2011-08-02 01:51:01 +02:00
|
|
|
<?php
|
|
|
|
|
2016-04-27 16:31:03 +02:00
|
|
|
/**
|
|
|
|
* @file include/network.php
|
|
|
|
*/
|
|
|
|
|
|
|
|
require_once("include/xml.php");
|
2016-07-09 20:09:09 +02:00
|
|
|
require_once('include/Probe.php');
|
2011-08-02 01:51:01 +02:00
|
|
|
|
2016-04-27 16:31:03 +02:00
|
|
|
/**
|
|
|
|
* @brief Curl wrapper
|
|
|
|
*
|
|
|
|
* If binary flag is true, return binary results.
|
|
|
|
* Set the cookiejar argument to a string (e.g. "/tmp/friendica-cookies.txt")
|
|
|
|
* to preserve cookies from one request to the next.
|
|
|
|
*
|
|
|
|
* @param string $url URL to fetch
|
|
|
|
* @param boolean $binary default false
|
|
|
|
* TRUE if asked to return binary results (file download)
|
|
|
|
* @param integer $redirects The recursion counter for internal use - default 0
|
|
|
|
* @param integer $timeout Timeout in seconds, default system config value or 60 seconds
|
|
|
|
* @param string $accept_content supply Accept: header with 'accept_content' as the value
|
|
|
|
* @param string $cookiejar Path to cookie jar file
|
|
|
|
*
|
|
|
|
* @return string The fetched content
|
|
|
|
*/
|
2013-08-05 04:59:22 +02:00
|
|
|
function fetch_url($url,$binary = false, &$redirects = 0, $timeout = 0, $accept_content=Null, $cookiejar = 0) {
|
2011-08-02 01:51:01 +02:00
|
|
|
|
2015-05-15 20:41:10 +02:00
|
|
|
$ret = z_fetch_url(
|
2015-05-16 22:38:41 +02:00
|
|
|
$url,
|
|
|
|
$binary,
|
|
|
|
$redirects,
|
|
|
|
array('timeout'=>$timeout,
|
2015-05-15 20:41:10 +02:00
|
|
|
'accept_content'=>$accept_content,
|
|
|
|
'cookiejar'=>$cookiejar
|
|
|
|
));
|
|
|
|
|
|
|
|
return($ret['body']);
|
2016-04-27 16:31:03 +02:00
|
|
|
}
|
2015-05-15 20:41:10 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief fetches an URL.
|
|
|
|
*
|
2016-04-27 16:31:03 +02:00
|
|
|
* @param string $url URL to fetch
|
2015-05-15 20:41:10 +02:00
|
|
|
* @param boolean $binary default false
|
|
|
|
* TRUE if asked to return binary results (file download)
|
2016-04-27 16:31:03 +02:00
|
|
|
* @param int $redirects The recursion counter for internal use - default 0
|
2015-05-15 20:41:10 +02:00
|
|
|
* @param array $opts (optional parameters) assoziative array with:
|
2016-04-27 16:31:03 +02:00
|
|
|
* 'accept_content' => supply Accept: header with 'accept_content' as the value
|
|
|
|
* 'timeout' => int Timeout in seconds, default system config value or 60 seconds
|
|
|
|
* 'http_auth' => username:password
|
|
|
|
* 'novalidate' => do not validate SSL certs, default is to validate using our CA list
|
|
|
|
* 'nobody' => only return the header
|
|
|
|
* 'cookiejar' => path to cookie jar file
|
2015-05-16 22:38:41 +02:00
|
|
|
*
|
2015-05-15 20:41:10 +02:00
|
|
|
* @return array an assoziative array with:
|
2016-04-27 16:31:03 +02:00
|
|
|
* int 'return_code' => HTTP return code or 0 if timeout or failure
|
|
|
|
* boolean 'success' => boolean true (if HTTP 2xx result) or false
|
|
|
|
* string 'redirect_url' => in case of redirect, content was finally retrieved from this URL
|
|
|
|
* string 'header' => HTTP headers
|
|
|
|
* string 'body' => fetched content
|
2015-05-15 20:41:10 +02:00
|
|
|
*/
|
|
|
|
function z_fetch_url($url,$binary = false, &$redirects = 0, $opts=array()) {
|
|
|
|
|
|
|
|
$ret = array('return_code' => 0, 'success' => false, 'header' => "", 'body' => "");
|
2015-05-16 22:38:41 +02:00
|
|
|
|
2015-05-15 20:41:10 +02:00
|
|
|
|
2013-01-26 16:46:43 +01:00
|
|
|
$stamp1 = microtime(true);
|
|
|
|
|
2011-08-02 01:51:01 +02:00
|
|
|
$a = get_app();
|
|
|
|
|
2011-08-30 07:50:41 +02:00
|
|
|
$ch = @curl_init($url);
|
2013-01-26 16:46:43 +01:00
|
|
|
if(($redirects > 8) || (! $ch))
|
2011-08-02 01:51:01 +02:00
|
|
|
return false;
|
|
|
|
|
2011-08-30 07:50:41 +02:00
|
|
|
@curl_setopt($ch, CURLOPT_HEADER, true);
|
2012-07-07 20:40:15 +02:00
|
|
|
|
2015-05-15 20:41:10 +02:00
|
|
|
if(x($opts,"cookiejar")) {
|
|
|
|
curl_setopt($ch, CURLOPT_COOKIEJAR, $opts["cookiejar"]);
|
|
|
|
curl_setopt($ch, CURLOPT_COOKIEFILE, $opts["cookiejar"]);
|
2013-08-05 04:59:22 +02:00
|
|
|
}
|
2013-02-22 01:42:34 +01:00
|
|
|
|
2016-04-27 16:31:03 +02:00
|
|
|
// These settings aren't needed. We're following the location already.
|
2013-02-22 01:42:34 +01:00
|
|
|
// @curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
|
|
|
|
// @curl_setopt($ch, CURLOPT_MAXREDIRS, 5);
|
2012-12-20 04:19:02 +01:00
|
|
|
|
2015-05-15 20:41:10 +02:00
|
|
|
if (x($opts,'accept_content')){
|
2011-11-17 13:40:11 +01:00
|
|
|
curl_setopt($ch,CURLOPT_HTTPHEADER, array (
|
2015-05-15 20:41:10 +02:00
|
|
|
"Accept: " . $opts['accept_content']
|
2011-11-17 13:40:11 +01:00
|
|
|
));
|
|
|
|
}
|
2012-07-07 20:40:15 +02:00
|
|
|
|
2011-08-30 07:50:41 +02:00
|
|
|
@curl_setopt($ch, CURLOPT_RETURNTRANSFER,true);
|
2014-09-07 10:47:37 +02:00
|
|
|
@curl_setopt($ch, CURLOPT_USERAGENT, $a->get_useragent());
|
2011-08-02 01:51:01 +02:00
|
|
|
|
2011-11-17 13:40:11 +01:00
|
|
|
|
2015-05-15 20:41:10 +02:00
|
|
|
|
|
|
|
if(x($opts,'headers')){
|
|
|
|
@curl_setopt($ch, CURLOPT_HTTPHEADER, $opts['headers']);
|
|
|
|
}
|
|
|
|
if(x($opts,'nobody')){
|
|
|
|
@curl_setopt($ch, CURLOPT_NOBODY, $opts['nobody']);
|
|
|
|
}
|
2015-11-03 00:48:49 +01:00
|
|
|
if(x($opts,'timeout')){
|
|
|
|
@curl_setopt($ch, CURLOPT_TIMEOUT, $opts['timeout']);
|
|
|
|
} else {
|
2011-08-17 05:05:02 +02:00
|
|
|
$curl_time = intval(get_config('system','curl_timeout'));
|
2011-08-30 07:50:41 +02:00
|
|
|
@curl_setopt($ch, CURLOPT_TIMEOUT, (($curl_time !== false) ? $curl_time : 60));
|
2011-08-17 05:05:02 +02:00
|
|
|
}
|
2016-04-27 16:31:03 +02:00
|
|
|
|
2011-08-02 01:51:01 +02:00
|
|
|
// by default we will allow self-signed certs
|
|
|
|
// but you can override this
|
|
|
|
|
|
|
|
$check_cert = get_config('system','verifyssl');
|
2011-08-30 07:50:41 +02:00
|
|
|
@curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, (($check_cert) ? true : false));
|
2015-03-02 00:32:46 +01:00
|
|
|
@curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, (($check_cert) ? 2 : false));
|
2011-08-02 01:51:01 +02:00
|
|
|
|
|
|
|
$prx = get_config('system','proxy');
|
|
|
|
if(strlen($prx)) {
|
2011-08-30 07:50:41 +02:00
|
|
|
@curl_setopt($ch, CURLOPT_HTTPPROXYTUNNEL, 1);
|
|
|
|
@curl_setopt($ch, CURLOPT_PROXY, $prx);
|
|
|
|
$prxusr = @get_config('system','proxyuser');
|
2011-08-02 01:51:01 +02:00
|
|
|
if(strlen($prxusr))
|
2011-08-30 07:50:41 +02:00
|
|
|
@curl_setopt($ch, CURLOPT_PROXYUSERPWD, $prxusr);
|
2011-08-02 01:51:01 +02:00
|
|
|
}
|
|
|
|
if($binary)
|
2011-08-30 07:50:41 +02:00
|
|
|
@curl_setopt($ch, CURLOPT_BINARYTRANSFER,1);
|
2011-08-02 01:51:01 +02:00
|
|
|
|
|
|
|
$a->set_curl_code(0);
|
|
|
|
|
|
|
|
// don't let curl abort the entire application
|
|
|
|
// if it throws any errors.
|
|
|
|
|
|
|
|
$s = @curl_exec($ch);
|
2016-01-03 06:59:54 +01:00
|
|
|
if (curl_errno($ch) !== CURLE_OK) {
|
|
|
|
logger('fetch_url error fetching '.$url.': '.curl_error($ch), LOGGER_NORMAL);
|
|
|
|
}
|
2011-08-02 01:51:01 +02:00
|
|
|
|
|
|
|
$base = $s;
|
2011-08-30 07:50:41 +02:00
|
|
|
$curl_info = @curl_getinfo($ch);
|
2015-05-15 20:41:10 +02:00
|
|
|
|
2011-08-02 01:51:01 +02:00
|
|
|
$http_code = $curl_info['http_code'];
|
2014-08-07 08:22:32 +02:00
|
|
|
logger('fetch_url '.$url.': '.$http_code." ".$s, LOGGER_DATA);
|
2011-08-02 01:51:01 +02:00
|
|
|
$header = '';
|
|
|
|
|
|
|
|
// Pull out multiple headers, e.g. proxy and continuation headers
|
|
|
|
// allow for HTTP/2.x without fixing code
|
|
|
|
|
|
|
|
while(preg_match('/^HTTP\/[1-2].+? [1-5][0-9][0-9]/',$base)) {
|
|
|
|
$chunk = substr($base,0,strpos($base,"\r\n\r\n")+4);
|
|
|
|
$header .= $chunk;
|
|
|
|
$base = substr($base,strlen($chunk));
|
|
|
|
}
|
|
|
|
|
2016-01-25 07:41:56 +01:00
|
|
|
$a->set_curl_code($http_code);
|
|
|
|
$a->set_curl_content_type($curl_info['content_type']);
|
|
|
|
$a->set_curl_headers($header);
|
|
|
|
|
2011-08-02 01:51:01 +02:00
|
|
|
if($http_code == 301 || $http_code == 302 || $http_code == 303 || $http_code == 307) {
|
2013-01-13 18:51:48 +01:00
|
|
|
$new_location_info = @parse_url($curl_info["redirect_url"]);
|
|
|
|
$old_location_info = @parse_url($curl_info["url"]);
|
|
|
|
|
|
|
|
$newurl = $curl_info["redirect_url"];
|
|
|
|
|
|
|
|
if (($new_location_info["path"] == "") AND ($new_location_info["host"] != ""))
|
|
|
|
$newurl = $new_location_info["scheme"]."://".$new_location_info["host"].$old_location_info["path"];
|
|
|
|
|
2013-03-14 06:50:45 +01:00
|
|
|
$matches = array();
|
2015-02-10 04:14:08 +01:00
|
|
|
if (preg_match('/(Location:|URI:)(.*?)\n/i', $header, $matches)) {
|
2013-03-14 06:50:45 +01:00
|
|
|
$newurl = trim(array_pop($matches));
|
|
|
|
}
|
2012-02-26 23:34:01 +01:00
|
|
|
if(strpos($newurl,'/') === 0)
|
2013-07-29 04:11:08 +02:00
|
|
|
$newurl = $old_location_info["scheme"]."://".$old_location_info["host"].$newurl;
|
2013-03-14 06:58:01 +01:00
|
|
|
if (filter_var($newurl, FILTER_VALIDATE_URL)) {
|
2012-07-07 20:40:15 +02:00
|
|
|
$redirects++;
|
2015-05-15 20:41:10 +02:00
|
|
|
@curl_close($ch);
|
2015-05-16 22:38:41 +02:00
|
|
|
return z_fetch_url($newurl,$binary, $redirects, $opts);
|
2012-07-07 20:40:15 +02:00
|
|
|
}
|
|
|
|
}
|
2011-08-02 01:51:01 +02:00
|
|
|
|
2015-05-15 20:41:10 +02:00
|
|
|
|
2011-08-02 01:51:01 +02:00
|
|
|
$a->set_curl_code($http_code);
|
2013-04-01 06:26:11 +02:00
|
|
|
$a->set_curl_content_type($curl_info['content_type']);
|
2011-08-02 01:51:01 +02:00
|
|
|
|
|
|
|
$body = substr($s,strlen($header));
|
2013-01-26 16:46:43 +01:00
|
|
|
|
2015-05-15 20:41:10 +02:00
|
|
|
|
|
|
|
|
|
|
|
$rc = intval($http_code);
|
|
|
|
$ret['return_code'] = $rc;
|
|
|
|
$ret['success'] = (($rc >= 200 && $rc <= 299) ? true : false);
|
2016-01-25 11:05:17 +01:00
|
|
|
$ret['redirect_url'] = $url;
|
2015-05-15 20:41:10 +02:00
|
|
|
if(! $ret['success']) {
|
|
|
|
$ret['error'] = curl_error($ch);
|
|
|
|
$ret['debug'] = $curl_info;
|
|
|
|
logger('z_fetch_url: error: ' . $url . ': ' . $ret['error'], LOGGER_DEBUG);
|
|
|
|
logger('z_fetch_url: debug: ' . print_r($curl_info,true), LOGGER_DATA);
|
|
|
|
}
|
|
|
|
$ret['body'] = substr($s,strlen($header));
|
|
|
|
$ret['header'] = $header;
|
|
|
|
if(x($opts,'debug')) {
|
|
|
|
$ret['debug'] = $curl_info;
|
|
|
|
}
|
|
|
|
@curl_close($ch);
|
2015-05-16 22:38:41 +02:00
|
|
|
|
2013-01-26 18:35:39 +01:00
|
|
|
$a->save_timestamp($stamp1, "network");
|
2015-05-16 22:38:41 +02:00
|
|
|
|
2015-05-15 20:41:10 +02:00
|
|
|
return($ret);
|
2013-01-26 16:46:43 +01:00
|
|
|
|
2016-04-27 16:31:03 +02:00
|
|
|
}
|
2011-08-02 01:51:01 +02:00
|
|
|
|
|
|
|
// post request to $url. $params is an array of post variables.
|
|
|
|
|
2016-04-27 16:31:03 +02:00
|
|
|
/**
|
|
|
|
* @brief Post request to $url
|
|
|
|
*
|
|
|
|
* @param string $url URL to post
|
|
|
|
* @param mixed $params
|
|
|
|
* @param string $headers HTTP headers
|
|
|
|
* @param integer $redirects Recursion counter for internal use - default = 0
|
|
|
|
* @param integer $timeout The timeout in seconds, default system config value or 60 seconds
|
|
|
|
*
|
|
|
|
* @return string The content
|
|
|
|
*/
|
2011-08-17 05:05:02 +02:00
|
|
|
function post_url($url,$params, $headers = null, &$redirects = 0, $timeout = 0) {
|
2013-01-26 16:46:43 +01:00
|
|
|
$stamp1 = microtime(true);
|
|
|
|
|
2011-08-02 01:51:01 +02:00
|
|
|
$a = get_app();
|
|
|
|
$ch = curl_init($url);
|
2012-11-22 15:06:15 +01:00
|
|
|
if(($redirects > 8) || (! $ch))
|
2011-08-02 01:51:01 +02:00
|
|
|
return false;
|
|
|
|
|
2014-05-24 11:01:33 +02:00
|
|
|
logger("post_url: start ".$url, LOGGER_DATA);
|
|
|
|
|
2011-08-02 01:51:01 +02:00
|
|
|
curl_setopt($ch, CURLOPT_HEADER, true);
|
|
|
|
curl_setopt($ch, CURLOPT_RETURNTRANSFER,true);
|
|
|
|
curl_setopt($ch, CURLOPT_POST,1);
|
|
|
|
curl_setopt($ch, CURLOPT_POSTFIELDS,$params);
|
2014-09-07 10:47:37 +02:00
|
|
|
curl_setopt($ch, CURLOPT_USERAGENT, $a->get_useragent());
|
2011-08-02 01:51:01 +02:00
|
|
|
|
2011-08-17 05:05:02 +02:00
|
|
|
if(intval($timeout)) {
|
|
|
|
curl_setopt($ch, CURLOPT_TIMEOUT, $timeout);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$curl_time = intval(get_config('system','curl_timeout'));
|
|
|
|
curl_setopt($ch, CURLOPT_TIMEOUT, (($curl_time !== false) ? $curl_time : 60));
|
|
|
|
}
|
2011-08-02 01:51:01 +02:00
|
|
|
|
|
|
|
if(defined('LIGHTTPD')) {
|
|
|
|
if(!is_array($headers)) {
|
|
|
|
$headers = array('Expect:');
|
|
|
|
} else {
|
|
|
|
if(!in_array('Expect:', $headers)) {
|
|
|
|
array_push($headers, 'Expect:');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if($headers)
|
|
|
|
curl_setopt($ch, CURLOPT_HTTPHEADER, $headers);
|
|
|
|
|
|
|
|
$check_cert = get_config('system','verifyssl');
|
|
|
|
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, (($check_cert) ? true : false));
|
2015-03-02 00:32:46 +01:00
|
|
|
curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, (($check_cert) ? 2 : false));
|
2011-08-02 01:51:01 +02:00
|
|
|
$prx = get_config('system','proxy');
|
|
|
|
if(strlen($prx)) {
|
|
|
|
curl_setopt($ch, CURLOPT_HTTPPROXYTUNNEL, 1);
|
|
|
|
curl_setopt($ch, CURLOPT_PROXY, $prx);
|
|
|
|
$prxusr = get_config('system','proxyuser');
|
|
|
|
if(strlen($prxusr))
|
|
|
|
curl_setopt($ch, CURLOPT_PROXYUSERPWD, $prxusr);
|
|
|
|
}
|
|
|
|
|
|
|
|
$a->set_curl_code(0);
|
|
|
|
|
|
|
|
// don't let curl abort the entire application
|
|
|
|
// if it throws any errors.
|
|
|
|
|
|
|
|
$s = @curl_exec($ch);
|
|
|
|
|
|
|
|
$base = $s;
|
|
|
|
$curl_info = curl_getinfo($ch);
|
|
|
|
$http_code = $curl_info['http_code'];
|
|
|
|
|
2014-05-24 11:01:33 +02:00
|
|
|
logger("post_url: result ".$http_code." - ".$url, LOGGER_DATA);
|
|
|
|
|
2011-08-02 01:51:01 +02:00
|
|
|
$header = '';
|
|
|
|
|
|
|
|
// Pull out multiple headers, e.g. proxy and continuation headers
|
|
|
|
// allow for HTTP/2.x without fixing code
|
|
|
|
|
|
|
|
while(preg_match('/^HTTP\/[1-2].+? [1-5][0-9][0-9]/',$base)) {
|
|
|
|
$chunk = substr($base,0,strpos($base,"\r\n\r\n")+4);
|
|
|
|
$header .= $chunk;
|
|
|
|
$base = substr($base,strlen($chunk));
|
|
|
|
}
|
|
|
|
|
2014-04-04 10:55:30 +02:00
|
|
|
if($http_code == 301 || $http_code == 302 || $http_code == 303 || $http_code == 307) {
|
2014-05-24 11:01:33 +02:00
|
|
|
$matches = array();
|
|
|
|
preg_match('/(Location:|URI:)(.*?)\n/', $header, $matches);
|
|
|
|
$newurl = trim(array_pop($matches));
|
2012-02-26 23:34:01 +01:00
|
|
|
if(strpos($newurl,'/') === 0)
|
2013-07-29 16:33:10 +02:00
|
|
|
$newurl = $old_location_info["scheme"] . "://" . $old_location_info["host"] . $newurl;
|
2014-05-24 11:01:33 +02:00
|
|
|
if (filter_var($newurl, FILTER_VALIDATE_URL)) {
|
|
|
|
$redirects++;
|
|
|
|
logger("post_url: redirect ".$url." to ".$newurl);
|
|
|
|
return post_url($newurl,$params, $headers, $redirects, $timeout);
|
|
|
|
//return fetch_url($newurl,false,$redirects,$timeout);
|
|
|
|
}
|
|
|
|
}
|
2011-08-02 01:51:01 +02:00
|
|
|
$a->set_curl_code($http_code);
|
|
|
|
$body = substr($s,strlen($header));
|
|
|
|
|
|
|
|
$a->set_curl_headers($header);
|
|
|
|
|
|
|
|
curl_close($ch);
|
2013-01-26 16:46:43 +01:00
|
|
|
|
2013-01-26 18:35:39 +01:00
|
|
|
$a->save_timestamp($stamp1, "network");
|
2013-01-26 16:46:43 +01:00
|
|
|
|
2014-05-24 11:01:33 +02:00
|
|
|
logger("post_url: end ".$url, LOGGER_DATA);
|
|
|
|
|
2011-08-02 01:51:01 +02:00
|
|
|
return($body);
|
2016-04-27 16:31:03 +02:00
|
|
|
}
|
2011-08-02 01:51:01 +02:00
|
|
|
|
|
|
|
// Generic XML return
|
2014-09-07 17:28:38 +02:00
|
|
|
// Outputs a basic dfrn XML status structure to STDOUT, with a <status> variable
|
|
|
|
// of $st and an optional text <message> of $message and terminates the current process.
|
2011-08-02 01:51:01 +02:00
|
|
|
|
|
|
|
function xml_status($st, $message = '') {
|
|
|
|
|
|
|
|
$xml_message = ((strlen($message)) ? "\t<message>" . xmlify($message) . "</message>\r\n" : '');
|
|
|
|
|
|
|
|
if($st)
|
|
|
|
logger('xml_status returning non_zero: ' . $st . " message=" . $message);
|
|
|
|
|
|
|
|
header( "Content-type: text/xml" );
|
|
|
|
echo '<?xml version="1.0" encoding="UTF-8"?>'."\r\n";
|
|
|
|
echo "<result>\r\n\t<status>$st</status>\r\n$xml_message</result>\r\n";
|
|
|
|
killme();
|
2016-04-27 16:31:03 +02:00
|
|
|
}
|
2011-08-02 01:51:01 +02:00
|
|
|
|
2016-04-27 16:31:03 +02:00
|
|
|
/**
|
|
|
|
* @brief Send HTTP status header and exit.
|
|
|
|
*
|
|
|
|
* @param integer $val HTTP status result value
|
|
|
|
* @param array $description optional message
|
|
|
|
* 'title' => header title
|
|
|
|
* 'description' => optional message
|
|
|
|
*/
|
|
|
|
|
2016-09-18 23:21:18 +02:00
|
|
|
/**
|
|
|
|
* @brief Send HTTP status header and exit.
|
|
|
|
*
|
|
|
|
* @param integer $val HTTP status result value
|
|
|
|
* @param array $description optional message
|
|
|
|
* 'title' => header title
|
|
|
|
* 'description' => optional message
|
|
|
|
*/
|
2015-10-03 23:16:40 +02:00
|
|
|
function http_status_exit($val, $description = array()) {
|
2016-04-27 16:31:03 +02:00
|
|
|
$err = '';
|
2015-10-03 23:16:40 +02:00
|
|
|
if($val >= 400) {
|
2011-08-10 03:55:46 +02:00
|
|
|
$err = 'Error';
|
2015-10-03 23:16:40 +02:00
|
|
|
if (!isset($description["title"]))
|
|
|
|
$description["title"] = $err." ".$val;
|
|
|
|
}
|
2011-08-10 03:55:46 +02:00
|
|
|
if($val >= 200 && $val < 300)
|
|
|
|
$err = 'OK';
|
|
|
|
|
2014-09-07 17:28:38 +02:00
|
|
|
logger('http_status_exit ' . $val);
|
2011-08-10 03:55:46 +02:00
|
|
|
header($_SERVER["SERVER_PROTOCOL"] . ' ' . $val . ' ' . $err);
|
2015-10-03 23:16:40 +02:00
|
|
|
|
|
|
|
if (isset($description["title"])) {
|
|
|
|
$tpl = get_markup_template('http_status.tpl');
|
|
|
|
echo replace_macros($tpl, array('$title' => $description["title"],
|
|
|
|
'$description' => $description["description"]));
|
|
|
|
}
|
|
|
|
|
2011-08-10 03:55:46 +02:00
|
|
|
killme();
|
|
|
|
|
2016-04-27 16:31:03 +02:00
|
|
|
}
|
2011-08-02 01:51:01 +02:00
|
|
|
|
2016-04-27 16:31:03 +02:00
|
|
|
/**
|
|
|
|
* @brief Check URL to se if ts's real
|
|
|
|
*
|
|
|
|
* Take a URL from the wild, prepend http:// if necessary
|
|
|
|
* and check DNS to see if it's real (or check if is a valid IP address)
|
|
|
|
*
|
|
|
|
* @param string $url The URL to be validated
|
|
|
|
* @return boolean True if it's a valid URL, fals if something wrong with it
|
|
|
|
*/
|
2011-08-02 01:51:01 +02:00
|
|
|
function validate_url(&$url) {
|
2016-05-01 15:01:19 +02:00
|
|
|
logger(sprintf('[%s:%d]: url=%s - CALLED!', __FUNCTION__, __LINE__, $url), LOGGER_TRACE);
|
2014-09-07 17:28:38 +02:00
|
|
|
|
|
|
|
if(get_config('system','disable_url_validation'))
|
2016-05-01 15:07:06 +02:00
|
|
|
logger(sprintf('[%s:%d]: URL validation disabled, returning TRUE - EXIT!', __FUNCTION__, __LINE__), LOGGER_TRACE);
|
2014-09-07 17:28:38 +02:00
|
|
|
return true;
|
2016-05-01 14:58:41 +02:00
|
|
|
|
2012-04-13 09:42:53 +02:00
|
|
|
// no naked subdomains (allow localhost for tests)
|
|
|
|
if(strpos($url,'.') === false && strpos($url,'/localhost/') === false)
|
2016-05-01 15:07:06 +02:00
|
|
|
logger(sprintf('[%s:%d]: URL is not complete, returning FALSE - EXIT!', __FUNCTION__, __LINE__), LOGGER_TRACE);
|
2012-02-12 23:18:32 +01:00
|
|
|
return false;
|
2016-05-01 14:58:41 +02:00
|
|
|
|
|
|
|
if(substr($url,0,4) != 'http' && substr($url,0,5) != 'https')
|
2011-08-02 01:51:01 +02:00
|
|
|
$url = 'http://' . $url;
|
2016-05-01 15:01:19 +02:00
|
|
|
|
|
|
|
logger(sprintf('[%s:%d]: url=%s - before parse_url() ...', __FUNCTION__, __LINE__, $url), LOGGER_DEBUG);
|
|
|
|
|
2011-08-02 01:51:01 +02:00
|
|
|
$h = @parse_url($url);
|
2013-01-26 16:46:43 +01:00
|
|
|
|
2016-05-01 15:01:19 +02:00
|
|
|
logger(sprintf('[%s:%d]: h[]=%s', __FUNCTION__, __LINE__, gettype($h)), LOGGER_DEBUG);
|
|
|
|
|
2016-05-01 15:07:06 +02:00
|
|
|
if((is_array($h)) && (dns_get_record($h['host'], DNS_A + DNS_CNAME + DNS_PTR) || filter_var($h['host'], FILTER_VALIDATE_IP) )) {
|
|
|
|
logger(sprintf('[%s:%d]: URL %s validated. - EXIT!', __FUNCTION__, __LINE__, $url), LOGGER_TRACE);
|
2011-08-02 01:51:01 +02:00
|
|
|
return true;
|
|
|
|
}
|
2016-05-01 15:07:06 +02:00
|
|
|
|
|
|
|
logger(sprintf('[%s:%d]: URL %s maybe not valid - EXIT!', __FUNCTION__, __LINE__, $url), LOGGER_TRACE);
|
2011-08-02 01:51:01 +02:00
|
|
|
return false;
|
2016-04-27 16:31:03 +02:00
|
|
|
}
|
2011-08-02 01:51:01 +02:00
|
|
|
|
2016-04-27 16:31:03 +02:00
|
|
|
/**
|
|
|
|
* @brief Checks that email is an actual resolvable internet address
|
|
|
|
*
|
|
|
|
* @param string $addr The email address
|
|
|
|
* @return boolean True if it's a valid email address, false if it's not
|
|
|
|
*/
|
2011-08-02 01:51:01 +02:00
|
|
|
function validate_email($addr) {
|
|
|
|
|
2012-07-02 03:56:00 +02:00
|
|
|
if(get_config('system','disable_email_validation'))
|
|
|
|
return true;
|
|
|
|
|
2011-08-02 01:51:01 +02:00
|
|
|
if(! strpos($addr,'@'))
|
|
|
|
return false;
|
|
|
|
$h = substr($addr,strpos($addr,'@') + 1);
|
|
|
|
|
2015-02-23 12:20:05 +01:00
|
|
|
if(($h) && (dns_get_record($h, DNS_A + DNS_CNAME + DNS_PTR + DNS_MX) || filter_var($h, FILTER_VALIDATE_IP) )) {
|
2011-08-02 01:51:01 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
2016-04-27 16:31:03 +02:00
|
|
|
}
|
2011-08-02 01:51:01 +02:00
|
|
|
|
2016-04-27 16:31:03 +02:00
|
|
|
/**
|
|
|
|
* @brief Check if URL is allowed
|
|
|
|
*
|
|
|
|
* Check $url against our list of allowed sites,
|
|
|
|
* wildcards allowed. If allowed_sites is unset return true;
|
|
|
|
*
|
|
|
|
* @param string $url URL which get tested
|
|
|
|
* @return boolean True if url is allowed otherwise return false
|
|
|
|
*/
|
2011-08-02 01:51:01 +02:00
|
|
|
function allowed_url($url) {
|
|
|
|
|
|
|
|
$h = @parse_url($url);
|
|
|
|
|
|
|
|
if(! $h) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
$str_allowed = get_config('system','allowed_sites');
|
|
|
|
if(! $str_allowed)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
$found = false;
|
|
|
|
|
|
|
|
$host = strtolower($h['host']);
|
|
|
|
|
|
|
|
// always allow our own site
|
|
|
|
|
|
|
|
if($host == strtolower($_SERVER['SERVER_NAME']))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
$fnmatch = function_exists('fnmatch');
|
|
|
|
$allowed = explode(',',$str_allowed);
|
|
|
|
|
|
|
|
if(count($allowed)) {
|
|
|
|
foreach($allowed as $a) {
|
|
|
|
$pat = strtolower(trim($a));
|
|
|
|
if(($fnmatch && fnmatch($pat,$host)) || ($pat == $host)) {
|
2014-09-07 17:28:38 +02:00
|
|
|
$found = true;
|
2011-08-02 01:51:01 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $found;
|
2016-04-27 16:31:03 +02:00
|
|
|
}
|
2011-08-02 01:51:01 +02:00
|
|
|
|
2016-04-27 16:31:03 +02:00
|
|
|
/**
|
|
|
|
* @brief Check if email address is allowed to register here.
|
|
|
|
*
|
|
|
|
* Compare against our list (wildcards allowed).
|
|
|
|
*
|
|
|
|
* @param type $email
|
|
|
|
* @return boolean False if not allowed, true if allowed
|
|
|
|
* or if allowed list is not configured
|
|
|
|
*/
|
2011-08-02 01:51:01 +02:00
|
|
|
function allowed_email($email) {
|
|
|
|
|
|
|
|
|
|
|
|
$domain = strtolower(substr($email,strpos($email,'@') + 1));
|
|
|
|
if(! $domain)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
$str_allowed = get_config('system','allowed_email');
|
|
|
|
if(! $str_allowed)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
$found = false;
|
|
|
|
|
|
|
|
$fnmatch = function_exists('fnmatch');
|
|
|
|
$allowed = explode(',',$str_allowed);
|
|
|
|
|
|
|
|
if(count($allowed)) {
|
|
|
|
foreach($allowed as $a) {
|
|
|
|
$pat = strtolower(trim($a));
|
|
|
|
if(($fnmatch && fnmatch($pat,$domain)) || ($pat == $domain)) {
|
2014-09-07 17:28:38 +02:00
|
|
|
$found = true;
|
2011-08-02 01:51:01 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $found;
|
2016-04-27 16:31:03 +02:00
|
|
|
}
|
2011-08-02 01:51:01 +02:00
|
|
|
|
2012-02-21 00:54:34 +01:00
|
|
|
function avatar_img($email) {
|
2012-04-11 00:33:43 +02:00
|
|
|
|
|
|
|
$a = get_app();
|
|
|
|
|
2012-04-08 23:20:31 +02:00
|
|
|
$avatar['size'] = 175;
|
|
|
|
$avatar['email'] = $email;
|
|
|
|
$avatar['url'] = '';
|
2012-04-11 00:33:43 +02:00
|
|
|
$avatar['success'] = false;
|
2012-02-21 00:54:34 +01:00
|
|
|
|
2012-04-08 23:20:31 +02:00
|
|
|
call_hooks('avatar_lookup', $avatar);
|
2011-08-02 01:51:01 +02:00
|
|
|
|
2012-04-11 00:33:43 +02:00
|
|
|
if(! $avatar['success'])
|
|
|
|
$avatar['url'] = $a->get_baseurl() . '/images/person-175.jpg';
|
|
|
|
|
|
|
|
logger('Avatar: ' . $avatar['email'] . ' ' . $avatar['url'], LOGGER_DEBUG);
|
2012-04-08 23:20:31 +02:00
|
|
|
return $avatar['url'];
|
2016-04-27 16:31:03 +02:00
|
|
|
}
|
2011-08-02 01:51:01 +02:00
|
|
|
|
|
|
|
|
|
|
|
function parse_xml_string($s,$strict = true) {
|
2016-04-27 16:31:03 +02:00
|
|
|
/// @todo Move this function to the xml class
|
2011-08-02 01:51:01 +02:00
|
|
|
if($strict) {
|
|
|
|
if(! strstr($s,'<?xml'))
|
|
|
|
return false;
|
|
|
|
$s2 = substr($s,strpos($s,'<?xml'));
|
|
|
|
}
|
|
|
|
else
|
|
|
|
$s2 = $s;
|
|
|
|
libxml_use_internal_errors(true);
|
|
|
|
|
|
|
|
$x = @simplexml_load_string($s2);
|
|
|
|
if(! $x) {
|
|
|
|
logger('libxml: parse: error: ' . $s2, LOGGER_DATA);
|
|
|
|
foreach(libxml_get_errors() as $err)
|
|
|
|
logger('libxml: parse: ' . $err->code." at ".$err->line.":".$err->column." : ".$err->message, LOGGER_DATA);
|
|
|
|
libxml_clear_errors();
|
|
|
|
}
|
|
|
|
return $x;
|
2016-04-27 16:31:03 +02:00
|
|
|
}
|
2011-08-18 13:20:30 +02:00
|
|
|
|
2013-05-03 07:19:16 +02:00
|
|
|
function scale_external_images($srctext, $include_link = true, $scale_replace = false) {
|
2012-02-25 23:22:51 +01:00
|
|
|
|
2014-02-11 23:44:45 +01:00
|
|
|
// Suppress "view full size"
|
|
|
|
if (intval(get_config('system','no_view_full_size')))
|
|
|
|
$include_link = false;
|
|
|
|
|
2012-02-25 23:22:51 +01:00
|
|
|
$a = get_app();
|
|
|
|
|
2012-07-08 21:27:20 +02:00
|
|
|
// Picture addresses can contain special characters
|
2013-05-03 07:19:16 +02:00
|
|
|
$s = htmlspecialchars_decode($srctext);
|
2012-07-08 21:27:20 +02:00
|
|
|
|
2012-02-25 23:22:51 +01:00
|
|
|
$matches = null;
|
2012-07-25 23:40:23 +02:00
|
|
|
$c = preg_match_all('/\[img.*?\](.*?)\[\/img\]/ism',$s,$matches,PREG_SET_ORDER);
|
2012-02-25 23:22:51 +01:00
|
|
|
if($c) {
|
|
|
|
require_once('include/Photo.php');
|
|
|
|
foreach($matches as $mtch) {
|
|
|
|
logger('scale_external_image: ' . $mtch[1]);
|
2012-06-20 04:45:24 +02:00
|
|
|
|
2012-02-25 23:22:51 +01:00
|
|
|
$hostname = str_replace('www.','',substr($a->get_baseurl(),strpos($a->get_baseurl(),'://')+3));
|
|
|
|
if(stristr($mtch[1],$hostname))
|
|
|
|
continue;
|
2012-06-20 04:45:24 +02:00
|
|
|
|
|
|
|
// $scale_replace, if passed, is an array of two elements. The
|
|
|
|
// first is the name of the full-size image. The second is the
|
|
|
|
// name of a remote, scaled-down version of the full size image.
|
|
|
|
// This allows Friendica to display the smaller remote image if
|
|
|
|
// one exists, while still linking to the full-size image
|
|
|
|
if($scale_replace)
|
|
|
|
$scaled = str_replace($scale_replace[0], $scale_replace[1], $mtch[1]);
|
|
|
|
else
|
|
|
|
$scaled = $mtch[1];
|
2013-05-03 07:19:16 +02:00
|
|
|
$i = @fetch_url($scaled);
|
|
|
|
if(! $i)
|
|
|
|
return $srctext;
|
2012-06-20 04:45:24 +02:00
|
|
|
|
2012-06-07 17:42:13 +02:00
|
|
|
// guess mimetype from headers or filename
|
|
|
|
$type = guess_image_type($mtch[1],true);
|
2012-11-17 00:50:39 +01:00
|
|
|
|
2012-02-25 23:22:51 +01:00
|
|
|
if($i) {
|
2012-06-07 17:42:13 +02:00
|
|
|
$ph = new Photo($i, $type);
|
2012-02-25 23:22:51 +01:00
|
|
|
if($ph->is_valid()) {
|
|
|
|
$orig_width = $ph->getWidth();
|
|
|
|
$orig_height = $ph->getHeight();
|
|
|
|
|
|
|
|
if($orig_width > 640 || $orig_height > 640) {
|
|
|
|
|
|
|
|
$ph->scaleImage(640);
|
|
|
|
$new_width = $ph->getWidth();
|
|
|
|
$new_height = $ph->getHeight();
|
|
|
|
logger('scale_external_images: ' . $orig_width . '->' . $new_width . 'w ' . $orig_height . '->' . $new_height . 'h' . ' match: ' . $mtch[0], LOGGER_DEBUG);
|
2012-06-20 04:45:24 +02:00
|
|
|
$s = str_replace($mtch[0],'[img=' . $new_width . 'x' . $new_height. ']' . $scaled . '[/img]'
|
2014-09-07 17:28:38 +02:00
|
|
|
. "\n" . (($include_link)
|
2012-02-25 23:22:51 +01:00
|
|
|
? '[url=' . $mtch[1] . ']' . t('view full size') . '[/url]' . "\n"
|
|
|
|
: ''),$s);
|
|
|
|
logger('scale_external_images: new string: ' . $s, LOGGER_DEBUG);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-08-04 03:33:11 +02:00
|
|
|
|
|
|
|
// replace the special char encoding
|
2012-12-14 22:47:30 +01:00
|
|
|
$s = htmlspecialchars($s,ENT_NOQUOTES,'UTF-8');
|
2012-02-25 23:22:51 +01:00
|
|
|
return $s;
|
|
|
|
}
|
2012-04-03 08:07:26 +02:00
|
|
|
|
|
|
|
|
|
|
|
function fix_contact_ssl_policy(&$contact,$new_policy) {
|
|
|
|
|
|
|
|
$ssl_changed = false;
|
|
|
|
if((intval($new_policy) == SSL_POLICY_SELFSIGN || $new_policy === 'self') && strstr($contact['url'],'https:')) {
|
|
|
|
$ssl_changed = true;
|
|
|
|
$contact['url'] = str_replace('https:','http:',$contact['url']);
|
|
|
|
$contact['request'] = str_replace('https:','http:',$contact['request']);
|
|
|
|
$contact['notify'] = str_replace('https:','http:',$contact['notify']);
|
|
|
|
$contact['poll'] = str_replace('https:','http:',$contact['poll']);
|
|
|
|
$contact['confirm'] = str_replace('https:','http:',$contact['confirm']);
|
|
|
|
$contact['poco'] = str_replace('https:','http:',$contact['poco']);
|
|
|
|
}
|
|
|
|
|
|
|
|
if((intval($new_policy) == SSL_POLICY_FULL || $new_policy === 'full') && strstr($contact['url'],'http:')) {
|
|
|
|
$ssl_changed = true;
|
|
|
|
$contact['url'] = str_replace('http:','https:',$contact['url']);
|
|
|
|
$contact['request'] = str_replace('http:','https:',$contact['request']);
|
|
|
|
$contact['notify'] = str_replace('http:','https:',$contact['notify']);
|
|
|
|
$contact['poll'] = str_replace('http:','https:',$contact['poll']);
|
|
|
|
$contact['confirm'] = str_replace('http:','https:',$contact['confirm']);
|
|
|
|
$contact['poco'] = str_replace('http:','https:',$contact['poco']);
|
|
|
|
}
|
|
|
|
|
|
|
|
if($ssl_changed) {
|
2014-09-07 17:28:38 +02:00
|
|
|
q("update contact set
|
|
|
|
url = '%s',
|
2012-04-03 08:07:26 +02:00
|
|
|
request = '%s',
|
|
|
|
notify = '%s',
|
|
|
|
poll = '%s',
|
|
|
|
confirm = '%s',
|
|
|
|
poco = '%s'
|
|
|
|
where id = %d limit 1",
|
|
|
|
dbesc($contact['url']),
|
|
|
|
dbesc($contact['request']),
|
|
|
|
dbesc($contact['notify']),
|
|
|
|
dbesc($contact['poll']),
|
|
|
|
dbesc($contact['confirm']),
|
|
|
|
dbesc($contact['poco']),
|
|
|
|
intval($contact['id'])
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-04-04 10:55:30 +02:00
|
|
|
function original_url($url, $depth=1, $fetchbody = false) {
|
2014-05-18 20:32:06 +02:00
|
|
|
|
2014-09-07 10:47:37 +02:00
|
|
|
$a = get_app();
|
|
|
|
|
2014-05-18 20:32:06 +02:00
|
|
|
// Remove Analytics Data from Google and other tracking platforms
|
|
|
|
$urldata = parse_url($url);
|
|
|
|
if (is_string($urldata["query"])) {
|
|
|
|
$query = $urldata["query"];
|
|
|
|
parse_str($query, $querydata);
|
|
|
|
|
|
|
|
if (is_array($querydata))
|
|
|
|
foreach ($querydata AS $param=>$value)
|
|
|
|
if (in_array($param, array("utm_source", "utm_medium", "utm_term", "utm_content", "utm_campaign",
|
|
|
|
"wt_mc", "pk_campaign", "pk_kwd", "mc_cid", "mc_eid",
|
2014-05-29 11:43:37 +02:00
|
|
|
"fb_action_ids", "fb_action_types", "fb_ref",
|
2014-12-01 22:52:51 +01:00
|
|
|
"awesm", "wtrid",
|
2014-05-18 20:32:06 +02:00
|
|
|
"woo_campaign", "woo_source", "woo_medium", "woo_content", "woo_term"))) {
|
2014-05-30 01:02:32 +02:00
|
|
|
|
|
|
|
$pair = $param."=".urlencode($value);
|
|
|
|
$url = str_replace($pair, "", $url);
|
|
|
|
|
|
|
|
// Second try: if the url isn't encoded completely
|
|
|
|
$pair = $param."=".str_replace(" ", "+", $value);
|
|
|
|
$url = str_replace($pair, "", $url);
|
|
|
|
|
|
|
|
// Third try: Maybey the url isn't encoded at all
|
2014-05-18 20:32:06 +02:00
|
|
|
$pair = $param."=".$value;
|
|
|
|
$url = str_replace($pair, "", $url);
|
2014-05-30 01:02:32 +02:00
|
|
|
|
2014-05-18 20:32:06 +02:00
|
|
|
$url = str_replace(array("?&", "&&"), array("?", ""), $url);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (substr($url, -1, 1) == "?")
|
|
|
|
$url = substr($url, 0, -1);
|
|
|
|
}
|
|
|
|
|
2015-03-07 23:14:26 +01:00
|
|
|
if ($depth > 10)
|
|
|
|
return($url);
|
|
|
|
|
|
|
|
$url = trim($url, "'");
|
2014-04-04 10:55:30 +02:00
|
|
|
|
2015-03-07 23:14:26 +01:00
|
|
|
$stamp1 = microtime(true);
|
2014-04-04 10:55:30 +02:00
|
|
|
|
2015-03-07 23:14:26 +01:00
|
|
|
$siteinfo = array();
|
|
|
|
$ch = curl_init();
|
|
|
|
curl_setopt($ch, CURLOPT_URL, $url);
|
2015-01-04 15:31:47 +01:00
|
|
|
curl_setopt($ch, CURLOPT_HEADER, 1);
|
|
|
|
curl_setopt($ch, CURLOPT_NOBODY, 1);
|
2015-03-07 23:14:26 +01:00
|
|
|
curl_setopt($ch, CURLOPT_TIMEOUT, 10);
|
|
|
|
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
|
2014-09-07 10:47:37 +02:00
|
|
|
curl_setopt($ch, CURLOPT_USERAGENT, $a->get_useragent());
|
2014-04-04 10:55:30 +02:00
|
|
|
|
2015-03-07 23:14:26 +01:00
|
|
|
$header = curl_exec($ch);
|
|
|
|
$curl_info = @curl_getinfo($ch);
|
|
|
|
$http_code = $curl_info['http_code'];
|
|
|
|
curl_close($ch);
|
|
|
|
|
|
|
|
$a->save_timestamp($stamp1, "network");
|
2014-04-04 10:55:30 +02:00
|
|
|
|
2016-01-18 15:38:38 +01:00
|
|
|
if ($http_code == 0)
|
|
|
|
return($url);
|
|
|
|
|
2015-03-07 23:14:26 +01:00
|
|
|
if ((($curl_info['http_code'] == "301") OR ($curl_info['http_code'] == "302"))
|
|
|
|
AND (($curl_info['redirect_url'] != "") OR ($curl_info['location'] != ""))) {
|
|
|
|
if ($curl_info['redirect_url'] != "")
|
|
|
|
return(original_url($curl_info['redirect_url'], ++$depth, $fetchbody));
|
|
|
|
else
|
|
|
|
return(original_url($curl_info['location'], ++$depth, $fetchbody));
|
|
|
|
}
|
2014-04-04 10:55:30 +02:00
|
|
|
|
2015-01-04 15:31:47 +01:00
|
|
|
// Check for redirects in the meta elements of the body if there are no redirects in the header.
|
|
|
|
if (!$fetchbody)
|
|
|
|
return(original_url($url, ++$depth, true));
|
|
|
|
|
|
|
|
// if the file is too large then exit
|
|
|
|
if ($curl_info["download_content_length"] > 1000000)
|
|
|
|
return($url);
|
|
|
|
|
|
|
|
// if it isn't a HTML file then exit
|
|
|
|
if (($curl_info["content_type"] != "") AND !strstr(strtolower($curl_info["content_type"]),"html"))
|
|
|
|
return($url);
|
2014-04-04 10:55:30 +02:00
|
|
|
|
2015-03-07 23:14:26 +01:00
|
|
|
$stamp1 = microtime(true);
|
|
|
|
|
2015-01-04 15:31:47 +01:00
|
|
|
$ch = curl_init();
|
|
|
|
curl_setopt($ch, CURLOPT_URL, $url);
|
|
|
|
curl_setopt($ch, CURLOPT_HEADER, 0);
|
|
|
|
curl_setopt($ch, CURLOPT_NOBODY, 0);
|
|
|
|
curl_setopt($ch, CURLOPT_TIMEOUT, 10);
|
|
|
|
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
|
|
|
|
curl_setopt($ch, CURLOPT_USERAGENT, $a->get_useragent());
|
|
|
|
|
|
|
|
$body = curl_exec($ch);
|
|
|
|
curl_close($ch);
|
2014-04-04 10:55:30 +02:00
|
|
|
|
2015-03-07 23:14:26 +01:00
|
|
|
$a->save_timestamp($stamp1, "network");
|
|
|
|
|
|
|
|
if (trim($body) == "")
|
2015-01-04 15:31:47 +01:00
|
|
|
return($url);
|
2014-04-04 10:55:30 +02:00
|
|
|
|
2015-01-04 15:31:47 +01:00
|
|
|
// Check for redirect in meta elements
|
2015-03-07 23:14:26 +01:00
|
|
|
$doc = new DOMDocument();
|
|
|
|
@$doc->loadHTML($body);
|
|
|
|
|
|
|
|
$xpath = new DomXPath($doc);
|
|
|
|
|
|
|
|
$list = $xpath->query("//meta[@content]");
|
|
|
|
foreach ($list as $node) {
|
|
|
|
$attr = array();
|
|
|
|
if ($node->attributes->length)
|
|
|
|
foreach ($node->attributes as $attribute)
|
|
|
|
$attr[$attribute->name] = $attribute->value;
|
|
|
|
|
|
|
|
if (@$attr["http-equiv"] == 'refresh') {
|
|
|
|
$path = $attr["content"];
|
|
|
|
$pathinfo = explode(";", $path);
|
|
|
|
$content = "";
|
|
|
|
foreach ($pathinfo AS $value)
|
|
|
|
if (substr(strtolower($value), 0, 4) == "url=")
|
|
|
|
return(original_url(substr($value, 4), ++$depth));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return($url);
|
2014-04-04 10:55:30 +02:00
|
|
|
}
|
2014-05-03 12:07:34 +02:00
|
|
|
|
|
|
|
function short_link($url) {
|
|
|
|
require_once('library/slinky.php');
|
|
|
|
$slinky = new Slinky($url);
|
|
|
|
$yourls_url = get_config('yourls','url1');
|
|
|
|
if ($yourls_url) {
|
|
|
|
$yourls_username = get_config('yourls','username1');
|
|
|
|
$yourls_password = get_config('yourls', 'password1');
|
|
|
|
$yourls_ssl = get_config('yourls', 'ssl1');
|
|
|
|
$yourls = new Slinky_YourLS();
|
|
|
|
$yourls->set('username', $yourls_username);
|
|
|
|
$yourls->set('password', $yourls_password);
|
|
|
|
$yourls->set('ssl', $yourls_ssl);
|
|
|
|
$yourls->set('yourls-url', $yourls_url);
|
|
|
|
$slinky->set_cascade( array($yourls, new Slinky_UR1ca(), new Slinky_Trim(), new Slinky_IsGd(), new Slinky_TinyURL()));
|
|
|
|
} else {
|
|
|
|
// setup a cascade of shortening services
|
|
|
|
// try to get a short link from these services
|
|
|
|
// in the order ur1.ca, trim, id.gd, tinyurl
|
|
|
|
$slinky->set_cascade(array(new Slinky_UR1ca(), new Slinky_Trim(), new Slinky_IsGd(), new Slinky_TinyURL()));
|
|
|
|
}
|
|
|
|
return $slinky->short();
|
2016-04-27 16:31:03 +02:00
|
|
|
}
|
2016-02-01 17:43:12 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Encodes content to json
|
|
|
|
*
|
|
|
|
* This function encodes an array to json format
|
|
|
|
* and adds an application/json HTTP header to the output.
|
|
|
|
* After finishing the process is getting killed.
|
2016-07-04 08:05:30 +02:00
|
|
|
*
|
2016-04-14 17:05:19 +02:00
|
|
|
* @param array $x The input content
|
2016-02-01 17:43:12 +01:00
|
|
|
*/
|
|
|
|
function json_return_and_die($x) {
|
|
|
|
header("content-type: application/json");
|
|
|
|
echo json_encode($x);
|
|
|
|
killme();
|
|
|
|
}
|
2016-07-04 08:05:30 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Find the matching part between two url
|
|
|
|
*
|
|
|
|
* @param string $url1
|
|
|
|
* @param string $url2
|
|
|
|
* @return string The matching part
|
|
|
|
*/
|
|
|
|
function matching_url($url1, $url2) {
|
|
|
|
|
|
|
|
if (($url1 == "") OR ($url2 == ""))
|
|
|
|
return "";
|
|
|
|
|
|
|
|
$url1 = normalise_link($url1);
|
|
|
|
$url2 = normalise_link($url2);
|
|
|
|
|
|
|
|
$parts1 = parse_url($url1);
|
|
|
|
$parts2 = parse_url($url2);
|
|
|
|
|
|
|
|
if (!isset($parts1["host"]) OR !isset($parts2["host"]))
|
|
|
|
return "";
|
|
|
|
|
|
|
|
if ($parts1["scheme"] != $parts2["scheme"])
|
|
|
|
return "";
|
|
|
|
|
|
|
|
if ($parts1["host"] != $parts2["host"])
|
|
|
|
return "";
|
|
|
|
|
|
|
|
if ($parts1["port"] != $parts2["port"])
|
|
|
|
return "";
|
|
|
|
|
|
|
|
$match = $parts1["scheme"]."://".$parts1["host"];
|
|
|
|
|
|
|
|
if ($parts1["port"])
|
|
|
|
$match .= ":".$parts1["port"];
|
|
|
|
|
|
|
|
$pathparts1 = explode("/", $parts1["path"]);
|
|
|
|
$pathparts2 = explode("/", $parts2["path"]);
|
|
|
|
|
|
|
|
$i = 0;
|
|
|
|
$path = "";
|
|
|
|
do {
|
|
|
|
$path1 = $pathparts1[$i];
|
|
|
|
$path2 = $pathparts2[$i];
|
|
|
|
|
|
|
|
if ($path1 == $path2)
|
|
|
|
$path .= $path1."/";
|
|
|
|
|
|
|
|
} while (($path1 == $path2) AND ($i++ <= count($pathparts1)));
|
|
|
|
|
|
|
|
$match .= $path;
|
|
|
|
|
|
|
|
return normalise_link($match);
|
|
|
|
}
|