http_fopen_wrapper.c 34 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020
  1. /*
  2. +----------------------------------------------------------------------+
  3. | PHP Version 5 |
  4. +----------------------------------------------------------------------+
  5. | Copyright (c) 1997-2016 The PHP Group |
  6. +----------------------------------------------------------------------+
  7. | This source file is subject to version 3.01 of the PHP license, |
  8. | that is bundled with this package in the file LICENSE, and is |
  9. | available through the world-wide-web at the following url: |
  10. | http://www.php.net/license/3_01.txt |
  11. | If you did not receive a copy of the PHP license and are unable to |
  12. | obtain it through the world-wide-web, please send a note to |
  13. | license@php.net so we can mail you a copy immediately. |
  14. +----------------------------------------------------------------------+
  15. | Authors: Rasmus Lerdorf <rasmus@php.net> |
  16. | Jim Winstead <jimw@php.net> |
  17. | Hartmut Holzgraefe <hholzgra@php.net> |
  18. | Wez Furlong <wez@thebrainroom.com> |
  19. | Sara Golemon <pollita@php.net> |
  20. +----------------------------------------------------------------------+
  21. */
  22. /* $Id$ */
  23. #include "php.h"
  24. #include "php_globals.h"
  25. #include "php_streams.h"
  26. #include "php_network.h"
  27. #include "php_ini.h"
  28. #include "ext/standard/basic_functions.h"
  29. #include "ext/standard/php_smart_str.h"
  30. #include <stdio.h>
  31. #include <stdlib.h>
  32. #include <errno.h>
  33. #include <sys/types.h>
  34. #include <sys/stat.h>
  35. #include <fcntl.h>
  36. #ifdef PHP_WIN32
  37. #define O_RDONLY _O_RDONLY
  38. #include "win32/param.h"
  39. #else
  40. #include <sys/param.h>
  41. #endif
  42. #include "php_standard.h"
  43. #include <sys/types.h>
  44. #if HAVE_SYS_SOCKET_H
  45. #include <sys/socket.h>
  46. #endif
  47. #ifdef PHP_WIN32
  48. #include <winsock2.h>
  49. #elif defined(NETWARE) && defined(USE_WINSOCK)
  50. #include <novsock2.h>
  51. #else
  52. #include <netinet/in.h>
  53. #include <netdb.h>
  54. #if HAVE_ARPA_INET_H
  55. #include <arpa/inet.h>
  56. #endif
  57. #endif
  58. #if defined(PHP_WIN32) || defined(__riscos__) || defined(NETWARE)
  59. #undef AF_UNIX
  60. #endif
  61. #if defined(AF_UNIX)
  62. #include <sys/un.h>
  63. #endif
  64. #include "php_fopen_wrappers.h"
  65. #define HTTP_HEADER_BLOCK_SIZE 1024
  66. #define PHP_URL_REDIRECT_MAX 20
  67. #define HTTP_HEADER_USER_AGENT 1
  68. #define HTTP_HEADER_HOST 2
  69. #define HTTP_HEADER_AUTH 4
  70. #define HTTP_HEADER_FROM 8
  71. #define HTTP_HEADER_CONTENT_LENGTH 16
  72. #define HTTP_HEADER_TYPE 32
  73. #define HTTP_HEADER_CONNECTION 64
  74. #define HTTP_WRAPPER_HEADER_INIT 1
  75. #define HTTP_WRAPPER_REDIRECTED 2
  76. static inline void strip_header(char *header_bag, char *lc_header_bag,
  77. const char *lc_header_name)
  78. {
  79. char *lc_header_start = strstr(lc_header_bag, lc_header_name);
  80. char *header_start = header_bag + (lc_header_start - lc_header_bag);
  81. if (lc_header_start
  82. && (lc_header_start == lc_header_bag || *(lc_header_start-1) == '\n')
  83. ) {
  84. char *lc_eol = strchr(lc_header_start, '\n');
  85. char *eol = header_start + (lc_eol - lc_header_start);
  86. if (lc_eol) {
  87. size_t eollen = strlen(lc_eol);
  88. memmove(lc_header_start, lc_eol+1, eollen);
  89. memmove(header_start, eol+1, eollen);
  90. } else {
  91. *lc_header_start = '\0';
  92. *header_start = '\0';
  93. }
  94. }
  95. }
  96. php_stream *php_stream_url_wrap_http_ex(php_stream_wrapper *wrapper,
  97. const char *path, const char *mode, int options, char **opened_path,
  98. php_stream_context *context, int redirect_max, int flags STREAMS_DC TSRMLS_DC) /* {{{ */
  99. {
  100. php_stream *stream = NULL;
  101. php_url *resource = NULL;
  102. int use_ssl;
  103. int use_proxy = 0;
  104. char *scratch = NULL;
  105. char *tmp = NULL;
  106. char *ua_str = NULL;
  107. zval **ua_zval = NULL, **tmpzval = NULL, *ssl_proxy_peer_name = NULL;
  108. int scratch_len = 0;
  109. int body = 0;
  110. char location[HTTP_HEADER_BLOCK_SIZE];
  111. zval *response_header = NULL;
  112. int reqok = 0;
  113. char *http_header_line = NULL;
  114. char tmp_line[128];
  115. size_t chunk_size = 0, file_size = 0;
  116. int eol_detect = 0;
  117. char *transport_string, *errstr = NULL;
  118. int transport_len, have_header = 0, request_fulluri = 0, ignore_errors = 0;
  119. char *protocol_version = NULL;
  120. int protocol_version_len = 3; /* Default: "1.0" */
  121. struct timeval timeout;
  122. char *user_headers = NULL;
  123. int header_init = ((flags & HTTP_WRAPPER_HEADER_INIT) != 0);
  124. int redirected = ((flags & HTTP_WRAPPER_REDIRECTED) != 0);
  125. int follow_location = 1;
  126. php_stream_filter *transfer_encoding = NULL;
  127. int response_code;
  128. tmp_line[0] = '\0';
  129. if (redirect_max < 1) {
  130. php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "Redirection limit reached, aborting");
  131. return NULL;
  132. }
  133. resource = php_url_parse(path);
  134. if (resource == NULL) {
  135. return NULL;
  136. }
  137. if (strncasecmp(resource->scheme, "http", sizeof("http")) && strncasecmp(resource->scheme, "https", sizeof("https"))) {
  138. if (!context ||
  139. php_stream_context_get_option(context, wrapper->wops->label, "proxy", &tmpzval) == FAILURE ||
  140. Z_TYPE_PP(tmpzval) != IS_STRING ||
  141. Z_STRLEN_PP(tmpzval) <= 0) {
  142. php_url_free(resource);
  143. return php_stream_open_wrapper_ex(path, mode, REPORT_ERRORS, NULL, context);
  144. }
  145. /* Called from a non-http wrapper with http proxying requested (i.e. ftp) */
  146. request_fulluri = 1;
  147. use_ssl = 0;
  148. use_proxy = 1;
  149. transport_len = Z_STRLEN_PP(tmpzval);
  150. transport_string = estrndup(Z_STRVAL_PP(tmpzval), Z_STRLEN_PP(tmpzval));
  151. } else {
  152. /* Normal http request (possibly with proxy) */
  153. if (strpbrk(mode, "awx+")) {
  154. php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "HTTP wrapper does not support writeable connections");
  155. php_url_free(resource);
  156. return NULL;
  157. }
  158. use_ssl = resource->scheme && (strlen(resource->scheme) > 4) && resource->scheme[4] == 's';
  159. /* choose default ports */
  160. if (use_ssl && resource->port == 0)
  161. resource->port = 443;
  162. else if (resource->port == 0)
  163. resource->port = 80;
  164. if (context &&
  165. php_stream_context_get_option(context, wrapper->wops->label, "proxy", &tmpzval) == SUCCESS &&
  166. Z_TYPE_PP(tmpzval) == IS_STRING &&
  167. Z_STRLEN_PP(tmpzval) > 0) {
  168. use_proxy = 1;
  169. transport_len = Z_STRLEN_PP(tmpzval);
  170. transport_string = estrndup(Z_STRVAL_PP(tmpzval), Z_STRLEN_PP(tmpzval));
  171. } else {
  172. transport_len = spprintf(&transport_string, 0, "%s://%s:%d", use_ssl ? "ssl" : "tcp", resource->host, resource->port);
  173. }
  174. }
  175. if (context && php_stream_context_get_option(context, wrapper->wops->label, "timeout", &tmpzval) == SUCCESS) {
  176. SEPARATE_ZVAL(tmpzval);
  177. convert_to_double_ex(tmpzval);
  178. timeout.tv_sec = (time_t) Z_DVAL_PP(tmpzval);
  179. timeout.tv_usec = (size_t) ((Z_DVAL_PP(tmpzval) - timeout.tv_sec) * 1000000);
  180. } else {
  181. timeout.tv_sec = FG(default_socket_timeout);
  182. timeout.tv_usec = 0;
  183. }
  184. stream = php_stream_xport_create(transport_string, transport_len, options,
  185. STREAM_XPORT_CLIENT | STREAM_XPORT_CONNECT,
  186. NULL, &timeout, context, &errstr, NULL);
  187. if (stream) {
  188. php_stream_set_option(stream, PHP_STREAM_OPTION_READ_TIMEOUT, 0, &timeout);
  189. }
  190. if (errstr) {
  191. php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "%s", errstr);
  192. efree(errstr);
  193. errstr = NULL;
  194. }
  195. efree(transport_string);
  196. if (stream && use_proxy && use_ssl) {
  197. smart_str header = {0};
  198. /* Set peer_name or name verification will try to use the proxy server name */
  199. if (!context || php_stream_context_get_option(context, "ssl", "peer_name", &tmpzval) == FAILURE) {
  200. MAKE_STD_ZVAL(ssl_proxy_peer_name);
  201. ZVAL_STRING(ssl_proxy_peer_name, resource->host, 1);
  202. php_stream_context_set_option(stream->context, "ssl", "peer_name", ssl_proxy_peer_name);
  203. }
  204. smart_str_appendl(&header, "CONNECT ", sizeof("CONNECT ")-1);
  205. smart_str_appends(&header, resource->host);
  206. smart_str_appendc(&header, ':');
  207. smart_str_append_unsigned(&header, resource->port);
  208. smart_str_appendl(&header, " HTTP/1.0\r\n", sizeof(" HTTP/1.0\r\n")-1);
  209. /* check if we have Proxy-Authorization header */
  210. if (context && php_stream_context_get_option(context, "http", "header", &tmpzval) == SUCCESS) {
  211. char *s, *p;
  212. if (Z_TYPE_PP(tmpzval) == IS_ARRAY) {
  213. HashPosition pos;
  214. zval **tmpheader = NULL;
  215. for (zend_hash_internal_pointer_reset_ex(Z_ARRVAL_PP(tmpzval), &pos);
  216. SUCCESS == zend_hash_get_current_data_ex(Z_ARRVAL_PP(tmpzval), (void *)&tmpheader, &pos);
  217. zend_hash_move_forward_ex(Z_ARRVAL_PP(tmpzval), &pos)) {
  218. if (Z_TYPE_PP(tmpheader) == IS_STRING) {
  219. s = Z_STRVAL_PP(tmpheader);
  220. do {
  221. while (*s == ' ' || *s == '\t') s++;
  222. p = s;
  223. while (*p != 0 && *p != ':' && *p != '\r' && *p !='\n') p++;
  224. if (*p == ':') {
  225. p++;
  226. if (p - s == sizeof("Proxy-Authorization:") - 1 &&
  227. zend_binary_strcasecmp(s, sizeof("Proxy-Authorization:") - 1,
  228. "Proxy-Authorization:", sizeof("Proxy-Authorization:") - 1) == 0) {
  229. while (*p != 0 && *p != '\r' && *p !='\n') p++;
  230. smart_str_appendl(&header, s, p - s);
  231. smart_str_appendl(&header, "\r\n", sizeof("\r\n")-1);
  232. goto finish;
  233. } else {
  234. while (*p != 0 && *p != '\r' && *p !='\n') p++;
  235. }
  236. }
  237. s = p;
  238. while (*s == '\r' || *s == '\n') s++;
  239. } while (*s != 0);
  240. }
  241. }
  242. } else if (Z_TYPE_PP(tmpzval) == IS_STRING && Z_STRLEN_PP(tmpzval)) {
  243. s = Z_STRVAL_PP(tmpzval);
  244. do {
  245. while (*s == ' ' || *s == '\t') s++;
  246. p = s;
  247. while (*p != 0 && *p != ':' && *p != '\r' && *p !='\n') p++;
  248. if (*p == ':') {
  249. p++;
  250. if (p - s == sizeof("Proxy-Authorization:") - 1 &&
  251. zend_binary_strcasecmp(s, sizeof("Proxy-Authorization:") - 1,
  252. "Proxy-Authorization:", sizeof("Proxy-Authorization:") - 1) == 0) {
  253. while (*p != 0 && *p != '\r' && *p !='\n') p++;
  254. smart_str_appendl(&header, s, p - s);
  255. smart_str_appendl(&header, "\r\n", sizeof("\r\n")-1);
  256. goto finish;
  257. } else {
  258. while (*p != 0 && *p != '\r' && *p !='\n') p++;
  259. }
  260. }
  261. s = p;
  262. while (*s == '\r' || *s == '\n') s++;
  263. } while (*s != 0);
  264. }
  265. }
  266. finish:
  267. smart_str_appendl(&header, "\r\n", sizeof("\r\n")-1);
  268. if (php_stream_write(stream, header.c, header.len) != header.len) {
  269. php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "Cannot connect to HTTPS server through proxy");
  270. php_stream_close(stream);
  271. stream = NULL;
  272. }
  273. smart_str_free(&header);
  274. if (stream) {
  275. char header_line[HTTP_HEADER_BLOCK_SIZE];
  276. /* get response header */
  277. while (php_stream_gets(stream, header_line, HTTP_HEADER_BLOCK_SIZE-1) != NULL) {
  278. if (header_line[0] == '\n' ||
  279. header_line[0] == '\r' ||
  280. header_line[0] == '\0') {
  281. break;
  282. }
  283. }
  284. }
  285. /* enable SSL transport layer */
  286. if (stream) {
  287. if (php_stream_xport_crypto_setup(stream, STREAM_CRYPTO_METHOD_SSLv23_CLIENT, NULL TSRMLS_CC) < 0 ||
  288. php_stream_xport_crypto_enable(stream, 1 TSRMLS_CC) < 0) {
  289. php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "Cannot connect to HTTPS server through proxy");
  290. php_stream_close(stream);
  291. stream = NULL;
  292. }
  293. }
  294. }
  295. if (stream == NULL)
  296. goto out;
  297. /* avoid buffering issues while reading header */
  298. if (options & STREAM_WILL_CAST)
  299. chunk_size = php_stream_set_chunk_size(stream, 1);
  300. /* avoid problems with auto-detecting when reading the headers -> the headers
  301. * are always in canonical \r\n format */
  302. eol_detect = stream->flags & (PHP_STREAM_FLAG_DETECT_EOL | PHP_STREAM_FLAG_EOL_MAC);
  303. stream->flags &= ~(PHP_STREAM_FLAG_DETECT_EOL | PHP_STREAM_FLAG_EOL_MAC);
  304. php_stream_context_set(stream, context);
  305. php_stream_notify_info(context, PHP_STREAM_NOTIFY_CONNECT, NULL, 0);
  306. if (header_init && context && php_stream_context_get_option(context, "http", "max_redirects", &tmpzval) == SUCCESS) {
  307. SEPARATE_ZVAL(tmpzval);
  308. convert_to_long_ex(tmpzval);
  309. redirect_max = Z_LVAL_PP(tmpzval);
  310. }
  311. if (context && php_stream_context_get_option(context, "http", "method", &tmpzval) == SUCCESS) {
  312. if (Z_TYPE_PP(tmpzval) == IS_STRING && Z_STRLEN_PP(tmpzval) > 0) {
  313. /* As per the RFC, automatically redirected requests MUST NOT use other methods than
  314. * GET and HEAD unless it can be confirmed by the user */
  315. if (!redirected
  316. || (Z_STRLEN_PP(tmpzval) == 3 && memcmp("GET", Z_STRVAL_PP(tmpzval), 3) == 0)
  317. || (Z_STRLEN_PP(tmpzval) == 4 && memcmp("HEAD",Z_STRVAL_PP(tmpzval), 4) == 0)
  318. ) {
  319. scratch_len = strlen(path) + 29 + Z_STRLEN_PP(tmpzval);
  320. scratch = emalloc(scratch_len);
  321. strlcpy(scratch, Z_STRVAL_PP(tmpzval), Z_STRLEN_PP(tmpzval) + 1);
  322. strncat(scratch, " ", 1);
  323. }
  324. }
  325. }
  326. if (context && php_stream_context_get_option(context, "http", "protocol_version", &tmpzval) == SUCCESS) {
  327. SEPARATE_ZVAL(tmpzval);
  328. convert_to_double_ex(tmpzval);
  329. protocol_version_len = spprintf(&protocol_version, 0, "%.1F", Z_DVAL_PP(tmpzval));
  330. }
  331. if (!scratch) {
  332. scratch_len = strlen(path) + 29 + protocol_version_len;
  333. scratch = emalloc(scratch_len);
  334. strncpy(scratch, "GET ", scratch_len);
  335. }
  336. /* Should we send the entire path in the request line, default to no. */
  337. if (!request_fulluri &&
  338. context &&
  339. php_stream_context_get_option(context, "http", "request_fulluri", &tmpzval) == SUCCESS) {
  340. zval ztmp = **tmpzval;
  341. zval_copy_ctor(&ztmp);
  342. convert_to_boolean(&ztmp);
  343. request_fulluri = Z_BVAL(ztmp) ? 1 : 0;
  344. zval_dtor(&ztmp);
  345. }
  346. if (request_fulluri) {
  347. /* Ask for everything */
  348. strcat(scratch, path);
  349. } else {
  350. /* Send the traditional /path/to/file?query_string */
  351. /* file */
  352. if (resource->path && *resource->path) {
  353. strlcat(scratch, resource->path, scratch_len);
  354. } else {
  355. strlcat(scratch, "/", scratch_len);
  356. }
  357. /* query string */
  358. if (resource->query) {
  359. strlcat(scratch, "?", scratch_len);
  360. strlcat(scratch, resource->query, scratch_len);
  361. }
  362. }
  363. /* protocol version we are speaking */
  364. if (protocol_version) {
  365. strlcat(scratch, " HTTP/", scratch_len);
  366. strlcat(scratch, protocol_version, scratch_len);
  367. strlcat(scratch, "\r\n", scratch_len);
  368. } else {
  369. strlcat(scratch, " HTTP/1.0\r\n", scratch_len);
  370. }
  371. /* send it */
  372. php_stream_write(stream, scratch, strlen(scratch));
  373. if (context && php_stream_context_get_option(context, "http", "header", &tmpzval) == SUCCESS) {
  374. tmp = NULL;
  375. if (Z_TYPE_PP(tmpzval) == IS_ARRAY) {
  376. HashPosition pos;
  377. zval **tmpheader = NULL;
  378. smart_str tmpstr = {0};
  379. for (zend_hash_internal_pointer_reset_ex(Z_ARRVAL_PP(tmpzval), &pos);
  380. SUCCESS == zend_hash_get_current_data_ex(Z_ARRVAL_PP(tmpzval), (void *)&tmpheader, &pos);
  381. zend_hash_move_forward_ex(Z_ARRVAL_PP(tmpzval), &pos)
  382. ) {
  383. if (Z_TYPE_PP(tmpheader) == IS_STRING) {
  384. smart_str_appendl(&tmpstr, Z_STRVAL_PP(tmpheader), Z_STRLEN_PP(tmpheader));
  385. smart_str_appendl(&tmpstr, "\r\n", sizeof("\r\n") - 1);
  386. }
  387. }
  388. smart_str_0(&tmpstr);
  389. /* Remove newlines and spaces from start and end. there's at least one extra \r\n at the end that needs to go. */
  390. if (tmpstr.c) {
  391. tmp = php_trim(tmpstr.c, strlen(tmpstr.c), NULL, 0, NULL, 3 TSRMLS_CC);
  392. smart_str_free(&tmpstr);
  393. }
  394. }
  395. if (Z_TYPE_PP(tmpzval) == IS_STRING && Z_STRLEN_PP(tmpzval)) {
  396. /* Remove newlines and spaces from start and end php_trim will estrndup() */
  397. tmp = php_trim(Z_STRVAL_PP(tmpzval), Z_STRLEN_PP(tmpzval), NULL, 0, NULL, 3 TSRMLS_CC);
  398. }
  399. if (tmp && strlen(tmp) > 0) {
  400. char *s;
  401. user_headers = estrdup(tmp);
  402. /* Make lowercase for easy comparison against 'standard' headers */
  403. php_strtolower(tmp, strlen(tmp));
  404. if (!header_init) {
  405. /* strip POST headers on redirect */
  406. strip_header(user_headers, tmp, "content-length:");
  407. strip_header(user_headers, tmp, "content-type:");
  408. }
  409. if ((s = strstr(tmp, "user-agent:")) &&
  410. (s == tmp || *(s-1) == '\r' || *(s-1) == '\n' ||
  411. *(s-1) == '\t' || *(s-1) == ' ')) {
  412. have_header |= HTTP_HEADER_USER_AGENT;
  413. }
  414. if ((s = strstr(tmp, "host:")) &&
  415. (s == tmp || *(s-1) == '\r' || *(s-1) == '\n' ||
  416. *(s-1) == '\t' || *(s-1) == ' ')) {
  417. have_header |= HTTP_HEADER_HOST;
  418. }
  419. if ((s = strstr(tmp, "from:")) &&
  420. (s == tmp || *(s-1) == '\r' || *(s-1) == '\n' ||
  421. *(s-1) == '\t' || *(s-1) == ' ')) {
  422. have_header |= HTTP_HEADER_FROM;
  423. }
  424. if ((s = strstr(tmp, "authorization:")) &&
  425. (s == tmp || *(s-1) == '\r' || *(s-1) == '\n' ||
  426. *(s-1) == '\t' || *(s-1) == ' ')) {
  427. have_header |= HTTP_HEADER_AUTH;
  428. }
  429. if ((s = strstr(tmp, "content-length:")) &&
  430. (s == tmp || *(s-1) == '\r' || *(s-1) == '\n' ||
  431. *(s-1) == '\t' || *(s-1) == ' ')) {
  432. have_header |= HTTP_HEADER_CONTENT_LENGTH;
  433. }
  434. if ((s = strstr(tmp, "content-type:")) &&
  435. (s == tmp || *(s-1) == '\r' || *(s-1) == '\n' ||
  436. *(s-1) == '\t' || *(s-1) == ' ')) {
  437. have_header |= HTTP_HEADER_TYPE;
  438. }
  439. if ((s = strstr(tmp, "connection:")) &&
  440. (s == tmp || *(s-1) == '\r' || *(s-1) == '\n' ||
  441. *(s-1) == '\t' || *(s-1) == ' ')) {
  442. have_header |= HTTP_HEADER_CONNECTION;
  443. }
  444. /* remove Proxy-Authorization header */
  445. if (use_proxy && use_ssl && (s = strstr(tmp, "proxy-authorization:")) &&
  446. (s == tmp || *(s-1) == '\r' || *(s-1) == '\n' ||
  447. *(s-1) == '\t' || *(s-1) == ' ')) {
  448. char *p = s + sizeof("proxy-authorization:") - 1;
  449. while (s > tmp && (*(s-1) == ' ' || *(s-1) == '\t')) s--;
  450. while (*p != 0 && *p != '\r' && *p != '\n') p++;
  451. while (*p == '\r' || *p == '\n') p++;
  452. if (*p == 0) {
  453. if (s == tmp) {
  454. efree(user_headers);
  455. user_headers = NULL;
  456. } else {
  457. while (s > tmp && (*(s-1) == '\r' || *(s-1) == '\n')) s--;
  458. user_headers[s - tmp] = 0;
  459. }
  460. } else {
  461. memmove(user_headers + (s - tmp), user_headers + (p - tmp), strlen(p) + 1);
  462. }
  463. }
  464. }
  465. if (tmp) {
  466. efree(tmp);
  467. }
  468. }
  469. /* auth header if it was specified */
  470. if (((have_header & HTTP_HEADER_AUTH) == 0) && resource->user) {
  471. /* decode the strings first */
  472. php_url_decode(resource->user, strlen(resource->user));
  473. /* scratch is large enough, since it was made large enough for the whole URL */
  474. strcpy(scratch, resource->user);
  475. strcat(scratch, ":");
  476. /* Note: password is optional! */
  477. if (resource->pass) {
  478. php_url_decode(resource->pass, strlen(resource->pass));
  479. strcat(scratch, resource->pass);
  480. }
  481. tmp = (char*)php_base64_encode((unsigned char*)scratch, strlen(scratch), NULL);
  482. if (snprintf(scratch, scratch_len, "Authorization: Basic %s\r\n", tmp) > 0) {
  483. php_stream_write(stream, scratch, strlen(scratch));
  484. php_stream_notify_info(context, PHP_STREAM_NOTIFY_AUTH_REQUIRED, NULL, 0);
  485. }
  486. efree(tmp);
  487. tmp = NULL;
  488. }
  489. /* if the user has configured who they are, send a From: line */
  490. if (((have_header & HTTP_HEADER_FROM) == 0) && FG(from_address)) {
  491. if (snprintf(scratch, scratch_len, "From: %s\r\n", FG(from_address)) > 0)
  492. php_stream_write(stream, scratch, strlen(scratch));
  493. }
  494. /* Send Host: header so name-based virtual hosts work */
  495. if ((have_header & HTTP_HEADER_HOST) == 0) {
  496. if ((use_ssl && resource->port != 443 && resource->port != 0) ||
  497. (!use_ssl && resource->port != 80 && resource->port != 0)) {
  498. if (snprintf(scratch, scratch_len, "Host: %s:%i\r\n", resource->host, resource->port) > 0)
  499. php_stream_write(stream, scratch, strlen(scratch));
  500. } else {
  501. if (snprintf(scratch, scratch_len, "Host: %s\r\n", resource->host) > 0) {
  502. php_stream_write(stream, scratch, strlen(scratch));
  503. }
  504. }
  505. }
  506. /* Send a Connection: close header to avoid hanging when the server
  507. * interprets the RFC literally and establishes a keep-alive connection,
  508. * unless the user specifically requests something else by specifying a
  509. * Connection header in the context options. Send that header even for
  510. * HTTP/1.0 to avoid issues when the server respond with a HTTP/1.1
  511. * keep-alive response, which is the preferred response type. */
  512. if ((have_header & HTTP_HEADER_CONNECTION) == 0) {
  513. php_stream_write_string(stream, "Connection: close\r\n");
  514. }
  515. if (context &&
  516. php_stream_context_get_option(context, "http", "user_agent", &ua_zval) == SUCCESS &&
  517. Z_TYPE_PP(ua_zval) == IS_STRING) {
  518. ua_str = Z_STRVAL_PP(ua_zval);
  519. } else if (FG(user_agent)) {
  520. ua_str = FG(user_agent);
  521. }
  522. if (((have_header & HTTP_HEADER_USER_AGENT) == 0) && ua_str) {
  523. #define _UA_HEADER "User-Agent: %s\r\n"
  524. char *ua;
  525. size_t ua_len;
  526. ua_len = sizeof(_UA_HEADER) + strlen(ua_str);
  527. /* ensure the header is only sent if user_agent is not blank */
  528. if (ua_len > sizeof(_UA_HEADER)) {
  529. ua = emalloc(ua_len + 1);
  530. if ((ua_len = slprintf(ua, ua_len, _UA_HEADER, ua_str)) > 0) {
  531. ua[ua_len] = 0;
  532. php_stream_write(stream, ua, ua_len);
  533. } else {
  534. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Cannot construct User-agent header");
  535. }
  536. if (ua) {
  537. efree(ua);
  538. }
  539. }
  540. }
  541. if (user_headers) {
  542. /* A bit weird, but some servers require that Content-Length be sent prior to Content-Type for POST
  543. * see bug #44603 for details. Since Content-Type maybe part of user's headers we need to do this check first.
  544. */
  545. if (
  546. header_init &&
  547. context &&
  548. !(have_header & HTTP_HEADER_CONTENT_LENGTH) &&
  549. php_stream_context_get_option(context, "http", "content", &tmpzval) == SUCCESS &&
  550. Z_TYPE_PP(tmpzval) == IS_STRING && Z_STRLEN_PP(tmpzval) > 0
  551. ) {
  552. scratch_len = slprintf(scratch, scratch_len, "Content-Length: %d\r\n", Z_STRLEN_PP(tmpzval));
  553. php_stream_write(stream, scratch, scratch_len);
  554. have_header |= HTTP_HEADER_CONTENT_LENGTH;
  555. }
  556. php_stream_write(stream, user_headers, strlen(user_headers));
  557. php_stream_write(stream, "\r\n", sizeof("\r\n")-1);
  558. efree(user_headers);
  559. }
  560. /* Request content, such as for POST requests */
  561. if (header_init && context &&
  562. php_stream_context_get_option(context, "http", "content", &tmpzval) == SUCCESS &&
  563. Z_TYPE_PP(tmpzval) == IS_STRING && Z_STRLEN_PP(tmpzval) > 0) {
  564. if (!(have_header & HTTP_HEADER_CONTENT_LENGTH)) {
  565. scratch_len = slprintf(scratch, scratch_len, "Content-Length: %d\r\n", Z_STRLEN_PP(tmpzval));
  566. php_stream_write(stream, scratch, scratch_len);
  567. }
  568. if (!(have_header & HTTP_HEADER_TYPE)) {
  569. php_stream_write(stream, "Content-Type: application/x-www-form-urlencoded\r\n",
  570. sizeof("Content-Type: application/x-www-form-urlencoded\r\n") - 1);
  571. php_error_docref(NULL TSRMLS_CC, E_NOTICE, "Content-type not specified assuming application/x-www-form-urlencoded");
  572. }
  573. php_stream_write(stream, "\r\n", sizeof("\r\n")-1);
  574. php_stream_write(stream, Z_STRVAL_PP(tmpzval), Z_STRLEN_PP(tmpzval));
  575. } else {
  576. php_stream_write(stream, "\r\n", sizeof("\r\n")-1);
  577. }
  578. location[0] = '\0';
  579. if (!EG(active_symbol_table)) {
  580. zend_rebuild_symbol_table(TSRMLS_C);
  581. }
  582. if (header_init) {
  583. zval *ztmp;
  584. MAKE_STD_ZVAL(ztmp);
  585. array_init(ztmp);
  586. ZEND_SET_SYMBOL(EG(active_symbol_table), "http_response_header", ztmp);
  587. }
  588. {
  589. zval **rh;
  590. if(zend_hash_find(EG(active_symbol_table), "http_response_header", sizeof("http_response_header"), (void **) &rh) != SUCCESS || Z_TYPE_PP(rh) != IS_ARRAY) {
  591. php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "HTTP request failed, http_response_header overwritten");
  592. goto out;
  593. }
  594. response_header = *rh;
  595. Z_ADDREF_P(response_header);
  596. }
  597. if (!php_stream_eof(stream)) {
  598. size_t tmp_line_len;
  599. /* get response header */
  600. if (php_stream_get_line(stream, tmp_line, sizeof(tmp_line) - 1, &tmp_line_len) != NULL) {
  601. zval *http_response;
  602. if (tmp_line_len > 9) {
  603. response_code = atoi(tmp_line + 9);
  604. } else {
  605. response_code = 0;
  606. }
  607. if (context && SUCCESS==php_stream_context_get_option(context, "http", "ignore_errors", &tmpzval)) {
  608. ignore_errors = zend_is_true(*tmpzval);
  609. }
  610. /* when we request only the header, don't fail even on error codes */
  611. if ((options & STREAM_ONLY_GET_HEADERS) || ignore_errors) {
  612. reqok = 1;
  613. }
  614. /* status codes of 1xx are "informational", and will be followed by a real response
  615. * e.g "100 Continue". RFC 7231 states that unexpected 1xx status MUST be parsed,
  616. * and MAY be ignored. As such, we need to skip ahead to the "real" status*/
  617. if (response_code >= 100 && response_code < 200) {
  618. /* consume lines until we find a line starting 'HTTP/1' */
  619. while (
  620. !php_stream_eof(stream)
  621. && php_stream_get_line(stream, tmp_line, sizeof(tmp_line) - 1, &tmp_line_len) != NULL
  622. && ( tmp_line_len < sizeof("HTTP/1") - 1 || strncasecmp(tmp_line, "HTTP/1", sizeof("HTTP/1") - 1) )
  623. );
  624. if (tmp_line_len > 9) {
  625. response_code = atoi(tmp_line + 9);
  626. } else {
  627. response_code = 0;
  628. }
  629. }
  630. /* all status codes in the 2xx range are defined by the specification as successful;
  631. * all status codes in the 3xx range are for redirection, and so also should never
  632. * fail */
  633. if (response_code >= 200 && response_code < 400) {
  634. reqok = 1;
  635. } else {
  636. switch(response_code) {
  637. case 403:
  638. php_stream_notify_error(context, PHP_STREAM_NOTIFY_AUTH_RESULT,
  639. tmp_line, response_code);
  640. break;
  641. default:
  642. /* safety net in the event tmp_line == NULL */
  643. if (!tmp_line_len) {
  644. tmp_line[0] = '\0';
  645. }
  646. php_stream_notify_error(context, PHP_STREAM_NOTIFY_FAILURE,
  647. tmp_line, response_code);
  648. }
  649. }
  650. if (tmp_line_len >= 1 && tmp_line[tmp_line_len - 1] == '\n') {
  651. --tmp_line_len;
  652. if (tmp_line_len >= 1 &&tmp_line[tmp_line_len - 1] == '\r') {
  653. --tmp_line_len;
  654. }
  655. }
  656. MAKE_STD_ZVAL(http_response);
  657. ZVAL_STRINGL(http_response, tmp_line, tmp_line_len, 1);
  658. zend_hash_next_index_insert(Z_ARRVAL_P(response_header), &http_response, sizeof(zval *), NULL);
  659. }
  660. } else {
  661. php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "HTTP request failed, unexpected end of socket!");
  662. goto out;
  663. }
  664. /* read past HTTP headers */
  665. http_header_line = emalloc(HTTP_HEADER_BLOCK_SIZE);
  666. while (!body && !php_stream_eof(stream)) {
  667. size_t http_header_line_length;
  668. if (php_stream_get_line(stream, http_header_line, HTTP_HEADER_BLOCK_SIZE, &http_header_line_length) && *http_header_line != '\n' && *http_header_line != '\r') {
  669. char *e = http_header_line + http_header_line_length - 1;
  670. if (*e != '\n') {
  671. do { /* partial header */
  672. if (php_stream_get_line(stream, http_header_line, HTTP_HEADER_BLOCK_SIZE, &http_header_line_length) == NULL) {
  673. php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "Failed to read HTTP headers");
  674. goto out;
  675. }
  676. e = http_header_line + http_header_line_length - 1;
  677. } while (*e != '\n');
  678. continue;
  679. }
  680. while (*e == '\n' || *e == '\r') {
  681. e--;
  682. }
  683. http_header_line_length = e - http_header_line + 1;
  684. http_header_line[http_header_line_length] = '\0';
  685. if (!strncasecmp(http_header_line, "Location: ", 10)) {
  686. if (context && php_stream_context_get_option(context, "http", "follow_location", &tmpzval) == SUCCESS) {
  687. SEPARATE_ZVAL(tmpzval);
  688. convert_to_long_ex(tmpzval);
  689. follow_location = Z_LVAL_PP(tmpzval);
  690. } else if (!(response_code >= 300 && response_code < 304 || 307 == response_code || 308 == response_code)) {
  691. /* we shouldn't redirect automatically
  692. if follow_location isn't set and response_code not in (300, 301, 302, 303 and 307)
  693. see http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.3.1
  694. RFC 7238 defines 308: http://tools.ietf.org/html/rfc7238 */
  695. follow_location = 0;
  696. }
  697. strlcpy(location, http_header_line + 10, sizeof(location));
  698. } else if (!strncasecmp(http_header_line, "Content-Type: ", 14)) {
  699. php_stream_notify_info(context, PHP_STREAM_NOTIFY_MIME_TYPE_IS, http_header_line + 14, 0);
  700. } else if (!strncasecmp(http_header_line, "Content-Length: ", 16)) {
  701. file_size = atoi(http_header_line + 16);
  702. php_stream_notify_file_size(context, file_size, http_header_line, 0);
  703. } else if (!strncasecmp(http_header_line, "Transfer-Encoding: chunked", sizeof("Transfer-Encoding: chunked"))) {
  704. /* create filter to decode response body */
  705. if (!(options & STREAM_ONLY_GET_HEADERS)) {
  706. long decode = 1;
  707. if (context && php_stream_context_get_option(context, "http", "auto_decode", &tmpzval) == SUCCESS) {
  708. SEPARATE_ZVAL(tmpzval);
  709. convert_to_boolean(*tmpzval);
  710. decode = Z_LVAL_PP(tmpzval);
  711. }
  712. if (decode) {
  713. transfer_encoding = php_stream_filter_create("dechunk", NULL, php_stream_is_persistent(stream) TSRMLS_CC);
  714. if (transfer_encoding) {
  715. /* don't store transfer-encodeing header */
  716. continue;
  717. }
  718. }
  719. }
  720. }
  721. if (http_header_line[0] == '\0') {
  722. body = 1;
  723. } else {
  724. zval *http_header;
  725. MAKE_STD_ZVAL(http_header);
  726. ZVAL_STRINGL(http_header, http_header_line, http_header_line_length, 1);
  727. zend_hash_next_index_insert(Z_ARRVAL_P(response_header), &http_header, sizeof(zval *), NULL);
  728. }
  729. } else {
  730. break;
  731. }
  732. }
  733. if (!reqok || (location[0] != '\0' && follow_location)) {
  734. if (!follow_location || (((options & STREAM_ONLY_GET_HEADERS) || ignore_errors) && redirect_max <= 1)) {
  735. goto out;
  736. }
  737. if (location[0] != '\0')
  738. php_stream_notify_info(context, PHP_STREAM_NOTIFY_REDIRECTED, location, 0);
  739. php_stream_close(stream);
  740. stream = NULL;
  741. if (location[0] != '\0') {
  742. char new_path[HTTP_HEADER_BLOCK_SIZE];
  743. char loc_path[HTTP_HEADER_BLOCK_SIZE];
  744. *new_path='\0';
  745. if (strlen(location)<8 || (strncasecmp(location, "http://", sizeof("http://")-1) &&
  746. strncasecmp(location, "https://", sizeof("https://")-1) &&
  747. strncasecmp(location, "ftp://", sizeof("ftp://")-1) &&
  748. strncasecmp(location, "ftps://", sizeof("ftps://")-1)))
  749. {
  750. if (*location != '/') {
  751. if (*(location+1) != '\0' && resource->path) {
  752. char *s = strrchr(resource->path, '/');
  753. if (!s) {
  754. s = resource->path;
  755. if (!s[0]) {
  756. efree(s);
  757. s = resource->path = estrdup("/");
  758. } else {
  759. *s = '/';
  760. }
  761. }
  762. s[1] = '\0';
  763. if (resource->path && *(resource->path) == '/' && *(resource->path + 1) == '\0') {
  764. snprintf(loc_path, sizeof(loc_path) - 1, "%s%s", resource->path, location);
  765. } else {
  766. snprintf(loc_path, sizeof(loc_path) - 1, "%s/%s", resource->path, location);
  767. }
  768. } else {
  769. snprintf(loc_path, sizeof(loc_path) - 1, "/%s", location);
  770. }
  771. } else {
  772. strlcpy(loc_path, location, sizeof(loc_path));
  773. }
  774. if ((use_ssl && resource->port != 443) || (!use_ssl && resource->port != 80)) {
  775. snprintf(new_path, sizeof(new_path) - 1, "%s://%s:%d%s", resource->scheme, resource->host, resource->port, loc_path);
  776. } else {
  777. snprintf(new_path, sizeof(new_path) - 1, "%s://%s%s", resource->scheme, resource->host, loc_path);
  778. }
  779. } else {
  780. strlcpy(new_path, location, sizeof(new_path));
  781. }
  782. php_url_free(resource);
  783. /* check for invalid redirection URLs */
  784. if ((resource = php_url_parse(new_path)) == NULL) {
  785. php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "Invalid redirect URL! %s", new_path);
  786. goto out;
  787. }
  788. #define CHECK_FOR_CNTRL_CHARS(val) { \
  789. if (val) { \
  790. unsigned char *s, *e; \
  791. int l; \
  792. l = php_url_decode(val, strlen(val)); \
  793. s = (unsigned char*)val; e = s + l; \
  794. while (s < e) { \
  795. if (iscntrl(*s)) { \
  796. php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "Invalid redirect URL! %s", new_path); \
  797. goto out; \
  798. } \
  799. s++; \
  800. } \
  801. } \
  802. }
  803. /* check for control characters in login, password & path */
  804. if (strncasecmp(new_path, "http://", sizeof("http://") - 1) || strncasecmp(new_path, "https://", sizeof("https://") - 1)) {
  805. CHECK_FOR_CNTRL_CHARS(resource->user)
  806. CHECK_FOR_CNTRL_CHARS(resource->pass)
  807. CHECK_FOR_CNTRL_CHARS(resource->path)
  808. }
  809. stream = php_stream_url_wrap_http_ex(wrapper, new_path, mode, options, opened_path, context, --redirect_max, HTTP_WRAPPER_REDIRECTED STREAMS_CC TSRMLS_CC);
  810. } else {
  811. php_stream_wrapper_log_error(wrapper, options TSRMLS_CC, "HTTP request failed! %s", tmp_line);
  812. }
  813. }
  814. out:
  815. if (protocol_version) {
  816. efree(protocol_version);
  817. }
  818. if (http_header_line) {
  819. efree(http_header_line);
  820. }
  821. if (scratch) {
  822. efree(scratch);
  823. }
  824. if (resource) {
  825. php_url_free(resource);
  826. }
  827. if (stream) {
  828. if (header_init) {
  829. stream->wrapperdata = response_header;
  830. } else {
  831. if(response_header) {
  832. Z_DELREF_P(response_header);
  833. }
  834. }
  835. php_stream_notify_progress_init(context, 0, file_size);
  836. /* Restore original chunk size now that we're done with headers */
  837. if (options & STREAM_WILL_CAST)
  838. php_stream_set_chunk_size(stream, chunk_size);
  839. /* restore the users auto-detect-line-endings setting */
  840. stream->flags |= eol_detect;
  841. /* as far as streams are concerned, we are now at the start of
  842. * the stream */
  843. stream->position = 0;
  844. /* restore mode */
  845. strlcpy(stream->mode, mode, sizeof(stream->mode));
  846. if (transfer_encoding) {
  847. php_stream_filter_append(&stream->readfilters, transfer_encoding);
  848. }
  849. } else {
  850. if(response_header) {
  851. Z_DELREF_P(response_header);
  852. }
  853. if (transfer_encoding) {
  854. php_stream_filter_free(transfer_encoding TSRMLS_CC);
  855. }
  856. }
  857. return stream;
  858. }
  859. /* }}} */
  860. php_stream *php_stream_url_wrap_http(php_stream_wrapper *wrapper, const char *path, const char *mode, int options, char **opened_path, php_stream_context *context STREAMS_DC TSRMLS_DC) /* {{{ */
  861. {
  862. return php_stream_url_wrap_http_ex(wrapper, path, mode, options, opened_path, context, PHP_URL_REDIRECT_MAX, HTTP_WRAPPER_HEADER_INIT STREAMS_CC TSRMLS_CC);
  863. }
  864. /* }}} */
  865. static int php_stream_http_stream_stat(php_stream_wrapper *wrapper, php_stream *stream, php_stream_statbuf *ssb TSRMLS_DC) /* {{{ */
  866. {
  867. /* one day, we could fill in the details based on Date: and Content-Length:
  868. * headers. For now, we return with a failure code to prevent the underlying
  869. * file's details from being used instead. */
  870. return -1;
  871. }
  872. /* }}} */
  873. static php_stream_wrapper_ops http_stream_wops = {
  874. php_stream_url_wrap_http,
  875. NULL, /* stream_close */
  876. php_stream_http_stream_stat,
  877. NULL, /* stat_url */
  878. NULL, /* opendir */
  879. "http",
  880. NULL, /* unlink */
  881. NULL, /* rename */
  882. NULL, /* mkdir */
  883. NULL /* rmdir */
  884. };
  885. PHPAPI php_stream_wrapper php_stream_http_wrapper = {
  886. &http_stream_wops,
  887. NULL,
  888. 1 /* is_url */
  889. };
  890. /*
  891. * Local variables:
  892. * tab-width: 4
  893. * c-basic-offset: 4
  894. * End:
  895. * vim600: sw=4 ts=4 fdm=marker
  896. * vim<600: sw=4 ts=4
  897. */