2 +--------------------------------------------------------------------+
4 +--------------------------------------------------------------------+
5 | Redistribution and use in source and binary forms, with or without |
6 | modification, are permitted provided that the conditions mentioned |
7 | in the accompanying LICENSE file are met. |
8 +--------------------------------------------------------------------+
9 | Copyright (c) 2004-2006, Michael Wallner <mike@php.net> |
10 +--------------------------------------------------------------------+
15 #define HTTP_WANT_SAPI
18 #include "php_output.h"
19 #include "ext/standard/url.h"
21 #include "php_http_api.h"
22 #include "php_http_send_api.h"
25 # include "php_http_exception_object.h"
28 PHP_MINIT_FUNCTION(http_support
)
30 HTTP_LONG_CONSTANT("HTTP_SUPPORT", HTTP_SUPPORT
);
31 HTTP_LONG_CONSTANT("HTTP_SUPPORT_REQUESTS", HTTP_SUPPORT_REQUESTS
);
32 HTTP_LONG_CONSTANT("HTTP_SUPPORT_MAGICMIME", HTTP_SUPPORT_MAGICMIME
);
33 HTTP_LONG_CONSTANT("HTTP_SUPPORT_ENCODINGS", HTTP_SUPPORT_ENCODINGS
);
34 HTTP_LONG_CONSTANT("HTTP_SUPPORT_SSLREQUESTS", HTTP_SUPPORT_SSLREQUESTS
);
39 PHP_HTTP_API
long _http_support(long feature
)
41 long support
= HTTP_SUPPORT
;
44 support
|= HTTP_SUPPORT_REQUESTS
;
46 support
|= HTTP_SUPPORT_SSLREQUESTS
;
49 #ifdef HTTP_HAVE_MAGIC
50 support
|= HTTP_SUPPORT_MAGICMIME
;
53 support
|= HTTP_SUPPORT_ENCODINGS
;
57 return (feature
== (support
& feature
));
62 /* char *pretty_key(char *, size_t, zend_bool, zend_bool) */
63 char *_http_pretty_key(char *key
, size_t key_len
, zend_bool uctitle
, zend_bool xhyphen
)
68 if ((wasalpha
= isalpha((int) key
[0]))) {
69 key
[0] = (char) (uctitle
? toupper((int) key
[0]) : tolower((int) key
[0]));
71 for (i
= 1; i
< key_len
; i
++) {
72 if (isalpha((int) key
[i
])) {
73 key
[i
] = (char) (((!wasalpha
) && uctitle
) ? toupper((int) key
[i
]) : tolower((int) key
[i
]));
76 if (xhyphen
&& (key
[i
] == '_')) {
87 /* {{{ STATUS http_parse_cookie(char *, HashTable *) */
88 PHP_HTTP_API STATUS
_http_parse_cookie(const char *list
, HashTable
*items TSRMLS_DC
)
97 int first
= 1, st
= ST_KEY
, keylen
= 0, vallen
= 0;
98 char *s
, *c
, *key
= NULL
, *val
= NULL
;
100 INIT_ZARR(array
, items
);
102 c
= s
= estrdup(list
);
105 char *tk
= NULL
, *tv
= NULL
;
109 tk
= estrndup(key
, keylen
);
113 tk
[3]='.'; tk
[4]='.'; tk
[5]='.';
118 tv
= estrndup(val
, vallen
);
122 tv
[3]='.'; tv
[4]='.'; tv
[5]='.';
125 fprintf(stderr
, "[%6s] %c \"%s=%s\"\n",
127 st
== ST_QUOTE
? "QUOTE" :
128 st
== ST_VALUE
? "VALUE" :
129 st
== ST_KEY
? "KEY" :
130 st
== ST_ASSIGN
? "ASSIGN" :
131 st
== ST_ADD
? "ADD":
135 STR_FREE(tk
); STR_FREE(tv
);
141 if (*(c
-1) != '\\') {
144 memmove(c
-1, c
, strlen(c
)+1);
231 } else if (!*c
|| *c
== ';') {
233 } else if (*c
!= ' ') {
241 vallen
= c
- val
- (*c
?1:0);
242 while (val
[vallen
-1] == ' ') --vallen
;
249 add_assoc_stringl(&array
, "name", key
, keylen
, 1);
250 add_assoc_stringl(&array
, "value", val
, vallen
, 1);
252 key
= estrndup(key
, keylen
);
253 add_assoc_stringl_ex(&array
, key
, keylen
+1, val
, vallen
, 1);
264 } else if (st
== ST_ADD
) {
275 http_error_ex(HE_WARNING
, HTTP_E_INVALID_PARAM
, "Unexpected character (%c) at pos %tu of %zu", *c
, c
-s
, strlen(s
));
281 /* {{{ void http_error(long, long, char*) */
282 void _http_error_ex(long type TSRMLS_DC
, long code
, const char *format
, ...)
286 va_start(args
, format
);
288 if ((type
== E_THROW
) || (PG(error_handling
) == EH_THROW
)) {
291 vspprintf(&message
, 0, format
, args
);
292 zend_throw_exception(http_exception_get_for_code(code
), message
, code TSRMLS_CC
);
296 php_verror(NULL
, "", type
, format
, args TSRMLS_CC
);
301 /* {{{ void http_log(char *, char *, char *) */
302 void _http_log_ex(char *file
, const char *ident
, const char *message TSRMLS_DC
)
306 char datetime
[20] = {0};
308 now
= HTTP_GET_REQUEST_TIME();
309 strftime(datetime
, sizeof(datetime
), "%Y-%m-%d %H:%M:%S", php_localtime_r(&now
, &nowtm
));
311 #define HTTP_LOG_WRITE(file, type, msg) \
312 if (file && *file) { \
313 php_stream *log = php_stream_open_wrapper(file, "ab", REPORT_ERRORS|ENFORCE_SAFE_MODE, NULL); \
316 php_stream_printf(log TSRMLS_CC, "%s\t[%s]\t%s\t<%s>%s", datetime, type, msg, SG(request_info).request_uri, PHP_EOL); \
317 php_stream_close(log); \
322 HTTP_LOG_WRITE(file
, ident
, message
);
323 HTTP_LOG_WRITE(HTTP_G
->log
.composite
, ident
, message
);
327 static void http_ob_blackhole(char *output
, uint output_len
, char **handled_output
, uint
*handled_output_len
, int mode TSRMLS_DC
)
329 *handled_output
= ecalloc(1,1);
330 *handled_output_len
= 0;
333 /* {{{ STATUS http_exit(int, char*, char*) */
334 STATUS
_http_exit_ex(int status
, char *header
, char *body
, zend_bool send_header TSRMLS_DC
)
336 if ( (send_header
&& (SUCCESS
!= http_send_status_header(status
, header
))) ||
337 (!send_header
&& status
&& (SUCCESS
!= http_send_status(status
)))) {
338 http_error_ex(HE_WARNING
, HTTP_E_HEADER
, "Failed to exit with status/header: %d - %s", status
, header
? header
: "");
344 php_end_ob_buffers(0 TSRMLS_CC
);
345 if ((SUCCESS
== sapi_send_headers(TSRMLS_C
)) && body
) {
346 PHPWRITE(body
, strlen(body
));
351 case 301: http_log(HTTP_G
->log
.redirect
, "301-REDIRECT", header
); break;
352 case 302: http_log(HTTP_G
->log
.redirect
, "302-REDIRECT", header
); break;
353 case 303: http_log(HTTP_G
->log
.redirect
, "303-REDIRECT", header
); break;
354 case 305: http_log(HTTP_G
->log
.redirect
, "305-REDIRECT", header
); break;
355 case 307: http_log(HTTP_G
->log
.redirect
, "307-REDIRECT", header
); break;
356 case 304: http_log(HTTP_G
->log
.cache
, "304-CACHE", header
); break;
357 case 405: http_log(HTTP_G
->log
.allowed_methods
, "405-ALLOWED", header
); break;
358 default: http_log(NULL
, header
, body
); break;
364 if (HTTP_G
->force_exit
) {
367 php_ob_set_internal_handler(http_ob_blackhole
, 4096, "blackhole", 0 TSRMLS_CC
);
374 /* {{{ STATUS http_check_method(char *) */
375 STATUS
_http_check_method_ex(const char *method
, const char *methods
)
379 if ( (found
= strstr(methods
, method
)) &&
380 (found
== method
|| !isalpha(found
[-1])) &&
381 (strlen(found
) >= strlen(method
) && !isalpha(found
[strlen(method
)]))) {
388 /* {{{ zval *http_get_server_var_ex(char *, size_t) */
389 PHP_HTTP_API zval
*_http_get_server_var_ex(const char *key
, size_t key_size
, zend_bool check TSRMLS_DC
)
394 if ((SUCCESS
!= zend_hash_find(&EG(symbol_table
), "_SERVER", sizeof("_SERVER"), (void **) &hsv
)) || (Z_TYPE_PP(hsv
) != IS_ARRAY
)) {
397 if ((SUCCESS
!= zend_hash_find(Z_ARRVAL_PP(hsv
), (char *) key
, key_size
, (void **) &var
)) || (Z_TYPE_PP(var
) != IS_STRING
)) {
400 if (check
&& !(Z_STRVAL_PP(var
) && Z_STRLEN_PP(var
))) {
407 /* {{{ STATUS http_get_request_body(char **, size_t *) */
408 PHP_HTTP_API STATUS
_http_get_request_body_ex(char **body
, size_t *length
, zend_bool dup TSRMLS_DC
)
413 if (SG(request_info
).raw_post_data
) {
414 *length
= SG(request_info
).raw_post_data_length
;
415 *body
= SG(request_info
).raw_post_data
;
418 *body
= estrndup(*body
, *length
);
421 } else if (sapi_module
.read_post
&& !HTTP_G
->read_post_data
) {
425 HTTP_G
->read_post_data
= 1;
427 while (0 < (len
= sapi_module
.read_post(buf
, sizeof(buf
) TSRMLS_CC
))) {
428 *body
= erealloc(*body
, *length
+ len
+ 1);
429 memcpy(*body
+ *length
, buf
, len
);
431 (*body
)[*length
] = '\0';
434 /* check for error */
441 SG(request_info
).raw_post_data
= *body
;
442 SG(request_info
).raw_post_data_length
= *length
;
445 *body
= estrndup(*body
, *length
);
454 /* {{{ php_stream *_http_get_request_body_stream(void) */
455 PHP_HTTP_API php_stream
*_http_get_request_body_stream(TSRMLS_D
)
457 php_stream
*s
= NULL
;
459 if (SG(request_info
).raw_post_data
) {
460 s
= php_stream_open_wrapper("php://input", "rb", 0, NULL
);
461 } else if (sapi_module
.read_post
&& !HTTP_G
->read_post_data
) {
462 HTTP_G
->read_post_data
= 1;
464 if ((s
= php_stream_temp_new())) {
468 while (0 < (len
= sapi_module
.read_post(buf
, sizeof(buf
) TSRMLS_CC
))) {
469 php_stream_write(s
, buf
, len
);
476 php_stream_rewind(s
);
490 * vim600: noet sw=4 ts=4 fdm=marker
491 * vim<600: noet sw=4 ts=4