Fixed spacing in actions/cache/filebackend/filerepo/job folder
[mediawiki.git] / includes / HttpFunctions.php
blob489a83aacfda0a77dd0517f6da4a0fb6279a31ce
1 <?php
2 /**
3 * Various HTTP related functions.
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License along
16 * with this program; if not, write to the Free Software Foundation, Inc.,
17 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
18 * http://www.gnu.org/copyleft/gpl.html
20 * @file
21 * @ingroup HTTP
24 /**
25 * @defgroup HTTP HTTP
28 /**
29 * Various HTTP related functions
30 * @ingroup HTTP
32 class Http {
33 static $httpEngine = false;
35 /**
36 * Perform an HTTP request
38 * @param string $method HTTP method. Usually GET/POST
39 * @param string $url full URL to act on. If protocol-relative, will be expanded to an http:// URL
40 * @param array $options options to pass to MWHttpRequest object.
41 * Possible keys for the array:
42 * - timeout Timeout length in seconds
43 * - postData An array of key-value pairs or a url-encoded form data
44 * - proxy The proxy to use.
45 * Otherwise it will use $wgHTTPProxy (if set)
46 * Otherwise it will use the environment variable "http_proxy" (if set)
47 * - noProxy Don't use any proxy at all. Takes precedence over proxy value(s).
48 * - sslVerifyHost (curl only) Verify hostname against certificate
49 * - sslVerifyCert (curl only) Verify SSL certificate
50 * - caInfo (curl only) Provide CA information
51 * - maxRedirects Maximum number of redirects to follow (defaults to 5)
52 * - followRedirects Whether to follow redirects (defaults to false).
53 * Note: this should only be used when the target URL is trusted,
54 * to avoid attacks on intranet services accessible by HTTP.
55 * - userAgent A user agent, if you want to override the default
56 * MediaWiki/$wgVersion
57 * @return Mixed: (bool)false on failure or a string on success
59 public static function request( $method, $url, $options = array() ) {
60 wfDebug( "HTTP: $method: $url\n" );
61 wfProfileIn( __METHOD__ . "-$method" );
63 $options['method'] = strtoupper( $method );
65 if ( !isset( $options['timeout'] ) ) {
66 $options['timeout'] = 'default';
69 $req = MWHttpRequest::factory( $url, $options );
70 $status = $req->execute();
72 $content = false;
73 if ( $status->isOK() ) {
74 $content = $req->getContent();
76 wfProfileOut( __METHOD__ . "-$method" );
77 return $content;
80 /**
81 * Simple wrapper for Http::request( 'GET' )
82 * @see Http::request()
84 * @param $url
85 * @param $timeout string
86 * @param $options array
87 * @return string
89 public static function get( $url, $timeout = 'default', $options = array() ) {
90 $options['timeout'] = $timeout;
91 return Http::request( 'GET', $url, $options );
94 /**
95 * Simple wrapper for Http::request( 'POST' )
96 * @see Http::request()
98 * @param $url
99 * @param $options array
100 * @return string
102 public static function post( $url, $options = array() ) {
103 return Http::request( 'POST', $url, $options );
107 * Check if the URL can be served by localhost
109 * @param string $url full url to check
110 * @return Boolean
112 public static function isLocalURL( $url ) {
113 global $wgCommandLineMode, $wgConf;
115 if ( $wgCommandLineMode ) {
116 return false;
119 // Extract host part
120 $matches = array();
121 if ( preg_match( '!^http://([\w.-]+)[/:].*$!', $url, $matches ) ) {
122 $host = $matches[1];
123 // Split up dotwise
124 $domainParts = explode( '.', $host );
125 // Check if this domain or any superdomain is listed in $wgConf as a local virtual host
126 $domainParts = array_reverse( $domainParts );
128 $domain = '';
129 for ( $i = 0; $i < count( $domainParts ); $i++ ) {
130 $domainPart = $domainParts[$i];
131 if ( $i == 0 ) {
132 $domain = $domainPart;
133 } else {
134 $domain = $domainPart . '.' . $domain;
137 if ( $wgConf->isLocalVHost( $domain ) ) {
138 return true;
143 return false;
147 * A standard user-agent we can use for external requests.
148 * @return String
150 public static function userAgent() {
151 global $wgVersion;
152 return "MediaWiki/$wgVersion";
156 * Checks that the given URI is a valid one. Hardcoding the
157 * protocols, because we only want protocols that both cURL
158 * and php support.
160 * file:// should not be allowed here for security purpose (r67684)
162 * @todo FIXME this is wildly inaccurate and fails to actually check most stuff
164 * @param $uri Mixed: URI to check for validity
165 * @return Boolean
167 public static function isValidURI( $uri ) {
168 return preg_match(
169 '/^https?:\/\/[^\/\s]\S*$/D',
170 $uri
176 * This wrapper class will call out to curl (if available) or fallback
177 * to regular PHP if necessary for handling internal HTTP requests.
179 * Renamed from HttpRequest to MWHttpRequest to avoid conflict with
180 * PHP's HTTP extension.
182 class MWHttpRequest {
183 const SUPPORTS_FILE_POSTS = false;
185 protected $content;
186 protected $timeout = 'default';
187 protected $headersOnly = null;
188 protected $postData = null;
189 protected $proxy = null;
190 protected $noProxy = false;
191 protected $sslVerifyHost = true;
192 protected $sslVerifyCert = true;
193 protected $caInfo = null;
194 protected $method = "GET";
195 protected $reqHeaders = array();
196 protected $url;
197 protected $parsedUrl;
198 protected $callback;
199 protected $maxRedirects = 5;
200 protected $followRedirects = false;
203 * @var CookieJar
205 protected $cookieJar;
207 protected $headerList = array();
208 protected $respVersion = "0.9";
209 protected $respStatus = "200 Ok";
210 protected $respHeaders = array();
212 public $status;
215 * @param string $url url to use. If protocol-relative, will be expanded to an http:// URL
216 * @param array $options (optional) extra params to pass (see Http::request())
218 protected function __construct( $url, $options = array() ) {
219 global $wgHTTPTimeout;
221 $this->url = wfExpandUrl( $url, PROTO_HTTP );
222 $this->parsedUrl = wfParseUrl( $this->url );
224 if ( !$this->parsedUrl || !Http::isValidURI( $this->url ) ) {
225 $this->status = Status::newFatal( 'http-invalid-url' );
226 } else {
227 $this->status = Status::newGood( 100 ); // continue
230 if ( isset( $options['timeout'] ) && $options['timeout'] != 'default' ) {
231 $this->timeout = $options['timeout'];
232 } else {
233 $this->timeout = $wgHTTPTimeout;
235 if( isset( $options['userAgent'] ) ) {
236 $this->setUserAgent( $options['userAgent'] );
239 $members = array( "postData", "proxy", "noProxy", "sslVerifyHost", "caInfo",
240 "method", "followRedirects", "maxRedirects", "sslVerifyCert", "callback" );
242 foreach ( $members as $o ) {
243 if ( isset( $options[$o] ) ) {
244 // ensure that MWHttpRequest::method is always
245 // uppercased. Bug 36137
246 if ( $o == 'method' ) {
247 $options[$o] = strtoupper( $options[$o] );
249 $this->$o = $options[$o];
253 if ( $this->noProxy ) {
254 $this->proxy = ''; // noProxy takes precedence
259 * Simple function to test if we can make any sort of requests at all, using
260 * cURL or fopen()
261 * @return bool
263 public static function canMakeRequests() {
264 return function_exists( 'curl_init' ) || wfIniGetBool( 'allow_url_fopen' );
268 * Generate a new request object
269 * @param string $url url to use
270 * @param array $options (optional) extra params to pass (see Http::request())
271 * @throws MWException
272 * @return CurlHttpRequest|PhpHttpRequest
273 * @see MWHttpRequest::__construct
275 public static function factory( $url, $options = null ) {
276 if ( !Http::$httpEngine ) {
277 Http::$httpEngine = function_exists( 'curl_init' ) ? 'curl' : 'php';
278 } elseif ( Http::$httpEngine == 'curl' && !function_exists( 'curl_init' ) ) {
279 throw new MWException( __METHOD__ . ': curl (http://php.net/curl) is not installed, but' .
280 ' Http::$httpEngine is set to "curl"' );
283 switch( Http::$httpEngine ) {
284 case 'curl':
285 return new CurlHttpRequest( $url, $options );
286 case 'php':
287 if ( !wfIniGetBool( 'allow_url_fopen' ) ) {
288 throw new MWException( __METHOD__ . ': allow_url_fopen needs to be enabled for pure PHP' .
289 ' http requests to work. If possible, curl should be used instead. See http://php.net/curl.' );
291 return new PhpHttpRequest( $url, $options );
292 default:
293 throw new MWException( __METHOD__ . ': The setting of Http::$httpEngine is not valid.' );
298 * Get the body, or content, of the response to the request
300 * @return String
302 public function getContent() {
303 return $this->content;
307 * Set the parameters of the request
309 * @param $args Array
310 * @todo overload the args param
312 public function setData( $args ) {
313 $this->postData = $args;
317 * Take care of setting up the proxy (do nothing if "noProxy" is set)
319 * @return void
321 public function proxySetup() {
322 global $wgHTTPProxy;
324 // If there is an explicit proxy set and proxies are not disabled, then use it
325 if ( $this->proxy && !$this->noProxy ) {
326 return;
329 // Otherwise, fallback to $wgHTTPProxy/http_proxy (when set) if this is not a machine
330 // local URL and proxies are not disabled
331 if ( Http::isLocalURL( $this->url ) || $this->noProxy ) {
332 $this->proxy = '';
333 } elseif ( $wgHTTPProxy ) {
334 $this->proxy = $wgHTTPProxy;
335 } elseif ( getenv( "http_proxy" ) ) {
336 $this->proxy = getenv( "http_proxy" );
341 * Set the referrer header
343 public function setReferer( $url ) {
344 $this->setHeader( 'Referer', $url );
348 * Set the user agent
349 * @param $UA string
351 public function setUserAgent( $UA ) {
352 $this->setHeader( 'User-Agent', $UA );
356 * Set an arbitrary header
357 * @param $name
358 * @param $value
360 public function setHeader( $name, $value ) {
361 // I feel like I should normalize the case here...
362 $this->reqHeaders[$name] = $value;
366 * Get an array of the headers
367 * @return array
369 public function getHeaderList() {
370 $list = array();
372 if ( $this->cookieJar ) {
373 $this->reqHeaders['Cookie'] =
374 $this->cookieJar->serializeToHttpRequest(
375 $this->parsedUrl['path'],
376 $this->parsedUrl['host']
380 foreach ( $this->reqHeaders as $name => $value ) {
381 $list[] = "$name: $value";
384 return $list;
388 * Set a read callback to accept data read from the HTTP request.
389 * By default, data is appended to an internal buffer which can be
390 * retrieved through $req->getContent().
392 * To handle data as it comes in -- especially for large files that
393 * would not fit in memory -- you can instead set your own callback,
394 * in the form function($resource, $buffer) where the first parameter
395 * is the low-level resource being read (implementation specific),
396 * and the second parameter is the data buffer.
398 * You MUST return the number of bytes handled in the buffer; if fewer
399 * bytes are reported handled than were passed to you, the HTTP fetch
400 * will be aborted.
402 * @param $callback Callback
403 * @throws MWException
405 public function setCallback( $callback ) {
406 if ( !is_callable( $callback ) ) {
407 throw new MWException( 'Invalid MwHttpRequest callback' );
409 $this->callback = $callback;
413 * A generic callback to read the body of the response from a remote
414 * server.
416 * @param $fh handle
417 * @param $content String
418 * @return int
420 public function read( $fh, $content ) {
421 $this->content .= $content;
422 return strlen( $content );
426 * Take care of whatever is necessary to perform the URI request.
428 * @return Status
430 public function execute() {
431 global $wgTitle;
433 wfProfileIn( __METHOD__ );
435 $this->content = "";
437 if ( strtoupper( $this->method ) == "HEAD" ) {
438 $this->headersOnly = true;
441 if ( is_object( $wgTitle ) && !isset( $this->reqHeaders['Referer'] ) ) {
442 $this->setReferer( wfExpandUrl( $wgTitle->getFullURL(), PROTO_CURRENT ) );
445 $this->proxySetup(); // set up any proxy as needed
447 if ( !$this->callback ) {
448 $this->setCallback( array( $this, 'read' ) );
451 if ( !isset( $this->reqHeaders['User-Agent'] ) ) {
452 $this->setUserAgent( Http::userAgent() );
455 wfProfileOut( __METHOD__ );
459 * Parses the headers, including the HTTP status code and any
460 * Set-Cookie headers. This function expects the headers to be
461 * found in an array in the member variable headerList.
463 protected function parseHeader() {
464 wfProfileIn( __METHOD__ );
466 $lastname = "";
468 foreach ( $this->headerList as $header ) {
469 if ( preg_match( "#^HTTP/([0-9.]+) (.*)#", $header, $match ) ) {
470 $this->respVersion = $match[1];
471 $this->respStatus = $match[2];
472 } elseif ( preg_match( "#^[ \t]#", $header ) ) {
473 $last = count( $this->respHeaders[$lastname] ) - 1;
474 $this->respHeaders[$lastname][$last] .= "\r\n$header";
475 } elseif ( preg_match( "#^([^:]*):[\t ]*(.*)#", $header, $match ) ) {
476 $this->respHeaders[strtolower( $match[1] )][] = $match[2];
477 $lastname = strtolower( $match[1] );
481 $this->parseCookies();
483 wfProfileOut( __METHOD__ );
487 * Sets HTTPRequest status member to a fatal value with the error
488 * message if the returned integer value of the status code was
489 * not successful (< 300) or a redirect (>=300 and < 400). (see
490 * RFC2616, section 10,
491 * http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html for a
492 * list of status codes.)
494 protected function setStatus() {
495 if ( !$this->respHeaders ) {
496 $this->parseHeader();
499 if ( (int)$this->respStatus > 399 ) {
500 list( $code, $message ) = explode( " ", $this->respStatus, 2 );
501 $this->status->fatal( "http-bad-status", $code, $message );
506 * Get the integer value of the HTTP status code (e.g. 200 for "200 Ok")
507 * (see RFC2616, section 10, http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html
508 * for a list of status codes.)
510 * @return Integer
512 public function getStatus() {
513 if ( !$this->respHeaders ) {
514 $this->parseHeader();
517 return (int)$this->respStatus;
521 * Returns true if the last status code was a redirect.
523 * @return Boolean
525 public function isRedirect() {
526 if ( !$this->respHeaders ) {
527 $this->parseHeader();
530 $status = (int)$this->respStatus;
532 if ( $status >= 300 && $status <= 303 ) {
533 return true;
536 return false;
540 * Returns an associative array of response headers after the
541 * request has been executed. Because some headers
542 * (e.g. Set-Cookie) can appear more than once the, each value of
543 * the associative array is an array of the values given.
545 * @return Array
547 public function getResponseHeaders() {
548 if ( !$this->respHeaders ) {
549 $this->parseHeader();
552 return $this->respHeaders;
556 * Returns the value of the given response header.
558 * @param $header String
559 * @return String
561 public function getResponseHeader( $header ) {
562 if ( !$this->respHeaders ) {
563 $this->parseHeader();
566 if ( isset( $this->respHeaders[strtolower( $header )] ) ) {
567 $v = $this->respHeaders[strtolower( $header )];
568 return $v[count( $v ) - 1];
571 return null;
575 * Tells the MWHttpRequest object to use this pre-loaded CookieJar.
577 * @param $jar CookieJar
579 public function setCookieJar( $jar ) {
580 $this->cookieJar = $jar;
584 * Returns the cookie jar in use.
586 * @return CookieJar
588 public function getCookieJar() {
589 if ( !$this->respHeaders ) {
590 $this->parseHeader();
593 return $this->cookieJar;
597 * Sets a cookie. Used before a request to set up any individual
598 * cookies. Used internally after a request to parse the
599 * Set-Cookie headers.
600 * @see Cookie::set
601 * @param $name
602 * @param $value null
603 * @param $attr null
605 public function setCookie( $name, $value = null, $attr = null ) {
606 if ( !$this->cookieJar ) {
607 $this->cookieJar = new CookieJar;
610 $this->cookieJar->setCookie( $name, $value, $attr );
614 * Parse the cookies in the response headers and store them in the cookie jar.
616 protected function parseCookies() {
617 wfProfileIn( __METHOD__ );
619 if ( !$this->cookieJar ) {
620 $this->cookieJar = new CookieJar;
623 if ( isset( $this->respHeaders['set-cookie'] ) ) {
624 $url = parse_url( $this->getFinalUrl() );
625 foreach ( $this->respHeaders['set-cookie'] as $cookie ) {
626 $this->cookieJar->parseCookieResponseHeader( $cookie, $url['host'] );
630 wfProfileOut( __METHOD__ );
634 * Returns the final URL after all redirections.
636 * Relative values of the "Location" header are incorrect as stated in RFC, however they do happen and modern browsers support them.
637 * This function loops backwards through all locations in order to build the proper absolute URI - Marooned at wikia-inc.com
639 * Note that the multiple Location: headers are an artifact of CURL -- they
640 * shouldn't actually get returned this way. Rewrite this when bug 29232 is
641 * taken care of (high-level redirect handling rewrite).
643 * @return string
645 public function getFinalUrl() {
646 $headers = $this->getResponseHeaders();
648 //return full url (fix for incorrect but handled relative location)
649 if ( isset( $headers['location'] ) ) {
650 $locations = $headers['location'];
651 $domain = '';
652 $foundRelativeURI = false;
653 $countLocations = count( $locations );
655 for ( $i = $countLocations - 1; $i >= 0; $i-- ) {
656 $url = parse_url( $locations[$i] );
658 if ( isset( $url['host'] ) ) {
659 $domain = $url['scheme'] . '://' . $url['host'];
660 break; //found correct URI (with host)
661 } else {
662 $foundRelativeURI = true;
666 if ( $foundRelativeURI ) {
667 if ( $domain ) {
668 return $domain . $locations[$countLocations - 1];
669 } else {
670 $url = parse_url( $this->url );
671 if ( isset( $url['host'] ) ) {
672 return $url['scheme'] . '://' . $url['host'] . $locations[$countLocations - 1];
675 } else {
676 return $locations[$countLocations - 1];
680 return $this->url;
684 * Returns true if the backend can follow redirects. Overridden by the
685 * child classes.
686 * @return bool
688 public function canFollowRedirects() {
689 return true;
694 * MWHttpRequest implemented using internal curl compiled into PHP
696 class CurlHttpRequest extends MWHttpRequest {
697 const SUPPORTS_FILE_POSTS = true;
699 protected $curlOptions = array();
700 protected $headerText = "";
703 * @param $fh
704 * @param $content
705 * @return int
707 protected function readHeader( $fh, $content ) {
708 $this->headerText .= $content;
709 return strlen( $content );
712 public function execute() {
713 wfProfileIn( __METHOD__ );
715 parent::execute();
717 if ( !$this->status->isOK() ) {
718 wfProfileOut( __METHOD__ );
719 return $this->status;
722 $this->curlOptions[CURLOPT_PROXY] = $this->proxy;
723 $this->curlOptions[CURLOPT_TIMEOUT] = $this->timeout;
724 $this->curlOptions[CURLOPT_HTTP_VERSION] = CURL_HTTP_VERSION_1_0;
725 $this->curlOptions[CURLOPT_WRITEFUNCTION] = $this->callback;
726 $this->curlOptions[CURLOPT_HEADERFUNCTION] = array( $this, "readHeader" );
727 $this->curlOptions[CURLOPT_MAXREDIRS] = $this->maxRedirects;
728 $this->curlOptions[CURLOPT_ENCODING] = ""; # Enable compression
730 /* not sure these two are actually necessary */
731 if ( isset( $this->reqHeaders['Referer'] ) ) {
732 $this->curlOptions[CURLOPT_REFERER] = $this->reqHeaders['Referer'];
734 $this->curlOptions[CURLOPT_USERAGENT] = $this->reqHeaders['User-Agent'];
736 $this->curlOptions[CURLOPT_SSL_VERIFYHOST] = $this->sslVerifyHost ? 2 : 0;
737 $this->curlOptions[CURLOPT_SSL_VERIFYPEER] = $this->sslVerifyCert;
739 if ( $this->caInfo ) {
740 $this->curlOptions[CURLOPT_CAINFO] = $this->caInfo;
743 if ( $this->headersOnly ) {
744 $this->curlOptions[CURLOPT_NOBODY] = true;
745 $this->curlOptions[CURLOPT_HEADER] = true;
746 } elseif ( $this->method == 'POST' ) {
747 $this->curlOptions[CURLOPT_POST] = true;
748 $this->curlOptions[CURLOPT_POSTFIELDS] = $this->postData;
749 // Suppress 'Expect: 100-continue' header, as some servers
750 // will reject it with a 417 and Curl won't auto retry
751 // with HTTP 1.0 fallback
752 $this->reqHeaders['Expect'] = '';
753 } else {
754 $this->curlOptions[CURLOPT_CUSTOMREQUEST] = $this->method;
757 $this->curlOptions[CURLOPT_HTTPHEADER] = $this->getHeaderList();
759 $curlHandle = curl_init( $this->url );
761 if ( !curl_setopt_array( $curlHandle, $this->curlOptions ) ) {
762 wfProfileOut( __METHOD__ );
763 throw new MWException( "Error setting curl options." );
766 if ( $this->followRedirects && $this->canFollowRedirects() ) {
767 wfSuppressWarnings();
768 if ( ! curl_setopt( $curlHandle, CURLOPT_FOLLOWLOCATION, true ) ) {
769 wfDebug( __METHOD__ . ": Couldn't set CURLOPT_FOLLOWLOCATION. " .
770 "Probably safe_mode or open_basedir is set.\n" );
771 // Continue the processing. If it were in curl_setopt_array,
772 // processing would have halted on its entry
774 wfRestoreWarnings();
777 $curlRes = curl_exec( $curlHandle );
778 if ( curl_errno( $curlHandle ) == CURLE_OPERATION_TIMEOUTED ) {
779 $this->status->fatal( 'http-timed-out', $this->url );
780 } elseif ( $curlRes === false ) {
781 $this->status->fatal( 'http-curl-error', curl_error( $curlHandle ) );
782 } else {
783 $this->headerList = explode( "\r\n", $this->headerText );
786 curl_close( $curlHandle );
788 $this->parseHeader();
789 $this->setStatus();
791 wfProfileOut( __METHOD__ );
793 return $this->status;
797 * @return bool
799 public function canFollowRedirects() {
800 if ( strval( ini_get( 'open_basedir' ) ) !== '' || wfIniGetBool( 'safe_mode' ) ) {
801 wfDebug( "Cannot follow redirects in safe mode\n" );
802 return false;
805 if ( !defined( 'CURLOPT_REDIR_PROTOCOLS' ) ) {
806 wfDebug( "Cannot follow redirects with libcurl < 7.19.4 due to CVE-2009-0037\n" );
807 return false;
810 return true;
814 class PhpHttpRequest extends MWHttpRequest {
817 * @param $url string
818 * @return string
820 protected function urlToTcp( $url ) {
821 $parsedUrl = parse_url( $url );
823 return 'tcp://' . $parsedUrl['host'] . ':' . $parsedUrl['port'];
826 public function execute() {
827 wfProfileIn( __METHOD__ );
829 parent::execute();
831 if ( is_array( $this->postData ) ) {
832 $this->postData = wfArrayToCgi( $this->postData );
835 if ( $this->parsedUrl['scheme'] != 'http' &&
836 $this->parsedUrl['scheme'] != 'https' ) {
837 $this->status->fatal( 'http-invalid-scheme', $this->parsedUrl['scheme'] );
840 $this->reqHeaders['Accept'] = "*/*";
841 if ( $this->method == 'POST' ) {
842 // Required for HTTP 1.0 POSTs
843 $this->reqHeaders['Content-Length'] = strlen( $this->postData );
844 if( !isset( $this->reqHeaders['Content-Type'] ) ) {
845 $this->reqHeaders['Content-Type'] = "application/x-www-form-urlencoded";
849 $options = array();
850 if ( $this->proxy ) {
851 $options['proxy'] = $this->urlToTCP( $this->proxy );
852 $options['request_fulluri'] = true;
855 if ( !$this->followRedirects ) {
856 $options['max_redirects'] = 0;
857 } else {
858 $options['max_redirects'] = $this->maxRedirects;
861 $options['method'] = $this->method;
862 $options['header'] = implode( "\r\n", $this->getHeaderList() );
863 // Note that at some future point we may want to support
864 // HTTP/1.1, but we'd have to write support for chunking
865 // in version of PHP < 5.3.1
866 $options['protocol_version'] = "1.0";
868 // This is how we tell PHP we want to deal with 404s (for example) ourselves.
869 // Only works on 5.2.10+
870 $options['ignore_errors'] = true;
872 if ( $this->postData ) {
873 $options['content'] = $this->postData;
876 $options['timeout'] = $this->timeout;
878 $context = stream_context_create( array( 'http' => $options ) );
880 $this->headerList = array();
881 $reqCount = 0;
882 $url = $this->url;
884 $result = array();
886 do {
887 $reqCount++;
888 wfSuppressWarnings();
889 $fh = fopen( $url, "r", false, $context );
890 wfRestoreWarnings();
892 if ( !$fh ) {
893 break;
896 $result = stream_get_meta_data( $fh );
897 $this->headerList = $result['wrapper_data'];
898 $this->parseHeader();
900 if ( !$this->followRedirects ) {
901 break;
904 # Handle manual redirection
905 if ( !$this->isRedirect() || $reqCount > $this->maxRedirects ) {
906 break;
908 # Check security of URL
909 $url = $this->getResponseHeader( "Location" );
911 if ( !Http::isValidURI( $url ) ) {
912 wfDebug( __METHOD__ . ": insecure redirection\n" );
913 break;
915 } while ( true );
917 $this->setStatus();
919 if ( $fh === false ) {
920 $this->status->fatal( 'http-request-error' );
921 wfProfileOut( __METHOD__ );
922 return $this->status;
925 if ( $result['timed_out'] ) {
926 $this->status->fatal( 'http-timed-out', $this->url );
927 wfProfileOut( __METHOD__ );
928 return $this->status;
931 // If everything went OK, or we received some error code
932 // get the response body content.
933 if ( $this->status->isOK() || (int)$this->respStatus >= 300 ) {
934 while ( !feof( $fh ) ) {
935 $buf = fread( $fh, 8192 );
937 if ( $buf === false ) {
938 $this->status->fatal( 'http-read-error' );
939 break;
942 if ( strlen( $buf ) ) {
943 call_user_func( $this->callback, $fh, $buf );
947 fclose( $fh );
949 wfProfileOut( __METHOD__ );
951 return $this->status;