From ca32f08966f1b51fcb19460f0996bb0c4048e6fe Mon Sep 17 00:00:00 2001 From: Pierre Schmitz Date: Sat, 3 Dec 2011 13:29:22 +0100 Subject: Update to MediaWiki 1.18.0 * also update ArchLinux skin to chagnes in MonoBook * Use only css to hide our menu bar when printing --- includes/HttpFunctions.php | 306 ++++++--------------------------------------- 1 file changed, 37 insertions(+), 269 deletions(-) (limited to 'includes/HttpFunctions.php') diff --git a/includes/HttpFunctions.php b/includes/HttpFunctions.php index 3d4d77a9..a80fec17 100644 --- a/includes/HttpFunctions.php +++ b/includes/HttpFunctions.php @@ -14,7 +14,7 @@ class Http { * Perform an HTTP request * * @param $method String: HTTP method. Usually GET/POST - * @param $url String: full URL to act on + * @param $url String: full URL to act on. If protocol-relative, will be expanded to an http:// URL * @param $options Array: options to pass to MWHttpRequest object. * Possible keys for the array: * - timeout Timeout length in seconds @@ -32,7 +32,6 @@ class Http { * @return Mixed: (bool)false on failure or a string on success */ public static function request( $method, $url, $options = array() ) { - $url = wfExpandUrl( $url ); wfDebug( "HTTP: $method: $url\n" ); $options['method'] = strtoupper( $method ); @@ -53,6 +52,8 @@ class Http { /** * Simple wrapper for Http::request( 'GET' ) * @see Http::request() + * + * @return string */ public static function get( $url, $timeout = 'default', $options = array() ) { $options['timeout'] = $timeout; @@ -62,6 +63,8 @@ class Http { /** * Simple wrapper for Http::request( 'POST' ) * @see Http::request() + * + * @return string */ public static function post( $url, $options = array() ) { return Http::request( 'POST', $url, $options ); @@ -89,6 +92,7 @@ class Http { // Check if this domain or any superdomain is listed in $wgConf as a local virtual host $domainParts = array_reverse( $domainParts ); + $domain = ''; for ( $i = 0; $i < count( $domainParts ); $i++ ) { $domainPart = $domainParts[$i]; if ( $i == 0 ) { @@ -137,10 +141,12 @@ class Http { * This wrapper class will call out to curl (if available) or fallback * to regular PHP if necessary for handling internal HTTP requests. * - * Renamed from HttpRequest to MWHttpRequst to avoid conflict with - * php's HTTP extension. + * Renamed from HttpRequest to MWHttpRequest to avoid conflict with + * PHP's HTTP extension. */ class MWHttpRequest { + const SUPPORTS_FILE_POSTS = false; + protected $content; protected $timeout = 'default'; protected $headersOnly = null; @@ -158,6 +164,9 @@ class MWHttpRequest { protected $maxRedirects = 5; protected $followRedirects = false; + /** + * @var CookieJar + */ protected $cookieJar; protected $headerList = array(); @@ -168,14 +177,14 @@ class MWHttpRequest { public $status; /** - * @param $url String: url to use + * @param $url String: url to use. If protocol-relative, will be expanded to an http:// URL * @param $options Array: (optional) extra params to pass (see Http::request()) */ function __construct( $url, $options = array() ) { global $wgHTTPTimeout; - $this->url = $url; - $this->parsedUrl = parse_url( $url ); + $this->url = wfExpandUrl( $url, PROTO_HTTP ); + $this->parsedUrl = parse_url( $this->url ); if ( !Http::isValidURI( $this->url ) ) { $this->status = Status::newFatal( 'http-invalid-url' ); @@ -190,7 +199,7 @@ class MWHttpRequest { } $members = array( "postData", "proxy", "noProxy", "sslVerifyHost", "caInfo", - "method", "followRedirects", "maxRedirects", "sslVerifyCert" ); + "method", "followRedirects", "maxRedirects", "sslVerifyCert", "callback" ); foreach ( $members as $o ) { if ( isset( $options[$o] ) ) { @@ -210,6 +219,8 @@ class MWHttpRequest { /** * Generate a new request object + * @param $url String: url to use + * @param $options Array: (optional) extra params to pass (see Http::request()) * @see MWHttpRequest::__construct */ public static function factory( $url, $options = null ) { @@ -368,12 +379,8 @@ class MWHttpRequest { $this->headersOnly = true; } - if ( is_array( $this->postData ) ) { - $this->postData = wfArrayToCGI( $this->postData ); - } - if ( is_object( $wgTitle ) && !isset( $this->reqHeaders['Referer'] ) ) { - $this->setReferer( $wgTitle->getFullURL() ); + $this->setReferer( wfExpandUrl( $wgTitle->getFullURL(), PROTO_CURRENT ) ); } if ( !$this->noProxy ) { @@ -582,249 +589,12 @@ class MWHttpRequest { } } - -class Cookie { - protected $name; - protected $value; - protected $expires; - protected $path; - protected $domain; - protected $isSessionKey = true; - // TO IMPLEMENT protected $secure - // TO IMPLEMENT? protected $maxAge (add onto expires) - // TO IMPLEMENT? protected $version - // TO IMPLEMENT? protected $comment - - function __construct( $name, $value, $attr ) { - $this->name = $name; - $this->set( $value, $attr ); - } - - /** - * Sets a cookie. Used before a request to set up any individual - * cookies. Used internally after a request to parse the - * Set-Cookie headers. - * - * @param $value String: the value of the cookie - * @param $attr Array: possible key/values: - * expires A date string - * path The path this cookie is used on - * domain Domain this cookie is used on - */ - public function set( $value, $attr ) { - $this->value = $value; - - if ( isset( $attr['expires'] ) ) { - $this->isSessionKey = false; - $this->expires = strtotime( $attr['expires'] ); - } - - if ( isset( $attr['path'] ) ) { - $this->path = $attr['path']; - } else { - $this->path = "/"; - } - - if ( isset( $attr['domain'] ) ) { - if ( self::validateCookieDomain( $attr['domain'] ) ) { - $this->domain = $attr['domain']; - } - } else { - throw new MWException( "You must specify a domain." ); - } - } - - /** - * Return the true if the cookie is valid is valid. Otherwise, - * false. The uses a method similar to IE cookie security - * described here: - * http://kuza55.blogspot.com/2008/02/understanding-cookie-security.html - * A better method might be to use a blacklist like - * http://publicsuffix.org/ - * - * @param $domain String: the domain to validate - * @param $originDomain String: (optional) the domain the cookie originates from - * @return Boolean - */ - public static function validateCookieDomain( $domain, $originDomain = null ) { - // Don't allow a trailing dot - if ( substr( $domain, -1 ) == "." ) { - return false; - } - - $dc = explode( ".", $domain ); - - // Only allow full, valid IP addresses - if ( preg_match( '/^[0-9.]+$/', $domain ) ) { - if ( count( $dc ) != 4 ) { - return false; - } - - if ( ip2long( $domain ) === false ) { - return false; - } - - if ( $originDomain == null || $originDomain == $domain ) { - return true; - } - - } - - // Don't allow cookies for "co.uk" or "gov.uk", etc, but allow "supermarket.uk" - if ( strrpos( $domain, "." ) - strlen( $domain ) == -3 ) { - if ( ( count( $dc ) == 2 && strlen( $dc[0] ) <= 2 ) - || ( count( $dc ) == 3 && strlen( $dc[0] ) == "" && strlen( $dc[1] ) <= 2 ) ) { - return false; - } - if ( ( count( $dc ) == 2 || ( count( $dc ) == 3 && $dc[0] == "" ) ) - && preg_match( '/(com|net|org|gov|edu)\...$/', $domain ) ) { - return false; - } - } - - if ( $originDomain != null ) { - if ( substr( $domain, 0, 1 ) != "." && $domain != $originDomain ) { - return false; - } - - if ( substr( $domain, 0, 1 ) == "." - && substr_compare( $originDomain, $domain, -strlen( $domain ), - strlen( $domain ), TRUE ) != 0 ) { - return false; - } - } - - return true; - } - - /** - * Serialize the cookie jar into a format useful for HTTP Request headers. - * - * @param $path String: the path that will be used. Required. - * @param $domain String: the domain that will be used. Required. - * @return String - */ - public function serializeToHttpRequest( $path, $domain ) { - $ret = ""; - - if ( $this->canServeDomain( $domain ) - && $this->canServePath( $path ) - && $this->isUnExpired() ) { - $ret = $this->name . "=" . $this->value; - } - - return $ret; - } - - protected function canServeDomain( $domain ) { - if ( $domain == $this->domain - || ( strlen( $domain ) > strlen( $this->domain ) - && substr( $this->domain, 0, 1 ) == "." - && substr_compare( $domain, $this->domain, -strlen( $this->domain ), - strlen( $this->domain ), TRUE ) == 0 ) ) { - return true; - } - - return false; - } - - protected function canServePath( $path ) { - if ( $this->path && substr_compare( $this->path, $path, 0, strlen( $this->path ) ) == 0 ) { - return true; - } - - return false; - } - - protected function isUnExpired() { - if ( $this->isSessionKey || $this->expires > time() ) { - return true; - } - - return false; - } -} - -class CookieJar { - private $cookie = array(); - - /** - * Set a cookie in the cookie jar. Make sure only one cookie per-name exists. - * @see Cookie::set() - */ - public function setCookie ( $name, $value, $attr ) { - /* cookies: case insensitive, so this should work. - * We'll still send the cookies back in the same case we got them, though. - */ - $index = strtoupper( $name ); - - if ( isset( $this->cookie[$index] ) ) { - $this->cookie[$index]->set( $value, $attr ); - } else { - $this->cookie[$index] = new Cookie( $name, $value, $attr ); - } - } - - /** - * @see Cookie::serializeToHttpRequest - */ - public function serializeToHttpRequest( $path, $domain ) { - $cookies = array(); - - foreach ( $this->cookie as $c ) { - $serialized = $c->serializeToHttpRequest( $path, $domain ); - - if ( $serialized ) { - $cookies[] = $serialized; - } - } - - return implode( "; ", $cookies ); - } - - /** - * Parse the content of an Set-Cookie HTTP Response header. - * - * @param $cookie String - * @param $domain String: cookie's domain - */ - public function parseCookieResponseHeader ( $cookie, $domain ) { - $len = strlen( "Set-Cookie:" ); - - if ( substr_compare( "Set-Cookie:", $cookie, 0, $len, TRUE ) === 0 ) { - $cookie = substr( $cookie, $len ); - } - - $bit = array_map( 'trim', explode( ";", $cookie ) ); - - if ( count( $bit ) >= 1 ) { - list( $name, $value ) = explode( "=", array_shift( $bit ), 2 ); - $attr = array(); - - foreach ( $bit as $piece ) { - $parts = explode( "=", $piece ); - if ( count( $parts ) > 1 ) { - $attr[strtolower( $parts[0] )] = $parts[1]; - } else { - $attr[strtolower( $parts[0] )] = true; - } - } - - if ( !isset( $attr['domain'] ) ) { - $attr['domain'] = $domain; - } elseif ( !Cookie::validateCookieDomain( $attr['domain'], $domain ) ) { - return null; - } - - $this->setCookie( $name, $value, $attr ); - } - } -} - /** * MWHttpRequest implemented using internal curl compiled into PHP */ class CurlHttpRequest extends MWHttpRequest { + const SUPPORTS_FILE_POSTS = true; + static $curlMessageMap = array( 6 => 'http-host-unreachable', 28 => 'http-timed-out' @@ -894,12 +664,14 @@ class CurlHttpRequest extends MWHttpRequest { } if ( $this->followRedirects && $this->canFollowRedirects() ) { - if ( ! @curl_setopt( $curlHandle, CURLOPT_FOLLOWLOCATION, true ) ) { + wfSuppressWarnings(); + if ( ! curl_setopt( $curlHandle, CURLOPT_FOLLOWLOCATION, true ) ) { wfDebug( __METHOD__ . ": Couldn't set CURLOPT_FOLLOWLOCATION. " . "Probably safe_mode or open_basedir is set.\n" ); // Continue the processing. If it were in curl_setopt_array, // processing would have halted on its entry } + wfRestoreWarnings(); } if ( false === curl_exec( $curlHandle ) ) { @@ -947,9 +719,9 @@ class PhpHttpRequest extends MWHttpRequest { public function execute() { parent::execute(); - // At least on Centos 4.8 with PHP 5.1.6, using max_redirects to follow redirects - // causes a segfault - $manuallyRedirect = version_compare( phpversion(), '5.1.7', '<' ); + if ( is_array( $this->postData ) ) { + $this->postData = wfArrayToCGI( $this->postData ); + } if ( $this->parsedUrl['scheme'] != 'http' && $this->parsedUrl['scheme'] != 'https' ) { @@ -969,7 +741,7 @@ class PhpHttpRequest extends MWHttpRequest { $options['request_fulluri'] = true; } - if ( !$this->followRedirects || $manuallyRedirect ) { + if ( !$this->followRedirects ) { $options['max_redirects'] = 0; } else { $options['max_redirects'] = $this->maxRedirects; @@ -990,12 +762,7 @@ class PhpHttpRequest extends MWHttpRequest { $options['content'] = $this->postData; } - $oldTimeout = false; - if ( version_compare( '5.2.1', phpversion(), '>' ) ) { - $oldTimeout = ini_set( 'default_socket_timeout', $this->timeout ); - } else { - $options['timeout'] = $this->timeout; - } + $options['timeout'] = $this->timeout; $context = stream_context_create( array( 'http' => $options ) ); @@ -1003,6 +770,8 @@ class PhpHttpRequest extends MWHttpRequest { $reqCount = 0; $url = $this->url; + $result = array(); + do { $reqCount++; wfSuppressWarnings(); @@ -1017,7 +786,7 @@ class PhpHttpRequest extends MWHttpRequest { $this->headerList = $result['wrapper_data']; $this->parseHeader(); - if ( !$manuallyRedirect || !$this->followRedirects ) { + if ( !$this->followRedirects ) { break; } @@ -1034,10 +803,6 @@ class PhpHttpRequest extends MWHttpRequest { } } while ( true ); - if ( $oldTimeout !== false ) { - ini_set( 'default_socket_timeout', $oldTimeout ); - } - $this->setStatus(); if ( $fh === false ) { @@ -1050,7 +815,10 @@ class PhpHttpRequest extends MWHttpRequest { return $this->status; } - if ( $this->status->isOK() ) { + // If everything went OK, or we recieved some error code + // get the response body content. + if ( $this->status->isOK() + || (int)$this->respStatus >= 300) { while ( !feof( $fh ) ) { $buf = fread( $fh, 8192 ); -- cgit v1.2.3-54-g00ecf