2010-02-27 04:37:38 +01:00
|
|
|
<?php
|
|
|
|
/**
|
2015-09-26 09:04:28 +02:00
|
|
|
* HTTP API: WP_Http class
|
2015-09-03 05:39:21 +02:00
|
|
|
*
|
|
|
|
* @package WordPress
|
|
|
|
* @subpackage HTTP
|
|
|
|
* @since 2.7.0
|
|
|
|
*/
|
|
|
|
|
2016-08-31 18:31:29 +02:00
|
|
|
if ( ! class_exists( 'Requests' ) ) {
|
2020-02-06 07:33:11 +01:00
|
|
|
require ABSPATH . WPINC . '/class-requests.php';
|
2016-05-13 06:42:28 +02:00
|
|
|
|
|
|
|
Requests::register_autoloader();
|
|
|
|
Requests::set_certificate_path( ABSPATH . WPINC . '/certificates/ca-bundle.crt' );
|
|
|
|
}
|
|
|
|
|
2015-09-03 05:39:21 +02:00
|
|
|
/**
|
|
|
|
* Core class used for managing HTTP transports and making HTTP requests.
|
2010-02-27 04:37:38 +01:00
|
|
|
*
|
2013-09-03 10:37:10 +02:00
|
|
|
* This class is used to consistently make outgoing HTTP requests easy for developers
|
|
|
|
* while still being compatible with the many PHP configurations under which
|
|
|
|
* WordPress runs.
|
2010-02-27 04:37:38 +01:00
|
|
|
*
|
|
|
|
* Debugging includes several actions, which pass different variables for debugging the HTTP API.
|
|
|
|
*
|
|
|
|
* @since 2.7.0
|
|
|
|
*/
|
|
|
|
class WP_Http {
|
|
|
|
|
2016-01-14 04:16:27 +01:00
|
|
|
// Aliases for HTTP response codes.
|
2017-12-01 00:11:00 +01:00
|
|
|
const HTTP_CONTINUE = 100;
|
|
|
|
const SWITCHING_PROTOCOLS = 101;
|
|
|
|
const PROCESSING = 102;
|
|
|
|
const EARLY_HINTS = 103;
|
|
|
|
|
|
|
|
const OK = 200;
|
|
|
|
const CREATED = 201;
|
|
|
|
const ACCEPTED = 202;
|
|
|
|
const NON_AUTHORITATIVE_INFORMATION = 203;
|
|
|
|
const NO_CONTENT = 204;
|
|
|
|
const RESET_CONTENT = 205;
|
|
|
|
const PARTIAL_CONTENT = 206;
|
|
|
|
const MULTI_STATUS = 207;
|
|
|
|
const IM_USED = 226;
|
|
|
|
|
|
|
|
const MULTIPLE_CHOICES = 300;
|
|
|
|
const MOVED_PERMANENTLY = 301;
|
|
|
|
const FOUND = 302;
|
|
|
|
const SEE_OTHER = 303;
|
|
|
|
const NOT_MODIFIED = 304;
|
|
|
|
const USE_PROXY = 305;
|
|
|
|
const RESERVED = 306;
|
|
|
|
const TEMPORARY_REDIRECT = 307;
|
|
|
|
const PERMANENT_REDIRECT = 308;
|
2016-01-14 04:16:27 +01:00
|
|
|
|
|
|
|
const BAD_REQUEST = 400;
|
|
|
|
const UNAUTHORIZED = 401;
|
|
|
|
const PAYMENT_REQUIRED = 402;
|
|
|
|
const FORBIDDEN = 403;
|
|
|
|
const NOT_FOUND = 404;
|
|
|
|
const METHOD_NOT_ALLOWED = 405;
|
|
|
|
const NOT_ACCEPTABLE = 406;
|
|
|
|
const PROXY_AUTHENTICATION_REQUIRED = 407;
|
|
|
|
const REQUEST_TIMEOUT = 408;
|
|
|
|
const CONFLICT = 409;
|
|
|
|
const GONE = 410;
|
|
|
|
const LENGTH_REQUIRED = 411;
|
|
|
|
const PRECONDITION_FAILED = 412;
|
|
|
|
const REQUEST_ENTITY_TOO_LARGE = 413;
|
|
|
|
const REQUEST_URI_TOO_LONG = 414;
|
|
|
|
const UNSUPPORTED_MEDIA_TYPE = 415;
|
|
|
|
const REQUESTED_RANGE_NOT_SATISFIABLE = 416;
|
|
|
|
const EXPECTATION_FAILED = 417;
|
|
|
|
const IM_A_TEAPOT = 418;
|
|
|
|
const MISDIRECTED_REQUEST = 421;
|
|
|
|
const UNPROCESSABLE_ENTITY = 422;
|
|
|
|
const LOCKED = 423;
|
|
|
|
const FAILED_DEPENDENCY = 424;
|
|
|
|
const UPGRADE_REQUIRED = 426;
|
|
|
|
const PRECONDITION_REQUIRED = 428;
|
|
|
|
const TOO_MANY_REQUESTS = 429;
|
|
|
|
const REQUEST_HEADER_FIELDS_TOO_LARGE = 431;
|
|
|
|
const UNAVAILABLE_FOR_LEGAL_REASONS = 451;
|
|
|
|
|
|
|
|
const INTERNAL_SERVER_ERROR = 500;
|
|
|
|
const NOT_IMPLEMENTED = 501;
|
|
|
|
const BAD_GATEWAY = 502;
|
|
|
|
const SERVICE_UNAVAILABLE = 503;
|
|
|
|
const GATEWAY_TIMEOUT = 504;
|
|
|
|
const HTTP_VERSION_NOT_SUPPORTED = 505;
|
|
|
|
const VARIANT_ALSO_NEGOTIATES = 506;
|
|
|
|
const INSUFFICIENT_STORAGE = 507;
|
|
|
|
const NOT_EXTENDED = 510;
|
|
|
|
const NETWORK_AUTHENTICATION_REQUIRED = 511;
|
|
|
|
|
2010-02-27 04:37:38 +01:00
|
|
|
/**
|
2014-07-19 00:01:15 +02:00
|
|
|
* Send an HTTP request to a URI.
|
2010-02-27 04:37:38 +01:00
|
|
|
*
|
2014-07-19 00:01:15 +02:00
|
|
|
* Please note: The only URI that are supported in the HTTP Transport implementation
|
|
|
|
* are the HTTP and HTTPS protocols.
|
2010-02-27 04:37:38 +01:00
|
|
|
*
|
|
|
|
* @since 2.7.0
|
|
|
|
*
|
2014-07-19 00:01:15 +02:00
|
|
|
* @param string $url The request URL.
|
|
|
|
* @param string|array $args {
|
|
|
|
* Optional. Array or string of HTTP request arguments.
|
|
|
|
*
|
2018-05-14 17:23:21 +02:00
|
|
|
* @type string $method Request method. Accepts 'GET', 'POST', 'HEAD', 'PUT', 'DELETE',
|
|
|
|
* 'TRACE', 'OPTIONS', or 'PATCH'.
|
2014-07-19 00:01:15 +02:00
|
|
|
* Some transports technically allow others, but should not be
|
|
|
|
* assumed. Default 'GET'.
|
2019-12-17 16:25:01 +01:00
|
|
|
* @type float $timeout How long the connection should stay open in seconds. Default 5.
|
2014-07-19 00:01:15 +02:00
|
|
|
* @type int $redirection Number of allowed redirects. Not supported by all transports
|
|
|
|
* Default 5.
|
|
|
|
* @type string $httpversion Version of the HTTP protocol to use. Accepts '1.0' and '1.1'.
|
|
|
|
* Default '1.0'.
|
|
|
|
* @type string $user-agent User-agent value sent.
|
2017-06-25 09:00:42 +02:00
|
|
|
* Default 'WordPress/' . get_bloginfo( 'version' ) . '; ' . get_bloginfo( 'url' ).
|
2016-05-02 06:00:28 +02:00
|
|
|
* @type bool $reject_unsafe_urls Whether to pass URLs through wp_http_validate_url().
|
2014-07-19 00:01:15 +02:00
|
|
|
* Default false.
|
|
|
|
* @type bool $blocking Whether the calling code requires the result of the request.
|
|
|
|
* If set to false, the request will be sent to the remote server,
|
|
|
|
* and processing returned to the calling code immediately, the caller
|
|
|
|
* will know if the request succeeded or failed, but will not receive
|
|
|
|
* any response from the remote server. Default true.
|
|
|
|
* @type string|array $headers Array or string of headers to send with the request.
|
|
|
|
* Default empty array.
|
|
|
|
* @type array $cookies List of cookies to send with the request. Default empty array.
|
|
|
|
* @type string|array $body Body to send with the request. Default null.
|
|
|
|
* @type bool $compress Whether to compress the $body when sending the request.
|
|
|
|
* Default false.
|
|
|
|
* @type bool $decompress Whether to decompress a compressed response. If set to false and
|
|
|
|
* compressed content is returned in the response anyway, it will
|
|
|
|
* need to be separately decompressed. Default true.
|
|
|
|
* @type bool $sslverify Whether to verify SSL for the request. Default true.
|
2019-10-07 21:08:06 +02:00
|
|
|
* @type string $sslcertificates Absolute path to an SSL certificate .crt file.
|
2014-07-19 00:01:15 +02:00
|
|
|
* Default ABSPATH . WPINC . '/certificates/ca-bundle.crt'.
|
|
|
|
* @type bool $stream Whether to stream to a file. If set to true and no filename was
|
|
|
|
* given, it will be droped it in the WP temp dir and its name will
|
|
|
|
* be set using the basename of the URL. Default false.
|
|
|
|
* @type string $filename Filename of the file to write to when streaming. $stream must be
|
|
|
|
* set to true. Default null.
|
|
|
|
* @type int $limit_response_size Size in bytes to limit the response to. Default null.
|
|
|
|
*
|
|
|
|
* }
|
|
|
|
* @return array|WP_Error Array containing 'headers', 'body', 'response', 'cookies', 'filename'.
|
|
|
|
* A WP_Error instance upon error.
|
2010-02-27 04:37:38 +01:00
|
|
|
*/
|
2014-05-19 07:34:15 +02:00
|
|
|
public function request( $url, $args = array() ) {
|
2010-02-27 04:37:38 +01:00
|
|
|
$defaults = array(
|
2017-12-01 00:11:00 +01:00
|
|
|
'method' => 'GET',
|
2014-01-28 09:25:11 +01:00
|
|
|
/**
|
2016-05-22 20:43:27 +02:00
|
|
|
* Filters the timeout value for an HTTP request.
|
2014-01-28 09:25:11 +01:00
|
|
|
*
|
|
|
|
* @since 2.7.0
|
2019-01-04 22:58:51 +01:00
|
|
|
* @since 5.1.0 The `$url` parameter was added.
|
2014-01-28 09:25:11 +01:00
|
|
|
*
|
2019-12-17 16:25:01 +01:00
|
|
|
* @param float $timeout_value Time in seconds until a request times out. Default 5.
|
2018-02-09 19:11:30 +01:00
|
|
|
* @param string $url The request URL.
|
2014-01-28 09:25:11 +01:00
|
|
|
*/
|
2018-02-09 19:11:30 +01:00
|
|
|
'timeout' => apply_filters( 'http_request_timeout', 5, $url ),
|
2014-01-28 09:25:11 +01:00
|
|
|
/**
|
2016-05-22 20:43:27 +02:00
|
|
|
* Filters the number of redirects allowed during an HTTP request.
|
2014-01-28 09:25:11 +01:00
|
|
|
*
|
|
|
|
* @since 2.7.0
|
2019-01-04 22:58:51 +01:00
|
|
|
* @since 5.1.0 The `$url` parameter was added.
|
2014-01-28 09:25:11 +01:00
|
|
|
*
|
2018-02-09 19:11:30 +01:00
|
|
|
* @param int $redirect_count Number of redirects allowed. Default 5.
|
|
|
|
* @param string $url The request URL.
|
2014-01-28 09:25:11 +01:00
|
|
|
*/
|
2018-02-09 19:11:30 +01:00
|
|
|
'redirection' => apply_filters( 'http_request_redirection_count', 5, $url ),
|
2014-01-28 09:25:11 +01:00
|
|
|
/**
|
2016-05-22 20:43:27 +02:00
|
|
|
* Filters the version of the HTTP protocol used in a request.
|
2014-01-28 09:25:11 +01:00
|
|
|
*
|
|
|
|
* @since 2.7.0
|
2019-01-04 22:58:51 +01:00
|
|
|
* @since 5.1.0 The `$url` parameter was added.
|
2014-01-28 09:25:11 +01:00
|
|
|
*
|
2018-02-09 19:11:30 +01:00
|
|
|
* @param string $version Version of HTTP used. Accepts '1.0' and '1.1'. Default '1.0'.
|
|
|
|
* @param string $url The request URL.
|
2014-01-28 09:25:11 +01:00
|
|
|
*/
|
2018-02-09 19:11:30 +01:00
|
|
|
'httpversion' => apply_filters( 'http_request_version', '1.0', $url ),
|
2014-01-28 09:25:11 +01:00
|
|
|
/**
|
2016-05-22 20:43:27 +02:00
|
|
|
* Filters the user agent value sent with an HTTP request.
|
2014-01-28 09:25:11 +01:00
|
|
|
*
|
|
|
|
* @since 2.7.0
|
2019-01-04 22:58:51 +01:00
|
|
|
* @since 5.1.0 The `$url` parameter was added.
|
2014-01-28 09:25:11 +01:00
|
|
|
*
|
|
|
|
* @param string $user_agent WordPress user agent string.
|
2018-02-09 19:11:30 +01:00
|
|
|
* @param string $url The request URL.
|
2014-01-28 09:25:11 +01:00
|
|
|
*/
|
2018-02-09 19:11:30 +01:00
|
|
|
'user-agent' => apply_filters( 'http_headers_useragent', 'WordPress/' . get_bloginfo( 'version' ) . '; ' . get_bloginfo( 'url' ), $url ),
|
2014-01-28 09:25:11 +01:00
|
|
|
/**
|
2016-05-22 20:43:27 +02:00
|
|
|
* Filters whether to pass URLs through wp_http_validate_url() in an HTTP request.
|
2014-01-28 09:25:11 +01:00
|
|
|
*
|
|
|
|
* @since 3.6.0
|
2019-01-04 22:58:51 +01:00
|
|
|
* @since 5.1.0 The `$url` parameter was added.
|
2014-01-28 09:25:11 +01:00
|
|
|
*
|
2018-02-09 19:11:30 +01:00
|
|
|
* @param bool $pass_url Whether to pass URLs through wp_http_validate_url(). Default false.
|
|
|
|
* @param string $url The request URL.
|
2014-01-28 09:25:11 +01:00
|
|
|
*/
|
2018-02-09 19:11:30 +01:00
|
|
|
'reject_unsafe_urls' => apply_filters( 'http_request_reject_unsafe_urls', false, $url ),
|
2017-12-01 00:11:00 +01:00
|
|
|
'blocking' => true,
|
|
|
|
'headers' => array(),
|
|
|
|
'cookies' => array(),
|
|
|
|
'body' => null,
|
|
|
|
'compress' => false,
|
|
|
|
'decompress' => true,
|
|
|
|
'sslverify' => true,
|
|
|
|
'sslcertificates' => ABSPATH . WPINC . '/certificates/ca-bundle.crt',
|
|
|
|
'stream' => false,
|
|
|
|
'filename' => null,
|
2013-07-22 20:55:05 +02:00
|
|
|
'limit_response_size' => null,
|
2010-02-27 04:37:38 +01:00
|
|
|
);
|
|
|
|
|
2011-03-24 06:18:34 +01:00
|
|
|
// Pre-parse for the HEAD checks.
|
|
|
|
$args = wp_parse_args( $args );
|
|
|
|
|
2019-10-07 21:08:06 +02:00
|
|
|
// By default, HEAD requests do not cause redirections.
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( isset( $args['method'] ) && 'HEAD' == $args['method'] ) {
|
2011-03-24 06:18:34 +01:00
|
|
|
$defaults['redirection'] = 0;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2011-03-24 06:18:34 +01:00
|
|
|
|
2019-07-25 02:48:58 +02:00
|
|
|
$parsed_args = wp_parse_args( $args, $defaults );
|
2014-01-28 09:25:11 +01:00
|
|
|
/**
|
2016-05-22 20:43:27 +02:00
|
|
|
* Filters the arguments used in an HTTP request.
|
2014-01-28 09:25:11 +01:00
|
|
|
*
|
|
|
|
* @since 2.7.0
|
|
|
|
*
|
2020-01-21 16:41:04 +01:00
|
|
|
* @param array $parsed_args An array of HTTP request arguments.
|
|
|
|
* @param string $url The request URL.
|
2014-01-28 09:25:11 +01:00
|
|
|
*/
|
2019-07-25 02:48:58 +02:00
|
|
|
$parsed_args = apply_filters( 'http_request_args', $parsed_args, $url );
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2013-03-04 06:17:05 +01:00
|
|
|
// The transports decrement this, store a copy of the original value for loop purposes.
|
2019-07-25 02:48:58 +02:00
|
|
|
if ( ! isset( $parsed_args['_redirection'] ) ) {
|
|
|
|
$parsed_args['_redirection'] = $parsed_args['redirection'];
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2011-03-24 06:18:34 +01:00
|
|
|
|
2014-01-28 09:25:11 +01:00
|
|
|
/**
|
2016-05-22 20:43:27 +02:00
|
|
|
* Filters whether to preempt an HTTP request's return value.
|
2014-01-28 09:25:11 +01:00
|
|
|
*
|
2015-09-24 20:52:25 +02:00
|
|
|
* Returning a non-false value from the filter will short-circuit the HTTP request and return
|
|
|
|
* early with that value. A filter should return either:
|
|
|
|
*
|
|
|
|
* - An array containing 'headers', 'body', 'response', 'cookies', and 'filename' elements
|
|
|
|
* - A WP_Error instance
|
|
|
|
* - boolean false (to avoid short-circuiting the response)
|
|
|
|
*
|
|
|
|
* Returning any other value may result in unexpected behaviour.
|
2014-01-28 09:25:11 +01:00
|
|
|
*
|
|
|
|
* @since 2.9.0
|
|
|
|
*
|
2019-10-07 21:08:06 +02:00
|
|
|
* @param false|array|WP_Error $preempt Whether to preempt an HTTP request's return value. Default false.
|
|
|
|
* @param array $parsed_args HTTP request arguments.
|
|
|
|
* @param string $url The request URL.
|
2014-01-28 09:25:11 +01:00
|
|
|
*/
|
2019-07-25 02:48:58 +02:00
|
|
|
$pre = apply_filters( 'pre_http_request', false, $parsed_args, $url );
|
2015-09-24 20:52:25 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( false !== $pre ) {
|
2010-02-27 04:37:38 +01:00
|
|
|
return $pre;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2013-06-23 08:02:19 +02:00
|
|
|
if ( function_exists( 'wp_kses_bad_protocol' ) ) {
|
2019-07-25 02:48:58 +02:00
|
|
|
if ( $parsed_args['reject_unsafe_urls'] ) {
|
2013-06-23 08:02:19 +02:00
|
|
|
$url = wp_http_validate_url( $url );
|
2016-05-13 06:42:28 +02:00
|
|
|
}
|
2015-03-09 03:11:28 +01:00
|
|
|
if ( $url ) {
|
|
|
|
$url = wp_kses_bad_protocol( $url, array( 'http', 'https', 'ssl' ) );
|
|
|
|
}
|
2013-06-23 08:02:19 +02:00
|
|
|
}
|
2013-06-21 08:07:47 +02:00
|
|
|
|
2020-04-24 09:28:10 +02:00
|
|
|
$arrURL = parse_url( $url );
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2016-05-13 06:42:28 +02:00
|
|
|
if ( empty( $url ) || empty( $arrURL['scheme'] ) ) {
|
2019-06-08 19:10:52 +02:00
|
|
|
$response = new WP_Error( 'http_request_failed', __( 'A valid URL was not provided.' ) );
|
|
|
|
/** This action is documented in wp-includes/class-http.php */
|
2019-07-25 02:48:58 +02:00
|
|
|
do_action( 'http_api_debug', $response, 'response', 'Requests', $parsed_args, $url );
|
2019-06-08 19:10:52 +02:00
|
|
|
return $response;
|
2016-05-13 06:42:28 +02:00
|
|
|
}
|
2010-04-18 06:58:19 +02:00
|
|
|
|
2016-05-13 06:42:28 +02:00
|
|
|
if ( $this->block_request( $url ) ) {
|
2019-06-08 19:10:52 +02:00
|
|
|
$response = new WP_Error( 'http_request_not_executed', __( 'User has blocked requests through HTTP.' ) );
|
|
|
|
/** This action is documented in wp-includes/class-http.php */
|
2019-07-25 02:48:58 +02:00
|
|
|
do_action( 'http_api_debug', $response, 'response', 'Requests', $parsed_args, $url );
|
2019-06-08 19:10:52 +02:00
|
|
|
return $response;
|
2014-10-20 09:32:21 +02:00
|
|
|
}
|
2011-03-25 03:42:20 +01:00
|
|
|
|
2016-05-13 06:42:28 +02:00
|
|
|
// If we are streaming to a file but no filename was given drop it in the WP temp dir
|
2019-11-10 02:18:02 +01:00
|
|
|
// and pick its name using the basename of the $url.
|
2019-07-25 02:48:58 +02:00
|
|
|
if ( $parsed_args['stream'] ) {
|
|
|
|
if ( empty( $parsed_args['filename'] ) ) {
|
|
|
|
$parsed_args['filename'] = get_temp_dir() . basename( $url );
|
2016-05-13 06:42:28 +02:00
|
|
|
}
|
|
|
|
|
2019-11-10 02:18:02 +01:00
|
|
|
// Force some settings if we are streaming to a file and check for existence
|
|
|
|
// and perms of destination directory.
|
2019-07-25 02:48:58 +02:00
|
|
|
$parsed_args['blocking'] = true;
|
|
|
|
if ( ! wp_is_writable( dirname( $parsed_args['filename'] ) ) ) {
|
2019-06-08 19:10:52 +02:00
|
|
|
$response = new WP_Error( 'http_request_failed', __( 'Destination directory for file streaming does not exist or is not writable.' ) );
|
|
|
|
/** This action is documented in wp-includes/class-http.php */
|
2019-07-25 02:48:58 +02:00
|
|
|
do_action( 'http_api_debug', $response, 'response', 'Requests', $parsed_args, $url );
|
2019-06-08 19:10:52 +02:00
|
|
|
return $response;
|
2016-05-13 06:42:28 +02:00
|
|
|
}
|
2011-03-25 03:42:20 +01:00
|
|
|
}
|
|
|
|
|
2019-07-25 02:48:58 +02:00
|
|
|
if ( is_null( $parsed_args['headers'] ) ) {
|
|
|
|
$parsed_args['headers'] = array();
|
2016-05-13 06:42:28 +02:00
|
|
|
}
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2016-05-13 06:42:28 +02:00
|
|
|
// WP allows passing in headers as a string, weirdly.
|
2019-07-25 02:48:58 +02:00
|
|
|
if ( ! is_array( $parsed_args['headers'] ) ) {
|
|
|
|
$processedHeaders = WP_Http::processHeaders( $parsed_args['headers'] );
|
|
|
|
$parsed_args['headers'] = $processedHeaders['headers'];
|
2010-02-27 04:37:38 +01:00
|
|
|
}
|
|
|
|
|
2019-11-10 02:18:02 +01:00
|
|
|
// Setup arguments.
|
2019-07-25 02:48:58 +02:00
|
|
|
$headers = $parsed_args['headers'];
|
|
|
|
$data = $parsed_args['body'];
|
|
|
|
$type = $parsed_args['method'];
|
2016-05-13 06:42:28 +02:00
|
|
|
$options = array(
|
2019-07-25 02:48:58 +02:00
|
|
|
'timeout' => $parsed_args['timeout'],
|
|
|
|
'useragent' => $parsed_args['user-agent'],
|
|
|
|
'blocking' => $parsed_args['blocking'],
|
|
|
|
'hooks' => new WP_HTTP_Requests_Hooks( $url, $parsed_args ),
|
2016-05-13 06:42:28 +02:00
|
|
|
);
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2016-05-13 07:11:27 +02:00
|
|
|
// Ensure redirects follow browser behaviour.
|
|
|
|
$options['hooks']->register( 'requests.before_redirect', array( get_class(), 'browser_redirect_compatibility' ) );
|
|
|
|
|
2017-05-16 10:38:42 +02:00
|
|
|
// Validate redirected URLs.
|
2019-07-25 02:48:58 +02:00
|
|
|
if ( function_exists( 'wp_kses_bad_protocol' ) && $parsed_args['reject_unsafe_urls'] ) {
|
2017-05-16 10:38:42 +02:00
|
|
|
$options['hooks']->register( 'requests.before_redirect', array( get_class(), 'validate_redirects' ) );
|
|
|
|
}
|
|
|
|
|
2019-07-25 02:48:58 +02:00
|
|
|
if ( $parsed_args['stream'] ) {
|
|
|
|
$options['filename'] = $parsed_args['filename'];
|
2010-02-27 04:37:38 +01:00
|
|
|
}
|
2019-07-25 02:48:58 +02:00
|
|
|
if ( empty( $parsed_args['redirection'] ) ) {
|
2016-05-13 06:42:28 +02:00
|
|
|
$options['follow_redirects'] = false;
|
2016-07-27 17:52:28 +02:00
|
|
|
} else {
|
2019-07-25 02:48:58 +02:00
|
|
|
$options['redirects'] = $parsed_args['redirection'];
|
2013-08-28 06:59:09 +02:00
|
|
|
}
|
|
|
|
|
2019-11-10 02:18:02 +01:00
|
|
|
// Use byte limit, if we can.
|
2019-07-25 02:48:58 +02:00
|
|
|
if ( isset( $parsed_args['limit_response_size'] ) ) {
|
|
|
|
$options['max_bytes'] = $parsed_args['limit_response_size'];
|
2016-05-13 06:42:28 +02:00
|
|
|
}
|
2013-09-11 10:13:10 +02:00
|
|
|
|
2016-07-27 17:32:27 +02:00
|
|
|
// If we've got cookies, use and convert them to Requests_Cookie.
|
2019-07-25 02:48:58 +02:00
|
|
|
if ( ! empty( $parsed_args['cookies'] ) ) {
|
|
|
|
$options['cookies'] = WP_Http::normalize_cookies( $parsed_args['cookies'] );
|
2013-03-04 04:33:12 +01:00
|
|
|
}
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2019-11-10 02:18:02 +01:00
|
|
|
// SSL certificate handling.
|
2019-07-25 02:48:58 +02:00
|
|
|
if ( ! $parsed_args['sslverify'] ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
$options['verify'] = false;
|
2016-10-05 05:24:37 +02:00
|
|
|
$options['verifyname'] = false;
|
2016-07-27 17:52:28 +02:00
|
|
|
} else {
|
2019-07-25 02:48:58 +02:00
|
|
|
$options['verify'] = $parsed_args['sslcertificates'];
|
2016-05-13 06:42:28 +02:00
|
|
|
}
|
2012-09-27 08:54:17 +02:00
|
|
|
|
2016-07-27 17:52:28 +02:00
|
|
|
// All non-GET/HEAD requests should put the arguments in the form body.
|
|
|
|
if ( 'HEAD' !== $type && 'GET' !== $type ) {
|
|
|
|
$options['data_format'] = 'body';
|
|
|
|
}
|
|
|
|
|
2016-05-13 06:42:28 +02:00
|
|
|
/**
|
2016-05-22 20:43:27 +02:00
|
|
|
* Filters whether SSL should be verified for non-local requests.
|
2016-05-13 06:42:28 +02:00
|
|
|
*
|
|
|
|
* @since 2.8.0
|
2019-01-04 22:58:51 +01:00
|
|
|
* @since 5.1.0 The `$url` parameter was added.
|
2016-05-13 06:42:28 +02:00
|
|
|
*
|
2018-02-09 19:11:30 +01:00
|
|
|
* @param bool $ssl_verify Whether to verify the SSL connection. Default true.
|
|
|
|
* @param string $url The request URL.
|
2016-05-13 06:42:28 +02:00
|
|
|
*/
|
2018-02-09 19:11:30 +01:00
|
|
|
$options['verify'] = apply_filters( 'https_ssl_verify', $options['verify'], $url );
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2016-07-13 17:51:28 +02:00
|
|
|
// Check for proxies.
|
|
|
|
$proxy = new WP_HTTP_Proxy();
|
|
|
|
if ( $proxy->is_enabled() && $proxy->send_through_proxy( $url ) ) {
|
|
|
|
$options['proxy'] = new Requests_Proxy_HTTP( $proxy->host() . ':' . $proxy->port() );
|
|
|
|
|
|
|
|
if ( $proxy->use_authentication() ) {
|
2016-07-31 20:20:29 +02:00
|
|
|
$options['proxy']->use_authentication = true;
|
2017-12-01 00:11:00 +01:00
|
|
|
$options['proxy']->user = $proxy->username();
|
|
|
|
$options['proxy']->pass = $proxy->password();
|
2016-07-13 17:51:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-10 02:18:02 +01:00
|
|
|
// Avoid issues where mbstring.func_overload is enabled.
|
2016-10-25 02:45:29 +02:00
|
|
|
mbstring_binary_safe_encoding();
|
|
|
|
|
2016-05-13 06:42:28 +02:00
|
|
|
try {
|
2016-07-06 19:51:30 +02:00
|
|
|
$requests_response = Requests::request( $url, $headers, $data, $type, $options );
|
2016-05-16 08:12:29 +02:00
|
|
|
|
2019-11-10 02:18:02 +01:00
|
|
|
// Convert the response into an array.
|
2019-07-25 02:48:58 +02:00
|
|
|
$http_response = new WP_HTTP_Requests_Response( $requests_response, $parsed_args['filename'] );
|
2017-12-01 00:11:00 +01:00
|
|
|
$response = $http_response->to_array();
|
2016-07-06 19:51:30 +02:00
|
|
|
|
|
|
|
// Add the original object to the array.
|
|
|
|
$response['http_response'] = $http_response;
|
2017-12-01 00:11:00 +01:00
|
|
|
} catch ( Requests_Exception $e ) {
|
2016-05-13 06:42:28 +02:00
|
|
|
$response = new WP_Error( 'http_request_failed', $e->getMessage() );
|
|
|
|
}
|
2012-09-27 08:54:17 +02:00
|
|
|
|
2016-10-25 02:45:29 +02:00
|
|
|
reset_mbstring_encoding();
|
|
|
|
|
2016-05-13 06:42:28 +02:00
|
|
|
/**
|
|
|
|
* Fires after an HTTP API response is received and before the response is returned.
|
|
|
|
*
|
|
|
|
* @since 2.8.0
|
|
|
|
*
|
2019-10-07 21:08:06 +02:00
|
|
|
* @param array|WP_Error $response HTTP response or WP_Error object.
|
|
|
|
* @param string $context Context under which the hook is fired.
|
|
|
|
* @param string $class HTTP transport used.
|
|
|
|
* @param array $parsed_args HTTP request arguments.
|
|
|
|
* @param string $url The request URL.
|
2016-05-13 06:42:28 +02:00
|
|
|
*/
|
2019-07-25 02:48:58 +02:00
|
|
|
do_action( 'http_api_debug', $response, 'response', 'Requests', $parsed_args, $url );
|
2016-05-13 06:42:28 +02:00
|
|
|
if ( is_wp_error( $response ) ) {
|
|
|
|
return $response;
|
2010-02-27 04:37:38 +01:00
|
|
|
}
|
|
|
|
|
2019-07-25 02:48:58 +02:00
|
|
|
if ( ! $parsed_args['blocking'] ) {
|
2016-05-13 06:42:28 +02:00
|
|
|
return array(
|
2017-12-01 00:11:00 +01:00
|
|
|
'headers' => array(),
|
|
|
|
'body' => '',
|
|
|
|
'response' => array(
|
|
|
|
'code' => false,
|
2016-05-13 06:42:28 +02:00
|
|
|
'message' => false,
|
|
|
|
),
|
2017-12-01 00:11:00 +01:00
|
|
|
'cookies' => array(),
|
2016-07-06 19:51:30 +02:00
|
|
|
'http_response' => null,
|
2016-05-13 06:42:28 +02:00
|
|
|
);
|
|
|
|
}
|
2013-09-11 10:13:10 +02:00
|
|
|
|
2016-05-13 06:42:28 +02:00
|
|
|
/**
|
2016-05-22 20:43:27 +02:00
|
|
|
* Filters the HTTP API response immediately before the response is returned.
|
2016-05-13 06:42:28 +02:00
|
|
|
*
|
|
|
|
* @since 2.9.0
|
|
|
|
*
|
2019-10-07 21:08:06 +02:00
|
|
|
* @param array $response HTTP response.
|
|
|
|
* @param array $parsed_args HTTP request arguments.
|
|
|
|
* @param string $url The request URL.
|
2016-05-13 06:42:28 +02:00
|
|
|
*/
|
2019-07-25 02:48:58 +02:00
|
|
|
return apply_filters( 'http_response', $response, $parsed_args, $url );
|
2016-05-13 06:42:28 +02:00
|
|
|
}
|
2013-08-17 03:20:09 +02:00
|
|
|
|
2016-07-27 17:32:27 +02:00
|
|
|
/**
|
|
|
|
* Normalizes cookies for using in Requests.
|
|
|
|
*
|
|
|
|
* @since 4.6.0
|
|
|
|
*
|
2018-03-25 21:35:29 +02:00
|
|
|
* @param array $cookies Array of cookies to send with the request.
|
2016-07-27 17:32:27 +02:00
|
|
|
* @return Requests_Cookie_Jar Cookie holder object.
|
|
|
|
*/
|
|
|
|
public static function normalize_cookies( $cookies ) {
|
|
|
|
$cookie_jar = new Requests_Cookie_Jar();
|
|
|
|
|
|
|
|
foreach ( $cookies as $name => $value ) {
|
|
|
|
if ( $value instanceof WP_Http_Cookie ) {
|
2019-04-08 07:32:51 +02:00
|
|
|
$cookie_jar[ $value->name ] = new Requests_Cookie( $value->name, $value->value, $value->get_attributes(), array( 'host-only' => $value->host_only ) );
|
2016-08-29 04:42:45 +02:00
|
|
|
} elseif ( is_scalar( $value ) ) {
|
2016-07-27 17:32:27 +02:00
|
|
|
$cookie_jar[ $name ] = new Requests_Cookie( $name, $value );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $cookie_jar;
|
|
|
|
}
|
|
|
|
|
2016-05-13 06:42:28 +02:00
|
|
|
/**
|
|
|
|
* Match redirect behaviour to browser handling.
|
|
|
|
*
|
|
|
|
* Changes 302 redirects from POST to GET to match browser handling. Per
|
|
|
|
* RFC 7231, user agents can deviate from the strict reading of the
|
|
|
|
* specification for compatibility purposes.
|
|
|
|
*
|
2016-07-27 17:32:27 +02:00
|
|
|
* @since 4.6.0
|
|
|
|
*
|
|
|
|
* @param string $location URL to redirect to.
|
|
|
|
* @param array $headers Headers for the redirect.
|
2017-10-18 18:38:48 +02:00
|
|
|
* @param string|array $data Body to send with the request.
|
2016-07-27 17:32:27 +02:00
|
|
|
* @param array $options Redirect request options.
|
2016-05-13 06:42:28 +02:00
|
|
|
* @param Requests_Response $original Response object.
|
|
|
|
*/
|
|
|
|
public static function browser_redirect_compatibility( $location, $headers, $data, &$options, $original ) {
|
2019-11-10 02:18:02 +01:00
|
|
|
// Browser compatibility.
|
2020-02-09 17:55:09 +01:00
|
|
|
if ( 302 === $original->status_code ) {
|
2016-05-13 06:42:28 +02:00
|
|
|
$options['type'] = Requests::GET;
|
2013-08-17 03:20:09 +02:00
|
|
|
}
|
2011-03-24 03:16:13 +01:00
|
|
|
}
|
|
|
|
|
2017-05-16 10:38:42 +02:00
|
|
|
/**
|
|
|
|
* Validate redirected URLs.
|
|
|
|
*
|
|
|
|
* @since 4.7.5
|
|
|
|
*
|
2019-11-10 02:18:02 +01:00
|
|
|
* @throws Requests_Exception On unsuccessful URL validation.
|
2017-05-16 10:38:42 +02:00
|
|
|
* @param string $location URL to redirect to.
|
|
|
|
*/
|
|
|
|
public static function validate_redirects( $location ) {
|
|
|
|
if ( ! wp_http_validate_url( $location ) ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
throw new Requests_Exception( __( 'A valid URL was not provided.' ), 'wp_http.redirect_failed_validation' );
|
2017-05-16 10:38:42 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-05-13 11:56:59 +02:00
|
|
|
/**
|
2011-05-14 11:50:20 +02:00
|
|
|
* Tests which transports are capable of supporting the request.
|
2011-06-11 01:01:45 +02:00
|
|
|
*
|
2011-05-13 11:56:59 +02:00
|
|
|
* @since 3.2.0
|
|
|
|
*
|
2019-11-10 02:18:02 +01:00
|
|
|
* @param array $args Request arguments.
|
|
|
|
* @param string $url URL to Request.
|
2011-05-13 11:56:59 +02:00
|
|
|
*
|
2019-11-10 02:18:02 +01:00
|
|
|
* @return string|false Class name for the first transport that claims to support the request.
|
|
|
|
* False if no transport claims to support the request.
|
2011-05-13 11:56:59 +02:00
|
|
|
*/
|
|
|
|
public function _get_first_available_transport( $args, $url = null ) {
|
2015-09-15 10:12:25 +02:00
|
|
|
$transports = array( 'curl', 'streams' );
|
2016-01-20 19:46:26 +01:00
|
|
|
|
2014-01-28 09:25:11 +01:00
|
|
|
/**
|
2016-05-22 20:43:27 +02:00
|
|
|
* Filters which HTTP transports are available and in what order.
|
2014-01-28 09:25:11 +01:00
|
|
|
*
|
|
|
|
* @since 3.7.0
|
|
|
|
*
|
2019-10-26 23:09:04 +02:00
|
|
|
* @param string[] $transports Array of HTTP transports to check. Default array contains
|
|
|
|
* 'curl' and 'streams', in that order.
|
|
|
|
* @param array $args HTTP request arguments.
|
|
|
|
* @param string $url The URL to request.
|
2014-01-28 09:25:11 +01:00
|
|
|
*/
|
2015-09-14 19:37:25 +02:00
|
|
|
$request_order = apply_filters( 'http_api_transports', $transports, $args, $url );
|
2011-05-13 11:56:59 +02:00
|
|
|
|
2014-07-18 23:47:15 +02:00
|
|
|
// Loop over each transport on each HTTP request looking for one which will serve this request's needs.
|
2011-05-13 11:56:59 +02:00
|
|
|
foreach ( $request_order as $transport ) {
|
2020-04-05 05:02:11 +02:00
|
|
|
if ( in_array( $transport, $transports, true ) ) {
|
2015-09-14 19:37:25 +02:00
|
|
|
$transport = ucfirst( $transport );
|
|
|
|
}
|
|
|
|
$class = 'WP_Http_' . $transport;
|
2011-05-13 11:56:59 +02:00
|
|
|
|
2014-07-18 23:47:15 +02:00
|
|
|
// Check to see if this transport is a possibility, calls the transport statically.
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! call_user_func( array( $class, 'test' ), $args, $url ) ) {
|
2011-05-13 11:56:59 +02:00
|
|
|
continue;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2011-05-13 11:56:59 +02:00
|
|
|
|
|
|
|
return $class;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2011-03-24 03:16:13 +01:00
|
|
|
/**
|
|
|
|
* Dispatches a HTTP request to a supporting transport.
|
|
|
|
*
|
2011-09-03 18:02:41 +02:00
|
|
|
* Tests each transport in order to find a transport which matches the request arguments.
|
2011-03-24 03:16:13 +01:00
|
|
|
* Also caches the transport instance to be used later.
|
|
|
|
*
|
2013-09-04 06:49:12 +02:00
|
|
|
* The order for requests is cURL, and then PHP Streams.
|
2011-03-24 03:16:13 +01:00
|
|
|
*
|
|
|
|
* @since 3.2.0
|
2018-12-20 02:59:48 +01:00
|
|
|
* @deprecated 5.1.0 Use WP_Http::request()
|
2018-02-28 04:48:30 +01:00
|
|
|
* @see WP_Http::request()
|
2015-05-29 17:43:29 +02:00
|
|
|
*
|
2020-02-22 20:12:06 +01:00
|
|
|
* @staticvar array $transports
|
|
|
|
*
|
2019-11-10 02:18:02 +01:00
|
|
|
* @param string $url URL to Request.
|
|
|
|
* @param array $args Request arguments.
|
|
|
|
* @return array|WP_Error Array containing 'headers', 'body', 'response', 'cookies', 'filename'.
|
|
|
|
* A WP_Error instance upon error.
|
2011-03-24 03:16:13 +01:00
|
|
|
*/
|
2011-05-13 11:56:59 +02:00
|
|
|
private function _dispatch_request( $url, $args ) {
|
2011-03-28 11:55:15 +02:00
|
|
|
static $transports = array();
|
2011-03-24 03:16:13 +01:00
|
|
|
|
2011-05-13 11:56:59 +02:00
|
|
|
$class = $this->_get_first_available_transport( $args, $url );
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! $class ) {
|
2011-05-13 11:56:59 +02:00
|
|
|
return new WP_Error( 'http_failure', __( 'There are no HTTP transports available which can complete the requested request.' ) );
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2011-03-24 03:16:13 +01:00
|
|
|
|
2011-05-14 11:50:20 +02:00
|
|
|
// Transport claims to support request, instantiate it and give it a whirl.
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( empty( $transports[ $class ] ) ) {
|
|
|
|
$transports[ $class ] = new $class;
|
|
|
|
}
|
2011-03-24 03:16:13 +01:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
$response = $transports[ $class ]->request( $url, $args );
|
2011-03-24 03:16:13 +01:00
|
|
|
|
2016-07-13 12:23:43 +02:00
|
|
|
/** This action is documented in wp-includes/class-http.php */
|
2011-09-29 03:42:09 +02:00
|
|
|
do_action( 'http_api_debug', $response, 'response', $class, $args, $url );
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( is_wp_error( $response ) ) {
|
2011-05-13 11:56:59 +02:00
|
|
|
return $response;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2018-02-28 04:48:30 +01:00
|
|
|
/** This filter is documented in wp-includes/class-http.php */
|
2011-05-13 11:56:59 +02:00
|
|
|
return apply_filters( 'http_response', $response, $args, $url );
|
2010-02-27 04:37:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Uses the POST HTTP method.
|
|
|
|
*
|
|
|
|
* Used for sending data that is expected to be in the body.
|
|
|
|
*
|
|
|
|
* @since 2.7.0
|
|
|
|
*
|
2014-07-18 20:15:15 +02:00
|
|
|
* @param string $url The request URL.
|
2014-01-28 09:25:11 +01:00
|
|
|
* @param string|array $args Optional. Override the defaults.
|
2019-11-10 02:18:02 +01:00
|
|
|
* @return array|WP_Error Array containing 'headers', 'body', 'response', 'cookies', 'filename'.
|
|
|
|
* A WP_Error instance upon error.
|
2010-02-27 04:37:38 +01:00
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
public function post( $url, $args = array() ) {
|
2019-07-25 02:48:58 +02:00
|
|
|
$defaults = array( 'method' => 'POST' );
|
|
|
|
$parsed_args = wp_parse_args( $args, $defaults );
|
|
|
|
return $this->request( $url, $parsed_args );
|
2010-02-27 04:37:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Uses the GET HTTP method.
|
|
|
|
*
|
|
|
|
* Used for sending data that is expected to be in the body.
|
|
|
|
*
|
|
|
|
* @since 2.7.0
|
|
|
|
*
|
2014-07-18 20:15:15 +02:00
|
|
|
* @param string $url The request URL.
|
|
|
|
* @param string|array $args Optional. Override the defaults.
|
2019-11-10 02:18:02 +01:00
|
|
|
* @return array|WP_Error Array containing 'headers', 'body', 'response', 'cookies', 'filename'.
|
|
|
|
* A WP_Error instance upon error.
|
2010-02-27 04:37:38 +01:00
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
public function get( $url, $args = array() ) {
|
2019-07-25 02:48:58 +02:00
|
|
|
$defaults = array( 'method' => 'GET' );
|
|
|
|
$parsed_args = wp_parse_args( $args, $defaults );
|
|
|
|
return $this->request( $url, $parsed_args );
|
2010-02-27 04:37:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Uses the HEAD HTTP method.
|
|
|
|
*
|
|
|
|
* Used for sending data that is expected to be in the body.
|
|
|
|
*
|
|
|
|
* @since 2.7.0
|
|
|
|
*
|
2014-07-18 20:15:15 +02:00
|
|
|
* @param string $url The request URL.
|
|
|
|
* @param string|array $args Optional. Override the defaults.
|
2019-11-10 02:18:02 +01:00
|
|
|
* @return array|WP_Error Array containing 'headers', 'body', 'response', 'cookies', 'filename'.
|
|
|
|
* A WP_Error instance upon error.
|
2010-02-27 04:37:38 +01:00
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
public function head( $url, $args = array() ) {
|
2019-07-25 02:48:58 +02:00
|
|
|
$defaults = array( 'method' => 'HEAD' );
|
|
|
|
$parsed_args = wp_parse_args( $args, $defaults );
|
|
|
|
return $this->request( $url, $parsed_args );
|
2010-02-27 04:37:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Parses the responses and splits the parts into headers and body.
|
|
|
|
*
|
|
|
|
* @since 2.7.0
|
|
|
|
*
|
2019-11-10 02:18:02 +01:00
|
|
|
* @param string $strResponse The full response string.
|
2020-02-02 04:27:05 +01:00
|
|
|
* @return array {
|
|
|
|
* Array with response headers and body.
|
|
|
|
*
|
|
|
|
* @type string $headers HTTP response headers.
|
|
|
|
* @type string $body HTTP response body.
|
|
|
|
* }
|
2010-02-27 04:37:38 +01:00
|
|
|
*/
|
2019-07-01 10:01:57 +02:00
|
|
|
public static function processResponse( $strResponse ) { // phpcs:ignore WordPress.NamingConventions.ValidFunctionName.MethodNameInvalid
|
2017-12-01 00:11:00 +01:00
|
|
|
$res = explode( "\r\n\r\n", $strResponse, 2 );
|
2010-05-03 22:26:11 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
return array(
|
|
|
|
'headers' => $res[0],
|
|
|
|
'body' => isset( $res[1] ) ? $res[1] : '',
|
|
|
|
);
|
2010-02-27 04:37:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Transform header string into an array.
|
|
|
|
*
|
2019-11-10 02:18:02 +01:00
|
|
|
* If an array is given, then it is assumed to be raw header data with numeric keys with the
|
2010-02-27 04:37:38 +01:00
|
|
|
* headers as the values. No headers must be passed that were already processed.
|
|
|
|
*
|
|
|
|
* @since 2.7.0
|
|
|
|
*
|
|
|
|
* @param string|array $headers
|
2019-11-10 02:18:02 +01:00
|
|
|
* @param string $url The URL that was requested.
|
2010-02-27 04:37:38 +01:00
|
|
|
* @return array Processed string headers. If duplicate headers are encountered,
|
2019-11-10 02:18:02 +01:00
|
|
|
* then a numbered array is returned as the value of that header-key.
|
2010-02-27 04:37:38 +01:00
|
|
|
*/
|
2019-07-01 10:01:57 +02:00
|
|
|
public static function processHeaders( $headers, $url = '' ) { // phpcs:ignore WordPress.NamingConventions.ValidFunctionName.MethodNameInvalid
|
2014-07-18 23:47:15 +02:00
|
|
|
// Split headers, one per array element.
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( is_string( $headers ) ) {
|
2014-07-18 23:47:15 +02:00
|
|
|
// Tolerate line terminator: CRLF = LF (RFC 2616 19.3).
|
2017-12-01 00:11:00 +01:00
|
|
|
$headers = str_replace( "\r\n", "\n", $headers );
|
2014-07-18 23:47:15 +02:00
|
|
|
/*
|
|
|
|
* Unfold folded header fields. LWS = [CRLF] 1*( SP | HT ) <US-ASCII SP, space (32)>,
|
|
|
|
* <US-ASCII HT, horizontal-tab (9)> (RFC 2616 2.2).
|
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
$headers = preg_replace( '/\n[ \t]/', ' ', $headers );
|
2014-07-18 23:47:15 +02:00
|
|
|
// Create the headers array.
|
2017-12-01 00:11:00 +01:00
|
|
|
$headers = explode( "\n", $headers );
|
2010-02-27 04:37:38 +01:00
|
|
|
}
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
$response = array(
|
|
|
|
'code' => 0,
|
|
|
|
'message' => '',
|
|
|
|
);
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2014-07-18 23:47:15 +02:00
|
|
|
/*
|
|
|
|
* If a redirection has taken place, The headers for each page request may have been passed.
|
|
|
|
* In this case, determine the final HTTP header and parse from there.
|
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
for ( $i = count( $headers ) - 1; $i >= 0; $i-- ) {
|
|
|
|
if ( ! empty( $headers[ $i ] ) && false === strpos( $headers[ $i ], ':' ) ) {
|
|
|
|
$headers = array_splice( $headers, $i );
|
2010-02-27 04:37:38 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
$cookies = array();
|
2010-02-27 04:37:38 +01:00
|
|
|
$newheaders = array();
|
2011-03-26 04:32:05 +01:00
|
|
|
foreach ( (array) $headers as $tempheader ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( empty( $tempheader ) ) {
|
2010-02-27 04:37:38 +01:00
|
|
|
continue;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( false === strpos( $tempheader, ':' ) ) {
|
|
|
|
$stack = explode( ' ', $tempheader, 3 );
|
2011-04-05 08:21:56 +02:00
|
|
|
$stack[] = '';
|
|
|
|
list( , $response['code'], $response['message']) = $stack;
|
2010-02-27 04:37:38 +01:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
list($key, $value) = explode( ':', $tempheader, 2 );
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
$key = strtolower( $key );
|
2012-07-08 07:16:26 +02:00
|
|
|
$value = trim( $value );
|
|
|
|
|
|
|
|
if ( isset( $newheaders[ $key ] ) ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! is_array( $newheaders[ $key ] ) ) {
|
|
|
|
$newheaders[ $key ] = array( $newheaders[ $key ] );
|
|
|
|
}
|
2012-07-08 07:16:26 +02:00
|
|
|
$newheaders[ $key ][] = $value;
|
|
|
|
} else {
|
|
|
|
$newheaders[ $key ] = $value;
|
2010-02-27 04:37:38 +01:00
|
|
|
}
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( 'set-cookie' == $key ) {
|
2013-08-17 02:34:10 +02:00
|
|
|
$cookies[] = new WP_Http_Cookie( $value, $url );
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2010-02-27 04:37:38 +01:00
|
|
|
}
|
|
|
|
|
2019-11-10 02:18:02 +01:00
|
|
|
// Cast the Response Code to an int.
|
2014-10-08 07:21:19 +02:00
|
|
|
$response['code'] = intval( $response['code'] );
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
return array(
|
|
|
|
'response' => $response,
|
|
|
|
'headers' => $newheaders,
|
|
|
|
'cookies' => $cookies,
|
|
|
|
);
|
2010-02-27 04:37:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Takes the arguments for a ::request() and checks for the cookie array.
|
|
|
|
*
|
2013-08-08 04:44:09 +02:00
|
|
|
* If it's found, then it upgrades any basic name => value pairs to WP_Http_Cookie instances,
|
|
|
|
* which are each parsed into strings and added to the Cookie: header (within the arguments array).
|
|
|
|
* Edits the array by reference.
|
2010-02-27 04:37:38 +01:00
|
|
|
*
|
2017-07-20 15:15:43 +02:00
|
|
|
* @since 2.8.0
|
2010-02-27 04:37:38 +01:00
|
|
|
*
|
|
|
|
* @param array $r Full array of args passed into ::request()
|
|
|
|
*/
|
2019-07-01 10:01:57 +02:00
|
|
|
public static function buildCookieHeader( &$r ) { // phpcs:ignore WordPress.NamingConventions.ValidFunctionName.MethodNameInvalid
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! empty( $r['cookies'] ) ) {
|
2014-07-18 23:47:15 +02:00
|
|
|
// Upgrade any name => value cookie pairs to WP_HTTP_Cookie instances.
|
2013-08-08 04:44:09 +02:00
|
|
|
foreach ( $r['cookies'] as $name => $value ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! is_object( $value ) ) {
|
|
|
|
$r['cookies'][ $name ] = new WP_Http_Cookie(
|
|
|
|
array(
|
|
|
|
'name' => $name,
|
|
|
|
'value' => $value,
|
|
|
|
)
|
|
|
|
);
|
|
|
|
}
|
2013-08-08 04:44:09 +02:00
|
|
|
}
|
|
|
|
|
2010-02-27 04:37:38 +01:00
|
|
|
$cookies_header = '';
|
|
|
|
foreach ( (array) $r['cookies'] as $cookie ) {
|
|
|
|
$cookies_header .= $cookie->getHeaderValue() . '; ';
|
|
|
|
}
|
2013-08-08 04:44:09 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
$cookies_header = substr( $cookies_header, 0, -2 );
|
2010-02-27 04:37:38 +01:00
|
|
|
$r['headers']['cookie'] = $cookies_header;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Decodes chunk transfer-encoding, based off the HTTP 1.1 specification.
|
|
|
|
*
|
2013-08-28 08:53:09 +02:00
|
|
|
* Based off the HTTP http_encoding_dechunk function.
|
2010-02-27 04:37:38 +01:00
|
|
|
*
|
2016-06-10 06:50:33 +02:00
|
|
|
* @link https://tools.ietf.org/html/rfc2616#section-19.4.6 Process for chunked decoding.
|
2012-07-08 07:34:47 +02:00
|
|
|
*
|
2010-02-27 04:37:38 +01:00
|
|
|
* @since 2.7.0
|
|
|
|
*
|
2019-11-10 02:18:02 +01:00
|
|
|
* @param string $body Body content.
|
2010-02-27 04:37:38 +01:00
|
|
|
* @return string Chunked decoded body on success or raw body on failure.
|
|
|
|
*/
|
2019-07-01 10:01:57 +02:00
|
|
|
public static function chunkTransferDecode( $body ) { // phpcs:ignore WordPress.NamingConventions.ValidFunctionName.MethodNameInvalid
|
2013-08-28 08:53:09 +02:00
|
|
|
// The body is not chunked encoded or is malformed.
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! preg_match( '/^([0-9a-f]+)[^\r\n]*\r\n/i', trim( $body ) ) ) {
|
2010-02-27 04:37:38 +01:00
|
|
|
return $body;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2013-08-28 08:53:09 +02:00
|
|
|
$parsed_body = '';
|
2014-07-18 23:47:15 +02:00
|
|
|
|
|
|
|
// We'll be altering $body, so need a backup in case of error.
|
|
|
|
$body_original = $body;
|
2010-02-27 04:37:38 +01:00
|
|
|
|
|
|
|
while ( true ) {
|
2013-08-28 09:30:08 +02:00
|
|
|
$has_chunk = (bool) preg_match( '/^([0-9a-f]+)[^\r\n]*\r\n/i', $body, $match );
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! $has_chunk || empty( $match[1] ) ) {
|
2013-08-28 08:53:09 +02:00
|
|
|
return $body_original;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
$length = hexdec( $match[1] );
|
2013-08-28 08:53:09 +02:00
|
|
|
$chunk_length = strlen( $match[0] );
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2014-07-18 23:47:15 +02:00
|
|
|
// Parse out the chunk of data.
|
2013-08-28 08:53:09 +02:00
|
|
|
$parsed_body .= substr( $body, $chunk_length, $length );
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2014-07-18 23:47:15 +02:00
|
|
|
// Remove the chunk from the raw data.
|
2013-08-28 08:53:09 +02:00
|
|
|
$body = substr( $body, $length + $chunk_length );
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2014-07-18 23:47:15 +02:00
|
|
|
// End of the document.
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( '0' === trim( $body ) ) {
|
2013-08-28 08:53:09 +02:00
|
|
|
return $parsed_body;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2010-02-27 04:37:38 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2019-10-12 20:05:04 +02:00
|
|
|
* Determines whether an HTTP API request to the given URL should be blocked.
|
2010-02-27 04:37:38 +01:00
|
|
|
*
|
|
|
|
* Those who are behind a proxy and want to prevent access to certain hosts may do so. This will
|
2019-10-12 20:05:04 +02:00
|
|
|
* prevent plugins from working and core functionality, if you don't include `api.wordpress.org`.
|
2010-02-27 04:37:38 +01:00
|
|
|
*
|
2019-10-12 20:05:04 +02:00
|
|
|
* You block external URL requests by defining `WP_HTTP_BLOCK_EXTERNAL` as true in your `wp-config.php`
|
2016-01-28 04:35:27 +01:00
|
|
|
* file and this will only allow localhost and your site to make requests. The constant
|
2019-10-12 20:05:04 +02:00
|
|
|
* `WP_ACCESSIBLE_HOSTS` will allow additional hosts to go through for requests. The format of the
|
|
|
|
* `WP_ACCESSIBLE_HOSTS` constant is a comma separated list of hostnames to allow, wildcard domains
|
|
|
|
* are supported, eg `*.wordpress.org` will allow for all subdomains of `wordpress.org` to be contacted.
|
2010-02-27 04:37:38 +01:00
|
|
|
*
|
|
|
|
* @since 2.8.0
|
2014-09-29 15:28:16 +02:00
|
|
|
* @link https://core.trac.wordpress.org/ticket/8927 Allow preventing external requests.
|
|
|
|
* @link https://core.trac.wordpress.org/ticket/14636 Allow wildcard domains in WP_ACCESSIBLE_HOSTS
|
2010-02-27 04:37:38 +01:00
|
|
|
*
|
2015-05-29 17:43:29 +02:00
|
|
|
* @staticvar array|null $accessible_hosts
|
|
|
|
* @staticvar array $wildcard_regex
|
|
|
|
*
|
2010-02-27 04:37:38 +01:00
|
|
|
* @param string $uri URI of url.
|
|
|
|
* @return bool True to block, false to allow.
|
|
|
|
*/
|
2017-12-01 00:11:00 +01:00
|
|
|
public function block_request( $uri ) {
|
2010-02-27 04:37:38 +01:00
|
|
|
// We don't need to block requests, because nothing is blocked.
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! defined( 'WP_HTTP_BLOCK_EXTERNAL' ) || ! WP_HTTP_BLOCK_EXTERNAL ) {
|
2010-02-27 04:37:38 +01:00
|
|
|
return false;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
$check = parse_url( $uri );
|
|
|
|
if ( ! $check ) {
|
2013-09-03 10:37:10 +02:00
|
|
|
return true;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
$home = parse_url( get_option( 'siteurl' ) );
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2014-07-18 23:47:15 +02:00
|
|
|
// Don't block requests back to ourselves by default.
|
2014-09-02 04:06:17 +02:00
|
|
|
if ( 'localhost' == $check['host'] || ( isset( $home['host'] ) && $home['host'] == $check['host'] ) ) {
|
2014-01-28 09:25:11 +01:00
|
|
|
/**
|
2019-10-12 20:05:04 +02:00
|
|
|
* Filters whether to block local HTTP API requests.
|
|
|
|
*
|
|
|
|
* A local request is one to `localhost` or to the same host as the site itself.
|
2014-01-28 09:25:11 +01:00
|
|
|
*
|
|
|
|
* @since 2.8.0
|
|
|
|
*
|
2019-10-12 20:05:04 +02:00
|
|
|
* @param bool $block Whether to block local requests. Default false.
|
2014-01-28 09:25:11 +01:00
|
|
|
*/
|
|
|
|
return apply_filters( 'block_local_requests', false );
|
|
|
|
}
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! defined( 'WP_ACCESSIBLE_HOSTS' ) ) {
|
2010-02-27 04:37:38 +01:00
|
|
|
return true;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2015-05-29 17:43:29 +02:00
|
|
|
static $accessible_hosts = null;
|
2017-12-01 00:11:00 +01:00
|
|
|
static $wildcard_regex = array();
|
2015-05-29 17:43:29 +02:00
|
|
|
if ( null === $accessible_hosts ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
$accessible_hosts = preg_split( '|,\s*|', WP_ACCESSIBLE_HOSTS );
|
2010-02-27 04:37:38 +01:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( false !== strpos( WP_ACCESSIBLE_HOSTS, '*' ) ) {
|
2010-10-22 12:27:35 +02:00
|
|
|
$wildcard_regex = array();
|
2017-12-01 00:11:00 +01:00
|
|
|
foreach ( $accessible_hosts as $host ) {
|
2013-08-28 06:54:09 +02:00
|
|
|
$wildcard_regex[] = str_replace( '\*', '.+', preg_quote( $host, '/' ) );
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
|
|
|
$wildcard_regex = '/^(' . implode( '|', $wildcard_regex ) . ')$/i';
|
2010-10-22 12:27:35 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! empty( $wildcard_regex ) ) {
|
|
|
|
return ! preg_match( $wildcard_regex, $check['host'] );
|
|
|
|
} else {
|
2020-04-05 05:02:11 +02:00
|
|
|
return ! in_array( $check['host'], $accessible_hosts, true ); // Inverse logic, if it's in the array, then don't block it.
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2010-10-22 12:27:35 +02:00
|
|
|
|
2010-02-27 04:37:38 +01:00
|
|
|
}
|
2012-05-10 23:32:02 +02:00
|
|
|
|
2014-10-09 03:11:18 +02:00
|
|
|
/**
|
2015-10-23 17:43:24 +02:00
|
|
|
* Used as a wrapper for PHP's parse_url() function that handles edgecases in < PHP 5.4.7.
|
2014-10-09 03:11:18 +02:00
|
|
|
*
|
2015-10-23 17:43:24 +02:00
|
|
|
* @deprecated 4.4.0 Use wp_parse_url()
|
|
|
|
* @see wp_parse_url()
|
2014-11-28 10:14:23 +01:00
|
|
|
*
|
|
|
|
* @param string $url The URL to parse.
|
|
|
|
* @return bool|array False on failure; Array of URL components on success;
|
|
|
|
* See parse_url()'s return values.
|
2014-10-09 03:11:18 +02:00
|
|
|
*/
|
2014-10-09 05:01:18 +02:00
|
|
|
protected static function parse_url( $url ) {
|
2015-10-23 07:54:25 +02:00
|
|
|
_deprecated_function( __METHOD__, '4.4.0', 'wp_parse_url()' );
|
|
|
|
return wp_parse_url( $url );
|
2014-10-09 03:11:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Converts a relative URL to an absolute URL relative to a given URL.
|
|
|
|
*
|
|
|
|
* If an Absolute URL is provided, no processing of that URL is done.
|
|
|
|
*
|
|
|
|
* @since 3.4.0
|
|
|
|
*
|
2019-11-10 02:18:02 +01:00
|
|
|
* @param string $maybe_relative_path The URL which might be relative.
|
|
|
|
* @param string $url The URL which $maybe_relative_path is relative to.
|
2014-10-09 03:11:18 +02:00
|
|
|
* @return string An Absolute URL, in a failure condition where the URL cannot be parsed, the relative URL will be returned.
|
|
|
|
*/
|
2014-05-19 07:34:15 +02:00
|
|
|
public static function make_absolute_url( $maybe_relative_path, $url ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( empty( $url ) ) {
|
2012-05-10 23:32:02 +02:00
|
|
|
return $maybe_relative_path;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2012-05-10 23:32:02 +02:00
|
|
|
|
2019-07-03 01:42:58 +02:00
|
|
|
$url_parts = wp_parse_url( $url );
|
|
|
|
if ( ! $url_parts ) {
|
2012-05-10 23:32:02 +02:00
|
|
|
return $maybe_relative_path;
|
2014-10-09 03:11:18 +02:00
|
|
|
}
|
2012-05-10 23:32:02 +02:00
|
|
|
|
2019-07-03 01:42:58 +02:00
|
|
|
$relative_url_parts = wp_parse_url( $maybe_relative_path );
|
|
|
|
if ( ! $relative_url_parts ) {
|
2012-05-10 23:32:02 +02:00
|
|
|
return $maybe_relative_path;
|
2014-10-09 03:11:18 +02:00
|
|
|
}
|
2012-05-10 23:32:02 +02:00
|
|
|
|
2020-01-29 01:45:18 +01:00
|
|
|
// Check for a scheme on the 'relative' URL.
|
2014-10-08 07:38:18 +02:00
|
|
|
if ( ! empty( $relative_url_parts['scheme'] ) ) {
|
|
|
|
return $maybe_relative_path;
|
|
|
|
}
|
|
|
|
|
2014-10-08 07:58:19 +02:00
|
|
|
$absolute_path = $url_parts['scheme'] . '://';
|
|
|
|
|
2020-01-29 01:45:18 +01:00
|
|
|
// Schemeless URLs will make it this far, so we check for a host in the relative URL
|
|
|
|
// and convert it to a protocol-URL.
|
2014-10-08 07:58:19 +02:00
|
|
|
if ( isset( $relative_url_parts['host'] ) ) {
|
|
|
|
$absolute_path .= $relative_url_parts['host'];
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( isset( $relative_url_parts['port'] ) ) {
|
2014-10-08 07:58:19 +02:00
|
|
|
$absolute_path .= ':' . $relative_url_parts['port'];
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2014-10-08 07:58:19 +02:00
|
|
|
} else {
|
|
|
|
$absolute_path .= $url_parts['host'];
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( isset( $url_parts['port'] ) ) {
|
2014-10-08 07:58:19 +02:00
|
|
|
$absolute_path .= ':' . $url_parts['port'];
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2014-10-08 07:58:19 +02:00
|
|
|
}
|
2012-05-10 23:32:02 +02:00
|
|
|
|
2020-01-29 01:45:18 +01:00
|
|
|
// Start off with the absolute URL path.
|
2012-05-10 23:32:02 +02:00
|
|
|
$path = ! empty( $url_parts['path'] ) ? $url_parts['path'] : '/';
|
|
|
|
|
2014-07-18 23:47:15 +02:00
|
|
|
// If it's a root-relative path, then great.
|
2012-05-10 23:32:02 +02:00
|
|
|
if ( ! empty( $relative_url_parts['path'] ) && '/' == $relative_url_parts['path'][0] ) {
|
|
|
|
$path = $relative_url_parts['path'];
|
|
|
|
|
2019-11-10 02:45:02 +01:00
|
|
|
// Else it's a relative path.
|
2012-05-10 23:32:02 +02:00
|
|
|
} elseif ( ! empty( $relative_url_parts['path'] ) ) {
|
2014-07-18 23:47:15 +02:00
|
|
|
// Strip off any file components from the absolute path.
|
2012-05-10 23:32:02 +02:00
|
|
|
$path = substr( $path, 0, strrpos( $path, '/' ) + 1 );
|
|
|
|
|
2014-07-18 23:47:15 +02:00
|
|
|
// Build the new path.
|
2012-05-10 23:32:02 +02:00
|
|
|
$path .= $relative_url_parts['path'];
|
|
|
|
|
2014-07-18 23:47:15 +02:00
|
|
|
// Strip all /path/../ out of the path.
|
2012-05-10 23:32:02 +02:00
|
|
|
while ( strpos( $path, '../' ) > 1 ) {
|
|
|
|
$path = preg_replace( '![^/]+/\.\./!', '', $path );
|
|
|
|
}
|
|
|
|
|
2014-07-18 23:47:15 +02:00
|
|
|
// Strip any final leading ../ from the path.
|
2012-05-10 23:32:02 +02:00
|
|
|
$path = preg_replace( '!^/(\.\./)+!', '', $path );
|
|
|
|
}
|
|
|
|
|
2020-01-29 01:45:18 +01:00
|
|
|
// Add the query string.
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! empty( $relative_url_parts['query'] ) ) {
|
2012-05-10 23:32:02 +02:00
|
|
|
$path .= '?' . $relative_url_parts['query'];
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2012-05-10 23:32:02 +02:00
|
|
|
|
|
|
|
return $absolute_path . '/' . ltrim( $path, '/' );
|
|
|
|
}
|
2013-07-29 03:19:54 +02:00
|
|
|
|
|
|
|
/**
|
2019-10-07 21:08:06 +02:00
|
|
|
* Handles an HTTP redirect and follows it if appropriate.
|
2013-07-29 03:19:54 +02:00
|
|
|
*
|
2013-07-30 08:47:03 +02:00
|
|
|
* @since 3.7.0
|
2015-05-29 17:43:29 +02:00
|
|
|
*
|
2019-10-12 20:05:04 +02:00
|
|
|
* @param string $url The URL which was requested.
|
|
|
|
* @param array $args The arguments which were used to make the request.
|
|
|
|
* @param array $response The response of the HTTP request.
|
2020-01-11 19:32:05 +01:00
|
|
|
* @return array|false|WP_Error An HTTP API response array if the redirect is successfully followed,
|
|
|
|
* false if no redirect is present, or a WP_Error object if there's an error.
|
2013-07-29 03:19:54 +02:00
|
|
|
*/
|
2014-05-19 07:34:15 +02:00
|
|
|
public static function handle_redirects( $url, $args, $response ) {
|
2013-07-29 03:19:54 +02:00
|
|
|
// If no redirects are present, or, redirects were not requested, perform no action.
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( ! isset( $response['headers']['location'] ) || 0 === $args['_redirection'] ) {
|
2013-07-29 03:19:54 +02:00
|
|
|
return false;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2013-07-29 03:19:54 +02:00
|
|
|
|
2014-07-18 23:47:15 +02:00
|
|
|
// Only perform redirections on redirection http codes.
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( $response['response']['code'] > 399 || $response['response']['code'] < 300 ) {
|
2013-07-29 03:19:54 +02:00
|
|
|
return false;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2013-07-29 03:19:54 +02:00
|
|
|
|
2014-07-18 23:47:15 +02:00
|
|
|
// Don't redirect if we've run out of redirects.
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( $args['redirection']-- <= 0 ) {
|
|
|
|
return new WP_Error( 'http_request_failed', __( 'Too many redirects.' ) );
|
|
|
|
}
|
2013-07-29 03:19:54 +02:00
|
|
|
|
2013-07-29 04:11:46 +02:00
|
|
|
$redirect_location = $response['headers']['location'];
|
|
|
|
|
2014-07-18 23:47:15 +02:00
|
|
|
// If there were multiple Location headers, use the last header specified.
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( is_array( $redirect_location ) ) {
|
2013-07-29 04:11:46 +02:00
|
|
|
$redirect_location = array_pop( $redirect_location );
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2013-07-29 04:11:46 +02:00
|
|
|
|
2015-09-14 19:37:25 +02:00
|
|
|
$redirect_location = WP_Http::make_absolute_url( $redirect_location, $url );
|
2013-07-29 03:19:54 +02:00
|
|
|
|
2014-07-18 23:47:15 +02:00
|
|
|
// POST requests should not POST to a redirected location.
|
2013-07-29 03:19:54 +02:00
|
|
|
if ( 'POST' == $args['method'] ) {
|
2020-04-09 17:43:10 +02:00
|
|
|
if ( in_array( $response['response']['code'], array( 302, 303 ), true ) ) {
|
2013-07-29 03:19:54 +02:00
|
|
|
$args['method'] = 'GET';
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2013-07-29 03:19:54 +02:00
|
|
|
}
|
|
|
|
|
2014-07-18 23:47:15 +02:00
|
|
|
// Include valid cookies in the redirect process.
|
2013-08-17 03:20:09 +02:00
|
|
|
if ( ! empty( $response['cookies'] ) ) {
|
2013-08-24 05:11:10 +02:00
|
|
|
foreach ( $response['cookies'] as $cookie ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( $cookie->test( $redirect_location ) ) {
|
2013-08-24 05:11:10 +02:00
|
|
|
$args['cookies'][] = $cookie;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2013-08-17 03:20:09 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-25 04:29:52 +02:00
|
|
|
return wp_remote_request( $redirect_location, $args );
|
2013-07-29 03:19:54 +02:00
|
|
|
}
|
2013-09-04 06:49:12 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Determines if a specified string represents an IP address or not.
|
|
|
|
*
|
|
|
|
* This function also detects the type of the IP address, returning either
|
|
|
|
* '4' or '6' to represent a IPv4 and IPv6 address respectively.
|
|
|
|
* This does not verify if the IP is a valid IP, only that it appears to be
|
|
|
|
* an IP address.
|
|
|
|
*
|
2019-11-10 02:18:02 +01:00
|
|
|
* @link http://home.deds.nl/~aeron/regex/ for IPv6 regex.
|
2013-09-04 06:49:12 +02:00
|
|
|
*
|
|
|
|
* @since 3.7.0
|
|
|
|
*
|
2019-11-10 02:18:02 +01:00
|
|
|
* @param string $maybe_ip A suspected IP address.
|
2013-09-04 06:49:12 +02:00
|
|
|
* @return integer|bool Upon success, '4' or '6' to represent a IPv4 or IPv6 address, false upon failure
|
|
|
|
*/
|
2014-05-19 07:34:15 +02:00
|
|
|
public static function is_ip_address( $maybe_ip ) {
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( preg_match( '/^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$/', $maybe_ip ) ) {
|
2013-09-04 06:49:12 +02:00
|
|
|
return 4;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2013-09-04 06:49:12 +02:00
|
|
|
|
2017-12-01 00:11:00 +01:00
|
|
|
if ( false !== strpos( $maybe_ip, ':' ) && preg_match( '/^(((?=.*(::))(?!.*\3.+\3))\3?|([\dA-F]{1,4}(\3|:\b|$)|\2))(?4){5}((?4){2}|(((2[0-4]|1\d|[1-9])?\d|25[0-5])\.?\b){4})$/i', trim( $maybe_ip, ' []' ) ) ) {
|
2013-09-04 06:49:12 +02:00
|
|
|
return 6;
|
2017-12-01 00:11:00 +01:00
|
|
|
}
|
2013-09-04 06:49:12 +02:00
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2010-02-27 04:37:38 +01:00
|
|
|
}
|