typo
[m6w6/ext-http] / http_api.c
1 /*
2 +--------------------------------------------------------------------+
3 | PECL :: http |
4 +--------------------------------------------------------------------+
5 | Redistribution and use in source and binary forms, with or without |
6 | modification, are permitted provided that the conditions mentioned |
7 | in the accompanying LICENSE file are met. |
8 +--------------------------------------------------------------------+
9 | Copyright (c) 2004-2006, Michael Wallner <mike@php.net> |
10 +--------------------------------------------------------------------+
11 */
12
13 /* $Id$ */
14
15 #define HTTP_WANT_SAPI
16 #include "php_http.h"
17
18 #include "php_output.h"
19 #include "ext/standard/url.h"
20
21 #include "php_http_api.h"
22 #include "php_http_send_api.h"
23
24 #ifdef ZEND_ENGINE_2
25 # include "php_http_exception_object.h"
26 #endif
27
28 PHP_MINIT_FUNCTION(http_support)
29 {
30 HTTP_LONG_CONSTANT("HTTP_SUPPORT", HTTP_SUPPORT);
31 HTTP_LONG_CONSTANT("HTTP_SUPPORT_REQUESTS", HTTP_SUPPORT_REQUESTS);
32 HTTP_LONG_CONSTANT("HTTP_SUPPORT_MAGICMIME", HTTP_SUPPORT_MAGICMIME);
33 HTTP_LONG_CONSTANT("HTTP_SUPPORT_ENCODINGS", HTTP_SUPPORT_ENCODINGS);
34 HTTP_LONG_CONSTANT("HTTP_SUPPORT_SSLREQUESTS", HTTP_SUPPORT_SSLREQUESTS);
35
36 return SUCCESS;
37 }
38
39 PHP_HTTP_API long _http_support(long feature)
40 {
41 long support = HTTP_SUPPORT;
42
43 #ifdef HTTP_HAVE_CURL
44 support |= HTTP_SUPPORT_REQUESTS;
45 # ifdef HTTP_HAVE_SSL
46 support |= HTTP_SUPPORT_SSLREQUESTS;
47 # endif
48 #endif
49 #ifdef HTTP_HAVE_MAGIC
50 support |= HTTP_SUPPORT_MAGICMIME;
51 #endif
52 #ifdef HTTP_HAVE_ZLIB
53 support |= HTTP_SUPPORT_ENCODINGS;
54 #endif
55
56 if (feature) {
57 return (feature == (support & feature));
58 }
59 return support;
60 }
61
62 /* char *pretty_key(char *, size_t, zend_bool, zend_bool) */
63 char *_http_pretty_key(char *key, size_t key_len, zend_bool uctitle, zend_bool xhyphen)
64 {
65 if (key && key_len) {
66 size_t i;
67 int wasalpha;
68 if ((wasalpha = isalpha((int) key[0]))) {
69 key[0] = (char) (uctitle ? toupper((int) key[0]) : tolower((int) key[0]));
70 }
71 for (i = 1; i < key_len; i++) {
72 if (isalpha((int) key[i])) {
73 key[i] = (char) (((!wasalpha) && uctitle) ? toupper((int) key[i]) : tolower((int) key[i]));
74 wasalpha = 1;
75 } else {
76 if (xhyphen && (key[i] == '_')) {
77 key[i] = '-';
78 }
79 wasalpha = 0;
80 }
81 }
82 }
83 return key;
84 }
85 /* }}} */
86
87 /* {{{ STATUS http_parse_cookie(char *, HashTable *) */
88 PHP_HTTP_API STATUS _http_parse_cookie(const char *list, HashTable *items TSRMLS_DC)
89 {
90 #define ST_QUOTE 1
91 #define ST_VALUE 2
92 #define ST_KEY 3
93 #define ST_ASSIGN 4
94 #define ST_ADD 5
95
96 zval array;
97 int first = 1, st = ST_KEY, keylen = 0, vallen = 0;
98 char *s, *c, *key = NULL, *val = NULL;
99
100 INIT_ZARR(array, items);
101
102 c = s = estrdup(list);
103 for(;;) {
104 #if 0
105 char *tk = NULL, *tv = NULL;
106
107 if (key) {
108 if (keylen) {
109 tk= estrndup(key, keylen);
110 } else {
111 tk = ecalloc(1, 7);
112 memcpy(tk, key, 3);
113 tk[3]='.'; tk[4]='.'; tk[5]='.';
114 }
115 }
116 if (val) {
117 if (vallen) {
118 tv = estrndup(val, vallen);
119 } else {
120 tv = ecalloc(1, 7);
121 memcpy(tv, val, 3);
122 tv[3]='.'; tv[4]='.'; tv[5]='.';
123 }
124 }
125 fprintf(stderr, "[%6s] %c \"%s=%s\"\n",
126 (
127 st == ST_QUOTE ? "QUOTE" :
128 st == ST_VALUE ? "VALUE" :
129 st == ST_KEY ? "KEY" :
130 st == ST_ASSIGN ? "ASSIGN" :
131 st == ST_ADD ? "ADD":
132 "HUH?"
133 ), *c, tk, tv
134 );
135 STR_FREE(tk); STR_FREE(tv);
136 #endif
137 switch (st)
138 {
139 case ST_QUOTE:
140 if (*c == '"') {
141 if (*(c-1) != '\\') {
142 st = ST_ADD;
143 } else {
144 memmove(c-1, c, strlen(c)+1);
145 }
146 } else {
147 if (!val) {
148 val = c;
149 }
150 if (!*c) {
151 --val;
152 st = ST_ADD;
153 }
154 }
155 break;
156
157 case ST_VALUE:
158 switch (*c)
159 {
160 case '"':
161 if (!val) {
162 st = ST_QUOTE;
163 }
164 break;
165
166 case ' ':
167 break;
168
169 case ';':
170 goto add;
171 break;
172
173 case '\0':
174 st = ST_ADD;
175 break;
176
177 default:
178 if (!val) {
179 val = c;
180 }
181 break;
182 }
183 break;
184
185 case ST_KEY:
186 switch (*c)
187 {
188 default:
189 if (!isalnum(*c)) {
190 goto failure;
191 }
192 case '.':
193 case '_':
194 case '$':
195 case '@':
196 if (!key) {
197 key = c;
198 }
199 break;
200
201 case ' ':
202 if (key) {
203 keylen = c - key;
204 st = ST_ASSIGN;
205 }
206 break;
207
208 case '=':
209 if (key) {
210 keylen = c - key;
211 st = ST_VALUE;
212 } else {
213 goto failure;
214 }
215 break;
216
217 case '\0':
218 if (key) {
219 keylen = c - key;
220 st = ST_ADD;
221 }
222 break;
223 }
224 break;
225
226 case ST_ASSIGN:
227 if (*c == '=') {
228 st = ST_VALUE;
229 } else if (*c == ';') {
230 st = ST_ADD;
231 } else if (*c != ' ') {
232 goto failure;
233 }
234 break;
235
236 case ST_ADD:
237 add:
238 if (val) {
239 vallen = c - val - (*c?1:0);
240 while (val[vallen-1] == ' ') --vallen;
241 } else {
242 val = "";
243 vallen = 0;
244 }
245 if (first) {
246 first = 0;
247 add_assoc_stringl(&array, "name", key, keylen, 1);
248 add_assoc_stringl(&array, "value", val, vallen, 1);
249 } else {
250 key = estrndup(key, keylen);
251 add_assoc_stringl_ex(&array, key, keylen+1, val, vallen, 1);
252 efree(key);
253 }
254 st = ST_KEY;
255 key = val = NULL;
256 keylen = vallen = 0;
257 break;
258 }
259
260 if (*c) {
261 ++c;
262 } else if (st == ST_ADD) {
263 goto add;
264 } else {
265 break;
266 }
267 }
268
269 efree(s);
270 return SUCCESS;
271
272 failure:
273 http_error_ex(HE_WARNING, HTTP_E_INVALID_PARAM, "Unexpected character (%c) at pos %tu of %zu", *c, c-s, strlen(s));
274 efree(s);
275 return FAILURE;
276 }
277 /* }}} */
278
279 /* {{{ void http_error(long, long, char*) */
280 void _http_error_ex(long type TSRMLS_DC, long code, const char *format, ...)
281 {
282 va_list args;
283
284 va_start(args, format);
285 #ifdef ZEND_ENGINE_2
286 if ((type == E_THROW) || (PG(error_handling) == EH_THROW)) {
287 char *message;
288
289 vspprintf(&message, 0, format, args);
290 zend_throw_exception(http_exception_get_for_code(code), message, code TSRMLS_CC);
291 efree(message);
292 } else
293 #endif
294 php_verror(NULL, "", type, format, args TSRMLS_CC);
295 va_end(args);
296 }
297 /* }}} */
298
299 /* {{{ void http_log(char *, char *, char *) */
300 void _http_log_ex(char *file, const char *ident, const char *message TSRMLS_DC)
301 {
302 time_t now;
303 struct tm nowtm;
304 char datetime[20] = {0};
305
306 now = HTTP_GET_REQUEST_TIME();
307 strftime(datetime, sizeof(datetime), "%Y-%m-%d %H:%M:%S", php_localtime_r(&now, &nowtm));
308
309 #define HTTP_LOG_WRITE(file, type, msg) \
310 if (file && *file) { \
311 php_stream *log = php_stream_open_wrapper(file, "ab", REPORT_ERRORS|ENFORCE_SAFE_MODE, NULL); \
312 \
313 if (log) { \
314 php_stream_printf(log TSRMLS_CC, "%s\t[%s]\t%s\t<%s>%s", datetime, type, msg, SG(request_info).request_uri, PHP_EOL); \
315 php_stream_close(log); \
316 } \
317 \
318 }
319
320 HTTP_LOG_WRITE(file, ident, message);
321 HTTP_LOG_WRITE(HTTP_G->log.composite, ident, message);
322 }
323 /* }}} */
324
325 static void http_ob_blackhole(char *output, uint output_len, char **handled_output, uint *handled_output_len, int mode TSRMLS_DC)
326 {
327 *handled_output = ecalloc(1,1);
328 *handled_output_len = 0;
329 }
330
331 /* {{{ STATUS http_exit(int, char*, char*) */
332 STATUS _http_exit_ex(int status, char *header, char *body, zend_bool send_header TSRMLS_DC)
333 {
334 if ( (send_header && (SUCCESS != http_send_status_header(status, header))) ||
335 (!send_header && status && (SUCCESS != http_send_status(status)))) {
336 http_error_ex(HE_WARNING, HTTP_E_HEADER, "Failed to exit with status/header: %d - %s", status, header ? header : "");
337 STR_FREE(header);
338 STR_FREE(body);
339 return FAILURE;
340 }
341
342 php_end_ob_buffers(0 TSRMLS_CC);
343 if ((SUCCESS == sapi_send_headers(TSRMLS_C)) && body) {
344 PHPWRITE(body, strlen(body));
345 }
346
347 switch (status)
348 {
349 case 301: http_log(HTTP_G->log.redirect, "301-REDIRECT", header); break;
350 case 302: http_log(HTTP_G->log.redirect, "302-REDIRECT", header); break;
351 case 303: http_log(HTTP_G->log.redirect, "303-REDIRECT", header); break;
352 case 305: http_log(HTTP_G->log.redirect, "305-REDIRECT", header); break;
353 case 307: http_log(HTTP_G->log.redirect, "307-REDIRECT", header); break;
354 case 304: http_log(HTTP_G->log.cache, "304-CACHE", header); break;
355 case 405: http_log(HTTP_G->log.allowed_methods, "405-ALLOWED", header); break;
356 default: http_log(NULL, header, body); break;
357 }
358
359 STR_FREE(header);
360 STR_FREE(body);
361
362 if (HTTP_G->force_exit) {
363 zend_bailout();
364 } else {
365 php_ob_set_internal_handler(http_ob_blackhole, 4096, "blackhole", 0 TSRMLS_CC);
366 }
367
368 return SUCCESS;
369 }
370 /* }}} */
371
372 /* {{{ STATUS http_check_method(char *) */
373 STATUS _http_check_method_ex(const char *method, const char *methods)
374 {
375 const char *found;
376
377 if ( (found = strstr(methods, method)) &&
378 (found == method || !isalpha(found[-1])) &&
379 (strlen(found) >= strlen(method) && !isalpha(found[strlen(method)]))) {
380 return SUCCESS;
381 }
382 return FAILURE;
383 }
384 /* }}} */
385
386 /* {{{ zval *http_get_server_var_ex(char *, size_t) */
387 PHP_HTTP_API zval *_http_get_server_var_ex(const char *key, size_t key_size, zend_bool check TSRMLS_DC)
388 {
389 zval **hsv;
390 zval **var;
391
392 if ((SUCCESS != zend_hash_find(&EG(symbol_table), "_SERVER", sizeof("_SERVER"), (void **) &hsv)) || (Z_TYPE_PP(hsv) != IS_ARRAY)) {
393 return NULL;
394 }
395 if ((SUCCESS != zend_hash_find(Z_ARRVAL_PP(hsv), (char *) key, key_size, (void **) &var)) || (Z_TYPE_PP(var) != IS_STRING)) {
396 return NULL;
397 }
398 if (check && !(Z_STRVAL_PP(var) && Z_STRLEN_PP(var))) {
399 return NULL;
400 }
401 return *var;
402 }
403 /* }}} */
404
405 /* {{{ STATUS http_get_request_body(char **, size_t *) */
406 PHP_HTTP_API STATUS _http_get_request_body_ex(char **body, size_t *length, zend_bool dup TSRMLS_DC)
407 {
408 *length = 0;
409 *body = NULL;
410
411 if (SG(request_info).raw_post_data) {
412 *length = SG(request_info).raw_post_data_length;
413 *body = SG(request_info).raw_post_data;
414
415 if (dup) {
416 *body = estrndup(*body, *length);
417 }
418 return SUCCESS;
419 } else if (sapi_module.read_post && !HTTP_G->read_post_data) {
420 char buf[4096];
421 int len;
422
423 HTTP_G->read_post_data = 1;
424
425 while (0 < (len = sapi_module.read_post(buf, sizeof(buf) TSRMLS_CC))) {
426 *body = erealloc(*body, *length + len + 1);
427 memcpy(*body + *length, buf, len);
428 *length += len;
429 (*body)[*length] = '\0';
430 }
431
432 /* check for error */
433 if (len < 0) {
434 STR_FREE(*body);
435 *length = 0;
436 return FAILURE;
437 }
438
439 SG(request_info).raw_post_data = *body;
440 SG(request_info).raw_post_data_length = *length;
441
442 if (dup) {
443 *body = estrndup(*body, *length);
444 }
445 return SUCCESS;
446 }
447
448 return FAILURE;
449 }
450 /* }}} */
451
452 /* {{{ php_stream *_http_get_request_body_stream(void) */
453 PHP_HTTP_API php_stream *_http_get_request_body_stream(TSRMLS_D)
454 {
455 php_stream *s = NULL;
456
457 if (SG(request_info).raw_post_data) {
458 s = php_stream_open_wrapper("php://input", "rb", 0, NULL);
459 } else if (sapi_module.read_post && !HTTP_G->read_post_data) {
460 HTTP_G->read_post_data = 1;
461
462 if ((s = php_stream_temp_new())) {
463 char buf[4096];
464 int len;
465
466 while (0 < (len = sapi_module.read_post(buf, sizeof(buf) TSRMLS_CC))) {
467 php_stream_write(s, buf, len);
468 }
469
470 if (len < 0) {
471 php_stream_close(s);
472 s = NULL;
473 } else {
474 php_stream_rewind(s);
475 }
476 }
477 }
478
479 return s;
480 }
481 /* }}} */
482
483 /*
484 * Local variables:
485 * tab-width: 4
486 * c-basic-offset: 4
487 * End:
488 * vim600: noet sw=4 ts=4 fdm=marker
489 * vim<600: noet sw=4 ts=4
490 */
491