: strncpy(scratch, "GET ", scratch_len);
348: }
349:
350: /* Should we send the entire path in the request line, default to no. */
351: if (!request_fulluri &&
352: context &&
353: php_stream_context_get_option(context, "http", "request_fulluri", &tmpzval) == SUCCESS) {
354: zval ztmp = **tmpzval;
355:
356: zval_copy_ctor(&ztmp);
357: convert_to_boolean(&ztmp);
358: request_fulluri = Z_BVAL(ztmp) ? 1 : 0;
359: zval_dtor(&ztmp);
360: }
361:
362: if (request_fulluri) {
363: /* Ask for everything */
364: strcat(scratch, path);
365: } else {
366: /* Send the traditional /path/to/file?query_string */
367:
368: /* file */
369: if (resource->path && *resource->path) {
370: strlcat(scratch, resource->path, scratch_len);
371: } else {
372: strlcat(scratch, "/", scratch_len);
373: }
374:
375: /* query string */
376: if (resource->query) {
377: strlcat(scratch, "?", scratch_len);
378: strlcat(scratch, resource->query, scratch_len);
379: }
380: }
381:
382: /* protocol version we are speaking */
383: if (protocol_version) {
384: strlcat(scratch, " HTTP/", scratch_len);
385: strlcat(scratch, protocol_version, scratch_len);
386: strlcat(scratch, "\r\n", scratch_len);
387: efree(protocol_version);
388: protocol_version = NULL;
389: } else {
390: strlcat(scratch, " HTTP/1.0\r\n", scratch_len);
391: }
392:
393: /* send it */
394: php_stream_write(stream, scratch, strlen(scratch));
395:
396: if (context && php_stream_context_get_option(context, "http", "header", &tmpzval) == SUCCESS) {
397: tmp = NULL;
398:
399: if (Z_TYPE_PP(tmpzval) == IS_ARRAY) {
400: HashPosition pos;
401: zval **tmpheader = NULL;
402: smart_str tmpstr = {0};
403:
404: for (zend_hash_internal_pointer_reset_ex(Z_ARRVAL_PP(tmpzval), &pos);
405: SUCCESS == zend_hash_get_current_data_ex(Z_ARRVAL_PP(tmpzval), (void *)&tmpheader, &pos);
406: zend_hash_move_forward_ex(Z_ARRVAL_PP(tmpzval), &pos)
407: ) {
408: if (Z_TYPE_PP(tmpheader) == IS_STRING) {
409: smart_str_appendl(&tmpstr, Z_STRVAL_PP(tmpheader), Z_STRLEN_PP(tmpheader));
410: smart_str_appendl(&tmpstr, "\r\n", sizeof("\r\n") - 1);
411: }
412: }
413: smart_str_0(&tmpstr);
414: /* Remove newlines and spaces from start and end. there's at least one extra \r\n at the end that needs to go. */
415: if (tmpstr.c) {
416: tmp = php_trim(tmpstr.c, strlen(tmpstr.c), NULL, 0, NULL, 3 TSRMLS_CC);
417: smart_str_free(&tmpstr);
418: }
419: }
420: if (Z_TYPE_PP(tmpzval) == IS_STRING && Z_STRLEN_PP(tmpzval)) {
421: /* Remove newlines and spaces from start and end php_trim will estrndup() */
422: tmp = php_trim(Z_STRVAL_PP(tmpzval), Z_STRLEN_PP(tmpzval), NULL, 0, NULL, 3 TSRMLS_CC);
423: }
424: if (tmp && strlen(tmp) > 0) {
425: char *s;
426:
427: if (!header_init) { /* Remove post headers for redirects */
428: int l = strlen(tmp);
429: char *s2, *tmp_c = estrdup(tmp);
430:
431: php_strtolower(tmp_c, l);
432: if ((s = strstr(tmp_c, "content-length:"))) {
433: if ((s2 = memchr(s, '\n', tmp_c + l - s))) {
434: int b = tmp_c + l - 1 - s2;
435: memmove(tmp, tmp + (s2 + 1 - tmp_c), b);
436: memmove(tmp_c, s2 + 1, b);
437:
438: } else {
439: tmp[s - tmp_c] = *s = '\0';
440: }
441: l = strlen(tmp_c);
442: }
443: if ((s = strstr(tmp_c, "content-type:"))) {
444: if ((s2 = memchr(s, '\n', tmp_c + l - s))) {
445: memmove(tmp, tmp + (s2 + 1 - tmp_c), tmp_c + l - 1 - s2);
446: } else {
447: tmp[s - tmp_c] = '\0';
448: }
449: }
450:
451: efree(tmp_c);
452: tmp_c = php_trim(tmp, strlen(tmp), NULL, 0, NULL, 3 TSRMLS_CC);
453: efree(tmp);
454: tmp = tmp_c;
455: }
456:
457: user_headers = estrdup(tmp);
458:
459: /* Make lowercase for easy comparison against 'standard' headers */
460: php_strtolower(tmp, strlen(tmp));
461: if ((s = strstr(tmp, "user-agent:")) &&
462: (s == tmp || *(s-1) == '\r' || *(s-1) == '\n' ||
463: *(s-1) == '\t' || *(s-1) == ' ')) {
464: have_header |= HTTP_HEADER_USER_AGENT;
465: }
466: if ((s = strstr(tmp, "host:")) &&
467: (s == tmp || *(s-1) == '\r' || *(s-1) == '\n' ||
468: *(s-1) == '\t' || *(s-1) == ' ')) {
469: have_header |= HTTP_HEADER_HOST;
470: }
471: if ((s = strstr(tmp, "from:")) &&
472: (s == tmp || *(s-1) == '\r' || *(s-1) == '\n' ||
473: *(s-1) == '\t' || *(s-1) == ' ')) {
474: have_header |= HTTP_HEADER_FROM;
475: }
476: if ((s = strstr(tmp, "authorization:")) &&
477: (s == tmp || *(s-1) == '\r' || *(s-1) == '\n' ||
478: *(s-1) == '\t' || *(s-1) == ' ')) {
479: have_header |= HTTP_HEADER_AUTH;
480: }
481: if ((s = strstr(tmp, "content-length:")) &&
482: (s == tmp || *(s-1) == '\r' || *(s-1) == '\n' ||
483: *(s-1) == '\t' || *(s-1) == ' ')) {
484: have_header |= HTTP_HEADER_CONTENT_LENGTH;
485: }
486: if ((s = strstr(tmp, "content-type:")) &&
487: (s == tmp || *(s-1) == '\r' || *(s-1) == '\n' ||
488: *(s-1) == '\t' || *(s-1) == ' ')) {
489: have_header |= HTTP_HEADER_TYPE;
490: }
491: /* remove Proxy-Authorization header */
492: if (use_proxy && use_ssl && (s = strstr(tmp, "proxy-authorization:")) &&
493: (s == tmp || *(s-1) == '\r' || *(s-1) == '\n' ||
494: *(s-1) == '\t' || *(s-1) == ' ')) {
495: char *p = s + sizeof("proxy-authorization:") - 1;
496:
497: while (s > tmp && (*(s-1) == ' ' || *(s-1) == '\t')) s--;
498: while (*p != 0 && *p != '\r' && *p != '\n') p++;
499: while (*p == '\r' || *p == '\n') p++;
500: if (*p == 0) {
501: if (s == tmp) {
502: efree(user_headers);
503: user_headers = NULL;
504: } else {
505: while (s > tmp && (*(s-1) == '\r' || *(s-1) == '\n')) s--;
506: user_headers[s - tmp] = 0;
507: }
508: } else {
509: memmove(user_headers + (s - tmp), user_headers + (p - tmp), strlen(p) + 1);
510: }
511: }
512:
513: }
514: if (tmp) {
515: efree(tmp);
516: }
517: }
518:
519: /* auth header if it was specified */
520: if (((have_header & HTTP_HEADER_AUTH) == 0) && resource->user) {
521: /* decode the strings first */
522: php_url_decode(resource->user, strlen(resource->user));
523:
524: /* scratch is large enough, since it was made large enough for the whole URL */
525: strcpy(scratch, resource->user);
526: strcat(scratch, ":");
527:
528: /* Note: password is optional! */
529: if (resource->pass) {
530: php_url_decode(resource->pass, strlen(resource->pass));
531: strcat(scratch, resource->pass);
532: }
533:
534: tmp = (char*)php_base64_encode((unsigned char*)scratch, strlen(scratch), NULL);
535:
536: if (snprintf(scratch, scratch_len, "Authorization: Basic %s\r\n", tmp) > 0) {
537: php_stream_write(stream, scratch, strlen(scratch));
538: php_stream_notify_info(context, PHP_STREAM_NOTIFY_AUTH_REQUIRED, NULL, 0);
539: }
540:
541: efree(tmp);
542: tmp = NULL;
543: }
544:
545: /* if the user has configured who they are, send a From: line */
1.1.1.2 ! misho 546: if (((have_header & HTTP_HEADER_FROM) == 0) && FG(from_address)) {
! 547: if (snprintf(scratch, scratch_len, "From: %s\r\n", FG(from_address)) > 0)
! 548: php_stream_write(stream, scratch, strlen(scratch));
1.1 misho 549: }
550:
551: /* Send Host: header so name-based virtual hosts work */
552: if ((have_header & HTTP_HEADER_HOST) == 0) {
553: if ((use_ssl && resource->port != 443 && resource->port != 0) ||
554: (!use_ssl && resource->port != 80 && resource->port != 0)) {
555: if (snprintf(scratch, scratch_len, "Host: %s:%i\r\n", resource->host, resource->port) > 0)
556: php_stream_write(stream, scratch, strlen(scratch));
557: } else {
558: if (snprintf(scratch, scratch_len, "Host: %s\r\n", resource->host) > 0) {
559: php_stream_write(stream, scratch, strlen(scratch));
560: }
561: }
562: }
563:
564: if (context &&
565: php_stream_context_get_option(context, "http", "user_agent", &ua_zval) == SUCCESS &&
566: Z_TYPE_PP(ua_zval) == IS_STRING) {
567: ua_str = Z_STRVAL_PP(ua_zval);
568: } else if (FG(user_agent)) {
569: ua_str = FG(user_agent);
570: }
571:
572: if (((have_header & HTTP_HEADER_USER_AGENT) == 0) && ua_str) {
573: #define _UA_HEADER "User-Agent: %s\r\n"
574: char *ua;
575: size_t ua_len;
576:
577: ua_len = sizeof(_UA_HEADER) + strlen(ua_str);
578:
579: /* ensure the header is only sent if user_agent is not blank */
580: if (ua_len > sizeof(_UA_HEADER)) {
581: ua = emalloc(ua_len + 1);
582: if ((ua_len = slprintf(ua, ua_len, _UA_HEADER, ua_str)) > 0) {
583: ua[ua_len] = 0;
584: php_stream_write(stream, ua, ua_len);
585: } else {
586: php_error_docref(NULL TSRMLS_CC, E_WARNING, "Cannot construct User-agent header");
587: }
588:
589: if (ua) {
590: efree(ua);
591: }
592: }
593: }
594:
595: if (user_headers) {
596: /* A bit weird, but some servers require that Content-Length be sent prior to Content-Type for POST
597: * see bug #44603 for details. Since Content-Type maybe part of user's headers we need to do this check first.
598: */
599: if (
600: header_init &&
601: context &&
602: !(have_header & HTTP_HEADER_CONTENT_LENGTH) &&
603: php_stream_context_get_option(context, "http", "content", &tmpzval) == SUCCESS &&
604: Z_TYPE_PP(tmpzval) == IS_STRING && Z_STRLEN_PP(tmpzval) > 0
605: ) {
606: scratch_len = slprintf(scratch, scratch_len, "Content-Length: %d\r\n", Z_STRLEN_PP(tmpzval));
607: php_stream_write(stream, scratch, scratch_len);
608: have_header |= HTTP_HEADER_CONTENT_LENGTH;
609: }
610:
611: php_stream_write(stream, user_headers, strlen(user_headers));
612: php_stream_write(stream, "\r\n", sizeof("\r\n")-1);
613: efree(user_headers);
614: }
615:
616: /* Request content, such as for POST requests */
617: if (header_init && context &&
618: php_stream_context_get_option(context, "http", "content", &tmpzval) == SUCCESS &&
619: Z_TYPE_PP(tmpzval) == IS_STRING && Z_STRLEN_PP(tmpzval) > 0) {
620: if (!(have_header & HTTP_HEADER_CONTENT_LENGTH)) {
621: scratch_len = slprintf(scratch, scratch_len, "Content-Length: %d\r\n", Z_STRLEN_PP(tmpzval));
622: php_stream_write(stream, scratch, scratch_len);
623: }
624: if (!(have_header & HTTP_HEADER_TYPE)) {
625: php_stream_write(stream, "Content-Type: application/x-www-form-urlencoded\r\n",
626: sizeof("Content-Type: application/x-www-form-urlencoded\r\n") - 1);
627: php_error_docref(NULL TSRMLS_CC, E_NOTICE, "Content-type not specified assuming application/x-www-form-urlencoded");
628: }
629: php_stream_write(stream, "\r\n", sizeof("\r\n")-1);
630: php_stream_write(stream, Z_STRVAL_PP(tmpzval), Z_STRLEN_PP(tmpzval));
631: } else {
632: php_stream_write(stream, "\r\n", sizeof("\r\n")-1);
633: }
634:
635: location[0] = '\0';
636:
637: if (!EG(active_symbol_table)) {
638: zend_rebuild_symbol_table(TSRMLS_C);
639: }
640:
641: if (header_init) {
642: zval *ztmp;
643: MAKE_STD_ZVAL(ztmp);
644: array_init(ztmp);
645: ZEND_SET_SYMBOL(EG(active_symbol_table), "http_response_header", ztmp);
646: }
647:
648: {
649: zval **rh;
650: zend_hash_find(EG(active_symbol_table), "http_response_header", sizeof("http_response_header"), (void **) &rh);
651: response_header = *rh;
652: }
653:
654: if (!php_stream_eof(stream)) {
655: size_t tmp_line_len;
656: /* get response header */
657:
658: if (php_stream_get_line(stream, tmp_line, sizeof(tmp_line) - 1, &tmp_line_len) != NULL) {
659: zval *http_response;
660: int response_code;
661:
662: if (tmp_line_len > 9) {
663: response_code = atoi(tmp_line + 9);
664: } else {
665: response_code = 0;
666: }
667: if (context && SUCCESS==php_stream_context_get_option(context, "http", "ignore_errors", &tmpzval)) {
668: ignore_errors = zend_is_true(*tmpzval);
669: }
670: /* when we request only the header, don't fail even on error codes */
671: if ((options & STREAM_ONLY_GET_HEADERS) || ignore_errors) {
672: reqok = 1;
673: }
674: /* all status codes in the 2xx range are defined by the specification as successful;
675: * all status codes in the 3xx range are for redirection, and so also should never
676: * fail */
677: if (response_code >= 200 && response_code < 400) {
678: reqok = 1;
679: } else {
680: switch(response_code) {
681: case 403:
682: php_stream_notify_error(context, PHP_STREAM_NOTIFY_AUTH_RESULT,
683: tmp_line, response_code);
684: break;
685: default:
686: /* safety net in the event tmp_line == NULL */
687: if (!tmp_line_len) {
688: tmp_line[0] = '\0';
689: }
690: php_stream_notify_error(context, PHP_STREAM_NOTIFY_FAILURE,
691: tmp_line, response_code);
692: }
693: }
694: if (tmp_line[tmp_line_len - 1] == '\n') {
695: --tmp_line_len;
696: if (tmp_line[tmp_line_len - 1] == '\r') {
697: --tmp_line_len;
698: }
699: }
700: MAKE_STD_ZVAL(http_response);
701: ZVAL_STRINGL(http_response, tmp_line, tmp_line_len, 1);
702: zend_hash_next_index_insert(Z_ARRVAL_P(response_header), &http_response, sizeof(zval *), NULL);
703: }
704: } else {
705: php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "HTTP request failed, unexpected end of socket!");
706: goto out;
707: }
708:
709: /* read past HTTP headers */
710:
711: http_header_line = emalloc(HTTP_HEADER_BLOCK_SIZE);
712:
713: while (!body && !php_stream_eof(stream)) {
714: size_t http_header_line_length;
715: if (php_stream_get_line(stream, http_header_line, HTTP_HEADER_BLOCK_SIZE, &http_header_line_length) && *http_header_line != '\n' && *http_header_line != '\r') {
716: char *e = http_header_line + http_header_line_length - 1;
717: if (*e != '\n') {
718: do { /* partial header */
719: if (php_stream_get_line(stream, http_header_line, HTTP_HEADER_BLOCK_SIZE, &http_header_line_length) == NULL) {
720: php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "Failed to read HTTP headers");
721: goto out;
722: }
723: e = http_header_line + http_header_line_length - 1;
724: } while (*e != '\n');
725: continue;
726: }
727: while (*e == '\n' || *e == '\r') {
728: e--;
729: }
730: http_header_line_length = e - http_header_line + 1;
731: http_header_line[http_header_line_length] = '\0';
732:
733: if (!strncasecmp(http_header_line, "Location: ", 10)) {
734: if (context && php_stream_context_get_option(context, "http", "follow_location", &tmpzval) == SUCCESS) {
735: SEPARATE_ZVAL(tmpzval);
736: convert_to_long_ex(tmpzval);
737: follow_location = Z_LVAL_PP(tmpzval);
738: }
739: strlcpy(location, http_header_line + 10, sizeof(location));
740: } else if (!strncasecmp(http_header_line, "Content-Type: ", 14)) {
741: php_stream_notify_info(context, PHP_STREAM_NOTIFY_MIME_TYPE_IS, http_header_line + 14, 0);
742: } else if (!strncasecmp(http_header_line, "Content-Length: ", 16)) {
743: file_size = atoi(http_header_line + 16);
744: php_stream_notify_file_size(context, file_size, http_header_line, 0);
745: } else if (!strncasecmp(http_header_line, "Transfer-Encoding: chunked", sizeof("Transfer-Encoding: chunked"))) {
746:
747: /* create filter to decode response body */
748: if (!(options & STREAM_ONLY_GET_HEADERS)) {
749: long decode = 1;
750:
751: if (context && php_stream_context_get_option(context, "http", "auto_decode", &tmpzval) == SUCCESS) {
752: SEPARATE_ZVAL(tmpzval);
753: convert_to_boolean(*tmpzval);
754: decode = Z_LVAL_PP(tmpzval);
755: }
756: if (decode) {
757: transfer_encoding = php_stream_filter_create("dechunk", NULL, php_stream_is_persistent(stream) TSRMLS_CC);
758: if (transfer_encoding) {
759: /* don't store transfer-encodeing header */
760: continue;
761: }
762: }
763: }
764: }
765:
766: if (http_header_line[0] == '\0') {
767: body = 1;
768: } else {
769: zval *http_header;
770:
771: MAKE_STD_ZVAL(http_header);
772:
773: ZVAL_STRINGL(http_header, http_header_line, http_header_line_length, 1);
774:
775: zend_hash_next_index_insert(Z_ARRVAL_P(response_header), &http_header, sizeof(zval *), NULL);
776: }
777: } else {
778: break;
779: }
780: }
781:
782: if (!reqok || (location[0] != '\0' && follow_location)) {
783: if (!follow_location || (((options & STREAM_ONLY_GET_HEADERS) || ignore_errors) && redirect_max <= 1)) {
784: goto out;
785: }
786:
787: if (location[0] != '\0')
788: php_stream_notify_info(context, PHP_STREAM_NOTIFY_REDIRECTED, location, 0);
789:
790: php_stream_close(stream);
791: stream = NULL;
792:
793: if (location[0] != '\0') {
794:
795: char new_path[HTTP_HEADER_BLOCK_SIZE];
796: char loc_path[HTTP_HEADER_BLOCK_SIZE];
797:
798: *new_path='\0';
799: if (strlen(location)<8 || (strncasecmp(location, "http://", sizeof("http://")-1) &&
800: strncasecmp(location, "https://", sizeof("https://")-1) &&
801: strncasecmp(location, "ftp://", sizeof("ftp://")-1) &&
802: strncasecmp(location, "ftps://", sizeof("ftps://")-1)))
803: {
804: if (*location != '/') {
805: if (*(location+1) != '\0' && resource->path) {
806: char *s = strrchr(resource->path, '/');
807: if (!s) {
808: s = resource->path;
809: if (!s[0]) {
810: efree(s);
811: s = resource->path = estrdup("/");
812: } else {
813: *s = '/';
814: }
815: }
816: s[1] = '\0';
817: if (resource->path && *(resource->path) == '/' && *(resource->path + 1) == '\0') {
818: snprintf(loc_path, sizeof(loc_path) - 1, "%s%s", resource->path, location);
819: } else {
820: snprintf(loc_path, sizeof(loc_path) - 1, "%s/%s", resource->path, location);
821: }
822: } else {
823: snprintf(loc_path, sizeof(loc_path) - 1, "/%s", location);
824: }
825: } else {
826: strlcpy(loc_path, location, sizeof(loc_path));
827: }
828: if ((use_ssl && resource->port != 443) || (!use_ssl && resource->port != 80)) {
829: snprintf(new_path, sizeof(new_path) - 1, "%s://%s:%d%s", resource->scheme, resource->host, resource->port, loc_path);
830: } else {
831: snprintf(new_path, sizeof(new_path) - 1, "%s://%s%s", resource->scheme, resource->host, loc_path);
832: }
833: } else {
834: strlcpy(new_path, location, sizeof(new_path));
835: }
836:
837: php_url_free(resource);
838: /* check for invalid redirection URLs */
839: if ((resource = php_url_parse(new_path)) == NULL) {
840: php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "Invalid redirect URL! %s", new_path);
841: goto out;
842: }
843:
844: #define CHECK_FOR_CNTRL_CHARS(val) { \
845: if (val) { \
846: unsigned char *s, *e; \
847: int l; \
848: l = php_url_decode(val, strlen(val)); \
849: s = (unsigned char*)val; e = s + l; \
850: while (s < e) { \
851: if (iscntrl(*s)) { \
852: php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "Invalid redirect URL! %s", new_path); \
853: goto out; \
854: } \
855: s++; \
856: } \
857: } \
858: }
859: /* check for control characters in login, password & path */
860: if (strncasecmp(new_path, "http://", sizeof("http://") - 1) || strncasecmp(new_path, "https://", sizeof("https://") - 1)) {
861: CHECK_FOR_CNTRL_CHARS(resource->user)
862: CHECK_FOR_CNTRL_CHARS(resource->pass)
863: CHECK_FOR_CNTRL_CHARS(resource->path)
864: }
865: stream = php_stream_url_wrap_http_ex(wrapper, new_path, mode, options, opened_path, context, --redirect_max, HTTP_WRAPPER_REDIRECTED STREAMS_CC TSRMLS_CC);
866: } else {
867: php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "HTTP request failed! %s", tmp_line);
868: }
869: }
870: out:
871: if (protocol_version) {
872: efree(protocol_version);
873: }
874:
875: if (http_header_line) {
876: efree(http_header_line);
877: }
878:
879: if (scratch) {
880: efree(scratch);
881: }
882:
883: if (resource) {
884: php_url_free(resource);
885: }
886:
887: if (stream) {
888: if (header_init) {
889: zval_add_ref(&response_header);
890: stream->wrapperdata = response_header;
891: }
892: php_stream_notify_progress_init(context, 0, file_size);
893:
894: /* Restore original chunk size now that we're done with headers */
895: if (options & STREAM_WILL_CAST)
896: php_stream_set_chunk_size(stream, chunk_size);
897:
898: /* restore the users auto-detect-line-endings setting */
899: stream->flags |= eol_detect;
900:
901: /* as far as streams are concerned, we are now at the start of
902: * the stream */
903: stream->position = 0;
904:
905: /* restore mode */
906: strlcpy(stream->mode, mode, sizeof(stream->mode));
907:
908: if (transfer_encoding) {
909: php_stream_filter_append(&stream->readfilters, transfer_encoding);
910: }
911: } else if (transfer_encoding) {
912: php_stream_filter_free(transfer_encoding TSRMLS_CC);
913: }
914:
915: return stream;
916: }
917: /* }}} */
918:
919: php_stream *php_stream_url_wrap_http(php_stream_wrapper *wrapper, char *path, char *mode, int options, char **opened_path, php_stream_context *context STREAMS_DC TSRMLS_DC) /* {{{ */
920: {
921: return php_stream_url_wrap_http_ex(wrapper, path, mode, options, opened_path, context, PHP_URL_REDIRECT_MAX, HTTP_WRAPPER_HEADER_INIT STREAMS_CC TSRMLS_CC);
922: }
923: /* }}} */
924:
925: static int php_stream_http_stream_stat(php_stream_wrapper *wrapper, php_stream *stream, php_stream_statbuf *ssb TSRMLS_DC) /* {{{ */
926: {
927: /* one day, we could fill in the details based on Date: and Content-Length:
928: * headers. For now, we return with a failure code to prevent the underlying
929: * file's details from being used instead. */
930: return -1;
931: }
932: /* }}} */
933:
934: static php_stream_wrapper_ops http_stream_wops = {
935: php_stream_url_wrap_http,
936: NULL, /* stream_close */
937: php_stream_http_stream_stat,
938: NULL, /* stat_url */
939: NULL, /* opendir */
940: "http",
941: NULL, /* unlink */
942: NULL, /* rename */
943: NULL, /* mkdir */
944: NULL /* rmdir */
945: };
946:
947: PHPAPI php_stream_wrapper php_stream_http_wrapper = {
948: &http_stream_wops,
949: NULL,
950: 1 /* is_url */
951: };
952:
953: /*
954: * Local variables:
955: * tab-width: 4
956: * c-basic-offset: 4
957: * End:
958: * vim600: sw=4 ts=4 fdm=marker
959: * vim<600: sw=4 ts=4
960: */
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>