# humbug_get_contents [![Package version](https://img.shields.io/packagist/v/padraic/humbug_get_contents.svg?style=flat-square)](https://packagist.org/packages/padraic/humbug_get_contents) [![Build Status](https://img.shields.io/travis/humbug/file_get_contents.svg?branch=master&style=flat-square)](https://travis-ci.org/humbug/file_get_contents?branch=master) [![Slack](https://img.shields.io/badge/slack-%23humbug-red.svg?style=flat-square)](https://symfony.com/slack-invite) [![License](https://img.shields.io/badge/license-MIT-red.svg?style=flat-square)](LICENSE) Defines a `Humbug\get_contents()` function that will transparently call `file_get_contents()`, except for HTTPS URIs where it will inject a context configured to enable secure SSL/TLS requests on all versions of PHP 5.3+. All versions of PHP below 5.6 not only disable SSL/TLS protections by default, but have most other default options set insecurely. This has led to the spread of insecure uses of `file_get_contents()` to retrieve HTTPS resources. For example, PHAR files or API requests. Without SSL/TLS protections, all such requests are vulnerable to Man-In-The-Middle attacks where a hacker can inject a fake response, e.g. a tailored php file or json response. ## Installation ```bash composer require padraic/humbug_get_contents ``` ## Usage ```php $content = Humbug\get_contents('https://www.howsmyssl.com/a/check'); ``` You can use this function as an immediate alternative to `file_get_contents()` in any code location where HTTP requests are probable. This solution was originally implemented within the Composer Installer, so this is a straightforward extraction of that code into a standalone package with just the one function. It borrows functions from both Composer and Sslurp. In rare cases, this function will complain when attempting to retrieve HTTPS URIs. This is actually the point ;). An error should have two causes: * A valid cafile could not be located, i.e. your server is misconfigured or missing a package * The URI requested could not be verified, i.e. in a browser this would be a red page warning. Neither is, in any way, a justification for disabling SSL/TLS and leaving end users vulnerable to getting hacked. Resolve such errors; don't ignore or workaround them. ## Headers You can set request headers, and get response headers, using the following functions. This support is based around stream contexts, but is offered in some limited form here as a convenience. If your needs are going to extend this, you should use a more complete solution and double check that it fully enables and supports TLS. ```php // Don't end headers with \r\n when setting via array Humbug\set_headers([ 'Accept-Language: da', 'User-Agent: Humbug', ]); $response = Humbug\get_contents('http://www.example.com'); ``` Request headers are emptied when used, so you would need to reset on each `Humbug\get_contents()` call. To retrieve an array of the last response headers: ```php $response = Humbug\get_contents('http://www.example.com'); $headers = Humbug\get_headers(); ``` ## Upgrade [Upgrade Guide](UPGRADE.md) ## Contributing [Contribution Guide](CONTRIBUTING.md)