2018-01-27 03:51:07 +00:00
|
|
|
<?php
|
|
|
|
/**
|
2022-01-02 07:27:47 +00:00
|
|
|
* @copyright Copyright (C) 2010-2022, the Friendica project
|
2020-02-09 15:18:46 +00:00
|
|
|
*
|
|
|
|
* @license GNU AGPL version 3 or any later version
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
*
|
2018-01-27 03:51:07 +00:00
|
|
|
*/
|
2020-02-09 15:18:46 +00:00
|
|
|
|
2018-01-27 03:51:07 +00:00
|
|
|
namespace Friendica\Util;
|
|
|
|
|
2018-12-26 06:06:24 +00:00
|
|
|
use Friendica\Core\Hook;
|
2018-10-29 21:20:46 +00:00
|
|
|
use Friendica\Core\Logger;
|
2019-12-15 22:50:35 +00:00
|
|
|
use Friendica\DI;
|
2020-08-18 20:30:24 +00:00
|
|
|
use Friendica\Model\Contact;
|
2022-07-05 05:04:05 +00:00
|
|
|
use Friendica\Network\HTTPClient\Client\HttpClientAccept;
|
2022-07-14 05:39:25 +00:00
|
|
|
use Friendica\Network\HTTPClient\Client\HttpClientOptions;
|
2021-10-29 23:21:07 +00:00
|
|
|
use Friendica\Network\HTTPException\NotModifiedException;
|
2022-05-11 11:06:14 +00:00
|
|
|
use GuzzleHttp\Psr7\Uri;
|
2018-01-27 03:51:07 +00:00
|
|
|
|
|
|
|
class Network
|
|
|
|
{
|
|
|
|
|
2019-07-30 22:26:01 +00:00
|
|
|
/**
|
|
|
|
* Return raw post data from a post request
|
|
|
|
*
|
|
|
|
* @return string post data
|
|
|
|
*/
|
|
|
|
public static function postdata()
|
|
|
|
{
|
|
|
|
return file_get_contents('php://input');
|
|
|
|
}
|
|
|
|
|
2018-01-27 03:51:07 +00:00
|
|
|
/**
|
2020-01-19 06:05:23 +00:00
|
|
|
* Check URL to see if it's real
|
2018-01-27 03:51:07 +00:00
|
|
|
*
|
|
|
|
* Take a URL from the wild, prepend http:// if necessary
|
|
|
|
* and check DNS to see if it's real (or check if is a valid IP address)
|
|
|
|
*
|
|
|
|
* @param string $url The URL to be validated
|
2022-08-18 20:05:00 +00:00
|
|
|
*
|
2018-01-27 03:51:07 +00:00
|
|
|
* @return string|boolean The actual working URL, false else
|
2019-01-06 21:06:53 +00:00
|
|
|
* @throws \Friendica\Network\HTTPException\InternalServerErrorException
|
2018-01-27 03:51:07 +00:00
|
|
|
*/
|
2019-06-10 10:06:41 +00:00
|
|
|
public static function isUrlValid(string $url)
|
2018-01-27 03:51:07 +00:00
|
|
|
{
|
2020-01-19 20:21:13 +00:00
|
|
|
if (DI::config()->get('system', 'disable_url_validation')) {
|
2018-01-27 03:51:07 +00:00
|
|
|
return $url;
|
|
|
|
}
|
|
|
|
|
|
|
|
// no naked subdomains (allow localhost for tests)
|
|
|
|
if (strpos($url, '.') === false && strpos($url, '/localhost/') === false) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (substr($url, 0, 4) != 'http') {
|
|
|
|
$url = 'http://' . $url;
|
|
|
|
}
|
|
|
|
|
2022-07-05 05:04:05 +00:00
|
|
|
$xrd_timeout = DI::config()->get('system', 'xrd_timeout');
|
|
|
|
$host = parse_url($url, PHP_URL_HOST);
|
2018-01-27 03:51:07 +00:00
|
|
|
|
2022-07-16 08:27:38 +00:00
|
|
|
if (empty($host) || !(filter_var($host, FILTER_VALIDATE_IP) || @dns_get_record($host . '.', DNS_A + DNS_AAAA))) {
|
2022-07-05 05:04:05 +00:00
|
|
|
return false;
|
2018-01-27 03:51:07 +00:00
|
|
|
}
|
|
|
|
|
2022-07-14 05:39:25 +00:00
|
|
|
if (in_array(parse_url($url, PHP_URL_SCHEME), ['https', 'http'])) {
|
2022-07-16 08:27:38 +00:00
|
|
|
$options = [HttpClientOptions::VERIFY => true, HttpClientOptions::TIMEOUT => $xrd_timeout];
|
|
|
|
$curlResult = DI::httpClient()->head($url, $options);
|
2022-07-14 05:39:25 +00:00
|
|
|
|
|
|
|
// Workaround for systems that can't handle a HEAD request. Don't retry on timeouts.
|
|
|
|
if (!$curlResult->isSuccess() && ($curlResult->getReturnCode() >= 400) && !in_array($curlResult->getReturnCode(), [408, 504])) {
|
2022-07-16 08:27:38 +00:00
|
|
|
$curlResult = DI::httpClient()->get($url, HttpClientAccept::DEFAULT, $options);
|
2022-07-14 05:39:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!$curlResult->isSuccess()) {
|
|
|
|
Logger::notice('Url not reachable', ['host' => $host, 'url' => $url]);
|
|
|
|
return false;
|
|
|
|
} elseif ($curlResult->isRedirectUrl()) {
|
|
|
|
$url = $curlResult->getRedirectUrl();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-05 05:04:05 +00:00
|
|
|
return $url;
|
2018-01-27 03:51:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-01-19 06:05:23 +00:00
|
|
|
* Checks that email is an actual resolvable internet address
|
2018-01-27 03:51:07 +00:00
|
|
|
*
|
|
|
|
* @param string $addr The email address
|
|
|
|
* @return boolean True if it's a valid email address, false if it's not
|
|
|
|
*/
|
2022-06-23 14:03:55 +00:00
|
|
|
public static function isEmailDomainValid(string $addr): bool
|
2018-01-27 03:51:07 +00:00
|
|
|
{
|
2020-01-19 20:21:13 +00:00
|
|
|
if (DI::config()->get('system', 'disable_email_validation')) {
|
2018-01-27 03:51:07 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (! strpos($addr, '@')) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
$h = substr($addr, strpos($addr, '@') + 1);
|
|
|
|
|
2018-08-02 17:07:20 +00:00
|
|
|
// Concerning the @ see here: https://stackoverflow.com/questions/36280957/dns-get-record-a-temporary-server-error-occurred
|
2022-07-05 05:04:05 +00:00
|
|
|
if ($h && (@dns_get_record($h, DNS_A + DNS_AAAA + DNS_MX) || filter_var($h, FILTER_VALIDATE_IP))) {
|
2018-06-03 09:29:06 +00:00
|
|
|
return true;
|
|
|
|
}
|
2018-08-02 17:07:20 +00:00
|
|
|
if ($h && @dns_get_record($h, DNS_CNAME + DNS_MX)) {
|
2018-01-27 03:51:07 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-01-19 06:05:23 +00:00
|
|
|
* Check if URL is allowed
|
2018-01-27 03:51:07 +00:00
|
|
|
*
|
|
|
|
* Check $url against our list of allowed sites,
|
|
|
|
* wildcards allowed. If allowed_sites is unset return true;
|
|
|
|
*
|
|
|
|
* @param string $url URL which get tested
|
|
|
|
* @return boolean True if url is allowed otherwise return false
|
|
|
|
*/
|
2022-06-23 14:03:55 +00:00
|
|
|
public static function isUrlAllowed(string $url): bool
|
2018-01-27 03:51:07 +00:00
|
|
|
{
|
|
|
|
$h = @parse_url($url);
|
|
|
|
|
|
|
|
if (! $h) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-01-19 20:21:13 +00:00
|
|
|
$str_allowed = DI::config()->get('system', 'allowed_sites');
|
2018-01-27 03:51:07 +00:00
|
|
|
if (! $str_allowed) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
$found = false;
|
|
|
|
|
|
|
|
$host = strtolower($h['host']);
|
|
|
|
|
|
|
|
// always allow our own site
|
|
|
|
if ($host == strtolower($_SERVER['SERVER_NAME'])) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
$fnmatch = function_exists('fnmatch');
|
|
|
|
$allowed = explode(',', $str_allowed);
|
|
|
|
|
|
|
|
if (count($allowed)) {
|
|
|
|
foreach ($allowed as $a) {
|
|
|
|
$pat = strtolower(trim($a));
|
|
|
|
if (($fnmatch && fnmatch($pat, $host)) || ($pat == $host)) {
|
|
|
|
$found = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $found;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Checks if the provided url domain is on the domain blocklist.
|
|
|
|
* Returns true if it is or malformed URL, false if not.
|
|
|
|
*
|
|
|
|
* @param string $url The url to check the domain from
|
|
|
|
*
|
|
|
|
* @return boolean
|
|
|
|
*/
|
2022-06-23 14:03:55 +00:00
|
|
|
public static function isUrlBlocked(string $url): bool
|
2018-01-27 03:51:07 +00:00
|
|
|
{
|
2018-07-18 01:00:22 +00:00
|
|
|
$host = @parse_url($url, PHP_URL_HOST);
|
2018-08-26 19:49:39 +00:00
|
|
|
if (!$host) {
|
|
|
|
return false;
|
2018-01-27 03:51:07 +00:00
|
|
|
}
|
|
|
|
|
2020-01-19 20:21:13 +00:00
|
|
|
$domain_blocklist = DI::config()->get('system', 'blocklist', []);
|
2018-08-26 19:49:39 +00:00
|
|
|
if (!$domain_blocklist) {
|
2018-01-27 03:51:07 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
foreach ($domain_blocklist as $domain_block) {
|
2019-07-26 02:36:25 +00:00
|
|
|
if (fnmatch(strtolower($domain_block['domain']), strtolower($host))) {
|
2018-01-27 03:51:07 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-09-16 04:56:37 +00:00
|
|
|
/**
|
|
|
|
* Checks if the provided url is on the list of domains where redirects are blocked.
|
|
|
|
* Returns true if it is or malformed URL, false if not.
|
|
|
|
*
|
|
|
|
* @param string $url The url to check the domain from
|
|
|
|
*
|
|
|
|
* @return boolean
|
|
|
|
*/
|
2022-06-23 14:03:55 +00:00
|
|
|
public static function isRedirectBlocked(string $url): bool
|
2020-09-16 04:56:37 +00:00
|
|
|
{
|
|
|
|
$host = @parse_url($url, PHP_URL_HOST);
|
|
|
|
if (!$host) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
$no_redirect_list = DI::config()->get('system', 'no_redirect_list', []);
|
|
|
|
if (!$no_redirect_list) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
foreach ($no_redirect_list as $no_redirect) {
|
|
|
|
if (fnmatch(strtolower($no_redirect), strtolower($host))) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2018-01-27 03:51:07 +00:00
|
|
|
/**
|
2020-01-19 06:05:23 +00:00
|
|
|
* Check if email address is allowed to register here.
|
2018-01-27 03:51:07 +00:00
|
|
|
*
|
|
|
|
* Compare against our list (wildcards allowed).
|
|
|
|
*
|
|
|
|
* @param string $email email address
|
|
|
|
* @return boolean False if not allowed, true if allowed
|
2019-01-06 21:06:53 +00:00
|
|
|
* or if allowed list is not configured
|
|
|
|
* @throws \Friendica\Network\HTTPException\InternalServerErrorException
|
2018-01-27 03:51:07 +00:00
|
|
|
*/
|
2022-06-23 14:03:55 +00:00
|
|
|
public static function isEmailDomainAllowed(string $email): bool
|
2018-01-27 03:51:07 +00:00
|
|
|
{
|
|
|
|
$domain = strtolower(substr($email, strpos($email, '@') + 1));
|
|
|
|
if (!$domain) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-01-19 20:21:13 +00:00
|
|
|
$str_allowed = DI::config()->get('system', 'allowed_email', '');
|
2018-11-30 14:06:22 +00:00
|
|
|
if (empty($str_allowed)) {
|
2018-01-27 03:51:07 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
$allowed = explode(',', $str_allowed);
|
|
|
|
|
2018-01-27 16:13:41 +00:00
|
|
|
return self::isDomainAllowed($domain, $allowed);
|
2018-01-27 03:51:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Checks for the existence of a domain in a domain list
|
|
|
|
*
|
|
|
|
* @param string $domain
|
|
|
|
* @param array $domain_list
|
2022-08-18 20:05:00 +00:00
|
|
|
*
|
2018-01-27 03:51:07 +00:00
|
|
|
* @return boolean
|
|
|
|
*/
|
2022-06-23 14:03:55 +00:00
|
|
|
public static function isDomainAllowed(string $domain, array $domain_list): bool
|
2018-01-27 03:51:07 +00:00
|
|
|
{
|
|
|
|
$found = false;
|
|
|
|
|
|
|
|
foreach ($domain_list as $item) {
|
|
|
|
$pat = strtolower(trim($item));
|
|
|
|
if (fnmatch($pat, $domain) || ($pat == $domain)) {
|
|
|
|
$found = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $found;
|
|
|
|
}
|
|
|
|
|
2022-06-23 14:03:55 +00:00
|
|
|
public static function lookupAvatarByEmail(string $email): string
|
2018-01-27 03:51:07 +00:00
|
|
|
{
|
2018-10-23 14:36:57 +00:00
|
|
|
$avatar['size'] = 300;
|
2018-01-27 03:51:07 +00:00
|
|
|
$avatar['email'] = $email;
|
|
|
|
$avatar['url'] = '';
|
|
|
|
$avatar['success'] = false;
|
|
|
|
|
2018-12-26 06:06:24 +00:00
|
|
|
Hook::callAll('avatar_lookup', $avatar);
|
2018-01-27 03:51:07 +00:00
|
|
|
|
|
|
|
if (! $avatar['success']) {
|
2020-08-18 20:30:24 +00:00
|
|
|
$avatar['url'] = DI::baseUrl() . Contact::DEFAULT_AVATAR_PHOTO;
|
2018-01-27 03:51:07 +00:00
|
|
|
}
|
|
|
|
|
2021-10-20 18:53:52 +00:00
|
|
|
Logger::info('Avatar: ' . $avatar['email'] . ' ' . $avatar['url']);
|
2018-01-27 03:51:07 +00:00
|
|
|
return $avatar['url'];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-01-19 06:05:23 +00:00
|
|
|
* Remove Google Analytics and other tracking platforms params from URL
|
2018-01-27 03:51:07 +00:00
|
|
|
*
|
|
|
|
* @param string $url Any user-submitted URL that may contain tracking params
|
2022-08-18 20:05:00 +00:00
|
|
|
*
|
2018-01-27 03:51:07 +00:00
|
|
|
* @return string The same URL stripped of tracking parameters
|
|
|
|
*/
|
2022-06-23 14:03:55 +00:00
|
|
|
public static function stripTrackingQueryParams(string $url): string
|
2018-01-27 03:51:07 +00:00
|
|
|
{
|
|
|
|
$urldata = parse_url($url);
|
2022-06-23 14:03:55 +00:00
|
|
|
|
|
|
|
if (!empty($urldata['query'])) {
|
|
|
|
$query = $urldata['query'];
|
2018-01-27 03:51:07 +00:00
|
|
|
parse_str($query, $querydata);
|
|
|
|
|
|
|
|
if (is_array($querydata)) {
|
|
|
|
foreach ($querydata as $param => $value) {
|
|
|
|
if (in_array(
|
|
|
|
$param,
|
|
|
|
[
|
2022-06-23 14:03:55 +00:00
|
|
|
'utm_source', 'utm_medium', 'utm_term', 'utm_content', 'utm_campaign',
|
|
|
|
// As seen from Purism
|
|
|
|
'mtm_source', 'mtm_medium', 'mtm_term', 'mtm_content', 'mtm_campaign',
|
|
|
|
'wt_mc', 'pk_campaign', 'pk_kwd', 'mc_cid', 'mc_eid',
|
|
|
|
'fb_action_ids', 'fb_action_types', 'fb_ref',
|
|
|
|
'awesm', 'wtrid',
|
|
|
|
'woo_campaign', 'woo_source', 'woo_medium', 'woo_content', 'woo_term']
|
2018-01-27 03:51:07 +00:00
|
|
|
)
|
|
|
|
) {
|
2022-06-23 14:03:55 +00:00
|
|
|
$pair = $param . '=' . urlencode($value);
|
|
|
|
$url = str_replace($pair, '', $url);
|
2018-01-27 03:51:07 +00:00
|
|
|
|
|
|
|
// Second try: if the url isn't encoded completely
|
2022-06-23 14:03:55 +00:00
|
|
|
$pair = $param . '=' . str_replace(' ', '+', $value);
|
|
|
|
$url = str_replace($pair, '', $url);
|
2018-01-27 03:51:07 +00:00
|
|
|
|
|
|
|
// Third try: Maybey the url isn't encoded at all
|
2022-06-23 14:03:55 +00:00
|
|
|
$pair = $param . '=' . $value;
|
|
|
|
$url = str_replace($pair, '', $url);
|
2018-01-27 03:51:07 +00:00
|
|
|
|
2022-06-23 14:03:55 +00:00
|
|
|
$url = str_replace(['?&', '&&'], ['?', ''], $url);
|
2018-01-27 03:51:07 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-23 14:03:55 +00:00
|
|
|
if (substr($url, -1, 1) == '?') {
|
2018-01-27 03:51:07 +00:00
|
|
|
$url = substr($url, 0, -1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $url;
|
|
|
|
}
|
|
|
|
|
2020-07-12 12:45:34 +00:00
|
|
|
/**
|
|
|
|
* Add a missing base path (scheme and host) to a given url
|
|
|
|
*
|
|
|
|
* @param string $url
|
|
|
|
* @param string $basepath
|
2022-08-18 20:05:00 +00:00
|
|
|
*
|
2020-07-12 12:45:34 +00:00
|
|
|
* @return string url
|
|
|
|
*/
|
2022-08-18 20:05:00 +00:00
|
|
|
public static function addBasePath(string $url, string $basepath): string
|
2020-07-12 12:45:34 +00:00
|
|
|
{
|
|
|
|
if (!empty(parse_url($url, PHP_URL_SCHEME)) || empty(parse_url($basepath, PHP_URL_SCHEME)) || empty($url) || empty(parse_url($url))) {
|
|
|
|
return $url;
|
|
|
|
}
|
|
|
|
|
2022-06-23 14:03:55 +00:00
|
|
|
$base = [
|
|
|
|
'scheme' => parse_url($basepath, PHP_URL_SCHEME),
|
|
|
|
'host' => parse_url($basepath, PHP_URL_HOST),
|
|
|
|
];
|
2020-07-12 12:45:34 +00:00
|
|
|
|
|
|
|
$parts = array_merge($base, parse_url('/' . ltrim($url, '/')));
|
|
|
|
return self::unparseURL($parts);
|
|
|
|
}
|
|
|
|
|
2018-01-27 03:51:07 +00:00
|
|
|
/**
|
2020-01-19 06:05:23 +00:00
|
|
|
* Find the matching part between two url
|
2018-01-27 03:51:07 +00:00
|
|
|
*
|
|
|
|
* @param string $url1
|
|
|
|
* @param string $url2
|
2022-08-18 20:05:00 +00:00
|
|
|
*
|
2022-06-23 14:03:55 +00:00
|
|
|
* @return string The matching part or empty string on error
|
2018-01-27 03:51:07 +00:00
|
|
|
*/
|
2022-06-23 14:03:55 +00:00
|
|
|
public static function getUrlMatch(string $url1, string $url2): string
|
2018-01-27 03:51:07 +00:00
|
|
|
{
|
2022-06-23 14:03:55 +00:00
|
|
|
if (($url1 == '') || ($url2 == '')) {
|
|
|
|
return '';
|
2018-01-27 03:51:07 +00:00
|
|
|
}
|
|
|
|
|
2018-11-08 16:28:29 +00:00
|
|
|
$url1 = Strings::normaliseLink($url1);
|
|
|
|
$url2 = Strings::normaliseLink($url2);
|
2018-01-27 03:51:07 +00:00
|
|
|
|
|
|
|
$parts1 = parse_url($url1);
|
|
|
|
$parts2 = parse_url($url2);
|
|
|
|
|
2022-06-23 14:03:55 +00:00
|
|
|
if (!isset($parts1['host']) || !isset($parts2['host'])) {
|
|
|
|
return '';
|
2018-01-27 03:51:07 +00:00
|
|
|
}
|
|
|
|
|
2022-06-23 14:03:55 +00:00
|
|
|
if (empty($parts1['scheme'])) {
|
|
|
|
$parts1['scheme'] = '';
|
2018-07-08 12:58:43 +00:00
|
|
|
}
|
2022-06-23 14:03:55 +00:00
|
|
|
if (empty($parts2['scheme'])) {
|
|
|
|
$parts2['scheme'] = '';
|
2018-07-08 12:58:43 +00:00
|
|
|
}
|
|
|
|
|
2022-06-23 14:03:55 +00:00
|
|
|
if ($parts1['scheme'] != $parts2['scheme']) {
|
|
|
|
return '';
|
2018-01-27 03:51:07 +00:00
|
|
|
}
|
|
|
|
|
2022-06-23 14:03:55 +00:00
|
|
|
if (empty($parts1['host'])) {
|
|
|
|
$parts1['host'] = '';
|
2018-07-08 12:58:43 +00:00
|
|
|
}
|
2022-06-23 14:03:55 +00:00
|
|
|
if (empty($parts2['host'])) {
|
|
|
|
$parts2['host'] = '';
|
2018-07-08 12:58:43 +00:00
|
|
|
}
|
|
|
|
|
2022-06-23 14:03:55 +00:00
|
|
|
if ($parts1['host'] != $parts2['host']) {
|
|
|
|
return '';
|
2018-01-27 03:51:07 +00:00
|
|
|
}
|
|
|
|
|
2022-06-23 14:03:55 +00:00
|
|
|
if (empty($parts1['port'])) {
|
|
|
|
$parts1['port'] = '';
|
2018-07-08 12:58:43 +00:00
|
|
|
}
|
2022-06-23 14:03:55 +00:00
|
|
|
if (empty($parts2['port'])) {
|
|
|
|
$parts2['port'] = '';
|
2018-07-08 12:58:43 +00:00
|
|
|
}
|
|
|
|
|
2022-06-23 14:03:55 +00:00
|
|
|
if ($parts1['port'] != $parts2['port']) {
|
|
|
|
return '';
|
2018-01-27 03:51:07 +00:00
|
|
|
}
|
|
|
|
|
2022-06-23 14:03:55 +00:00
|
|
|
$match = $parts1['scheme'] . '://' . $parts1['host'];
|
2018-01-27 03:51:07 +00:00
|
|
|
|
2022-06-23 14:03:55 +00:00
|
|
|
if ($parts1['port']) {
|
|
|
|
$match .= ':' . $parts1['port'];
|
2018-01-27 03:51:07 +00:00
|
|
|
}
|
|
|
|
|
2022-06-23 14:03:55 +00:00
|
|
|
if (empty($parts1['path'])) {
|
|
|
|
$parts1['path'] = '';
|
2018-07-08 12:58:43 +00:00
|
|
|
}
|
2022-06-23 14:03:55 +00:00
|
|
|
if (empty($parts2['path'])) {
|
|
|
|
$parts2['path'] = '';
|
2018-07-08 12:58:43 +00:00
|
|
|
}
|
|
|
|
|
2022-06-23 14:03:55 +00:00
|
|
|
$pathparts1 = explode('/', $parts1['path']);
|
|
|
|
$pathparts2 = explode('/', $parts2['path']);
|
2018-01-27 03:51:07 +00:00
|
|
|
|
|
|
|
$i = 0;
|
2022-06-23 14:03:55 +00:00
|
|
|
$path = '';
|
2018-01-27 03:51:07 +00:00
|
|
|
do {
|
2019-10-16 12:35:14 +00:00
|
|
|
$path1 = $pathparts1[$i] ?? '';
|
|
|
|
$path2 = $pathparts2[$i] ?? '';
|
2018-01-27 03:51:07 +00:00
|
|
|
|
|
|
|
if ($path1 == $path2) {
|
2022-06-23 14:03:55 +00:00
|
|
|
$path .= $path1 . '/';
|
2018-01-27 03:51:07 +00:00
|
|
|
}
|
|
|
|
} while (($path1 == $path2) && ($i++ <= count($pathparts1)));
|
|
|
|
|
|
|
|
$match .= $path;
|
|
|
|
|
2018-11-08 16:28:29 +00:00
|
|
|
return Strings::normaliseLink($match);
|
2018-01-27 03:51:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-01-19 06:05:23 +00:00
|
|
|
* Glue url parts together
|
2018-01-27 03:51:07 +00:00
|
|
|
*
|
|
|
|
* @param array $parsed URL parts
|
2022-08-18 20:05:00 +00:00
|
|
|
*
|
2022-06-23 15:26:31 +00:00
|
|
|
* @return string|null The glued URL or null on error
|
2022-05-11 11:06:14 +00:00
|
|
|
* @deprecated since version 2021.12, use GuzzleHttp\Psr7\Uri::fromParts($parts) instead
|
2018-01-27 03:51:07 +00:00
|
|
|
*/
|
2022-06-23 14:03:55 +00:00
|
|
|
public static function unparseURL(array $parsed): string
|
2018-01-27 03:51:07 +00:00
|
|
|
{
|
|
|
|
$get = function ($key) use ($parsed) {
|
|
|
|
return isset($parsed[$key]) ? $parsed[$key] : null;
|
|
|
|
};
|
|
|
|
|
|
|
|
$pass = $get('pass');
|
|
|
|
$user = $get('user');
|
|
|
|
$userinfo = $pass !== null ? "$user:$pass" : $user;
|
|
|
|
$port = $get('port');
|
|
|
|
$scheme = $get('scheme');
|
|
|
|
$query = $get('query');
|
|
|
|
$fragment = $get('fragment');
|
2022-06-23 15:26:31 +00:00
|
|
|
$authority = ($userinfo !== null ? $userinfo . '@' : '') .
|
2018-01-27 03:51:07 +00:00
|
|
|
$get('host') .
|
|
|
|
($port ? ":$port" : '');
|
|
|
|
|
2022-11-09 22:16:12 +00:00
|
|
|
return (!empty($scheme) ? $scheme . ':' : '') .
|
|
|
|
(!empty($authority) ? '//' . $authority : '') .
|
2018-01-27 03:51:07 +00:00
|
|
|
$get('path') .
|
2022-11-09 22:16:12 +00:00
|
|
|
(!empty($query) ? '?' . $query : '') .
|
|
|
|
(!empty($fragment) ? '#' . $fragment : '');
|
2018-01-27 03:51:07 +00:00
|
|
|
}
|
2019-04-08 19:12:10 +00:00
|
|
|
|
2022-05-11 06:34:25 +00:00
|
|
|
/**
|
|
|
|
* Convert an URI to an IDN compatible URI
|
|
|
|
*
|
|
|
|
* @param string $uri
|
2022-08-18 20:05:00 +00:00
|
|
|
*
|
2022-05-11 06:34:25 +00:00
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public static function convertToIdn(string $uri): string
|
|
|
|
{
|
|
|
|
$parts = parse_url($uri);
|
|
|
|
if (!empty($parts['scheme']) && !empty($parts['host'])) {
|
|
|
|
$parts['host'] = idn_to_ascii($parts['host']);
|
2022-07-29 16:05:04 +00:00
|
|
|
$uri = (string)Uri::fromParts($parts);
|
2022-05-11 06:58:26 +00:00
|
|
|
} else {
|
2022-05-11 06:55:02 +00:00
|
|
|
$parts = explode('@', $uri);
|
|
|
|
if (count($parts) == 2) {
|
|
|
|
$uri = $parts[0] . '@' . idn_to_ascii($parts[1]);
|
2022-05-11 06:58:26 +00:00
|
|
|
} else {
|
|
|
|
$uri = idn_to_ascii($uri);
|
2022-05-11 06:55:02 +00:00
|
|
|
}
|
2022-05-11 06:34:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return $uri;
|
|
|
|
}
|
2019-04-08 19:12:10 +00:00
|
|
|
|
|
|
|
/**
|
2019-04-08 21:12:34 +00:00
|
|
|
* Switch the scheme of an url between http and https
|
2019-04-08 19:12:10 +00:00
|
|
|
*
|
2022-06-23 14:03:55 +00:00
|
|
|
* @param string $url
|
2022-08-18 20:05:00 +00:00
|
|
|
*
|
2022-06-23 14:03:55 +00:00
|
|
|
* @return string Switched URL
|
2019-04-08 19:12:10 +00:00
|
|
|
*/
|
2022-06-23 14:03:55 +00:00
|
|
|
public static function switchScheme(string $url): string
|
2019-04-08 19:12:10 +00:00
|
|
|
{
|
2019-04-08 21:12:34 +00:00
|
|
|
$scheme = parse_url($url, PHP_URL_SCHEME);
|
|
|
|
if (empty($scheme)) {
|
2019-04-08 19:12:10 +00:00
|
|
|
return $url;
|
|
|
|
}
|
2019-04-08 21:12:34 +00:00
|
|
|
|
|
|
|
if ($scheme === 'http') {
|
2019-04-08 19:12:10 +00:00
|
|
|
$url = str_replace('http://', 'https://', $url);
|
2019-04-08 21:12:34 +00:00
|
|
|
} elseif ($scheme === 'https') {
|
2019-04-08 19:12:10 +00:00
|
|
|
$url = str_replace('https://', 'http://', $url);
|
|
|
|
}
|
2019-04-08 21:12:34 +00:00
|
|
|
|
2019-04-08 19:12:10 +00:00
|
|
|
return $url;
|
|
|
|
}
|
2020-02-01 00:39:15 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Adds query string parameters to the provided URI. Replace the value of existing keys.
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @param array $additionalParams Associative array of parameters
|
2022-08-18 20:05:00 +00:00
|
|
|
*
|
2020-02-01 00:39:15 +00:00
|
|
|
* @return string
|
|
|
|
*/
|
2022-06-23 14:03:55 +00:00
|
|
|
public static function appendQueryParam(string $path, array $additionalParams): string
|
2020-02-01 00:39:15 +00:00
|
|
|
{
|
|
|
|
$parsed = parse_url($path);
|
|
|
|
|
|
|
|
$params = [];
|
|
|
|
if (!empty($parsed['query'])) {
|
|
|
|
parse_str($parsed['query'], $params);
|
|
|
|
}
|
|
|
|
|
|
|
|
$params = array_merge($params, $additionalParams);
|
|
|
|
|
|
|
|
$parsed['query'] = http_build_query($params);
|
|
|
|
|
|
|
|
return self::unparseURL($parsed);
|
|
|
|
}
|
2020-04-05 21:58:09 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Generates ETag and Last-Modified response headers and checks them against
|
|
|
|
* If-None-Match and If-Modified-Since request headers if present.
|
|
|
|
*
|
|
|
|
* Blocking function, sends 304 headers and exits if check passes.
|
|
|
|
*
|
|
|
|
* @param string $etag The page etag
|
|
|
|
* @param string $last_modified The page last modification UTC date
|
2022-08-18 20:05:00 +00:00
|
|
|
*
|
2022-06-23 14:03:55 +00:00
|
|
|
* @return void
|
2020-04-05 21:58:09 +00:00
|
|
|
* @throws \Exception
|
|
|
|
*/
|
|
|
|
public static function checkEtagModified(string $etag, string $last_modified)
|
|
|
|
{
|
|
|
|
$last_modified = DateTimeFormat::utc($last_modified, 'D, d M Y H:i:s') . ' GMT';
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @see http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.26
|
|
|
|
*/
|
|
|
|
$if_none_match = filter_input(INPUT_SERVER, 'HTTP_IF_NONE_MATCH');
|
|
|
|
$if_modified_since = filter_input(INPUT_SERVER, 'HTTP_IF_MODIFIED_SINCE');
|
|
|
|
$flag_not_modified = null;
|
|
|
|
if ($if_none_match) {
|
|
|
|
$result = [];
|
|
|
|
preg_match('/^(?:W\/")?([^"]+)"?$/i', $etag, $result);
|
|
|
|
$etagTrimmed = $result[1];
|
|
|
|
// Lazy exact ETag match, could check weak/strong ETags
|
|
|
|
$flag_not_modified = $if_none_match == '*' || strpos($if_none_match, $etagTrimmed) !== false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($if_modified_since && (!$if_none_match || $flag_not_modified)) {
|
|
|
|
// Lazy exact Last-Modified match, could check If-Modified-Since validity
|
|
|
|
$flag_not_modified = $if_modified_since == $last_modified;
|
|
|
|
}
|
|
|
|
|
|
|
|
header('Etag: ' . $etag);
|
|
|
|
header('Last-Modified: ' . $last_modified);
|
|
|
|
|
|
|
|
if ($flag_not_modified) {
|
2021-10-29 23:21:07 +00:00
|
|
|
throw new NotModifiedException();
|
2020-04-05 21:58:09 +00:00
|
|
|
}
|
|
|
|
}
|
2021-05-26 09:24:37 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Check if the given URL is a local link
|
|
|
|
*
|
2022-07-05 05:04:05 +00:00
|
|
|
* @param string $url
|
2022-08-18 20:05:00 +00:00
|
|
|
*
|
2022-07-05 05:04:05 +00:00
|
|
|
* @return bool
|
2021-05-26 09:24:37 +00:00
|
|
|
*/
|
2022-06-23 14:03:55 +00:00
|
|
|
public static function isLocalLink(string $url): bool
|
2021-05-26 09:24:37 +00:00
|
|
|
{
|
|
|
|
return (strpos(Strings::normaliseLink($url), Strings::normaliseLink(DI::baseUrl())) !== false);
|
|
|
|
}
|
2022-04-03 07:21:36 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Check if the given URL is a valid HTTP/HTTPS URL
|
|
|
|
*
|
2022-07-05 05:04:05 +00:00
|
|
|
* @param string $url
|
|
|
|
* @return bool
|
2022-04-03 07:21:36 +00:00
|
|
|
*/
|
2022-06-23 14:03:55 +00:00
|
|
|
public static function isValidHttpUrl(string $url): bool
|
2022-04-03 07:21:36 +00:00
|
|
|
{
|
2022-04-03 07:31:42 +00:00
|
|
|
$scheme = parse_url($url, PHP_URL_SCHEME);
|
|
|
|
return !empty($scheme) && in_array($scheme, ['http', 'https']) && parse_url($url, PHP_URL_HOST);
|
2022-04-03 07:21:36 +00:00
|
|
|
}
|
2018-01-27 03:51:07 +00:00
|
|
|
}
|