yiisoft /
yii2-app-basic
| 1 | <?php |
||||
| 2 | |||||
| 3 | /* |
||||
| 4 | * This file is part of Composer. |
||||
| 5 | * |
||||
| 6 | * (c) Nils Adermann <[email protected]> |
||||
| 7 | * Jordi Boggiano <[email protected]> |
||||
| 8 | * |
||||
| 9 | * For the full copyright and license information, please view the LICENSE |
||||
| 10 | * file that was distributed with this source code. |
||||
| 11 | */ |
||||
| 12 | |||||
| 13 | setupEnvironment(); |
||||
| 14 | process(is_array($argv) ? $argv : array()); |
||||
| 15 | |||||
| 16 | /** |
||||
| 17 | * Initializes various values |
||||
| 18 | * |
||||
| 19 | * @throws RuntimeException If uopz extension prevents exit calls |
||||
| 20 | */ |
||||
| 21 | function setupEnvironment() |
||||
| 22 | { |
||||
| 23 | ini_set('display_errors', 1); |
||||
| 24 | |||||
| 25 | if (extension_loaded('uopz') && !(ini_get('uopz.disable') || ini_get('uopz.exit'))) { |
||||
| 26 | // uopz works at opcode level and disables exit calls |
||||
| 27 | if (function_exists('uopz_allow_exit')) { |
||||
| 28 | @uopz_allow_exit(true); |
||||
|
0 ignored issues
–
show
Are you sure the usage of
uopz_allow_exit(true) is correct as it seems to always return null.
This check looks for function or method calls that always return null and whose return value is used. class A
{
function getObject()
{
return null;
}
}
$a = new A();
if ($a->getObject()) {
The method The reason is most likely that a function or method is imcomplete or has been reduced for debug purposes. Loading history...
|
|||||
| 29 | } else { |
||||
| 30 | throw new RuntimeException('The uopz extension ignores exit calls and breaks this installer.'); |
||||
| 31 | } |
||||
| 32 | } |
||||
| 33 | |||||
| 34 | $installer = 'ComposerInstaller'; |
||||
| 35 | |||||
| 36 | if (defined('PHP_WINDOWS_VERSION_MAJOR')) { |
||||
| 37 | if ($version = getenv('COMPOSERSETUP')) { |
||||
| 38 | $installer = sprintf('Composer-Setup.exe/%s', $version); |
||||
| 39 | } |
||||
| 40 | } |
||||
| 41 | |||||
| 42 | define('COMPOSER_INSTALLER', $installer); |
||||
| 43 | } |
||||
| 44 | |||||
| 45 | /** |
||||
| 46 | * Processes the installer |
||||
| 47 | */ |
||||
| 48 | function process($argv) |
||||
| 49 | { |
||||
| 50 | // Determine ANSI output from --ansi and --no-ansi flags |
||||
| 51 | setUseAnsi($argv); |
||||
| 52 | |||||
| 53 | $help = in_array('--help', $argv) || in_array('-h', $argv); |
||||
| 54 | if ($help) { |
||||
| 55 | displayHelp(); |
||||
| 56 | exit(0); |
||||
|
0 ignored issues
–
show
|
|||||
| 57 | } |
||||
| 58 | |||||
| 59 | $check = in_array('--check', $argv); |
||||
| 60 | $force = in_array('--force', $argv); |
||||
| 61 | $quiet = in_array('--quiet', $argv); |
||||
| 62 | $channel = 'stable'; |
||||
| 63 | if (in_array('--snapshot', $argv)) { |
||||
| 64 | $channel = 'snapshot'; |
||||
| 65 | } elseif (in_array('--preview', $argv)) { |
||||
| 66 | $channel = 'preview'; |
||||
| 67 | } elseif (in_array('--1', $argv)) { |
||||
| 68 | $channel = '1'; |
||||
| 69 | } elseif (in_array('--2', $argv)) { |
||||
| 70 | $channel = '2'; |
||||
| 71 | } elseif (in_array('--2.2', $argv)) { |
||||
| 72 | $channel = '2.2'; |
||||
| 73 | } |
||||
| 74 | $disableTls = in_array('--disable-tls', $argv); |
||||
| 75 | $installDir = getOptValue('--install-dir', $argv, false); |
||||
| 76 | $version = getOptValue('--version', $argv, false); |
||||
| 77 | $filename = getOptValue('--filename', $argv, 'composer.phar'); |
||||
| 78 | $cafile = getOptValue('--cafile', $argv, false); |
||||
| 79 | |||||
| 80 | if (!checkParams($installDir, $version, $cafile)) { |
||||
| 81 | exit(1); |
||||
|
0 ignored issues
–
show
|
|||||
| 82 | } |
||||
| 83 | |||||
| 84 | $ok = checkPlatform($warnings, $quiet, $disableTls, true); |
||||
| 85 | |||||
| 86 | if ($check) { |
||||
| 87 | // Only show warnings if we haven't output any errors |
||||
| 88 | if ($ok) { |
||||
| 89 | showWarnings($warnings); |
||||
| 90 | showSecurityWarning($disableTls); |
||||
| 91 | } |
||||
| 92 | exit($ok ? 0 : 1); |
||||
|
0 ignored issues
–
show
|
|||||
| 93 | } |
||||
| 94 | |||||
| 95 | if ($ok || $force) { |
||||
| 96 | if ($channel === '1' && !$quiet) { |
||||
| 97 | out('Warning: You forced the install of Composer 1.x via --1, but Composer 2.x is the latest stable version. Updating to it via composer self-update --stable is recommended.', 'error'); |
||||
| 98 | } |
||||
| 99 | |||||
| 100 | $installer = new Installer($quiet, $disableTls, $cafile); |
||||
| 101 | if ($installer->run($version, $installDir, $filename, $channel)) { |
||||
| 102 | showWarnings($warnings); |
||||
| 103 | showSecurityWarning($disableTls); |
||||
| 104 | exit(0); |
||||
|
0 ignored issues
–
show
|
|||||
| 105 | } |
||||
| 106 | } |
||||
| 107 | |||||
| 108 | exit(1); |
||||
|
0 ignored issues
–
show
|
|||||
| 109 | } |
||||
| 110 | |||||
| 111 | /** |
||||
| 112 | * Displays the help |
||||
| 113 | */ |
||||
| 114 | function displayHelp() |
||||
| 115 | { |
||||
| 116 | echo <<<EOF |
||||
| 117 | Composer Installer |
||||
| 118 | ------------------ |
||||
| 119 | Options |
||||
| 120 | --help this help |
||||
| 121 | --check for checking environment only |
||||
| 122 | --force forces the installation |
||||
| 123 | --ansi force ANSI color output |
||||
| 124 | --no-ansi disable ANSI color output |
||||
| 125 | --quiet do not output unimportant messages |
||||
| 126 | --install-dir="..." accepts a target installation directory |
||||
| 127 | --preview install the latest version from the preview (alpha/beta/rc) channel instead of stable |
||||
| 128 | --snapshot install the latest version from the snapshot (dev builds) channel instead of stable |
||||
| 129 | --1 install the latest stable Composer 1.x (EOL) version |
||||
| 130 | --2 install the latest stable Composer 2.x version |
||||
| 131 | --2.2 install the latest stable Composer 2.2.x (LTS) version |
||||
| 132 | --version="..." accepts a specific version to install instead of the latest |
||||
| 133 | --filename="..." accepts a target filename (default: composer.phar) |
||||
| 134 | --disable-tls disable SSL/TLS security for file downloads |
||||
| 135 | --cafile="..." accepts a path to a Certificate Authority (CA) certificate file for SSL/TLS verification |
||||
| 136 | |||||
| 137 | EOF; |
||||
| 138 | } |
||||
| 139 | |||||
| 140 | /** |
||||
| 141 | * Sets the USE_ANSI define for colorizing output |
||||
| 142 | * |
||||
| 143 | * @param array $argv Command-line arguments |
||||
| 144 | */ |
||||
| 145 | function setUseAnsi($argv) |
||||
| 146 | { |
||||
| 147 | // --no-ansi wins over --ansi |
||||
| 148 | if (in_array('--no-ansi', $argv)) { |
||||
| 149 | define('USE_ANSI', false); |
||||
| 150 | } elseif (in_array('--ansi', $argv)) { |
||||
| 151 | define('USE_ANSI', true); |
||||
| 152 | } else { |
||||
| 153 | define('USE_ANSI', outputSupportsColor()); |
||||
| 154 | } |
||||
| 155 | } |
||||
| 156 | |||||
| 157 | /** |
||||
| 158 | * Returns whether color output is supported |
||||
| 159 | * |
||||
| 160 | * @return bool |
||||
| 161 | */ |
||||
| 162 | function outputSupportsColor() |
||||
| 163 | { |
||||
| 164 | if (false !== getenv('NO_COLOR') || !defined('STDOUT')) { |
||||
| 165 | return false; |
||||
| 166 | } |
||||
| 167 | |||||
| 168 | if ('Hyper' === getenv('TERM_PROGRAM')) { |
||||
| 169 | return true; |
||||
| 170 | } |
||||
| 171 | |||||
| 172 | if (defined('PHP_WINDOWS_VERSION_BUILD')) { |
||||
| 173 | return (function_exists('sapi_windows_vt100_support') |
||||
| 174 | && sapi_windows_vt100_support(STDOUT)) |
||||
| 175 | || false !== getenv('ANSICON') |
||||
| 176 | || 'ON' === getenv('ConEmuANSI') |
||||
| 177 | || 'xterm' === getenv('TERM'); |
||||
| 178 | } |
||||
| 179 | |||||
| 180 | if (function_exists('stream_isatty')) { |
||||
| 181 | return stream_isatty(STDOUT); |
||||
| 182 | } |
||||
| 183 | |||||
| 184 | if (function_exists('posix_isatty')) { |
||||
| 185 | return posix_isatty(STDOUT); |
||||
| 186 | } |
||||
| 187 | |||||
| 188 | $stat = fstat(STDOUT); |
||||
| 189 | // Check if formatted mode is S_IFCHR |
||||
| 190 | return $stat ? 0020000 === ($stat['mode'] & 0170000) : false; |
||||
| 191 | } |
||||
| 192 | |||||
| 193 | /** |
||||
| 194 | * Returns the value of a command-line option |
||||
| 195 | * |
||||
| 196 | * @param string $opt The command-line option to check |
||||
| 197 | * @param array $argv Command-line arguments |
||||
| 198 | * @param mixed $default Default value to be returned |
||||
| 199 | * |
||||
| 200 | * @return mixed The command-line value or the default |
||||
| 201 | */ |
||||
| 202 | function getOptValue($opt, $argv, $default) |
||||
| 203 | { |
||||
| 204 | $optLength = strlen($opt); |
||||
| 205 | |||||
| 206 | foreach ($argv as $key => $value) { |
||||
| 207 | $next = $key + 1; |
||||
| 208 | if (0 === strpos($value, $opt)) { |
||||
| 209 | if ($optLength === strlen($value) && isset($argv[$next])) { |
||||
| 210 | return trim($argv[$next]); |
||||
| 211 | } else { |
||||
| 212 | return trim(substr($value, $optLength + 1)); |
||||
| 213 | } |
||||
| 214 | } |
||||
| 215 | } |
||||
| 216 | |||||
| 217 | return $default; |
||||
| 218 | } |
||||
| 219 | |||||
| 220 | /** |
||||
| 221 | * Checks that user-supplied params are valid |
||||
| 222 | * |
||||
| 223 | * @param mixed $installDir The required istallation directory |
||||
| 224 | * @param mixed $version The required composer version to install |
||||
| 225 | * @param mixed $cafile Certificate Authority file |
||||
| 226 | * |
||||
| 227 | * @return bool True if the supplied params are okay |
||||
| 228 | */ |
||||
| 229 | function checkParams($installDir, $version, $cafile) |
||||
| 230 | { |
||||
| 231 | $result = true; |
||||
| 232 | |||||
| 233 | if (false !== $installDir && !is_dir($installDir)) { |
||||
| 234 | out("The defined install dir ({$installDir}) does not exist.", 'info'); |
||||
| 235 | $result = false; |
||||
| 236 | } |
||||
| 237 | |||||
| 238 | if (false !== $version && 1 !== preg_match('/^\d+\.\d+\.\d+(\-(alpha|beta|RC)\d*)*$/', $version)) { |
||||
| 239 | out("The defined install version ({$version}) does not match release pattern.", 'info'); |
||||
| 240 | $result = false; |
||||
| 241 | } |
||||
| 242 | |||||
| 243 | if (false !== $cafile && (!file_exists($cafile) || !is_readable($cafile))) { |
||||
| 244 | out("The defined Certificate Authority (CA) cert file ({$cafile}) does not exist or is not readable.", 'info'); |
||||
| 245 | $result = false; |
||||
| 246 | } |
||||
| 247 | return $result; |
||||
| 248 | } |
||||
| 249 | |||||
| 250 | /** |
||||
| 251 | * Checks the platform for possible issues running Composer |
||||
| 252 | * |
||||
| 253 | * Errors are written to the output, warnings are saved for later display. |
||||
| 254 | * |
||||
| 255 | * @param array $warnings Populated by method, to be shown later |
||||
| 256 | * @param bool $quiet Quiet mode |
||||
| 257 | * @param bool $disableTls Bypass tls |
||||
| 258 | * @param bool $install If we are installing, rather than diagnosing |
||||
| 259 | * |
||||
| 260 | * @return bool True if there are no errors |
||||
| 261 | */ |
||||
| 262 | function checkPlatform(&$warnings, $quiet, $disableTls, $install) |
||||
| 263 | { |
||||
| 264 | getPlatformIssues($errors, $warnings, $install); |
||||
| 265 | |||||
| 266 | // Make openssl warning an error if tls has not been specifically disabled |
||||
| 267 | if (isset($warnings['openssl']) && !$disableTls) { |
||||
| 268 | $errors['openssl'] = $warnings['openssl']; |
||||
| 269 | unset($warnings['openssl']); |
||||
| 270 | } |
||||
| 271 | |||||
| 272 | if (!empty($errors)) { |
||||
| 273 | // Composer-Setup.exe uses "Some settings" to flag platform errors |
||||
| 274 | out('Some settings on your machine make Composer unable to work properly.', 'error'); |
||||
| 275 | out('Make sure that you fix the issues listed below and run this script again:', 'error'); |
||||
| 276 | outputIssues($errors); |
||||
| 277 | return false; |
||||
| 278 | } |
||||
| 279 | |||||
| 280 | if (empty($warnings) && !$quiet) { |
||||
| 281 | out('All settings correct for using Composer', 'success'); |
||||
| 282 | } |
||||
| 283 | return true; |
||||
| 284 | } |
||||
| 285 | |||||
| 286 | /** |
||||
| 287 | * Checks platform configuration for common incompatibility issues |
||||
| 288 | * |
||||
| 289 | * @param array $errors Populated by method |
||||
| 290 | * @param array $warnings Populated by method |
||||
| 291 | * @param bool $install If we are installing, rather than diagnosing |
||||
| 292 | * |
||||
| 293 | * @return bool If any errors or warnings have been found |
||||
| 294 | */ |
||||
| 295 | function getPlatformIssues(&$errors, &$warnings, $install) |
||||
| 296 | { |
||||
| 297 | $errors = array(); |
||||
| 298 | $warnings = array(); |
||||
| 299 | |||||
| 300 | if ($iniPath = php_ini_loaded_file()) { |
||||
| 301 | $iniMessage = PHP_EOL.'The php.ini used by your command-line PHP is: ' . $iniPath; |
||||
| 302 | } else { |
||||
| 303 | $iniMessage = PHP_EOL.'A php.ini file does not exist. You will have to create one.'; |
||||
| 304 | } |
||||
| 305 | $iniMessage .= PHP_EOL.'If you can not modify the ini file, you can also run `php -d option=value` to modify ini values on the fly. You can use -d multiple times.'; |
||||
| 306 | |||||
| 307 | if (ini_get('detect_unicode')) { |
||||
| 308 | $errors['unicode'] = array( |
||||
| 309 | 'The detect_unicode setting must be disabled.', |
||||
| 310 | 'Add the following to the end of your `php.ini`:', |
||||
| 311 | ' detect_unicode = Off', |
||||
| 312 | $iniMessage |
||||
| 313 | ); |
||||
| 314 | } |
||||
| 315 | |||||
| 316 | if (extension_loaded('suhosin')) { |
||||
| 317 | $suhosin = ini_get('suhosin.executor.include.whitelist'); |
||||
| 318 | $suhosinBlacklist = ini_get('suhosin.executor.include.blacklist'); |
||||
| 319 | if (false === stripos($suhosin, 'phar') && (!$suhosinBlacklist || false !== stripos($suhosinBlacklist, 'phar'))) { |
||||
| 320 | $errors['suhosin'] = array( |
||||
| 321 | 'The suhosin.executor.include.whitelist setting is incorrect.', |
||||
| 322 | 'Add the following to the end of your `php.ini` or suhosin.ini (Example path [for Debian]: /etc/php5/cli/conf.d/suhosin.ini):', |
||||
| 323 | ' suhosin.executor.include.whitelist = phar '.$suhosin, |
||||
| 324 | $iniMessage |
||||
| 325 | ); |
||||
| 326 | } |
||||
| 327 | } |
||||
| 328 | |||||
| 329 | if (!function_exists('json_decode')) { |
||||
| 330 | $errors['json'] = array( |
||||
| 331 | 'The json extension is missing.', |
||||
| 332 | 'Install it or recompile php without --disable-json' |
||||
| 333 | ); |
||||
| 334 | } |
||||
| 335 | |||||
| 336 | if (!extension_loaded('Phar')) { |
||||
| 337 | $errors['phar'] = array( |
||||
| 338 | 'The phar extension is missing.', |
||||
| 339 | 'Install it or recompile php without --disable-phar' |
||||
| 340 | ); |
||||
| 341 | } |
||||
| 342 | |||||
| 343 | if (!extension_loaded('filter')) { |
||||
| 344 | $errors['filter'] = array( |
||||
| 345 | 'The filter extension is missing.', |
||||
| 346 | 'Install it or recompile php without --disable-filter' |
||||
| 347 | ); |
||||
| 348 | } |
||||
| 349 | |||||
| 350 | if (!extension_loaded('hash')) { |
||||
| 351 | $errors['hash'] = array( |
||||
| 352 | 'The hash extension is missing.', |
||||
| 353 | 'Install it or recompile php without --disable-hash' |
||||
| 354 | ); |
||||
| 355 | } |
||||
| 356 | |||||
| 357 | if (!extension_loaded('iconv') && !extension_loaded('mbstring')) { |
||||
| 358 | $errors['iconv_mbstring'] = array( |
||||
| 359 | 'The iconv OR mbstring extension is required and both are missing.', |
||||
| 360 | 'Install either of them or recompile php without --disable-iconv' |
||||
| 361 | ); |
||||
| 362 | } |
||||
| 363 | |||||
| 364 | if (!ini_get('allow_url_fopen')) { |
||||
| 365 | $errors['allow_url_fopen'] = array( |
||||
| 366 | 'The allow_url_fopen setting is incorrect.', |
||||
| 367 | 'Add the following to the end of your `php.ini`:', |
||||
| 368 | ' allow_url_fopen = On', |
||||
| 369 | $iniMessage |
||||
| 370 | ); |
||||
| 371 | } |
||||
| 372 | |||||
| 373 | if (extension_loaded('ionCube Loader') && ioncube_loader_iversion() < 40009) { |
||||
|
0 ignored issues
–
show
The function
ioncube_loader_iversion was not found. Maybe you did not declare it correctly or list all dependencies?
(
Ignorable by Annotation
)
If this is a false-positive, you can also ignore this issue in your code via the
Loading history...
|
|||||
| 374 | $ioncube = ioncube_loader_version(); |
||||
|
0 ignored issues
–
show
The function
ioncube_loader_version was not found. Maybe you did not declare it correctly or list all dependencies?
(
Ignorable by Annotation
)
If this is a false-positive, you can also ignore this issue in your code via the
Loading history...
|
|||||
| 375 | $errors['ioncube'] = array( |
||||
| 376 | 'Your ionCube Loader extension ('.$ioncube.') is incompatible with Phar files.', |
||||
| 377 | 'Upgrade to ionCube 4.0.9 or higher or remove this line (path may be different) from your `php.ini` to disable it:', |
||||
| 378 | ' zend_extension = /usr/lib/php5/20090626+lfs/ioncube_loader_lin_5.3.so', |
||||
| 379 | $iniMessage |
||||
| 380 | ); |
||||
| 381 | } |
||||
| 382 | |||||
| 383 | if (version_compare(PHP_VERSION, '5.3.2', '<')) { |
||||
| 384 | $errors['php'] = array( |
||||
| 385 | 'Your PHP ('.PHP_VERSION.') is too old, you must upgrade to PHP 5.3.2 or higher.' |
||||
| 386 | ); |
||||
| 387 | } |
||||
| 388 | |||||
| 389 | if (version_compare(PHP_VERSION, '5.3.4', '<')) { |
||||
| 390 | $warnings['php'] = array( |
||||
| 391 | 'Your PHP ('.PHP_VERSION.') is quite old, upgrading to PHP 5.3.4 or higher is recommended.', |
||||
| 392 | 'Composer works with 5.3.2+ for most people, but there might be edge case issues.' |
||||
| 393 | ); |
||||
| 394 | } |
||||
| 395 | |||||
| 396 | if (!extension_loaded('openssl')) { |
||||
| 397 | $warnings['openssl'] = array( |
||||
| 398 | 'The openssl extension is missing, which means that secure HTTPS transfers are impossible.', |
||||
| 399 | 'If possible you should enable it or recompile php with --with-openssl' |
||||
| 400 | ); |
||||
| 401 | } |
||||
| 402 | |||||
| 403 | if (extension_loaded('openssl') && OPENSSL_VERSION_NUMBER < 0x1000100f) { |
||||
| 404 | // Attempt to parse version number out, fallback to whole string value. |
||||
| 405 | $opensslVersion = trim(strstr(OPENSSL_VERSION_TEXT, ' ')); |
||||
| 406 | $opensslVersion = substr($opensslVersion, 0, strpos($opensslVersion, ' ')); |
||||
| 407 | $opensslVersion = $opensslVersion ? $opensslVersion : OPENSSL_VERSION_TEXT; |
||||
| 408 | |||||
| 409 | $warnings['openssl_version'] = array( |
||||
| 410 | 'The OpenSSL library ('.$opensslVersion.') used by PHP does not support TLSv1.2 or TLSv1.1.', |
||||
| 411 | 'If possible you should upgrade OpenSSL to version 1.0.1 or above.' |
||||
| 412 | ); |
||||
| 413 | } |
||||
| 414 | |||||
| 415 | if (!defined('HHVM_VERSION') && !extension_loaded('apcu') && ini_get('apc.enable_cli')) { |
||||
| 416 | $warnings['apc_cli'] = array( |
||||
| 417 | 'The apc.enable_cli setting is incorrect.', |
||||
| 418 | 'Add the following to the end of your `php.ini`:', |
||||
| 419 | ' apc.enable_cli = Off', |
||||
| 420 | $iniMessage |
||||
| 421 | ); |
||||
| 422 | } |
||||
| 423 | |||||
| 424 | if (!$install && extension_loaded('xdebug')) { |
||||
| 425 | $warnings['xdebug_loaded'] = array( |
||||
| 426 | 'The xdebug extension is loaded, this can slow down Composer a little.', |
||||
| 427 | 'Disabling it when using Composer is recommended.' |
||||
| 428 | ); |
||||
| 429 | |||||
| 430 | if (ini_get('xdebug.profiler_enabled')) { |
||||
| 431 | $warnings['xdebug_profile'] = array( |
||||
| 432 | 'The xdebug.profiler_enabled setting is enabled, this can slow down Composer a lot.', |
||||
| 433 | 'Add the following to the end of your `php.ini` to disable it:', |
||||
| 434 | ' xdebug.profiler_enabled = 0', |
||||
| 435 | $iniMessage |
||||
| 436 | ); |
||||
| 437 | } |
||||
| 438 | } |
||||
| 439 | |||||
| 440 | if (!extension_loaded('zlib')) { |
||||
| 441 | $warnings['zlib'] = array( |
||||
| 442 | 'The zlib extension is not loaded, this can slow down Composer a lot.', |
||||
| 443 | 'If possible, install it or recompile php with --with-zlib', |
||||
| 444 | $iniMessage |
||||
| 445 | ); |
||||
| 446 | } |
||||
| 447 | |||||
| 448 | if (defined('PHP_WINDOWS_VERSION_BUILD') |
||||
| 449 | && (version_compare(PHP_VERSION, '7.2.23', '<') |
||||
| 450 | || (version_compare(PHP_VERSION, '7.3.0', '>=') |
||||
| 451 | && version_compare(PHP_VERSION, '7.3.10', '<')))) { |
||||
| 452 | $warnings['onedrive'] = array( |
||||
| 453 | 'The Windows OneDrive folder is not supported on PHP versions below 7.2.23 and 7.3.10.', |
||||
| 454 | 'Upgrade your PHP ('.PHP_VERSION.') to use this location with Composer.' |
||||
| 455 | ); |
||||
| 456 | } |
||||
| 457 | |||||
| 458 | if (extension_loaded('uopz') && !(ini_get('uopz.disable') || ini_get('uopz.exit'))) { |
||||
| 459 | $warnings['uopz'] = array( |
||||
| 460 | 'The uopz extension ignores exit calls and may not work with all Composer commands.', |
||||
| 461 | 'Disabling it when using Composer is recommended.' |
||||
| 462 | ); |
||||
| 463 | } |
||||
| 464 | |||||
| 465 | ob_start(); |
||||
| 466 | phpinfo(INFO_GENERAL); |
||||
| 467 | $phpinfo = ob_get_clean(); |
||||
| 468 | if (preg_match('{Configure Command(?: *</td><td class="v">| *=> *)(.*?)(?:</td>|$)}m', $phpinfo, $match)) { |
||||
| 469 | $configure = $match[1]; |
||||
| 470 | |||||
| 471 | if (false !== strpos($configure, '--enable-sigchild')) { |
||||
| 472 | $warnings['sigchild'] = array( |
||||
| 473 | 'PHP was compiled with --enable-sigchild which can cause issues on some platforms.', |
||||
| 474 | 'Recompile it without this flag if possible, see also:', |
||||
| 475 | ' https://bugs.php.net/bug.php?id=22999' |
||||
| 476 | ); |
||||
| 477 | } |
||||
| 478 | |||||
| 479 | if (false !== strpos($configure, '--with-curlwrappers')) { |
||||
| 480 | $warnings['curlwrappers'] = array( |
||||
| 481 | 'PHP was compiled with --with-curlwrappers which will cause issues with HTTP authentication and GitHub.', |
||||
| 482 | 'Recompile it without this flag if possible' |
||||
| 483 | ); |
||||
| 484 | } |
||||
| 485 | } |
||||
| 486 | |||||
| 487 | // Stringify the message arrays |
||||
| 488 | foreach ($errors as $key => $value) { |
||||
| 489 | $errors[$key] = PHP_EOL.implode(PHP_EOL, $value); |
||||
| 490 | } |
||||
| 491 | |||||
| 492 | foreach ($warnings as $key => $value) { |
||||
| 493 | $warnings[$key] = PHP_EOL.implode(PHP_EOL, $value); |
||||
| 494 | } |
||||
| 495 | |||||
| 496 | return !empty($errors) || !empty($warnings); |
||||
| 497 | } |
||||
| 498 | |||||
| 499 | |||||
| 500 | /** |
||||
| 501 | * Outputs an array of issues |
||||
| 502 | * |
||||
| 503 | * @param array $issues |
||||
| 504 | */ |
||||
| 505 | function outputIssues($issues) |
||||
| 506 | { |
||||
| 507 | foreach ($issues as $issue) { |
||||
| 508 | out($issue, 'info'); |
||||
| 509 | } |
||||
| 510 | out(''); |
||||
| 511 | } |
||||
| 512 | |||||
| 513 | /** |
||||
| 514 | * Outputs any warnings found |
||||
| 515 | * |
||||
| 516 | * @param array $warnings |
||||
| 517 | */ |
||||
| 518 | function showWarnings($warnings) |
||||
| 519 | { |
||||
| 520 | if (!empty($warnings)) { |
||||
| 521 | out('Some settings on your machine may cause stability issues with Composer.', 'error'); |
||||
| 522 | out('If you encounter issues, try to change the following:', 'error'); |
||||
| 523 | outputIssues($warnings); |
||||
| 524 | } |
||||
| 525 | } |
||||
| 526 | |||||
| 527 | /** |
||||
| 528 | * Outputs an end of process warning if tls has been bypassed |
||||
| 529 | * |
||||
| 530 | * @param bool $disableTls Bypass tls |
||||
| 531 | */ |
||||
| 532 | function showSecurityWarning($disableTls) |
||||
| 533 | { |
||||
| 534 | if ($disableTls) { |
||||
| 535 | out('You have instructed the Installer not to enforce SSL/TLS security on remote HTTPS requests.', 'info'); |
||||
| 536 | out('This will leave all downloads during installation vulnerable to Man-In-The-Middle (MITM) attacks', 'info'); |
||||
| 537 | } |
||||
| 538 | } |
||||
| 539 | |||||
| 540 | /** |
||||
| 541 | * colorize output |
||||
| 542 | */ |
||||
| 543 | function out($text, $color = null, $newLine = true) |
||||
| 544 | { |
||||
| 545 | $styles = array( |
||||
| 546 | 'success' => "\033[0;32m%s\033[0m", |
||||
| 547 | 'error' => "\033[31;31m%s\033[0m", |
||||
| 548 | 'info' => "\033[33;33m%s\033[0m" |
||||
| 549 | ); |
||||
| 550 | |||||
| 551 | $format = '%s'; |
||||
| 552 | |||||
| 553 | if (isset($styles[$color]) && USE_ANSI) { |
||||
| 554 | $format = $styles[$color]; |
||||
| 555 | } |
||||
| 556 | |||||
| 557 | if ($newLine) { |
||||
| 558 | $format .= PHP_EOL; |
||||
| 559 | } |
||||
| 560 | |||||
| 561 | printf($format, $text); |
||||
| 562 | } |
||||
| 563 | |||||
| 564 | /** |
||||
| 565 | * Returns the system-dependent Composer home location, which may not exist |
||||
| 566 | * |
||||
| 567 | * @return string |
||||
| 568 | */ |
||||
| 569 | function getHomeDir() |
||||
| 570 | { |
||||
| 571 | $home = getenv('COMPOSER_HOME'); |
||||
| 572 | if ($home) { |
||||
| 573 | return $home; |
||||
| 574 | } |
||||
| 575 | |||||
| 576 | $userDir = getUserDir(); |
||||
| 577 | |||||
| 578 | if (defined('PHP_WINDOWS_VERSION_MAJOR')) { |
||||
| 579 | return $userDir.'/Composer'; |
||||
| 580 | } |
||||
| 581 | |||||
| 582 | $dirs = array(); |
||||
| 583 | |||||
| 584 | if (useXdg()) { |
||||
| 585 | // XDG Base Directory Specifications |
||||
| 586 | $xdgConfig = getenv('XDG_CONFIG_HOME'); |
||||
| 587 | if (!$xdgConfig) { |
||||
| 588 | $xdgConfig = $userDir . '/.config'; |
||||
| 589 | } |
||||
| 590 | |||||
| 591 | $dirs[] = $xdgConfig . '/composer'; |
||||
| 592 | } |
||||
| 593 | |||||
| 594 | $dirs[] = $userDir . '/.composer'; |
||||
| 595 | |||||
| 596 | // select first dir which exists of: $XDG_CONFIG_HOME/composer or ~/.composer |
||||
| 597 | foreach ($dirs as $dir) { |
||||
| 598 | if (is_dir($dir)) { |
||||
| 599 | return $dir; |
||||
| 600 | } |
||||
| 601 | } |
||||
| 602 | |||||
| 603 | // if none exists, we default to first defined one (XDG one if system uses it, or ~/.composer otherwise) |
||||
| 604 | return $dirs[0]; |
||||
| 605 | } |
||||
| 606 | |||||
| 607 | /** |
||||
| 608 | * Returns the location of the user directory from the environment |
||||
| 609 | * @throws RuntimeException If the environment value does not exists |
||||
| 610 | * |
||||
| 611 | * @return string |
||||
| 612 | */ |
||||
| 613 | function getUserDir() |
||||
| 614 | { |
||||
| 615 | $userEnv = defined('PHP_WINDOWS_VERSION_MAJOR') ? 'APPDATA' : 'HOME'; |
||||
| 616 | $userDir = getenv($userEnv); |
||||
| 617 | |||||
| 618 | if (!$userDir) { |
||||
| 619 | throw new RuntimeException('The '.$userEnv.' or COMPOSER_HOME environment variable must be set for composer to run correctly'); |
||||
| 620 | } |
||||
| 621 | |||||
| 622 | return rtrim(strtr($userDir, '\\', '/'), '/'); |
||||
| 623 | } |
||||
| 624 | |||||
| 625 | /** |
||||
| 626 | * @return bool |
||||
| 627 | */ |
||||
| 628 | function useXdg() |
||||
| 629 | { |
||||
| 630 | foreach (array_keys($_SERVER) as $key) { |
||||
| 631 | if (strpos($key, 'XDG_') === 0) { |
||||
| 632 | return true; |
||||
| 633 | } |
||||
| 634 | } |
||||
| 635 | |||||
| 636 | if (is_dir('/etc/xdg')) { |
||||
| 637 | return true; |
||||
| 638 | } |
||||
| 639 | |||||
| 640 | return false; |
||||
| 641 | } |
||||
| 642 | |||||
| 643 | function validateCaFile($contents) |
||||
| 644 | { |
||||
| 645 | // assume the CA is valid if php is vulnerable to |
||||
| 646 | // https://www.sektioneins.de/advisories/advisory-012013-php-openssl_x509_parse-memory-corruption-vulnerability.html |
||||
| 647 | if ( |
||||
| 648 | PHP_VERSION_ID <= 50327 |
||||
| 649 | || (PHP_VERSION_ID >= 50400 && PHP_VERSION_ID < 50422) |
||||
| 650 | || (PHP_VERSION_ID >= 50500 && PHP_VERSION_ID < 50506) |
||||
| 651 | ) { |
||||
| 652 | return !empty($contents); |
||||
| 653 | } |
||||
| 654 | |||||
| 655 | return (bool) openssl_x509_parse($contents); |
||||
| 656 | } |
||||
| 657 | |||||
| 658 | class Installer |
||||
| 659 | { |
||||
| 660 | private $quiet; |
||||
| 661 | private $disableTls; |
||||
| 662 | private $cafile; |
||||
| 663 | private $displayPath; |
||||
| 664 | private $target; |
||||
| 665 | private $tmpFile; |
||||
| 666 | private $tmpCafile; |
||||
| 667 | private $baseUrl; |
||||
| 668 | private $algo; |
||||
| 669 | private $errHandler; |
||||
| 670 | private $httpClient; |
||||
| 671 | private $pubKeys = array(); |
||||
| 672 | private $installs = array(); |
||||
| 673 | |||||
| 674 | /** |
||||
| 675 | * Constructor - must not do anything that throws an exception |
||||
| 676 | * |
||||
| 677 | * @param bool $quiet Quiet mode |
||||
| 678 | * @param bool $disableTls Bypass tls |
||||
| 679 | * @param mixed $cafile Path to CA bundle, or false |
||||
| 680 | */ |
||||
| 681 | public function __construct($quiet, $disableTls, $caFile) |
||||
| 682 | { |
||||
| 683 | if (($this->quiet = $quiet)) { |
||||
| 684 | ob_start(); |
||||
| 685 | } |
||||
| 686 | $this->disableTls = $disableTls; |
||||
| 687 | $this->cafile = $caFile; |
||||
| 688 | $this->errHandler = new ErrorHandler(); |
||||
| 689 | } |
||||
| 690 | |||||
| 691 | /** |
||||
| 692 | * Runs the installer |
||||
| 693 | * |
||||
| 694 | * @param mixed $version Specific version to install, or false |
||||
| 695 | * @param mixed $installDir Specific installation directory, or false |
||||
| 696 | * @param string $filename Specific filename to save to, or composer.phar |
||||
| 697 | * @param string $channel Specific version channel to use |
||||
| 698 | * @throws Exception If anything other than a RuntimeException is caught |
||||
| 699 | * |
||||
| 700 | * @return bool If the installation succeeded |
||||
| 701 | */ |
||||
| 702 | public function run($version, $installDir, $filename, $channel) |
||||
| 703 | { |
||||
| 704 | try { |
||||
| 705 | $this->initTargets($installDir, $filename); |
||||
| 706 | $this->initTls(); |
||||
| 707 | $this->httpClient = new HttpClient($this->disableTls, $this->cafile); |
||||
| 708 | $result = $this->install($version, $channel); |
||||
| 709 | |||||
| 710 | // in case --1 or --2 is passed, we leave the default channel for next self-update to stable |
||||
| 711 | if (1 === preg_match('{^\d+$}D', $channel)) { |
||||
| 712 | $channel = 'stable'; |
||||
| 713 | } |
||||
| 714 | |||||
| 715 | if ($result && $channel !== 'stable' && !$version && defined('PHP_BINARY')) { |
||||
| 716 | $null = (defined('PHP_WINDOWS_VERSION_MAJOR') ? 'NUL' : '/dev/null'); |
||||
| 717 | @exec(escapeshellarg(PHP_BINARY) .' '.escapeshellarg($this->target).' self-update --'.$channel.' --set-channel-only -q > '.$null.' 2> '.$null, $output); |
||||
|
0 ignored issues
–
show
It seems like you do not handle an error condition for
exec(). This can introduce security issues, and is generally not recommended.
(
Ignorable by Annotation
)
If this is a false-positive, you can also ignore this issue in your code via the
If you suppress an error, we recommend checking for the error condition explicitly: // For example instead of
@mkdir($dir);
// Better use
if (@mkdir($dir) === false) {
throw new \RuntimeException('The directory '.$dir.' could not be created.');
}
Loading history...
|
|||||
| 718 | } |
||||
| 719 | } catch (Exception $e) { |
||||
| 720 | $result = false; |
||||
| 721 | } |
||||
| 722 | |||||
| 723 | // Always clean up |
||||
| 724 | $this->cleanUp($result); |
||||
| 725 | |||||
| 726 | if (isset($e)) { |
||||
| 727 | // Rethrow anything that is not a RuntimeException |
||||
| 728 | if (!$e instanceof RuntimeException) { |
||||
| 729 | throw $e; |
||||
| 730 | } |
||||
| 731 | out($e->getMessage(), 'error'); |
||||
| 732 | } |
||||
| 733 | return $result; |
||||
| 734 | } |
||||
| 735 | |||||
| 736 | /** |
||||
| 737 | * Initialization methods to set the required filenames and composer url |
||||
| 738 | * |
||||
| 739 | * @param mixed $installDir Specific installation directory, or false |
||||
| 740 | * @param string $filename Specific filename to save to, or composer.phar |
||||
| 741 | * @throws RuntimeException If the installation directory is not writable |
||||
| 742 | */ |
||||
| 743 | protected function initTargets($installDir, $filename) |
||||
| 744 | { |
||||
| 745 | $this->displayPath = ($installDir ? rtrim($installDir, '/').'/' : '').$filename; |
||||
| 746 | $installDir = $installDir ? realpath($installDir) : getcwd(); |
||||
| 747 | |||||
| 748 | if (!is_writeable($installDir)) { |
||||
| 749 | throw new RuntimeException('The installation directory "'.$installDir.'" is not writable'); |
||||
| 750 | } |
||||
| 751 | |||||
| 752 | $this->target = $installDir.DIRECTORY_SEPARATOR.$filename; |
||||
| 753 | $this->tmpFile = $installDir.DIRECTORY_SEPARATOR.basename($this->target, '.phar').'-temp.phar'; |
||||
| 754 | |||||
| 755 | $uriScheme = $this->disableTls ? 'http' : 'https'; |
||||
| 756 | $this->baseUrl = $uriScheme.'://getcomposer.org'; |
||||
| 757 | } |
||||
| 758 | |||||
| 759 | /** |
||||
| 760 | * A wrapper around methods to check tls and write public keys |
||||
| 761 | * @throws RuntimeException If SHA384 is not supported |
||||
| 762 | */ |
||||
| 763 | protected function initTls() |
||||
| 764 | { |
||||
| 765 | if ($this->disableTls) { |
||||
| 766 | return; |
||||
| 767 | } |
||||
| 768 | |||||
| 769 | if (!in_array('sha384', array_map('strtolower', openssl_get_md_methods()))) { |
||||
| 770 | throw new RuntimeException('SHA384 is not supported by your openssl extension'); |
||||
| 771 | } |
||||
| 772 | |||||
| 773 | $this->algo = defined('OPENSSL_ALGO_SHA384') ? OPENSSL_ALGO_SHA384 : 'SHA384'; |
||||
| 774 | $home = $this->getComposerHome(); |
||||
| 775 | |||||
| 776 | $this->pubKeys = array( |
||||
| 777 | 'dev' => $this->installKey(self::getPKDev(), $home, 'keys.dev.pub'), |
||||
| 778 | 'tags' => $this->installKey(self::getPKTags(), $home, 'keys.tags.pub') |
||||
| 779 | ); |
||||
| 780 | |||||
| 781 | if (empty($this->cafile) && !HttpClient::getSystemCaRootBundlePath()) { |
||||
| 782 | $this->cafile = $this->tmpCafile = $this->installKey(HttpClient::getPackagedCaFile(), $home, 'cacert-temp.pem'); |
||||
| 783 | } |
||||
| 784 | } |
||||
| 785 | |||||
| 786 | /** |
||||
| 787 | * Returns the Composer home directory, creating it if required |
||||
| 788 | * @throws RuntimeException If the directory cannot be created |
||||
| 789 | * |
||||
| 790 | * @return string |
||||
| 791 | */ |
||||
| 792 | protected function getComposerHome() |
||||
| 793 | { |
||||
| 794 | $home = getHomeDir(); |
||||
| 795 | |||||
| 796 | if (!is_dir($home)) { |
||||
| 797 | $this->errHandler->start(); |
||||
| 798 | |||||
| 799 | if (!mkdir($home, 0777, true)) { |
||||
| 800 | throw new RuntimeException(sprintf( |
||||
| 801 | 'Unable to create Composer home directory "%s": %s', |
||||
| 802 | $home, |
||||
| 803 | $this->errHandler->message |
||||
| 804 | )); |
||||
| 805 | } |
||||
| 806 | $this->installs[] = $home; |
||||
| 807 | $this->errHandler->stop(); |
||||
| 808 | } |
||||
| 809 | return $home; |
||||
| 810 | } |
||||
| 811 | |||||
| 812 | /** |
||||
| 813 | * Writes public key data to disc |
||||
| 814 | * |
||||
| 815 | * @param string $data The public key(s) in pem format |
||||
| 816 | * @param string $path The directory to write to |
||||
| 817 | * @param string $filename The name of the file |
||||
| 818 | * @throws RuntimeException If the file cannot be written |
||||
| 819 | * |
||||
| 820 | * @return string The path to the saved data |
||||
| 821 | */ |
||||
| 822 | protected function installKey($data, $path, $filename) |
||||
| 823 | { |
||||
| 824 | $this->errHandler->start(); |
||||
| 825 | |||||
| 826 | $target = $path.DIRECTORY_SEPARATOR.$filename; |
||||
| 827 | $installed = file_exists($target); |
||||
| 828 | $write = file_put_contents($target, $data, LOCK_EX); |
||||
| 829 | @chmod($target, 0644); |
||||
|
0 ignored issues
–
show
It seems like you do not handle an error condition for
chmod(). This can introduce security issues, and is generally not recommended.
(
Ignorable by Annotation
)
If this is a false-positive, you can also ignore this issue in your code via the
If you suppress an error, we recommend checking for the error condition explicitly: // For example instead of
@mkdir($dir);
// Better use
if (@mkdir($dir) === false) {
throw new \RuntimeException('The directory '.$dir.' could not be created.');
}
Loading history...
|
|||||
| 830 | |||||
| 831 | $this->errHandler->stop(); |
||||
| 832 | |||||
| 833 | if (!$write) { |
||||
| 834 | throw new RuntimeException(sprintf('Unable to write %s to: %s', $filename, $path)); |
||||
| 835 | } |
||||
| 836 | |||||
| 837 | if (!$installed) { |
||||
| 838 | $this->installs[] = $target; |
||||
| 839 | } |
||||
| 840 | |||||
| 841 | return $target; |
||||
| 842 | } |
||||
| 843 | |||||
| 844 | /** |
||||
| 845 | * The main install function |
||||
| 846 | * |
||||
| 847 | * @param mixed $version Specific version to install, or false |
||||
| 848 | * @param string $channel Version channel to use |
||||
| 849 | * |
||||
| 850 | * @return bool If the installation succeeded |
||||
| 851 | */ |
||||
| 852 | protected function install($version, $channel) |
||||
| 853 | { |
||||
| 854 | $retries = 3; |
||||
| 855 | $result = false; |
||||
| 856 | $infoMsg = 'Downloading...'; |
||||
| 857 | $infoType = 'info'; |
||||
| 858 | |||||
| 859 | while ($retries--) { |
||||
| 860 | if (!$this->quiet) { |
||||
| 861 | out($infoMsg, $infoType); |
||||
| 862 | $infoMsg = 'Retrying...'; |
||||
| 863 | $infoType = 'error'; |
||||
| 864 | } |
||||
| 865 | |||||
| 866 | if (!$this->getVersion($channel, $version, $url, $error)) { |
||||
| 867 | out($error, 'error'); |
||||
| 868 | continue; |
||||
| 869 | } |
||||
| 870 | |||||
| 871 | if (!$this->downloadToTmp($url, $signature, $error)) { |
||||
| 872 | out($error, 'error'); |
||||
| 873 | continue; |
||||
| 874 | } |
||||
| 875 | |||||
| 876 | if (!$this->verifyAndSave($version, $signature, $error)) { |
||||
| 877 | out($error, 'error'); |
||||
| 878 | continue; |
||||
| 879 | } |
||||
| 880 | |||||
| 881 | $result = true; |
||||
| 882 | break; |
||||
| 883 | } |
||||
| 884 | |||||
| 885 | if (!$this->quiet) { |
||||
| 886 | if ($result) { |
||||
| 887 | out(PHP_EOL."Composer (version {$version}) successfully installed to: {$this->target}", 'success'); |
||||
| 888 | out("Use it: php {$this->displayPath}", 'info'); |
||||
| 889 | out(''); |
||||
| 890 | } else { |
||||
| 891 | out('The download failed repeatedly, aborting.', 'error'); |
||||
| 892 | } |
||||
| 893 | } |
||||
| 894 | return $result; |
||||
| 895 | } |
||||
| 896 | |||||
| 897 | /** |
||||
| 898 | * Sets the version url, downloading version data if required |
||||
| 899 | * |
||||
| 900 | * @param string $channel Version channel to use |
||||
| 901 | * @param false|string $version Version to install, or set by method |
||||
| 902 | * @param null|string $url The versioned url, set by method |
||||
| 903 | * @param null|string $error Set by method on failure |
||||
| 904 | * |
||||
| 905 | * @return bool If the operation succeeded |
||||
| 906 | */ |
||||
| 907 | protected function getVersion($channel, &$version, &$url, &$error) |
||||
| 908 | { |
||||
| 909 | $error = ''; |
||||
| 910 | |||||
| 911 | if ($version) { |
||||
| 912 | if (empty($url)) { |
||||
| 913 | $url = $this->baseUrl."/download/{$version}/composer.phar"; |
||||
| 914 | } |
||||
| 915 | return true; |
||||
| 916 | } |
||||
| 917 | |||||
| 918 | $this->errHandler->start(); |
||||
| 919 | |||||
| 920 | if ($this->downloadVersionData($data, $error)) { |
||||
| 921 | $this->parseVersionData($data, $channel, $version, $url); |
||||
| 922 | } |
||||
| 923 | |||||
| 924 | $this->errHandler->stop(); |
||||
| 925 | return empty($error); |
||||
| 926 | } |
||||
| 927 | |||||
| 928 | /** |
||||
| 929 | * Downloads and json-decodes version data |
||||
| 930 | * |
||||
| 931 | * @param null|array $data Downloaded version data, set by method |
||||
| 932 | * @param null|string $error Set by method on failure |
||||
| 933 | * |
||||
| 934 | * @return bool If the operation succeeded |
||||
| 935 | */ |
||||
| 936 | protected function downloadVersionData(&$data, &$error) |
||||
| 937 | { |
||||
| 938 | $url = $this->baseUrl.'/versions'; |
||||
| 939 | $errFmt = 'The "%s" file could not be %s: %s'; |
||||
| 940 | |||||
| 941 | if (!$json = $this->httpClient->get($url)) { |
||||
| 942 | $error = sprintf($errFmt, $url, 'downloaded', $this->errHandler->message); |
||||
| 943 | return false; |
||||
| 944 | } |
||||
| 945 | |||||
| 946 | if (!$data = json_decode($json, true)) { |
||||
| 947 | $error = sprintf($errFmt, $url, 'json-decoded', $this->getJsonError()); |
||||
| 948 | return false; |
||||
| 949 | } |
||||
| 950 | return true; |
||||
| 951 | } |
||||
| 952 | |||||
| 953 | /** |
||||
| 954 | * A wrapper around the methods needed to download and save the phar |
||||
| 955 | * |
||||
| 956 | * @param string $url The versioned download url |
||||
| 957 | * @param null|string $signature Set by method on successful download |
||||
| 958 | * @param null|string $error Set by method on failure |
||||
| 959 | * |
||||
| 960 | * @return bool If the operation succeeded |
||||
| 961 | */ |
||||
| 962 | protected function downloadToTmp($url, &$signature, &$error) |
||||
| 963 | { |
||||
| 964 | $error = ''; |
||||
| 965 | $errFmt = 'The "%s" file could not be downloaded: %s'; |
||||
| 966 | $sigUrl = $url.'.sig'; |
||||
| 967 | $this->errHandler->start(); |
||||
| 968 | |||||
| 969 | if (!$fh = fopen($this->tmpFile, 'w')) { |
||||
| 970 | $error = sprintf('Could not create file "%s": %s', $this->tmpFile, $this->errHandler->message); |
||||
| 971 | |||||
| 972 | } elseif (!$this->getSignature($sigUrl, $signature)) { |
||||
| 973 | $error = sprintf($errFmt, $sigUrl, $this->errHandler->message); |
||||
| 974 | |||||
| 975 | } elseif (!fwrite($fh, $this->httpClient->get($url))) { |
||||
| 976 | $error = sprintf($errFmt, $url, $this->errHandler->message); |
||||
| 977 | } |
||||
| 978 | |||||
| 979 | if (is_resource($fh)) { |
||||
| 980 | fclose($fh); |
||||
| 981 | } |
||||
| 982 | $this->errHandler->stop(); |
||||
| 983 | return empty($error); |
||||
| 984 | } |
||||
| 985 | |||||
| 986 | /** |
||||
| 987 | * Verifies the downloaded file and saves it to the target location |
||||
| 988 | * |
||||
| 989 | * @param string $version The composer version downloaded |
||||
| 990 | * @param string $signature The digital signature to check |
||||
| 991 | * @param null|string $error Set by method on failure |
||||
| 992 | * |
||||
| 993 | * @return bool If the operation succeeded |
||||
| 994 | */ |
||||
| 995 | protected function verifyAndSave($version, $signature, &$error) |
||||
| 996 | { |
||||
| 997 | $error = ''; |
||||
| 998 | |||||
| 999 | if (!$this->validatePhar($this->tmpFile, $pharError)) { |
||||
| 1000 | $error = 'The download is corrupt: '.$pharError; |
||||
| 1001 | |||||
| 1002 | } elseif (!$this->verifySignature($version, $signature, $this->tmpFile)) { |
||||
| 1003 | $error = 'Signature mismatch, could not verify the phar file integrity'; |
||||
| 1004 | |||||
| 1005 | } else { |
||||
| 1006 | $this->errHandler->start(); |
||||
| 1007 | |||||
| 1008 | if (!rename($this->tmpFile, $this->target)) { |
||||
| 1009 | $error = sprintf('Could not write to file "%s": %s', $this->target, $this->errHandler->message); |
||||
| 1010 | } |
||||
| 1011 | chmod($this->target, 0755); |
||||
| 1012 | $this->errHandler->stop(); |
||||
| 1013 | } |
||||
| 1014 | |||||
| 1015 | return empty($error); |
||||
| 1016 | } |
||||
| 1017 | |||||
| 1018 | /** |
||||
| 1019 | * Parses an array of version data to match the required channel |
||||
| 1020 | * |
||||
| 1021 | * @param array $data Downloaded version data |
||||
| 1022 | * @param mixed $channel Version channel to use |
||||
| 1023 | * @param false|string $version Set by method |
||||
| 1024 | * @param mixed $url The versioned url, set by method |
||||
| 1025 | */ |
||||
| 1026 | protected function parseVersionData(array $data, $channel, &$version, &$url) |
||||
| 1027 | { |
||||
| 1028 | foreach ($data[$channel] as $candidate) { |
||||
| 1029 | if ($candidate['min-php'] <= PHP_VERSION_ID) { |
||||
| 1030 | $version = $candidate['version']; |
||||
| 1031 | $url = $this->baseUrl.$candidate['path']; |
||||
| 1032 | break; |
||||
| 1033 | } |
||||
| 1034 | } |
||||
| 1035 | |||||
| 1036 | if (!$version) { |
||||
| 1037 | $error = sprintf( |
||||
| 1038 | 'None of the %d %s version(s) of Composer matches your PHP version (%s / ID: %d)', |
||||
| 1039 | count($data[$channel]), |
||||
| 1040 | $channel, |
||||
| 1041 | PHP_VERSION, |
||||
| 1042 | PHP_VERSION_ID |
||||
| 1043 | ); |
||||
| 1044 | throw new RuntimeException($error); |
||||
| 1045 | } |
||||
| 1046 | } |
||||
| 1047 | |||||
| 1048 | /** |
||||
| 1049 | * Downloads the digital signature of required phar file |
||||
| 1050 | * |
||||
| 1051 | * @param string $url The signature url |
||||
| 1052 | * @param null|string $signature Set by method on success |
||||
| 1053 | * |
||||
| 1054 | * @return bool If the download succeeded |
||||
| 1055 | */ |
||||
| 1056 | protected function getSignature($url, &$signature) |
||||
| 1057 | { |
||||
| 1058 | if (!$result = $this->disableTls) { |
||||
| 1059 | $signature = $this->httpClient->get($url); |
||||
| 1060 | |||||
| 1061 | if ($signature) { |
||||
| 1062 | $signature = json_decode($signature, true); |
||||
| 1063 | $signature = base64_decode($signature['sha384']); |
||||
| 1064 | $result = true; |
||||
| 1065 | } |
||||
| 1066 | } |
||||
| 1067 | |||||
| 1068 | return $result; |
||||
| 1069 | } |
||||
| 1070 | |||||
| 1071 | /** |
||||
| 1072 | * Verifies the signature of the downloaded phar |
||||
| 1073 | * |
||||
| 1074 | * @param string $version The composer versione |
||||
| 1075 | * @param string $signature The downloaded digital signature |
||||
| 1076 | * @param string $file The temp phar file |
||||
| 1077 | * |
||||
| 1078 | * @return bool If the operation succeeded |
||||
| 1079 | */ |
||||
| 1080 | protected function verifySignature($version, $signature, $file) |
||||
| 1081 | { |
||||
| 1082 | if (!$result = $this->disableTls) { |
||||
| 1083 | $path = preg_match('{^[0-9a-f]{40}$}', $version) ? $this->pubKeys['dev'] : $this->pubKeys['tags']; |
||||
| 1084 | $pubkeyid = openssl_pkey_get_public('file://'.$path); |
||||
| 1085 | |||||
| 1086 | $result = 1 === openssl_verify( |
||||
| 1087 | file_get_contents($file), |
||||
| 1088 | $signature, |
||||
| 1089 | $pubkeyid, |
||||
| 1090 | $this->algo |
||||
| 1091 | ); |
||||
| 1092 | |||||
| 1093 | // PHP 8 automatically frees the key instance and deprecates the function |
||||
| 1094 | if (PHP_VERSION_ID < 80000) { |
||||
| 1095 | openssl_free_key($pubkeyid); |
||||
| 1096 | } |
||||
| 1097 | } |
||||
| 1098 | |||||
| 1099 | return $result; |
||||
| 1100 | } |
||||
| 1101 | |||||
| 1102 | /** |
||||
| 1103 | * Validates the downloaded phar file |
||||
| 1104 | * |
||||
| 1105 | * @param string $pharFile The temp phar file |
||||
| 1106 | * @param null|string $error Set by method on failure |
||||
| 1107 | * |
||||
| 1108 | * @return bool If the operation succeeded |
||||
| 1109 | */ |
||||
| 1110 | protected function validatePhar($pharFile, &$error) |
||||
| 1111 | { |
||||
| 1112 | if (ini_get('phar.readonly')) { |
||||
| 1113 | return true; |
||||
| 1114 | } |
||||
| 1115 | |||||
| 1116 | try { |
||||
| 1117 | // Test the phar validity |
||||
| 1118 | $phar = new Phar($pharFile); |
||||
| 1119 | // Free the variable to unlock the file |
||||
| 1120 | unset($phar); |
||||
| 1121 | $result = true; |
||||
| 1122 | |||||
| 1123 | } catch (Exception $e) { |
||||
| 1124 | if (!$e instanceof UnexpectedValueException && !$e instanceof PharException) { |
||||
| 1125 | throw $e; |
||||
| 1126 | } |
||||
| 1127 | $error = $e->getMessage(); |
||||
| 1128 | $result = false; |
||||
| 1129 | } |
||||
| 1130 | return $result; |
||||
| 1131 | } |
||||
| 1132 | |||||
| 1133 | /** |
||||
| 1134 | * Returns a string representation of the last json error |
||||
| 1135 | * |
||||
| 1136 | * @return string The error string or code |
||||
| 1137 | */ |
||||
| 1138 | protected function getJsonError() |
||||
| 1139 | { |
||||
| 1140 | if (function_exists('json_last_error_msg')) { |
||||
| 1141 | return json_last_error_msg(); |
||||
| 1142 | } else { |
||||
| 1143 | return 'json_last_error = '.json_last_error(); |
||||
| 1144 | } |
||||
| 1145 | } |
||||
| 1146 | |||||
| 1147 | /** |
||||
| 1148 | * Cleans up resources at the end of the installation |
||||
| 1149 | * |
||||
| 1150 | * @param bool $result If the installation succeeded |
||||
| 1151 | */ |
||||
| 1152 | protected function cleanUp($result) |
||||
| 1153 | { |
||||
| 1154 | if (!$result) { |
||||
| 1155 | // Output buffered errors |
||||
| 1156 | if ($this->quiet) { |
||||
| 1157 | $this->outputErrors(); |
||||
| 1158 | } |
||||
| 1159 | // Clean up stuff we created |
||||
| 1160 | $this->uninstall(); |
||||
| 1161 | } elseif ($this->tmpCafile) { |
||||
| 1162 | @unlink($this->tmpCafile); |
||||
|
0 ignored issues
–
show
It seems like you do not handle an error condition for
unlink(). This can introduce security issues, and is generally not recommended.
(
Ignorable by Annotation
)
If this is a false-positive, you can also ignore this issue in your code via the
If you suppress an error, we recommend checking for the error condition explicitly: // For example instead of
@mkdir($dir);
// Better use
if (@mkdir($dir) === false) {
throw new \RuntimeException('The directory '.$dir.' could not be created.');
}
Loading history...
|
|||||
| 1163 | } |
||||
| 1164 | } |
||||
| 1165 | |||||
| 1166 | /** |
||||
| 1167 | * Outputs unique errors when in quiet mode |
||||
| 1168 | * |
||||
| 1169 | */ |
||||
| 1170 | protected function outputErrors() |
||||
| 1171 | { |
||||
| 1172 | $errors = explode(PHP_EOL, ob_get_clean()); |
||||
| 1173 | $shown = array(); |
||||
| 1174 | |||||
| 1175 | foreach ($errors as $error) { |
||||
| 1176 | if ($error && !in_array($error, $shown)) { |
||||
| 1177 | out($error, 'error'); |
||||
| 1178 | $shown[] = $error; |
||||
| 1179 | } |
||||
| 1180 | } |
||||
| 1181 | } |
||||
| 1182 | |||||
| 1183 | /** |
||||
| 1184 | * Uninstalls newly-created files and directories on failure |
||||
| 1185 | * |
||||
| 1186 | */ |
||||
| 1187 | protected function uninstall() |
||||
| 1188 | { |
||||
| 1189 | foreach (array_reverse($this->installs) as $target) { |
||||
| 1190 | if (is_file($target)) { |
||||
| 1191 | @unlink($target); |
||||
|
0 ignored issues
–
show
It seems like you do not handle an error condition for
unlink(). This can introduce security issues, and is generally not recommended.
(
Ignorable by Annotation
)
If this is a false-positive, you can also ignore this issue in your code via the
If you suppress an error, we recommend checking for the error condition explicitly: // For example instead of
@mkdir($dir);
// Better use
if (@mkdir($dir) === false) {
throw new \RuntimeException('The directory '.$dir.' could not be created.');
}
Loading history...
|
|||||
| 1192 | } elseif (is_dir($target)) { |
||||
| 1193 | @rmdir($target); |
||||
|
0 ignored issues
–
show
It seems like you do not handle an error condition for
rmdir(). This can introduce security issues, and is generally not recommended.
(
Ignorable by Annotation
)
If this is a false-positive, you can also ignore this issue in your code via the
If you suppress an error, we recommend checking for the error condition explicitly: // For example instead of
@mkdir($dir);
// Better use
if (@mkdir($dir) === false) {
throw new \RuntimeException('The directory '.$dir.' could not be created.');
}
Loading history...
|
|||||
| 1194 | } |
||||
| 1195 | } |
||||
| 1196 | |||||
| 1197 | if ($this->tmpFile !== null && file_exists($this->tmpFile)) { |
||||
| 1198 | @unlink($this->tmpFile); |
||||
| 1199 | } |
||||
| 1200 | } |
||||
| 1201 | |||||
| 1202 | public static function getPKDev() |
||||
| 1203 | { |
||||
| 1204 | return <<<PKDEV |
||||
| 1205 | -----BEGIN PUBLIC KEY----- |
||||
| 1206 | MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAnBDHjZS6e0ZMoK3xTD7f |
||||
| 1207 | FNCzlXjX/Aie2dit8QXA03pSrOTbaMnxON3hUL47Lz3g1SC6YJEMVHr0zYq4elWi |
||||
| 1208 | i3ecFEgzLcj+pZM5X6qWu2Ozz4vWx3JYo1/a/HYdOuW9e3lwS8VtS0AVJA+U8X0A |
||||
| 1209 | hZnBmGpltHhO8hPKHgkJtkTUxCheTcbqn4wGHl8Z2SediDcPTLwqezWKUfrYzu1f |
||||
| 1210 | o/j3WFwFs6GtK4wdYtiXr+yspBZHO3y1udf8eFFGcb2V3EaLOrtfur6XQVizjOuk |
||||
| 1211 | 8lw5zzse1Qp/klHqbDRsjSzJ6iL6F4aynBc6Euqt/8ccNAIz0rLjLhOraeyj4eNn |
||||
| 1212 | 8iokwMKiXpcrQLTKH+RH1JCuOVxQ436bJwbSsp1VwiqftPQieN+tzqy+EiHJJmGf |
||||
| 1213 | TBAbWcncicCk9q2md+AmhNbvHO4PWbbz9TzC7HJb460jyWeuMEvw3gNIpEo2jYa9 |
||||
| 1214 | pMV6cVqnSa+wOc0D7pC9a6bne0bvLcm3S+w6I5iDB3lZsb3A9UtRiSP7aGSo7D72 |
||||
| 1215 | 8tC8+cIgZcI7k9vjvOqH+d7sdOU2yPCnRY6wFh62/g8bDnUpr56nZN1G89GwM4d4 |
||||
| 1216 | r/TU7BQQIzsZgAiqOGXvVklIgAMiV0iucgf3rNBLjjeNEwNSTTG9F0CtQ+7JLwaE |
||||
| 1217 | wSEuAuRm+pRqi8BRnQ/GKUcCAwEAAQ== |
||||
| 1218 | -----END PUBLIC KEY----- |
||||
| 1219 | PKDEV; |
||||
| 1220 | } |
||||
| 1221 | |||||
| 1222 | public static function getPKTags() |
||||
| 1223 | { |
||||
| 1224 | return <<<PKTAGS |
||||
| 1225 | -----BEGIN PUBLIC KEY----- |
||||
| 1226 | MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0Vi/2K6apCVj76nCnCl2 |
||||
| 1227 | MQUPdK+A9eqkYBacXo2wQBYmyVlXm2/n/ZsX6pCLYPQTHyr5jXbkQzBw8SKqPdlh |
||||
| 1228 | vA7NpbMeNCz7wP/AobvUXM8xQuXKbMDTY2uZ4O7sM+PfGbptKPBGLe8Z8d2sUnTO |
||||
| 1229 | bXtX6Lrj13wkRto7st/w/Yp33RHe9SlqkiiS4MsH1jBkcIkEHsRaveZzedUaxY0M |
||||
| 1230 | mba0uPhGUInpPzEHwrYqBBEtWvP97t2vtfx8I5qv28kh0Y6t+jnjL1Urid2iuQZf |
||||
| 1231 | noCMFIOu4vksK5HxJxxrN0GOmGmwVQjOOtxkwikNiotZGPR4KsVj8NnBrLX7oGuM |
||||
| 1232 | nQvGciiu+KoC2r3HDBrpDeBVdOWxDzT5R4iI0KoLzFh2pKqwbY+obNPS2bj+2dgJ |
||||
| 1233 | rV3V5Jjry42QOCBN3c88wU1PKftOLj2ECpewY6vnE478IipiEu7EAdK8Zwj2LmTr |
||||
| 1234 | RKQUSa9k7ggBkYZWAeO/2Ag0ey3g2bg7eqk+sHEq5ynIXd5lhv6tC5PBdHlWipDK |
||||
| 1235 | tl2IxiEnejnOmAzGVivE1YGduYBjN+mjxDVy8KGBrjnz1JPgAvgdwJ2dYw4Rsc/e |
||||
| 1236 | TzCFWGk/HM6a4f0IzBWbJ5ot0PIi4amk07IotBXDWwqDiQTwyuGCym5EqWQ2BD95 |
||||
| 1237 | RGv89BPD+2DLnJysngsvVaUCAwEAAQ== |
||||
| 1238 | -----END PUBLIC KEY----- |
||||
| 1239 | PKTAGS; |
||||
| 1240 | } |
||||
| 1241 | } |
||||
| 1242 | |||||
| 1243 | class ErrorHandler |
||||
| 1244 | { |
||||
| 1245 | public $message; |
||||
| 1246 | protected $active; |
||||
| 1247 | |||||
| 1248 | /** |
||||
| 1249 | * Handle php errors |
||||
| 1250 | * |
||||
| 1251 | * @param mixed $code The error code |
||||
| 1252 | * @param mixed $msg The error message |
||||
| 1253 | */ |
||||
| 1254 | public function handleError($code, $msg) |
||||
| 1255 | { |
||||
| 1256 | if ($this->message) { |
||||
| 1257 | $this->message .= PHP_EOL; |
||||
| 1258 | } |
||||
| 1259 | $this->message .= preg_replace('{^file_get_contents\(.*?\): }', '', $msg); |
||||
| 1260 | } |
||||
| 1261 | |||||
| 1262 | /** |
||||
| 1263 | * Starts error-handling if not already active |
||||
| 1264 | * |
||||
| 1265 | * Any message is cleared |
||||
| 1266 | */ |
||||
| 1267 | public function start() |
||||
| 1268 | { |
||||
| 1269 | if (!$this->active) { |
||||
| 1270 | set_error_handler(array($this, 'handleError')); |
||||
| 1271 | $this->active = true; |
||||
| 1272 | } |
||||
| 1273 | $this->message = ''; |
||||
| 1274 | } |
||||
| 1275 | |||||
| 1276 | /** |
||||
| 1277 | * Stops error-handling if active |
||||
| 1278 | * |
||||
| 1279 | * Any message is preserved until the next call to start() |
||||
| 1280 | */ |
||||
| 1281 | public function stop() |
||||
| 1282 | { |
||||
| 1283 | if ($this->active) { |
||||
| 1284 | restore_error_handler(); |
||||
| 1285 | $this->active = false; |
||||
| 1286 | } |
||||
| 1287 | } |
||||
| 1288 | } |
||||
| 1289 | |||||
| 1290 | class NoProxyPattern |
||||
| 1291 | { |
||||
| 1292 | private $composerInNoProxy = false; |
||||
| 1293 | private $rulePorts = array(); |
||||
| 1294 | |||||
| 1295 | public function __construct($pattern) |
||||
| 1296 | { |
||||
| 1297 | $rules = preg_split('{[\s,]+}', $pattern, null, PREG_SPLIT_NO_EMPTY); |
||||
| 1298 | |||||
| 1299 | if ($matches = preg_grep('{getcomposer\.org(?::\d+)?}i', $rules)) { |
||||
| 1300 | $this->composerInNoProxy = true; |
||||
| 1301 | |||||
| 1302 | foreach ($matches as $match) { |
||||
| 1303 | if (strpos($match, ':') !== false) { |
||||
| 1304 | list(, $port) = explode(':', $match); |
||||
| 1305 | $this->rulePorts[] = (int) $port; |
||||
| 1306 | } |
||||
| 1307 | } |
||||
| 1308 | } |
||||
| 1309 | } |
||||
| 1310 | |||||
| 1311 | /** |
||||
| 1312 | * Returns true if NO_PROXY contains getcomposer.org |
||||
| 1313 | * |
||||
| 1314 | * @param string $url http(s)://getcomposer.org |
||||
| 1315 | * |
||||
| 1316 | * @return bool |
||||
| 1317 | */ |
||||
| 1318 | public function test($url) |
||||
| 1319 | { |
||||
| 1320 | if (!$this->composerInNoProxy) { |
||||
| 1321 | return false; |
||||
| 1322 | } |
||||
| 1323 | |||||
| 1324 | if (empty($this->rulePorts)) { |
||||
| 1325 | return true; |
||||
| 1326 | } |
||||
| 1327 | |||||
| 1328 | if (strpos($url, 'http://') === 0) { |
||||
| 1329 | $port = 80; |
||||
| 1330 | } else { |
||||
| 1331 | $port = 443; |
||||
| 1332 | } |
||||
| 1333 | |||||
| 1334 | return in_array($port, $this->rulePorts); |
||||
| 1335 | } |
||||
| 1336 | } |
||||
| 1337 | |||||
| 1338 | class HttpClient { |
||||
| 1339 | |||||
| 1340 | /** @var null|string */ |
||||
| 1341 | private static $caPath; |
||||
| 1342 | |||||
| 1343 | private $options = array('http' => array()); |
||||
| 1344 | private $disableTls = false; |
||||
| 1345 | |||||
| 1346 | public function __construct($disableTls = false, $cafile = false) |
||||
| 1347 | { |
||||
| 1348 | $this->disableTls = $disableTls; |
||||
| 1349 | if ($this->disableTls === false) { |
||||
| 1350 | if (!empty($cafile) && !is_dir($cafile)) { |
||||
| 1351 | if (!is_readable($cafile) || !validateCaFile(file_get_contents($cafile))) { |
||||
| 1352 | throw new RuntimeException('The configured cafile (' .$cafile. ') was not valid or could not be read.'); |
||||
| 1353 | } |
||||
| 1354 | } |
||||
| 1355 | $options = $this->getTlsStreamContextDefaults($cafile); |
||||
| 1356 | $this->options = array_replace_recursive($this->options, $options); |
||||
| 1357 | } |
||||
| 1358 | } |
||||
| 1359 | |||||
| 1360 | public function get($url) |
||||
| 1361 | { |
||||
| 1362 | $context = $this->getStreamContext($url); |
||||
| 1363 | $result = file_get_contents($url, false, $context); |
||||
| 1364 | |||||
| 1365 | if ($result && extension_loaded('zlib')) { |
||||
| 1366 | $decode = false; |
||||
| 1367 | foreach ($http_response_header as $header) { |
||||
| 1368 | if (preg_match('{^content-encoding: *gzip *$}i', $header)) { |
||||
| 1369 | $decode = true; |
||||
| 1370 | continue; |
||||
| 1371 | } elseif (preg_match('{^HTTP/}i', $header)) { |
||||
| 1372 | $decode = false; |
||||
| 1373 | } |
||||
| 1374 | } |
||||
| 1375 | |||||
| 1376 | if ($decode) { |
||||
| 1377 | if (version_compare(PHP_VERSION, '5.4.0', '>=')) { |
||||
| 1378 | $result = zlib_decode($result); |
||||
| 1379 | } else { |
||||
| 1380 | // work around issue with gzuncompress & co that do not work with all gzip checksums |
||||
| 1381 | $result = file_get_contents('compress.zlib://data:application/octet-stream;base64,'.base64_encode($result)); |
||||
| 1382 | } |
||||
| 1383 | |||||
| 1384 | if (!$result) { |
||||
| 1385 | throw new RuntimeException('Failed to decode zlib stream'); |
||||
| 1386 | } |
||||
| 1387 | } |
||||
| 1388 | } |
||||
| 1389 | |||||
| 1390 | return $result; |
||||
| 1391 | } |
||||
| 1392 | |||||
| 1393 | protected function getStreamContext($url) |
||||
| 1394 | { |
||||
| 1395 | if ($this->disableTls === false) { |
||||
| 1396 | if (PHP_VERSION_ID < 50600) { |
||||
| 1397 | $this->options['ssl']['SNI_server_name'] = parse_url($url, PHP_URL_HOST); |
||||
| 1398 | } |
||||
| 1399 | } |
||||
| 1400 | // Keeping the above mostly isolated from the code copied from Composer. |
||||
| 1401 | return $this->getMergedStreamContext($url); |
||||
| 1402 | } |
||||
| 1403 | |||||
| 1404 | protected function getTlsStreamContextDefaults($cafile) |
||||
| 1405 | { |
||||
| 1406 | $ciphers = implode(':', array( |
||||
| 1407 | 'ECDHE-RSA-AES128-GCM-SHA256', |
||||
| 1408 | 'ECDHE-ECDSA-AES128-GCM-SHA256', |
||||
| 1409 | 'ECDHE-RSA-AES256-GCM-SHA384', |
||||
| 1410 | 'ECDHE-ECDSA-AES256-GCM-SHA384', |
||||
| 1411 | 'DHE-RSA-AES128-GCM-SHA256', |
||||
| 1412 | 'DHE-DSS-AES128-GCM-SHA256', |
||||
| 1413 | 'kEDH+AESGCM', |
||||
| 1414 | 'ECDHE-RSA-AES128-SHA256', |
||||
| 1415 | 'ECDHE-ECDSA-AES128-SHA256', |
||||
| 1416 | 'ECDHE-RSA-AES128-SHA', |
||||
| 1417 | 'ECDHE-ECDSA-AES128-SHA', |
||||
| 1418 | 'ECDHE-RSA-AES256-SHA384', |
||||
| 1419 | 'ECDHE-ECDSA-AES256-SHA384', |
||||
| 1420 | 'ECDHE-RSA-AES256-SHA', |
||||
| 1421 | 'ECDHE-ECDSA-AES256-SHA', |
||||
| 1422 | 'DHE-RSA-AES128-SHA256', |
||||
| 1423 | 'DHE-RSA-AES128-SHA', |
||||
| 1424 | 'DHE-DSS-AES128-SHA256', |
||||
| 1425 | 'DHE-RSA-AES256-SHA256', |
||||
| 1426 | 'DHE-DSS-AES256-SHA', |
||||
| 1427 | 'DHE-RSA-AES256-SHA', |
||||
| 1428 | 'AES128-GCM-SHA256', |
||||
| 1429 | 'AES256-GCM-SHA384', |
||||
| 1430 | 'AES128-SHA256', |
||||
| 1431 | 'AES256-SHA256', |
||||
| 1432 | 'AES128-SHA', |
||||
| 1433 | 'AES256-SHA', |
||||
| 1434 | 'AES', |
||||
| 1435 | 'CAMELLIA', |
||||
| 1436 | 'DES-CBC3-SHA', |
||||
| 1437 | '!aNULL', |
||||
| 1438 | '!eNULL', |
||||
| 1439 | '!EXPORT', |
||||
| 1440 | '!DES', |
||||
| 1441 | '!RC4', |
||||
| 1442 | '!MD5', |
||||
| 1443 | '!PSK', |
||||
| 1444 | '!aECDH', |
||||
| 1445 | '!EDH-DSS-DES-CBC3-SHA', |
||||
| 1446 | '!EDH-RSA-DES-CBC3-SHA', |
||||
| 1447 | '!KRB5-DES-CBC3-SHA', |
||||
| 1448 | )); |
||||
| 1449 | |||||
| 1450 | /** |
||||
| 1451 | * CN_match and SNI_server_name are only known once a URL is passed. |
||||
| 1452 | * They will be set in the getOptionsForUrl() method which receives a URL. |
||||
| 1453 | * |
||||
| 1454 | * cafile or capath can be overridden by passing in those options to constructor. |
||||
| 1455 | */ |
||||
| 1456 | $options = array( |
||||
| 1457 | 'ssl' => array( |
||||
| 1458 | 'ciphers' => $ciphers, |
||||
| 1459 | 'verify_peer' => true, |
||||
| 1460 | 'verify_depth' => 7, |
||||
| 1461 | 'SNI_enabled' => true, |
||||
| 1462 | ) |
||||
| 1463 | ); |
||||
| 1464 | |||||
| 1465 | /** |
||||
| 1466 | * Attempt to find a local cafile or throw an exception. |
||||
| 1467 | * The user may go download one if this occurs. |
||||
| 1468 | */ |
||||
| 1469 | if (!$cafile) { |
||||
| 1470 | $cafile = self::getSystemCaRootBundlePath(); |
||||
| 1471 | } |
||||
| 1472 | if (is_dir($cafile)) { |
||||
| 1473 | $options['ssl']['capath'] = $cafile; |
||||
| 1474 | } elseif ($cafile) { |
||||
| 1475 | $options['ssl']['cafile'] = $cafile; |
||||
| 1476 | } else { |
||||
| 1477 | throw new RuntimeException('A valid cafile could not be located automatically.'); |
||||
| 1478 | } |
||||
| 1479 | |||||
| 1480 | /** |
||||
| 1481 | * Disable TLS compression to prevent CRIME attacks where supported. |
||||
| 1482 | */ |
||||
| 1483 | if (version_compare(PHP_VERSION, '5.4.13') >= 0) { |
||||
| 1484 | $options['ssl']['disable_compression'] = true; |
||||
| 1485 | } |
||||
| 1486 | |||||
| 1487 | return $options; |
||||
| 1488 | } |
||||
| 1489 | |||||
| 1490 | /** |
||||
| 1491 | * function copied from Composer\Util\StreamContextFactory::initOptions |
||||
| 1492 | * |
||||
| 1493 | * Any changes should be applied there as well, or backported here. |
||||
| 1494 | * |
||||
| 1495 | * @param string $url URL the context is to be used for |
||||
| 1496 | * @return resource Default context |
||||
| 1497 | * @throws \RuntimeException if https proxy required and OpenSSL uninstalled |
||||
| 1498 | */ |
||||
| 1499 | protected function getMergedStreamContext($url) |
||||
| 1500 | { |
||||
| 1501 | $options = $this->options; |
||||
| 1502 | |||||
| 1503 | // Handle HTTP_PROXY/http_proxy on CLI only for security reasons |
||||
| 1504 | if ((PHP_SAPI === 'cli' || PHP_SAPI === 'phpdbg') && (!empty($_SERVER['HTTP_PROXY']) || !empty($_SERVER['http_proxy']))) { |
||||
| 1505 | $proxy = parse_url(!empty($_SERVER['http_proxy']) ? $_SERVER['http_proxy'] : $_SERVER['HTTP_PROXY']); |
||||
| 1506 | } |
||||
| 1507 | |||||
| 1508 | // Prefer CGI_HTTP_PROXY if available |
||||
| 1509 | if (!empty($_SERVER['CGI_HTTP_PROXY'])) { |
||||
| 1510 | $proxy = parse_url($_SERVER['CGI_HTTP_PROXY']); |
||||
| 1511 | } |
||||
| 1512 | |||||
| 1513 | // Override with HTTPS proxy if present and URL is https |
||||
| 1514 | if (preg_match('{^https://}i', $url) && (!empty($_SERVER['HTTPS_PROXY']) || !empty($_SERVER['https_proxy']))) { |
||||
| 1515 | $proxy = parse_url(!empty($_SERVER['https_proxy']) ? $_SERVER['https_proxy'] : $_SERVER['HTTPS_PROXY']); |
||||
| 1516 | } |
||||
| 1517 | |||||
| 1518 | // Remove proxy if URL matches no_proxy directive |
||||
| 1519 | if (!empty($_SERVER['NO_PROXY']) || !empty($_SERVER['no_proxy']) && parse_url($url, PHP_URL_HOST)) { |
||||
| 1520 | $pattern = new NoProxyPattern(!empty($_SERVER['no_proxy']) ? $_SERVER['no_proxy'] : $_SERVER['NO_PROXY']); |
||||
| 1521 | if ($pattern->test($url)) { |
||||
| 1522 | unset($proxy); |
||||
| 1523 | } |
||||
| 1524 | } |
||||
| 1525 | |||||
| 1526 | if (!empty($proxy)) { |
||||
| 1527 | $proxyURL = isset($proxy['scheme']) ? $proxy['scheme'] . '://' : ''; |
||||
| 1528 | $proxyURL .= isset($proxy['host']) ? $proxy['host'] : ''; |
||||
| 1529 | |||||
| 1530 | if (isset($proxy['port'])) { |
||||
| 1531 | $proxyURL .= ":" . $proxy['port']; |
||||
| 1532 | } elseif (strpos($proxyURL, 'http://') === 0) { |
||||
| 1533 | $proxyURL .= ":80"; |
||||
| 1534 | } elseif (strpos($proxyURL, 'https://') === 0) { |
||||
| 1535 | $proxyURL .= ":443"; |
||||
| 1536 | } |
||||
| 1537 | |||||
| 1538 | // check for a secure proxy |
||||
| 1539 | if (strpos($proxyURL, 'https://') === 0) { |
||||
| 1540 | if (!extension_loaded('openssl')) { |
||||
| 1541 | throw new RuntimeException('You must enable the openssl extension to use a secure proxy.'); |
||||
| 1542 | } |
||||
| 1543 | if (strpos($url, 'https://') === 0) { |
||||
| 1544 | throw new RuntimeException('PHP does not support https requests through a secure proxy.'); |
||||
| 1545 | } |
||||
| 1546 | } |
||||
| 1547 | |||||
| 1548 | // http(s):// is not supported in proxy |
||||
| 1549 | $proxyURL = str_replace(array('http://', 'https://'), array('tcp://', 'ssl://'), $proxyURL); |
||||
| 1550 | |||||
| 1551 | $options['http'] = array( |
||||
| 1552 | 'proxy' => $proxyURL, |
||||
| 1553 | ); |
||||
| 1554 | |||||
| 1555 | // add request_fulluri for http requests |
||||
| 1556 | if ('http' === parse_url($url, PHP_URL_SCHEME)) { |
||||
| 1557 | $options['http']['request_fulluri'] = true; |
||||
| 1558 | } |
||||
| 1559 | |||||
| 1560 | // handle proxy auth if present |
||||
| 1561 | if (isset($proxy['user'])) { |
||||
| 1562 | $auth = rawurldecode($proxy['user']); |
||||
| 1563 | if (isset($proxy['pass'])) { |
||||
| 1564 | $auth .= ':' . rawurldecode($proxy['pass']); |
||||
| 1565 | } |
||||
| 1566 | $auth = base64_encode($auth); |
||||
| 1567 | |||||
| 1568 | $options['http']['header'] = "Proxy-Authorization: Basic {$auth}\r\n"; |
||||
| 1569 | } |
||||
| 1570 | } |
||||
| 1571 | |||||
| 1572 | if (isset($options['http']['header'])) { |
||||
| 1573 | $options['http']['header'] .= "Connection: close\r\n"; |
||||
| 1574 | } else { |
||||
| 1575 | $options['http']['header'] = "Connection: close\r\n"; |
||||
| 1576 | } |
||||
| 1577 | if (extension_loaded('zlib')) { |
||||
| 1578 | $options['http']['header'] .= "Accept-Encoding: gzip\r\n"; |
||||
| 1579 | } |
||||
| 1580 | $options['http']['header'] .= "User-Agent: ".COMPOSER_INSTALLER."\r\n"; |
||||
| 1581 | $options['http']['protocol_version'] = 1.1; |
||||
| 1582 | $options['http']['timeout'] = 600; |
||||
| 1583 | |||||
| 1584 | return stream_context_create($options); |
||||
| 1585 | } |
||||
| 1586 | |||||
| 1587 | /** |
||||
| 1588 | * This method was adapted from Sslurp. |
||||
| 1589 | * https://github.com/EvanDotPro/Sslurp |
||||
| 1590 | * |
||||
| 1591 | * (c) Evan Coury <[email protected]> |
||||
| 1592 | * |
||||
| 1593 | * For the full copyright and license information, please see below: |
||||
| 1594 | * |
||||
| 1595 | * Copyright (c) 2013, Evan Coury |
||||
| 1596 | * All rights reserved. |
||||
| 1597 | * |
||||
| 1598 | * Redistribution and use in source and binary forms, with or without modification, |
||||
| 1599 | * are permitted provided that the following conditions are met: |
||||
| 1600 | * |
||||
| 1601 | * * Redistributions of source code must retain the above copyright notice, |
||||
| 1602 | * this list of conditions and the following disclaimer. |
||||
| 1603 | * |
||||
| 1604 | * * Redistributions in binary form must reproduce the above copyright notice, |
||||
| 1605 | * this list of conditions and the following disclaimer in the documentation |
||||
| 1606 | * and/or other materials provided with the distribution. |
||||
| 1607 | * |
||||
| 1608 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND |
||||
| 1609 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED |
||||
| 1610 | * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE |
||||
| 1611 | * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR |
||||
| 1612 | * ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES |
||||
| 1613 | * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
||||
| 1614 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON |
||||
| 1615 | * ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
||||
| 1616 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS |
||||
| 1617 | * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
||||
| 1618 | */ |
||||
| 1619 | public static function getSystemCaRootBundlePath() |
||||
| 1620 | { |
||||
| 1621 | if (self::$caPath !== null) { |
||||
| 1622 | return self::$caPath; |
||||
| 1623 | } |
||||
| 1624 | |||||
| 1625 | // If SSL_CERT_FILE env variable points to a valid certificate/bundle, use that. |
||||
| 1626 | // This mimics how OpenSSL uses the SSL_CERT_FILE env variable. |
||||
| 1627 | $envCertFile = getenv('SSL_CERT_FILE'); |
||||
| 1628 | if ($envCertFile && is_readable($envCertFile) && validateCaFile(file_get_contents($envCertFile))) { |
||||
| 1629 | return self::$caPath = $envCertFile; |
||||
| 1630 | } |
||||
| 1631 | |||||
| 1632 | // If SSL_CERT_DIR env variable points to a valid certificate/bundle, use that. |
||||
| 1633 | // This mimics how OpenSSL uses the SSL_CERT_FILE env variable. |
||||
| 1634 | $envCertDir = getenv('SSL_CERT_DIR'); |
||||
| 1635 | if ($envCertDir && is_dir($envCertDir) && is_readable($envCertDir)) { |
||||
| 1636 | return self::$caPath = $envCertDir; |
||||
| 1637 | } |
||||
| 1638 | |||||
| 1639 | $configured = ini_get('openssl.cafile'); |
||||
| 1640 | if ($configured && strlen($configured) > 0 && is_readable($configured) && validateCaFile(file_get_contents($configured))) { |
||||
| 1641 | return self::$caPath = $configured; |
||||
| 1642 | } |
||||
| 1643 | |||||
| 1644 | $configured = ini_get('openssl.capath'); |
||||
| 1645 | if ($configured && is_dir($configured) && is_readable($configured)) { |
||||
| 1646 | return self::$caPath = $configured; |
||||
| 1647 | } |
||||
| 1648 | |||||
| 1649 | $caBundlePaths = array( |
||||
| 1650 | '/etc/pki/tls/certs/ca-bundle.crt', // Fedora, RHEL, CentOS (ca-certificates package) |
||||
| 1651 | '/etc/ssl/certs/ca-certificates.crt', // Debian, Ubuntu, Gentoo, Arch Linux (ca-certificates package) |
||||
| 1652 | '/etc/ssl/ca-bundle.pem', // SUSE, openSUSE (ca-certificates package) |
||||
| 1653 | '/usr/local/share/certs/ca-root-nss.crt', // FreeBSD (ca_root_nss_package) |
||||
| 1654 | '/usr/ssl/certs/ca-bundle.crt', // Cygwin |
||||
| 1655 | '/opt/local/share/curl/curl-ca-bundle.crt', // OS X macports, curl-ca-bundle package |
||||
| 1656 | '/usr/local/share/curl/curl-ca-bundle.crt', // Default cURL CA bunde path (without --with-ca-bundle option) |
||||
| 1657 | '/usr/share/ssl/certs/ca-bundle.crt', // Really old RedHat? |
||||
| 1658 | '/etc/ssl/cert.pem', // OpenBSD |
||||
| 1659 | '/usr/local/etc/ssl/cert.pem', // FreeBSD 10.x |
||||
| 1660 | '/usr/local/etc/openssl/cert.pem', // OS X homebrew, openssl package |
||||
| 1661 | '/usr/local/etc/[email protected]/cert.pem', // OS X homebrew, [email protected] package |
||||
| 1662 | '/opt/homebrew/etc/openssl@3/cert.pem', // macOS silicon homebrew, openssl@3 package |
||||
| 1663 | '/opt/homebrew/etc/[email protected]/cert.pem', // macOS silicon homebrew, [email protected] package |
||||
| 1664 | ); |
||||
| 1665 | |||||
| 1666 | foreach ($caBundlePaths as $caBundle) { |
||||
| 1667 | if (@is_readable($caBundle) && validateCaFile(file_get_contents($caBundle))) { |
||||
| 1668 | return self::$caPath = $caBundle; |
||||
| 1669 | } |
||||
| 1670 | } |
||||
| 1671 | |||||
| 1672 | foreach ($caBundlePaths as $caBundle) { |
||||
| 1673 | $caBundle = dirname($caBundle); |
||||
| 1674 | if (is_dir($caBundle) && glob($caBundle.'/*')) { |
||||
| 1675 | return self::$caPath = $caBundle; |
||||
| 1676 | } |
||||
| 1677 | } |
||||
| 1678 | |||||
| 1679 | return self::$caPath = false; |
||||
|
0 ignored issues
–
show
It seems like
false of type false is incompatible with the declared type null|string of property $caPath.
Our type inference engine has found an assignment to a property that is incompatible with the declared type of that property. Either this assignment is in error or the assigned type should be added to the documentation/type hint for that property.. Loading history...
|
|||||
| 1680 | } |
||||
| 1681 | |||||
| 1682 | public static function getPackagedCaFile() |
||||
| 1683 | { |
||||
| 1684 | return <<<CACERT |
||||
| 1685 | ## |
||||
| 1686 | ## Bundle of CA Root Certificates for Let's Encrypt |
||||
| 1687 | ## |
||||
| 1688 | ## See https://letsencrypt.org/certificates/#root-certificates |
||||
| 1689 | ## |
||||
| 1690 | ## ISRG Root X1 (RSA 4096) expires Jun 04 11:04:38 2035 GMT |
||||
| 1691 | ## ISRG Root X2 (ECDSA P-384) expires Sep 17 16:00:00 2040 GMT |
||||
| 1692 | ## |
||||
| 1693 | ## Both these are self-signed CA root certificates |
||||
| 1694 | ## |
||||
| 1695 | |||||
| 1696 | ISRG Root X1 |
||||
| 1697 | ============ |
||||
| 1698 | -----BEGIN CERTIFICATE----- |
||||
| 1699 | MIIFazCCA1OgAwIBAgIRAIIQz7DSQONZRGPgu2OCiwAwDQYJKoZIhvcNAQELBQAw |
||||
| 1700 | TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh |
||||
| 1701 | cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMTUwNjA0MTEwNDM4 |
||||
| 1702 | WhcNMzUwNjA0MTEwNDM4WjBPMQswCQYDVQQGEwJVUzEpMCcGA1UEChMgSW50ZXJu |
||||
| 1703 | ZXQgU2VjdXJpdHkgUmVzZWFyY2ggR3JvdXAxFTATBgNVBAMTDElTUkcgUm9vdCBY |
||||
| 1704 | MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK3oJHP0FDfzm54rVygc |
||||
| 1705 | h77ct984kIxuPOZXoHj3dcKi/vVqbvYATyjb3miGbESTtrFj/RQSa78f0uoxmyF+ |
||||
| 1706 | 0TM8ukj13Xnfs7j/EvEhmkvBioZxaUpmZmyPfjxwv60pIgbz5MDmgK7iS4+3mX6U |
||||
| 1707 | A5/TR5d8mUgjU+g4rk8Kb4Mu0UlXjIB0ttov0DiNewNwIRt18jA8+o+u3dpjq+sW |
||||
| 1708 | T8KOEUt+zwvo/7V3LvSye0rgTBIlDHCNAymg4VMk7BPZ7hm/ELNKjD+Jo2FR3qyH |
||||
| 1709 | B5T0Y3HsLuJvW5iB4YlcNHlsdu87kGJ55tukmi8mxdAQ4Q7e2RCOFvu396j3x+UC |
||||
| 1710 | B5iPNgiV5+I3lg02dZ77DnKxHZu8A/lJBdiB3QW0KtZB6awBdpUKD9jf1b0SHzUv |
||||
| 1711 | KBds0pjBqAlkd25HN7rOrFleaJ1/ctaJxQZBKT5ZPt0m9STJEadao0xAH0ahmbWn |
||||
| 1712 | OlFuhjuefXKnEgV4We0+UXgVCwOPjdAvBbI+e0ocS3MFEvzG6uBQE3xDk3SzynTn |
||||
| 1713 | jh8BCNAw1FtxNrQHusEwMFxIt4I7mKZ9YIqioymCzLq9gwQbooMDQaHWBfEbwrbw |
||||
| 1714 | qHyGO0aoSCqI3Haadr8faqU9GY/rOPNk3sgrDQoo//fb4hVC1CLQJ13hef4Y53CI |
||||
| 1715 | rU7m2Ys6xt0nUW7/vGT1M0NPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV |
||||
| 1716 | HRMBAf8EBTADAQH/MB0GA1UdDgQWBBR5tFnme7bl5AFzgAiIyBpY9umbbjANBgkq |
||||
| 1717 | hkiG9w0BAQsFAAOCAgEAVR9YqbyyqFDQDLHYGmkgJykIrGF1XIpu+ILlaS/V9lZL |
||||
| 1718 | ubhzEFnTIZd+50xx+7LSYK05qAvqFyFWhfFQDlnrzuBZ6brJFe+GnY+EgPbk6ZGQ |
||||
| 1719 | 3BebYhtF8GaV0nxvwuo77x/Py9auJ/GpsMiu/X1+mvoiBOv/2X/qkSsisRcOj/KK |
||||
| 1720 | NFtY2PwByVS5uCbMiogziUwthDyC3+6WVwW6LLv3xLfHTjuCvjHIInNzktHCgKQ5 |
||||
| 1721 | ORAzI4JMPJ+GslWYHb4phowim57iaztXOoJwTdwJx4nLCgdNbOhdjsnvzqvHu7Ur |
||||
| 1722 | TkXWStAmzOVyyghqpZXjFaH3pO3JLF+l+/+sKAIuvtd7u+Nxe5AW0wdeRlN8NwdC |
||||
| 1723 | jNPElpzVmbUq4JUagEiuTDkHzsxHpFKVK7q4+63SM1N95R1NbdWhscdCb+ZAJzVc |
||||
| 1724 | oyi3B43njTOQ5yOf+1CceWxG1bQVs5ZufpsMljq4Ui0/1lvh+wjChP4kqKOJ2qxq |
||||
| 1725 | 4RgqsahDYVvTH9w7jXbyLeiNdd8XM2w9U/t7y0Ff/9yi0GE44Za4rF2LN9d11TPA |
||||
| 1726 | mRGunUHBcnWEvgJBQl9nJEiU0Zsnvgc/ubhPgXRR4Xq37Z0j4r7g1SgEEzwxA57d |
||||
| 1727 | emyPxgcYxn/eR44/KJ4EBs+lVDR3veyJm+kXQ99b21/+jh5Xos1AnX5iItreGCc= |
||||
| 1728 | -----END CERTIFICATE----- |
||||
| 1729 | |||||
| 1730 | ISRG Root X2 |
||||
| 1731 | ============ |
||||
| 1732 | -----BEGIN CERTIFICATE----- |
||||
| 1733 | MIICGzCCAaGgAwIBAgIQQdKd0XLq7qeAwSxs6S+HUjAKBggqhkjOPQQDAzBPMQsw |
||||
| 1734 | CQYDVQQGEwJVUzEpMCcGA1UEChMgSW50ZXJuZXQgU2VjdXJpdHkgUmVzZWFyY2gg |
||||
| 1735 | R3JvdXAxFTATBgNVBAMTDElTUkcgUm9vdCBYMjAeFw0yMDA5MDQwMDAwMDBaFw00 |
||||
| 1736 | MDA5MTcxNjAwMDBaME8xCzAJBgNVBAYTAlVTMSkwJwYDVQQKEyBJbnRlcm5ldCBT |
||||
| 1737 | ZWN1cml0eSBSZXNlYXJjaCBHcm91cDEVMBMGA1UEAxMMSVNSRyBSb290IFgyMHYw |
||||
| 1738 | EAYHKoZIzj0CAQYFK4EEACIDYgAEzZvVn4CDCuwJSvMWSj5cz3es3mcFDR0HttwW |
||||
| 1739 | +1qLFNvicWDEukWVEYmO6gbf9yoWHKS5xcUy4APgHoIYOIvXRdgKam7mAHf7AlF9 |
||||
| 1740 | ItgKbppbd9/w+kHsOdx1ymgHDB/qo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0T |
||||
| 1741 | AQH/BAUwAwEB/zAdBgNVHQ4EFgQUfEKWrt5LSDv6kviejM9ti6lyN5UwCgYIKoZI |
||||
| 1742 | zj0EAwMDaAAwZQIwe3lORlCEwkSHRhtFcP9Ymd70/aTSVaYgLXTWNLxBo1BfASdW |
||||
| 1743 | tL4ndQavEi51mI38AjEAi/V3bNTIZargCyzuFJ0nN6T5U6VR5CmD1/iQMVtCnwr1 |
||||
| 1744 | /q4AaOeMSQ+2b1tbFfLn |
||||
| 1745 | -----END CERTIFICATE----- |
||||
| 1746 | CACERT; |
||||
| 1747 | } |
||||
| 1748 | } |
||||
| 1749 |
If you suppress an error, we recommend checking for the error condition explicitly: