2012-05-01 06:07:52 +00:00
|
|
|
<?php
|
|
|
|
|
2017-01-18 21:45:32 +00:00
|
|
|
use \Friendica\Core\Config;
|
|
|
|
|
2012-05-01 06:07:52 +00:00
|
|
|
require_once("boot.php");
|
|
|
|
require_once('include/Scrape.php');
|
2012-05-02 03:11:35 +00:00
|
|
|
require_once('include/socgraph.php');
|
2012-05-01 06:07:52 +00:00
|
|
|
|
2012-11-05 08:28:54 +00:00
|
|
|
function gprobe_run(&$argv, &$argc){
|
2012-05-01 06:07:52 +00:00
|
|
|
global $a, $db;
|
|
|
|
|
|
|
|
if(is_null($a)) {
|
|
|
|
$a = new App;
|
|
|
|
}
|
2014-12-08 10:02:03 +00:00
|
|
|
|
2012-05-01 06:07:52 +00:00
|
|
|
if(is_null($db)) {
|
2016-11-04 15:44:49 +00:00
|
|
|
@include(".htconfig.php");
|
2016-11-04 18:26:28 +00:00
|
|
|
require_once("include/dba.php");
|
2016-11-04 15:44:49 +00:00
|
|
|
$db = new dba($db_host, $db_user, $db_pass, $db_data);
|
2016-11-04 18:26:28 +00:00
|
|
|
unset($db_host, $db_user, $db_pass, $db_data);
|
2016-11-04 15:44:49 +00:00
|
|
|
};
|
2012-05-01 06:07:52 +00:00
|
|
|
|
|
|
|
require_once('include/session.php');
|
|
|
|
require_once('include/datetime.php');
|
|
|
|
|
2017-01-18 21:45:32 +00:00
|
|
|
Config::load();
|
2012-05-01 06:07:52 +00:00
|
|
|
|
|
|
|
$a->set_baseurl(get_config('system','url'));
|
|
|
|
|
|
|
|
load_hooks();
|
|
|
|
|
|
|
|
if($argc != 2)
|
|
|
|
return;
|
|
|
|
|
|
|
|
$url = hex2bin($argv[1]);
|
|
|
|
|
2016-01-23 21:36:15 +00:00
|
|
|
$r = q("SELECT `id`, `url`, `network` FROM `gcontact` WHERE `nurl` = '%s' ORDER BY `id` LIMIT 1",
|
2012-05-01 06:07:52 +00:00
|
|
|
dbesc(normalise_link($url))
|
|
|
|
);
|
|
|
|
|
2014-12-08 10:02:03 +00:00
|
|
|
logger("gprobe start for ".normalise_link($url), LOGGER_DEBUG);
|
|
|
|
|
2016-11-04 15:44:49 +00:00
|
|
|
if (!dbm::is_result($r)) {
|
2012-05-01 06:07:52 +00:00
|
|
|
|
2015-03-28 07:29:01 +00:00
|
|
|
// Is it a DDoS attempt?
|
|
|
|
$urlparts = parse_url($url);
|
|
|
|
|
|
|
|
$result = Cache::get("gprobe:".$urlparts["host"]);
|
|
|
|
if (!is_null($result)) {
|
2015-10-03 22:28:15 +00:00
|
|
|
if (in_array($result["network"], array(NETWORK_FEED, NETWORK_PHANTOM))) {
|
2015-03-28 07:49:24 +00:00
|
|
|
logger("DDoS attempt detected for ".$urlparts["host"]." by ".$_SERVER["REMOTE_ADDR"].". server data: ".print_r($_SERVER, true), LOGGER_DEBUG);
|
2015-03-28 07:29:01 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-01 08:34:47 +00:00
|
|
|
$arr = probe_url($url);
|
2015-03-28 07:29:01 +00:00
|
|
|
|
|
|
|
if (is_null($result))
|
2016-11-04 15:44:49 +00:00
|
|
|
Cache::set("gprobe:".$urlparts["host"], $arr);
|
2015-03-28 07:29:01 +00:00
|
|
|
|
2016-04-20 05:58:52 +00:00
|
|
|
if (!in_array($arr["network"], array(NETWORK_FEED, NETWORK_PHANTOM)))
|
2016-01-23 21:36:15 +00:00
|
|
|
update_gcontact($arr);
|
|
|
|
|
|
|
|
$r = q("SELECT `id`, `url`, `network` FROM `gcontact` WHERE `nurl` = '%s' ORDER BY `id` LIMIT 1",
|
2012-05-01 08:34:47 +00:00
|
|
|
dbesc(normalise_link($url))
|
2012-05-01 06:07:52 +00:00
|
|
|
);
|
|
|
|
}
|
2016-12-14 08:42:36 +00:00
|
|
|
if (dbm::is_result($r)) {
|
2016-04-23 08:46:16 +00:00
|
|
|
// Check for accessibility and do a poco discovery
|
|
|
|
if (poco_last_updated($r[0]['url'], true) AND ($r[0]["network"] == NETWORK_DFRN))
|
2016-01-23 21:36:15 +00:00
|
|
|
poco_load(0,0,$r[0]['id'], str_replace('/profile/','/poco/',$r[0]['url']));
|
2016-04-23 08:46:16 +00:00
|
|
|
}
|
2014-12-08 10:02:03 +00:00
|
|
|
|
|
|
|
logger("gprobe end for ".normalise_link($url), LOGGER_DEBUG);
|
2012-05-01 06:07:52 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (array_search(__file__,get_included_files())===0){
|
2016-11-04 15:44:49 +00:00
|
|
|
gprobe_run($_SERVER["argv"],$_SERVER["argc"]);
|
|
|
|
killme();
|
2012-05-01 06:07:52 +00:00
|
|
|
}
|