gnu-social/vendor/padraic/humbug_get_contents/README.md

84 lines
3.1 KiB
Markdown
Raw Normal View History

2020-08-07 23:42:38 +01:00
# humbug_get_contents
[![Package version](https://img.shields.io/packagist/v/padraic/humbug_get_contents.svg?style=flat-square)](https://packagist.org/packages/padraic/humbug_get_contents)
[![Build Status](https://img.shields.io/travis/humbug/file_get_contents.svg?branch=master&style=flat-square)](https://travis-ci.org/humbug/file_get_contents?branch=master)
[![Slack](https://img.shields.io/badge/slack-%23humbug-red.svg?style=flat-square)](https://symfony.com/slack-invite)
[![License](https://img.shields.io/badge/license-MIT-red.svg?style=flat-square)](LICENSE)
Defines a `Humbug\get_contents()` function that will transparently call `file_get_contents()`,
except for HTTPS URIs where it will inject a context configured to enable secure
SSL/TLS requests on all versions of PHP 5.3+.
All versions of PHP below 5.6 not only disable SSL/TLS protections by default, but
have most other default options set insecurely. This has led to
the spread of insecure uses of `file_get_contents()` to retrieve HTTPS resources. For example,
PHAR files or API requests. Without SSL/TLS protections, all such requests are vulnerable
to Man-In-The-Middle attacks where a hacker can inject a fake response, e.g. a tailored php
file or json response.
## Installation
```bash
composer require padraic/humbug_get_contents
```
## Usage
```php
$content = Humbug\get_contents('https://www.howsmyssl.com/a/check');
```
You can use this function as an immediate alternative to `file_get_contents()` in any code
location where HTTP requests are probable.
This solution was originally implemented within the Composer Installer, so this is a
straightforward extraction of that code into a standalone package with just the one function.
It borrows functions from both Composer and Sslurp.
In rare cases, this function will complain when attempting to retrieve HTTPS URIs. This is
actually the point ;). An error should have two causes:
* A valid cafile could not be located, i.e. your server is misconfigured or missing a package
* The URI requested could not be verified, i.e. in a browser this would be a red page warning.
Neither is, in any way, a justification for disabling SSL/TLS and leaving end users vulnerable
to getting hacked. Resolve such errors; don't ignore or workaround them.
## Headers
You can set request headers, and get response headers, using the following functions.
This support is based around stream contexts, but is offered in some limited form
here as a convenience. If your needs are going to extend this, you should use a
more complete solution and double check that it fully enables and supports TLS.
```php
// Don't end headers with \r\n when setting via array
Humbug\set_headers([
'Accept-Language: da',
'User-Agent: Humbug',
]);
$response = Humbug\get_contents('http://www.example.com');
```
Request headers are emptied when used, so you would need to reset on each
`Humbug\get_contents()` call.
To retrieve an array of the last response headers:
```php
$response = Humbug\get_contents('http://www.example.com');
$headers = Humbug\get_headers();
```
## Upgrade
[Upgrade Guide](UPGRADE.md)
## Contributing
[Contribution Guide](CONTRIBUTING.md)