2020-03-04 21:07:05 +00:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* @copyright Copyright (C) 2020, Friendica
|
|
|
|
*
|
|
|
|
* @license GNU APGL version 3 or any later version
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace Friendica\Network;
|
|
|
|
|
2020-03-04 21:30:24 +00:00
|
|
|
use DOMDocument;
|
|
|
|
use DomXPath;
|
2020-03-04 21:11:01 +00:00
|
|
|
use Friendica\App;
|
|
|
|
use Friendica\Core\Config\IConfig;
|
2020-03-04 21:07:05 +00:00
|
|
|
use Friendica\Core\System;
|
|
|
|
use Friendica\Util\Network;
|
2020-03-04 21:11:01 +00:00
|
|
|
use Friendica\Util\Profiler;
|
2020-10-08 19:20:41 +00:00
|
|
|
use GuzzleHttp\Client;
|
|
|
|
use GuzzleHttp\Exception\RequestException;
|
|
|
|
use Psr\Http\Message\RequestInterface;
|
|
|
|
use Psr\Http\Message\ResponseInterface;
|
|
|
|
use Psr\Http\Message\UriInterface;
|
2020-03-04 21:11:01 +00:00
|
|
|
use Psr\Log\LoggerInterface;
|
2020-03-04 21:07:05 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Performs HTTP requests to a given URL
|
|
|
|
*/
|
2020-03-04 21:56:16 +00:00
|
|
|
class HTTPRequest implements IHTTPRequest
|
2020-03-04 21:07:05 +00:00
|
|
|
{
|
2020-03-04 21:11:01 +00:00
|
|
|
/** @var LoggerInterface */
|
|
|
|
private $logger;
|
|
|
|
/** @var Profiler */
|
|
|
|
private $profiler;
|
|
|
|
/** @var IConfig */
|
|
|
|
private $config;
|
|
|
|
/** @var string */
|
2020-03-04 21:26:38 +00:00
|
|
|
private $baseUrl;
|
2020-03-04 21:11:01 +00:00
|
|
|
|
2020-03-04 21:26:38 +00:00
|
|
|
public function __construct(LoggerInterface $logger, Profiler $profiler, IConfig $config, App\BaseURL $baseUrl)
|
2020-03-04 21:11:01 +00:00
|
|
|
{
|
2020-03-04 21:26:38 +00:00
|
|
|
$this->logger = $logger;
|
|
|
|
$this->profiler = $profiler;
|
|
|
|
$this->config = $config;
|
|
|
|
$this->baseUrl = $baseUrl->get();
|
2020-03-04 21:11:01 +00:00
|
|
|
}
|
|
|
|
|
2020-03-04 21:07:05 +00:00
|
|
|
/**
|
2020-03-04 21:56:16 +00:00
|
|
|
* {@inheritDoc}
|
2020-03-04 21:07:05 +00:00
|
|
|
*/
|
2020-10-08 19:20:41 +00:00
|
|
|
public function get(string $url, bool $binary = false, array $opts = [])
|
2020-03-04 21:07:05 +00:00
|
|
|
{
|
|
|
|
$stamp1 = microtime(true);
|
|
|
|
|
|
|
|
if (strlen($url) > 1000) {
|
2020-03-04 21:15:46 +00:00
|
|
|
$this->logger->debug('URL is longer than 1000 characters.', ['url' => $url, 'callstack' => System::callstack(20)]);
|
2020-03-04 21:07:05 +00:00
|
|
|
return CurlResult::createErrorCurl(substr($url, 0, 200));
|
|
|
|
}
|
|
|
|
|
|
|
|
$parts2 = [];
|
|
|
|
$parts = parse_url($url);
|
|
|
|
$path_parts = explode('/', $parts['path'] ?? '');
|
|
|
|
foreach ($path_parts as $part) {
|
|
|
|
if (strlen($part) <> mb_strlen($part)) {
|
|
|
|
$parts2[] = rawurlencode($part);
|
|
|
|
} else {
|
|
|
|
$parts2[] = $part;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
$parts['path'] = implode('/', $parts2);
|
|
|
|
$url = Network::unparseURL($parts);
|
|
|
|
|
|
|
|
if (Network::isUrlBlocked($url)) {
|
2020-03-04 21:15:46 +00:00
|
|
|
$this->logger->info('Domain is blocked.', ['url' => $url]);
|
2020-03-04 21:07:05 +00:00
|
|
|
return CurlResult::createErrorCurl($url);
|
|
|
|
}
|
|
|
|
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions = [];
|
2020-03-04 21:07:05 +00:00
|
|
|
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_HEADER] = true;
|
2020-03-04 21:07:05 +00:00
|
|
|
|
|
|
|
if (!empty($opts['cookiejar'])) {
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_COOKIEJAR] = $opts["cookiejar"];
|
|
|
|
$curlOptions[CURLOPT_COOKIEFILE] = $opts["cookiejar"];
|
2020-03-04 21:07:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// These settings aren't needed. We're following the location already.
|
2020-10-08 19:20:41 +00:00
|
|
|
// $curlOptions[CURLOPT_FOLLOWLOCATION] =true;
|
|
|
|
// $curlOptions[CURLOPT_MAXREDIRS] = 5;
|
2020-03-04 21:07:05 +00:00
|
|
|
|
|
|
|
if (!empty($opts['accept_content'])) {
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_HTTPHEADER][] = ['Accept: ' . $opts['accept_content']];
|
2020-03-04 21:07:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!empty($opts['header'])) {
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_HTTPHEADER][] = $opts['header'];
|
2020-03-04 21:07:05 +00:00
|
|
|
}
|
|
|
|
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_RETURNTRANSFER] = true;
|
|
|
|
$curlOptions[CURLOPT_USERAGENT] = $this->getUserAgent();
|
2020-03-04 21:07:05 +00:00
|
|
|
|
2020-03-04 21:15:46 +00:00
|
|
|
$range = intval($this->config->get('system', 'curl_range_bytes', 0));
|
2020-03-04 21:07:05 +00:00
|
|
|
|
|
|
|
if ($range > 0) {
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_RANGE] = '0-' . $range;
|
2020-03-04 21:07:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Without this setting it seems as if some webservers send compressed content
|
|
|
|
// This seems to confuse curl so that it shows this uncompressed.
|
|
|
|
/// @todo We could possibly set this value to "gzip" or something similar
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_ENCODING] = '';
|
2020-03-04 21:07:05 +00:00
|
|
|
|
|
|
|
if (!empty($opts['headers'])) {
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_HTTPHEADER][] = $opts['headers'];
|
2020-03-04 21:07:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!empty($opts['nobody'])) {
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_NOBODY] = $opts['nobody'];
|
2020-03-04 21:07:05 +00:00
|
|
|
}
|
|
|
|
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_CONNECTTIMEOUT] = 10;
|
2020-08-18 03:55:27 +00:00
|
|
|
|
2020-03-04 21:07:05 +00:00
|
|
|
if (!empty($opts['timeout'])) {
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_TIMEOUT] = $opts['timeout'];
|
2020-03-04 21:07:05 +00:00
|
|
|
} else {
|
2020-03-04 21:15:46 +00:00
|
|
|
$curl_time = $this->config->get('system', 'curl_timeout', 60);
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_TIMEOUT] = intval($curl_time);
|
2020-03-04 21:07:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// by default we will allow self-signed certs
|
|
|
|
// but you can override this
|
|
|
|
|
2020-03-04 21:15:46 +00:00
|
|
|
$check_cert = $this->config->get('system', 'verifyssl');
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_SSL_VERIFYPEER] = ($check_cert) ? true : false;
|
2020-03-04 21:07:05 +00:00
|
|
|
|
|
|
|
if ($check_cert) {
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_SSL_VERIFYHOST] = 2;
|
2020-03-04 21:07:05 +00:00
|
|
|
}
|
|
|
|
|
2020-03-04 21:15:46 +00:00
|
|
|
$proxy = $this->config->get('system', 'proxy');
|
2020-03-04 21:07:05 +00:00
|
|
|
|
2020-03-04 21:15:46 +00:00
|
|
|
if (!empty($proxy)) {
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_HTTPPROXYTUNNEL] = 1;
|
|
|
|
$curlOptions[CURLOPT_PROXY] = $proxy;
|
2020-03-04 21:15:46 +00:00
|
|
|
$proxyuser = $this->config->get('system', 'proxyuser');
|
2020-03-04 21:07:05 +00:00
|
|
|
|
2020-03-04 21:15:46 +00:00
|
|
|
if (!empty($proxyuser)) {
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_PROXYUSERPWD] = $proxyuser;
|
2020-03-04 21:07:05 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-04 21:15:46 +00:00
|
|
|
if ($this->config->get('system', 'ipv4_resolve', false)) {
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_IPRESOLVE] = CURL_IPRESOLVE_V4;
|
2020-03-04 21:07:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if ($binary) {
|
2020-10-08 19:20:41 +00:00
|
|
|
$curlOptions[CURLOPT_BINARYTRANSFER] = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
$onRedirect = function(
|
|
|
|
RequestInterface $request,
|
|
|
|
ResponseInterface $response,
|
|
|
|
UriInterface $uri
|
|
|
|
) {
|
|
|
|
$this->logger->notice('Curl redirect.', ['url' => $request->getUri(), 'to' => $uri]);
|
|
|
|
};
|
|
|
|
|
|
|
|
$client = new Client([
|
|
|
|
'allow_redirect' => [
|
|
|
|
'max' => 8,
|
|
|
|
'on_redirect' => $onRedirect,
|
|
|
|
'track_redirect' => true,
|
|
|
|
'strict' => true,
|
|
|
|
'referer' => true,
|
|
|
|
],
|
|
|
|
'curl' => $curlOptions
|
|
|
|
]);
|
|
|
|
|
|
|
|
try {
|
|
|
|
$response = $client->get($url);
|
|
|
|
return new GuzzleResponse($response, $url);
|
|
|
|
} catch (RequestException $exception) {
|
|
|
|
if ($exception->hasResponse()) {
|
|
|
|
return new GuzzleResponse($exception->getResponse(), $url, $exception->getCode(), $exception->getMessage());
|
|
|
|
} else {
|
2020-10-09 17:59:24 +00:00
|
|
|
return new CurlResult($url, '', ['http_code' => $exception->getCode()], $exception->getCode(), $exception->getMessage());
|
2020-10-08 19:20:41 +00:00
|
|
|
}
|
|
|
|
} finally {
|
|
|
|
$this->profiler->saveTimestamp($stamp1, 'network');
|
2020-03-04 21:07:05 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-03-04 21:56:16 +00:00
|
|
|
* {@inheritDoc}
|
2020-03-04 21:07:05 +00:00
|
|
|
*
|
2020-03-04 21:56:16 +00:00
|
|
|
* @param int $redirects The recursion counter for internal use - default 0
|
2020-03-04 21:07:05 +00:00
|
|
|
*
|
|
|
|
* @throws \Friendica\Network\HTTPException\InternalServerErrorException
|
|
|
|
*/
|
2020-03-04 21:18:28 +00:00
|
|
|
public function post(string $url, $params, array $headers = [], int $timeout = 0, int &$redirects = 0)
|
2020-03-04 21:07:05 +00:00
|
|
|
{
|
|
|
|
$stamp1 = microtime(true);
|
|
|
|
|
|
|
|
if (Network::isUrlBlocked($url)) {
|
2020-03-04 21:26:38 +00:00
|
|
|
$this->logger->info('Domain is blocked.' . ['url' => $url]);
|
2020-03-04 21:07:05 +00:00
|
|
|
return CurlResult::createErrorCurl($url);
|
|
|
|
}
|
|
|
|
|
|
|
|
$ch = curl_init($url);
|
|
|
|
|
|
|
|
if (($redirects > 8) || (!$ch)) {
|
|
|
|
return CurlResult::createErrorCurl($url);
|
|
|
|
}
|
|
|
|
|
2020-03-04 21:18:28 +00:00
|
|
|
$this->logger->debug('Post_url: start.', ['url' => $url]);
|
2020-03-04 21:07:05 +00:00
|
|
|
|
|
|
|
curl_setopt($ch, CURLOPT_HEADER, true);
|
|
|
|
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
|
|
|
|
curl_setopt($ch, CURLOPT_POST, 1);
|
|
|
|
curl_setopt($ch, CURLOPT_POSTFIELDS, $params);
|
2020-03-04 21:33:31 +00:00
|
|
|
curl_setopt($ch, CURLOPT_USERAGENT, $this->getUserAgent());
|
2020-03-04 21:07:05 +00:00
|
|
|
|
2020-03-04 21:18:28 +00:00
|
|
|
if ($this->config->get('system', 'ipv4_resolve', false)) {
|
2020-03-04 21:07:05 +00:00
|
|
|
curl_setopt($ch, CURLOPT_IPRESOLVE, CURL_IPRESOLVE_V4);
|
|
|
|
}
|
|
|
|
|
2020-08-18 03:55:27 +00:00
|
|
|
@curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 10);
|
|
|
|
|
2020-03-04 21:07:05 +00:00
|
|
|
if (intval($timeout)) {
|
|
|
|
curl_setopt($ch, CURLOPT_TIMEOUT, $timeout);
|
|
|
|
} else {
|
2020-03-04 21:18:28 +00:00
|
|
|
$curl_time = $this->config->get('system', 'curl_timeout', 60);
|
2020-03-04 21:07:05 +00:00
|
|
|
curl_setopt($ch, CURLOPT_TIMEOUT, intval($curl_time));
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!empty($headers)) {
|
|
|
|
curl_setopt($ch, CURLOPT_HTTPHEADER, $headers);
|
|
|
|
}
|
|
|
|
|
2020-03-04 21:18:28 +00:00
|
|
|
$check_cert = $this->config->get('system', 'verifyssl');
|
2020-03-04 21:07:05 +00:00
|
|
|
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, (($check_cert) ? true : false));
|
|
|
|
|
|
|
|
if ($check_cert) {
|
|
|
|
@curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 2);
|
|
|
|
}
|
|
|
|
|
2020-03-04 21:18:28 +00:00
|
|
|
$proxy = $this->config->get('system', 'proxy');
|
2020-03-04 21:07:05 +00:00
|
|
|
|
2020-03-04 21:18:28 +00:00
|
|
|
if (!empty($proxy)) {
|
2020-03-04 21:07:05 +00:00
|
|
|
curl_setopt($ch, CURLOPT_HTTPPROXYTUNNEL, 1);
|
|
|
|
curl_setopt($ch, CURLOPT_PROXY, $proxy);
|
2020-03-04 21:18:28 +00:00
|
|
|
$proxyuser = $this->config->get('system', 'proxyuser');
|
|
|
|
if (!empty($proxyuser)) {
|
2020-03-04 21:07:05 +00:00
|
|
|
curl_setopt($ch, CURLOPT_PROXYUSERPWD, $proxyuser);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// don't let curl abort the entire application
|
|
|
|
// if it throws any errors.
|
|
|
|
|
|
|
|
$s = @curl_exec($ch);
|
|
|
|
|
|
|
|
$curl_info = curl_getinfo($ch);
|
|
|
|
|
|
|
|
$curlResponse = new CurlResult($url, $s, $curl_info, curl_errno($ch), curl_error($ch));
|
|
|
|
|
2020-09-16 04:56:37 +00:00
|
|
|
if (!Network::isRedirectBlocked($url) && $curlResponse->isRedirectUrl()) {
|
2020-03-04 21:07:05 +00:00
|
|
|
$redirects++;
|
2020-03-04 21:18:28 +00:00
|
|
|
$this->logger->info('Post redirect.', ['url' => $url, 'to' => $curlResponse->getRedirectUrl()]);
|
2020-03-04 21:07:05 +00:00
|
|
|
curl_close($ch);
|
2020-03-04 21:33:31 +00:00
|
|
|
return $this->post($curlResponse->getRedirectUrl(), $params, $headers, $redirects, $timeout);
|
2020-03-04 21:07:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
curl_close($ch);
|
|
|
|
|
2020-07-27 04:22:07 +00:00
|
|
|
$this->profiler->saveTimestamp($stamp1, 'network');
|
2020-03-04 21:07:05 +00:00
|
|
|
|
|
|
|
// Very old versions of Lighttpd don't like the "Expect" header, so we remove it when needed
|
|
|
|
if ($curlResponse->getReturnCode() == 417) {
|
|
|
|
$redirects++;
|
|
|
|
|
|
|
|
if (empty($headers)) {
|
|
|
|
$headers = ['Expect:'];
|
|
|
|
} else {
|
|
|
|
if (!in_array('Expect:', $headers)) {
|
|
|
|
array_push($headers, 'Expect:');
|
|
|
|
}
|
|
|
|
}
|
2020-03-04 21:33:31 +00:00
|
|
|
$this->logger->info('Server responds with 417, applying workaround', ['url' => $url]);
|
|
|
|
return $this->post($url, $params, $headers, $redirects, $timeout);
|
2020-03-04 21:07:05 +00:00
|
|
|
}
|
|
|
|
|
2020-03-04 21:33:31 +00:00
|
|
|
$this->logger->debug('Post_url: End.', ['url' => $url]);
|
2020-03-04 21:07:05 +00:00
|
|
|
|
|
|
|
return $curlResponse;
|
|
|
|
}
|
|
|
|
|
2020-03-04 21:30:24 +00:00
|
|
|
/**
|
2020-03-04 21:56:16 +00:00
|
|
|
* {@inheritDoc}
|
2020-03-04 21:30:24 +00:00
|
|
|
*/
|
2020-03-04 21:33:31 +00:00
|
|
|
public function finalUrl(string $url, int $depth = 1, bool $fetchbody = false)
|
2020-03-04 21:30:24 +00:00
|
|
|
{
|
2020-08-07 13:49:59 +00:00
|
|
|
if (Network::isUrlBlocked($url)) {
|
|
|
|
$this->logger->info('Domain is blocked.', ['url' => $url]);
|
|
|
|
return $url;
|
|
|
|
}
|
|
|
|
|
2020-09-16 04:56:37 +00:00
|
|
|
if (Network::isRedirectBlocked($url)) {
|
|
|
|
$this->logger->info('Domain should not be redirected.', ['url' => $url]);
|
|
|
|
return $url;
|
|
|
|
}
|
|
|
|
|
2020-03-04 21:30:24 +00:00
|
|
|
$url = Network::stripTrackingQueryParams($url);
|
|
|
|
|
|
|
|
if ($depth > 10) {
|
|
|
|
return $url;
|
|
|
|
}
|
|
|
|
|
|
|
|
$url = trim($url, "'");
|
|
|
|
|
|
|
|
$stamp1 = microtime(true);
|
|
|
|
|
|
|
|
$ch = curl_init();
|
|
|
|
curl_setopt($ch, CURLOPT_URL, $url);
|
|
|
|
curl_setopt($ch, CURLOPT_HEADER, 1);
|
|
|
|
curl_setopt($ch, CURLOPT_NOBODY, 1);
|
2020-08-18 03:55:27 +00:00
|
|
|
curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 10);
|
2020-03-04 21:30:24 +00:00
|
|
|
curl_setopt($ch, CURLOPT_TIMEOUT, 10);
|
|
|
|
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
|
2020-03-04 21:33:31 +00:00
|
|
|
curl_setopt($ch, CURLOPT_USERAGENT, $this->getUserAgent());
|
2020-03-04 21:30:24 +00:00
|
|
|
|
|
|
|
curl_exec($ch);
|
|
|
|
$curl_info = @curl_getinfo($ch);
|
|
|
|
$http_code = $curl_info['http_code'];
|
|
|
|
curl_close($ch);
|
|
|
|
|
2020-07-27 04:22:07 +00:00
|
|
|
$this->profiler->saveTimestamp($stamp1, "network");
|
2020-03-04 21:30:24 +00:00
|
|
|
|
|
|
|
if ($http_code == 0) {
|
|
|
|
return $url;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (in_array($http_code, ['301', '302'])) {
|
|
|
|
if (!empty($curl_info['redirect_url'])) {
|
2020-03-04 21:33:31 +00:00
|
|
|
return $this->finalUrl($curl_info['redirect_url'], ++$depth, $fetchbody);
|
2020-03-04 21:30:24 +00:00
|
|
|
} elseif (!empty($curl_info['location'])) {
|
2020-03-04 21:33:31 +00:00
|
|
|
return $this->finalUrl($curl_info['location'], ++$depth, $fetchbody);
|
2020-03-04 21:30:24 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for redirects in the meta elements of the body if there are no redirects in the header.
|
|
|
|
if (!$fetchbody) {
|
2020-03-04 21:33:31 +00:00
|
|
|
return $this->finalUrl($url, ++$depth, true);
|
2020-03-04 21:30:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// if the file is too large then exit
|
|
|
|
if ($curl_info["download_content_length"] > 1000000) {
|
|
|
|
return $url;
|
|
|
|
}
|
|
|
|
|
|
|
|
// if it isn't a HTML file then exit
|
|
|
|
if (!empty($curl_info["content_type"]) && !strstr(strtolower($curl_info["content_type"]), "html")) {
|
|
|
|
return $url;
|
|
|
|
}
|
|
|
|
|
|
|
|
$stamp1 = microtime(true);
|
|
|
|
|
|
|
|
$ch = curl_init();
|
|
|
|
curl_setopt($ch, CURLOPT_URL, $url);
|
|
|
|
curl_setopt($ch, CURLOPT_HEADER, 0);
|
|
|
|
curl_setopt($ch, CURLOPT_NOBODY, 0);
|
2020-08-18 03:55:27 +00:00
|
|
|
curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 10);
|
2020-03-04 21:30:24 +00:00
|
|
|
curl_setopt($ch, CURLOPT_TIMEOUT, 10);
|
|
|
|
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
|
2020-03-04 21:33:31 +00:00
|
|
|
curl_setopt($ch, CURLOPT_USERAGENT, $this->getUserAgent());
|
2020-03-04 21:30:24 +00:00
|
|
|
|
|
|
|
$body = curl_exec($ch);
|
|
|
|
curl_close($ch);
|
|
|
|
|
2020-07-27 04:22:07 +00:00
|
|
|
$this->profiler->saveTimestamp($stamp1, "network");
|
2020-03-04 21:30:24 +00:00
|
|
|
|
|
|
|
if (trim($body) == "") {
|
|
|
|
return $url;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for redirect in meta elements
|
|
|
|
$doc = new DOMDocument();
|
|
|
|
@$doc->loadHTML($body);
|
|
|
|
|
|
|
|
$xpath = new DomXPath($doc);
|
|
|
|
|
|
|
|
$list = $xpath->query("//meta[@content]");
|
|
|
|
foreach ($list as $node) {
|
|
|
|
$attr = [];
|
|
|
|
if ($node->attributes->length) {
|
|
|
|
foreach ($node->attributes as $attribute) {
|
|
|
|
$attr[$attribute->name] = $attribute->value;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (@$attr["http-equiv"] == 'refresh') {
|
|
|
|
$path = $attr["content"];
|
|
|
|
$pathinfo = explode(";", $path);
|
|
|
|
foreach ($pathinfo as $value) {
|
|
|
|
if (substr(strtolower($value), 0, 4) == "url=") {
|
2020-03-04 21:33:31 +00:00
|
|
|
return $this->finalUrl(substr($value, 4), ++$depth);
|
2020-03-04 21:30:24 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $url;
|
|
|
|
}
|
|
|
|
|
2020-03-04 21:07:05 +00:00
|
|
|
/**
|
2020-03-04 21:56:16 +00:00
|
|
|
* {@inheritDoc}
|
2020-03-04 21:07:05 +00:00
|
|
|
*
|
2020-03-04 21:56:16 +00:00
|
|
|
* @param int $redirects The recursion counter for internal use - default 0
|
2020-03-04 21:07:05 +00:00
|
|
|
*
|
|
|
|
* @throws \Friendica\Network\HTTPException\InternalServerErrorException
|
|
|
|
*/
|
2020-03-04 21:35:40 +00:00
|
|
|
public function fetch(string $url, bool $binary = false, int $timeout = 0, string $accept_content = '', string $cookiejar = '', int &$redirects = 0)
|
2020-03-04 21:07:05 +00:00
|
|
|
{
|
2020-03-04 21:35:40 +00:00
|
|
|
$ret = $this->fetchFull($url, $binary, $timeout, $accept_content, $cookiejar, $redirects);
|
2020-03-04 21:07:05 +00:00
|
|
|
|
|
|
|
return $ret->getBody();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-03-04 21:56:16 +00:00
|
|
|
* {@inheritDoc}
|
2020-03-04 21:07:05 +00:00
|
|
|
*
|
2020-03-04 21:56:16 +00:00
|
|
|
* @param int $redirects The recursion counter for internal use - default 0
|
2020-03-04 21:07:05 +00:00
|
|
|
*
|
|
|
|
* @throws \Friendica\Network\HTTPException\InternalServerErrorException
|
|
|
|
*/
|
2020-03-04 21:35:40 +00:00
|
|
|
public function fetchFull(string $url, bool $binary = false, int $timeout = 0, string $accept_content = '', string $cookiejar = '', int &$redirects = 0)
|
2020-03-04 21:07:05 +00:00
|
|
|
{
|
2020-03-04 21:35:09 +00:00
|
|
|
return $this->get(
|
2020-03-04 21:07:05 +00:00
|
|
|
$url,
|
|
|
|
$binary,
|
|
|
|
[
|
|
|
|
'timeout' => $timeout,
|
|
|
|
'accept_content' => $accept_content,
|
|
|
|
'cookiejar' => $cookiejar
|
2020-10-09 17:33:19 +00:00
|
|
|
]
|
2020-03-04 21:07:05 +00:00
|
|
|
);
|
|
|
|
}
|
2020-03-04 21:26:38 +00:00
|
|
|
|
|
|
|
/**
|
2020-03-04 21:56:16 +00:00
|
|
|
* {@inheritDoc}
|
2020-03-04 21:26:38 +00:00
|
|
|
*/
|
|
|
|
public function getUserAgent()
|
|
|
|
{
|
|
|
|
return
|
|
|
|
FRIENDICA_PLATFORM . " '" .
|
|
|
|
FRIENDICA_CODENAME . "' " .
|
|
|
|
FRIENDICA_VERSION . '-' .
|
|
|
|
DB_UPDATE_VERSION . '; ' .
|
|
|
|
$this->baseUrl;
|
|
|
|
}
|
2020-03-04 21:07:05 +00:00
|
|
|
}
|