1 | <?php |
||
2 | |||
3 | namespace PhpXmlRpc\Helper; |
||
4 | |||
5 | use PhpXmlRpc\Exception\HttpException; |
||
6 | use PhpXmlRpc\PhpXmlRpc; |
||
7 | use PhpXmlRpc\Traits\LoggerAware; |
||
8 | |||
9 | class Http |
||
10 | { |
||
11 | use LoggerAware; |
||
12 | |||
13 | /** |
||
14 | * Decode a string that is encoded with "chunked" transfer encoding as defined in RFC 2068 par. 19.4.6. |
||
15 | * Code shamelessly stolen from nusoap library by Dietrich Ayala. |
||
16 | * @internal this function will become protected in the future |
||
17 | * |
||
18 | * @param string $buffer the string to be decoded |
||
19 | * @return string |
||
20 | */ |
||
21 | public static function decodeChunked($buffer) |
||
22 | { |
||
23 | // length := 0 |
||
24 | $length = 0; |
||
25 | $new = ''; |
||
26 | |||
27 | // read chunk-size, chunk-extension (if any) and crlf |
||
28 | // get the position of the linebreak |
||
29 | $chunkEnd = strpos($buffer, "\r\n") + 2; |
||
30 | $temp = substr($buffer, 0, $chunkEnd); |
||
31 | $chunkSize = hexdec(trim($temp)); |
||
32 | $chunkStart = $chunkEnd; |
||
33 | while ($chunkSize > 0) { |
||
34 | $chunkEnd = strpos($buffer, "\r\n", $chunkStart + $chunkSize); |
||
0 ignored issues
–
show
Bug
introduced
by
![]() |
|||
35 | |||
36 | // just in case we got a broken connection |
||
37 | if ($chunkEnd == false) { |
||
0 ignored issues
–
show
|
|||
38 | $chunk = substr($buffer, $chunkStart); |
||
39 | // append chunk-data to entity-body |
||
40 | $new .= $chunk; |
||
41 | $length += strlen($chunk); |
||
42 | break; |
||
43 | } |
||
44 | |||
45 | // read chunk-data and crlf |
||
46 | $chunk = substr($buffer, $chunkStart, $chunkEnd - $chunkStart); |
||
47 | // append chunk-data to entity-body |
||
48 | $new .= $chunk; |
||
49 | // length := length + chunk-size |
||
50 | $length += strlen($chunk); |
||
51 | // read chunk-size and crlf |
||
52 | $chunkStart = $chunkEnd + 2; |
||
53 | |||
54 | $chunkEnd = strpos($buffer, "\r\n", $chunkStart) + 2; |
||
55 | if ($chunkEnd == false) { |
||
0 ignored issues
–
show
|
|||
56 | break; // just in case we got a broken connection |
||
57 | } |
||
58 | $temp = substr($buffer, $chunkStart, $chunkEnd - $chunkStart); |
||
59 | $chunkSize = hexdec(trim($temp)); |
||
60 | $chunkStart = $chunkEnd; |
||
61 | } |
||
62 | |||
63 | return $new; |
||
64 | } |
||
65 | |||
66 | /** |
||
67 | * Parses HTTP an http response's headers and separates them from the body. |
||
68 | * |
||
69 | * @param string $data the http response, headers and body. It will be stripped of headers |
||
70 | * @param bool $headersProcessed when true, we assume that response inflating and dechunking has been already carried out |
||
71 | * @param int $debug when > 0, logs to screen messages detailing info about the parsed data |
||
72 | * @return array with keys 'headers', 'cookies', 'raw_data' and 'status_code' |
||
73 | 699 | * @throws HttpException |
|
74 | * |
||
75 | 699 | * @todo if $debug is < 0, we could avoid populating 'raw_data' in the returned value - but that would |
|
76 | * be a weird API... (note that we still need to always have headers parsed for content charset) |
||
77 | */ |
||
78 | 699 | public function parseResponseHeaders(&$data, $headersProcessed = false, $debug = 0) |
|
79 | { |
||
80 | $httpResponse = array('raw_data' => $data, 'headers'=> array(), 'cookies' => array(), 'status_code' => null); |
||
81 | 32 | ||
82 | 32 | // Support "web-proxy-tunnelling" connections for https through proxies |
|
83 | 32 | if (preg_match('/^HTTP\/1\.[0-1] 200 Connection established/', $data)) { |
|
84 | // Look for CR/LF or simple LF as line separator (even though it is not valid http) |
||
85 | $pos = strpos($data, "\r\n\r\n"); |
||
86 | if ($pos || is_int($pos)) { |
||
0 ignored issues
–
show
|
|||
87 | $bd = $pos + 4; |
||
88 | } else { |
||
89 | $pos = strpos($data, "\n\n"); |
||
90 | if ($pos || is_int($pos)) { |
||
91 | $bd = $pos + 2; |
||
92 | } else { |
||
93 | 32 | // No separation between response headers and body: fault? |
|
94 | $bd = 0; |
||
95 | } |
||
96 | 32 | } |
|
97 | if ($bd) { |
||
98 | // this filters out all http headers from proxy. maybe we could take them into account, too? |
||
99 | $data = substr($data, $bd); |
||
100 | } else { |
||
101 | $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': HTTPS via proxy error, tunnel connection possibly failed'); |
||
102 | throw new HttpException(PhpXmlRpc::$xmlrpcstr['http_error'] . ' (HTTPS via proxy error, tunnel connection possibly failed)', PhpXmlRpc::$xmlrpcerr['http_error']); |
||
103 | } |
||
104 | 699 | } |
|
105 | 1 | ||
106 | // Strip HTTP 1.1 100 Continue header if present |
||
107 | while (preg_match('/^HTTP\/1\.1 1[0-9]{2} /', $data)) { |
||
108 | 1 | $pos = strpos($data, 'HTTP', 12); |
|
109 | // server sent a Continue header without any (valid) content following... |
||
110 | // give the client a chance to know it |
||
111 | if (!$pos && !is_int($pos)) { |
||
112 | /// @todo this construct works fine in php 3, 4 and 5 - 8; would it not be enough to have !== false now ? |
||
113 | 1 | ||
114 | break; |
||
115 | } |
||
116 | $data = substr($data, $pos); |
||
117 | } |
||
118 | 699 | ||
119 | 32 | // When using Curl to query servers using Digest Auth, we get back a double set of http headers. |
|
120 | 32 | // Same when following redirects |
|
121 | // We strip out the 1st... |
||
122 | /// @todo we should let the caller know that there was a redirect involved |
||
123 | if ($headersProcessed && preg_match('/^HTTP\/[0-9](?:\.[0-9])? (?:401|30[1278]) /', $data)) { |
||
124 | 699 | if (preg_match('/(\r?\n){2}HTTP\/[0-9](?:\.[0-9])? 200 /', $data)) { |
|
125 | 699 | $data = preg_replace('/^HTTP\/[0-9](?:\.[0-9])? (?:401|30[1278]) .+?(?:\r?\n){2}(HTTP\/[0-9.]+ 200 )/s', '$1', $data, 1); |
|
126 | 699 | } |
|
127 | } |
||
128 | |||
129 | 699 | if (preg_match('/^HTTP\/([0-9](?:\.[0-9])?) ([0-9]{3}) /', $data, $matches)) { |
|
130 | 3 | $httpResponse['protocol_version'] = $matches[1]; |
|
131 | 3 | $httpResponse['status_code'] = $matches[2]; |
|
132 | 3 | } |
|
133 | |||
134 | if ($httpResponse['status_code'] !== '200') { |
||
135 | $errstr = substr($data, 0, strpos($data, "\n") - 1); |
||
136 | $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': HTTP error, got response: ' . $errstr); |
||
137 | 696 | throw new HttpException(PhpXmlRpc::$xmlrpcstr['http_error'] . ' (' . $errstr . ')', PhpXmlRpc::$xmlrpcerr['http_error'], null, $httpResponse['status_code']); |
|
138 | 696 | } |
|
139 | 695 | ||
140 | // be tolerant to usage of \n instead of \r\n to separate headers and data (even though it is not valid http) |
||
141 | 1 | $pos = strpos($data, "\r\n\r\n"); |
|
142 | 1 | if ($pos || is_int($pos)) { |
|
0 ignored issues
–
show
|
|||
143 | 1 | $bd = $pos + 4; |
|
144 | } else { |
||
145 | $pos = strpos($data, "\n\n"); |
||
146 | if ($pos || is_int($pos)) { |
||
147 | $bd = $pos + 2; |
||
148 | } else { |
||
149 | // No separation between response headers and body: fault? |
||
150 | // we could take some action here instead of going on... |
||
151 | $bd = 0; |
||
152 | 696 | } |
|
153 | } |
||
154 | 696 | ||
155 | // be tolerant to line endings, and extra empty lines |
||
156 | 696 | $ar = preg_split("/\r?\n/", trim(substr($data, 0, $pos))); |
|
157 | 696 | ||
158 | 696 | foreach ($ar as $line) { |
|
159 | // take care of (multi-line) headers and cookies |
||
160 | $arr = explode(':', $line, 2); |
||
161 | if (count($arr) > 1) { |
||
162 | /// @todo according to https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4, we should reject with error |
||
163 | /// 400 any messages where a space is present between the header name and colon |
||
164 | 696 | $headerName = strtolower(trim($arr[0])); |
|
165 | 22 | if ($headerName == 'set-cookie') { |
|
166 | $cookie = $arr[1]; |
||
167 | // glue together all received cookies, using a comma to separate them (same as php does with getallheaders()) |
||
168 | if (isset($httpResponse['headers'][$headerName])) { |
||
169 | $httpResponse['headers'][$headerName] .= ', ' . trim($cookie); |
||
170 | 22 | } else { |
|
171 | $httpResponse['headers'][$headerName] = trim($cookie); |
||
172 | 22 | } |
|
173 | // parse cookie attributes, in case user wants to correctly honour them |
||
174 | // @todo support for server sending multiple time cookie with same name, but using different PATHs |
||
175 | 22 | $cookie = explode(';', $cookie); |
|
176 | 22 | foreach ($cookie as $pos => $val) { |
|
177 | $val = explode('=', $val, 2); |
||
178 | 22 | $tag = trim($val[0]); |
|
179 | $val = isset($val[1]) ? trim($val[1]) : ''; |
||
180 | if ($pos === 0) { |
||
181 | $cookieName = $tag; |
||
182 | // if present, we have strip leading and trailing " chars from $val |
||
183 | 22 | if (preg_match('/^"(.*)"$/', $val, $matches)) { |
|
184 | 22 | $val = $matches[1]; |
|
185 | 22 | } |
|
186 | 22 | $httpResponse['cookies'][$cookieName] = array('value' => urldecode($val)); |
|
187 | 22 | } else { |
|
188 | $httpResponse['cookies'][$cookieName][$tag] = $val; |
||
0 ignored issues
–
show
Comprehensibility
Best Practice
introduced
by
|
|||
189 | 22 | } |
|
190 | 22 | } |
|
191 | 22 | } else { |
|
192 | 22 | /// @todo some other headers (the ones that allow a CSV list of values) do allow many values to be |
|
193 | /// passed using multiple header lines. |
||
194 | 22 | /// We should add content to $xmlrpc->_xh['headers'][$headerName] instead of replacing it for those... |
|
195 | 22 | $httpResponse['headers'][$headerName] = trim($arr[1]); |
|
196 | } |
||
197 | } elseif (isset($headerName)) { |
||
198 | /// @todo improve this: 1. check that the line starts with a space or tab; 2. according to |
||
199 | /// https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4, we should flat out refuse these messages |
||
200 | $httpResponse['headers'][$headerName] .= ' ' . trim($line); |
||
201 | 696 | } |
|
202 | } |
||
203 | |||
204 | $data = substr($data, $bd); |
||
205 | 1 | ||
206 | if ($debug && count($httpResponse['headers'])) { |
||
207 | $msg = ''; |
||
208 | foreach ($httpResponse['headers'] as $header => $value) { |
||
209 | 696 | $msg .= "HEADER: $header: $value\n"; |
|
210 | } |
||
211 | 696 | foreach ($httpResponse['cookies'] as $header => $value) { |
|
212 | 3 | $msg .= "COOKIE: $header={$value['value']}\n"; |
|
213 | 3 | } |
|
214 | 3 | $this->getLogger()->debug($msg); |
|
215 | } |
||
216 | 3 | ||
217 | // if CURL was used for the call, http headers have been processed, and dechunking + reinflating have been carried out |
||
218 | if (!$headersProcessed) { |
||
219 | 3 | ||
220 | // Decode chunked encoding sent by http 1.1 servers |
||
221 | if (isset($httpResponse['headers']['transfer-encoding']) && $httpResponse['headers']['transfer-encoding'] == 'chunked') { |
||
222 | if (!$data = static::decodeChunked($data)) { |
||
223 | $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': errors occurred when trying to rebuild the chunked data received from server'); |
||
224 | 696 | throw new HttpException(PhpXmlRpc::$xmlrpcstr['dechunk_fail'], PhpXmlRpc::$xmlrpcerr['dechunk_fail'], null, $httpResponse['status_code']); |
|
225 | } |
||
226 | } |
||
227 | 374 | ||
228 | // Decode gzip-compressed stuff |
||
229 | // code shamelessly inspired from nusoap library by Dietrich Ayala |
||
230 | if (isset($httpResponse['headers']['content-encoding'])) { |
||
231 | $httpResponse['headers']['content-encoding'] = str_replace('x-', '', $httpResponse['headers']['content-encoding']); |
||
232 | if ($httpResponse['headers']['content-encoding'] == 'deflate' || $httpResponse['headers']['content-encoding'] == 'gzip') { |
||
233 | // if decoding works, use it. else assume data wasn't gzencoded |
||
234 | if (function_exists('gzinflate')) { |
||
235 | if ($httpResponse['headers']['content-encoding'] == 'deflate' && $degzdata = @gzuncompress($data)) { |
||
236 | 374 | $data = $degzdata; |
|
237 | 71 | if ($debug) { |
|
238 | 71 | $this->getLogger()->debug("---INFLATED RESPONSE---[" . strlen($data) . " chars]---\n$data\n---END---"); |
|
239 | } |
||
240 | 71 | } elseif ($httpResponse['headers']['content-encoding'] == 'gzip' && $degzdata = @gzinflate(substr($data, 10))) { |
|
241 | 71 | $data = $degzdata; |
|
242 | 32 | if ($debug) { |
|
243 | 32 | $this->getLogger()->debug("---INFLATED RESPONSE---[" . strlen($data) . " chars]---\n$data\n---END---"); |
|
244 | 32 | } |
|
245 | } else { |
||
246 | 39 | $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': errors occurred when trying to decode the deflated data received from server'); |
|
247 | 39 | throw new HttpException(PhpXmlRpc::$xmlrpcstr['decompress_fail'], PhpXmlRpc::$xmlrpcerr['decompress_fail'], null, $httpResponse['status_code']); |
|
248 | 39 | } |
|
249 | 35 | } else { |
|
250 | $this->getLogger()->error('XML-RPC: ' . __METHOD__ . ': the server sent deflated data. Your php install must have the Zlib extension compiled in to support this.'); |
||
251 | throw new HttpException(PhpXmlRpc::$xmlrpcstr['cannot_decompress'], PhpXmlRpc::$xmlrpcerr['cannot_decompress'], null, $httpResponse['status_code']); |
||
252 | } |
||
253 | 64 | } |
|
254 | } |
||
255 | } // end of 'if needed, de-chunk, re-inflate response' |
||
256 | |||
257 | return $httpResponse; |
||
258 | } |
||
259 | |||
260 | /** |
||
261 | * Parses one of the http headers which can have a list of values with quality param. |
||
262 | * @see https://www.rfc-editor.org/rfc/rfc7231#section-5.3.1 |
||
263 | 696 | * |
|
264 | * @param string $header |
||
265 | * @return string[] |
||
266 | */ |
||
267 | public function parseAcceptHeader($header) |
||
268 | { |
||
269 | $accepted = array(); |
||
270 | foreach(explode(',', $header) as $c) { |
||
271 | if (preg_match('/^([^;]+); *q=([0-9.]+)/', $c, $matches)) { |
||
272 | $c = $matches[1]; |
||
273 | $w = $matches[2]; |
||
274 | } else { |
||
275 | $c = preg_replace('/;.*/', '', $c); |
||
276 | $w = 1; |
||
277 | } |
||
278 | $accepted[(trim($c))] = $w; |
||
279 | } |
||
280 | arsort($accepted); |
||
281 | return array_keys($accepted); |
||
282 | } |
||
283 | } |
||
284 |