2015-03-16 13:28:23 +03:00
|
|
|
<?php
|
2019-12-03 21:57:53 +03:00
|
|
|
|
2018-01-16 18:41:41 +03:00
|
|
|
declare(strict_types=1);
|
2019-12-03 21:57:53 +03:00
|
|
|
|
2015-03-16 13:28:23 +03:00
|
|
|
/**
|
2016-07-21 18:07:57 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2020-04-29 12:57:22 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Daniel Kesselberg <mail@danielkesselberg.de>
|
2020-04-29 12:57:22 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2020-03-31 11:49:10 +03:00
|
|
|
* @author Mohammed Abdellatif <m.latief@gmail.com>
|
2016-07-21 19:13:36 +03:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
|
|
|
* @author Scott Shambarger <devel@shambarger.net>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
2015-03-16 13:28:23 +03:00
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OC\Http\Client;
|
|
|
|
|
|
|
|
use GuzzleHttp\Client as GuzzleClient;
|
2019-02-24 16:48:05 +03:00
|
|
|
use GuzzleHttp\RequestOptions;
|
2015-03-16 13:28:23 +03:00
|
|
|
use OCP\Http\Client\IClient;
|
2018-01-16 18:41:41 +03:00
|
|
|
use OCP\Http\Client\IResponse;
|
2020-03-24 16:19:57 +03:00
|
|
|
use OCP\Http\Client\LocalServerException;
|
2015-03-16 13:28:23 +03:00
|
|
|
use OCP\ICertificateManager;
|
|
|
|
use OCP\IConfig;
|
2020-03-24 16:19:57 +03:00
|
|
|
use OCP\ILogger;
|
2015-03-16 13:28:23 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Class Client
|
|
|
|
*
|
|
|
|
* @package OC\Http
|
|
|
|
*/
|
|
|
|
class Client implements IClient {
|
|
|
|
/** @var GuzzleClient */
|
|
|
|
private $client;
|
|
|
|
/** @var IConfig */
|
|
|
|
private $config;
|
2020-03-24 16:19:57 +03:00
|
|
|
/** @var ILogger */
|
|
|
|
private $logger;
|
2015-03-16 13:28:23 +03:00
|
|
|
/** @var ICertificateManager */
|
|
|
|
private $certificateManager;
|
|
|
|
|
2018-02-08 15:39:27 +03:00
|
|
|
public function __construct(
|
|
|
|
IConfig $config,
|
2020-03-24 16:19:57 +03:00
|
|
|
ILogger $logger,
|
2018-02-08 15:39:27 +03:00
|
|
|
ICertificateManager $certificateManager,
|
2019-02-24 16:48:05 +03:00
|
|
|
GuzzleClient $client
|
2018-02-08 15:39:27 +03:00
|
|
|
) {
|
2015-03-16 13:28:23 +03:00
|
|
|
$this->config = $config;
|
2020-03-24 16:19:57 +03:00
|
|
|
$this->logger = $logger;
|
2015-03-16 13:28:23 +03:00
|
|
|
$this->client = $client;
|
|
|
|
$this->certificateManager = $certificateManager;
|
|
|
|
}
|
|
|
|
|
2019-02-24 16:48:05 +03:00
|
|
|
private function buildRequestOptions(array $options): array {
|
2019-10-25 22:21:32 +03:00
|
|
|
$proxy = $this->getProxyUri();
|
|
|
|
|
2019-02-24 16:48:05 +03:00
|
|
|
$defaults = [
|
|
|
|
RequestOptions::VERIFY => $this->getCertBundle(),
|
2019-09-02 16:42:48 +03:00
|
|
|
RequestOptions::TIMEOUT => 30,
|
2019-02-24 16:48:05 +03:00
|
|
|
];
|
2018-02-08 15:39:27 +03:00
|
|
|
|
2019-10-25 22:21:32 +03:00
|
|
|
// Only add RequestOptions::PROXY if Nextcloud is explicitly
|
|
|
|
// configured to use a proxy. This is needed in order not to override
|
|
|
|
// Guzzle default values.
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($proxy !== null) {
|
2019-10-25 22:21:32 +03:00
|
|
|
$defaults[RequestOptions::PROXY] = $proxy;
|
|
|
|
}
|
|
|
|
|
2019-02-24 16:48:05 +03:00
|
|
|
$options = array_merge($defaults, $options);
|
2018-02-08 15:39:27 +03:00
|
|
|
|
2019-02-24 16:48:05 +03:00
|
|
|
if (!isset($options[RequestOptions::HEADERS]['User-Agent'])) {
|
|
|
|
$options[RequestOptions::HEADERS]['User-Agent'] = 'Nextcloud Server Crawler';
|
2018-02-08 15:39:27 +03:00
|
|
|
}
|
2019-02-24 16:48:05 +03:00
|
|
|
|
2018-02-08 15:39:27 +03:00
|
|
|
return $options;
|
|
|
|
}
|
|
|
|
|
2019-02-24 16:48:05 +03:00
|
|
|
private function getCertBundle(): string {
|
2020-07-03 15:21:38 +03:00
|
|
|
if ($this->certificateManager->listCertificates() !== []) {
|
|
|
|
return $this->certificateManager->getAbsoluteBundlePath();
|
|
|
|
}
|
|
|
|
|
2019-02-24 16:48:05 +03:00
|
|
|
// If the instance is not yet setup we need to use the static path as
|
2020-11-20 22:01:28 +03:00
|
|
|
// $this->certificateManager->getAbsoluteBundlePath() tries to instantiate
|
2019-02-24 16:48:05 +03:00
|
|
|
// a view
|
2020-07-03 15:21:38 +03:00
|
|
|
if ($this->config->getSystemValue('installed', false)) {
|
|
|
|
return $this->certificateManager->getAbsoluteBundlePath(null);
|
2019-02-24 16:48:05 +03:00
|
|
|
}
|
|
|
|
|
2020-07-03 15:21:38 +03:00
|
|
|
return \OC::$SERVERROOT . '/resources/config/ca-bundle.crt';
|
2015-03-16 13:28:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2019-10-25 22:21:32 +03:00
|
|
|
* Returns a null or an associative array specifiying the proxy URI for
|
|
|
|
* 'http' and 'https' schemes, in addition to a 'no' key value pair
|
|
|
|
* providing a list of host names that should not be proxied to.
|
|
|
|
*
|
|
|
|
* @return array|null
|
|
|
|
*
|
|
|
|
* The return array looks like:
|
|
|
|
* [
|
|
|
|
* 'http' => 'username:password@proxy.example.com',
|
|
|
|
* 'https' => 'username:password@proxy.example.com',
|
|
|
|
* 'no' => ['foo.com', 'bar.com']
|
|
|
|
* ]
|
2016-05-12 14:29:45 +03:00
|
|
|
*
|
2015-03-16 13:28:23 +03:00
|
|
|
*/
|
2019-10-25 22:21:32 +03:00
|
|
|
private function getProxyUri(): ?array {
|
2019-08-03 01:18:01 +03:00
|
|
|
$proxyHost = $this->config->getSystemValue('proxy', '');
|
2015-03-16 13:28:23 +03:00
|
|
|
|
2019-08-03 01:18:01 +03:00
|
|
|
if ($proxyHost === '' || $proxyHost === null) {
|
2019-02-24 16:48:05 +03:00
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2019-08-03 01:18:01 +03:00
|
|
|
$proxyUserPwd = $this->config->getSystemValue('proxyuserpwd', '');
|
2019-10-25 22:21:32 +03:00
|
|
|
if ($proxyUserPwd !== '' && $proxyUserPwd !== null) {
|
|
|
|
$proxyHost = $proxyUserPwd . '@' . $proxyHost;
|
|
|
|
}
|
|
|
|
|
|
|
|
$proxy = [
|
|
|
|
'http' => $proxyHost,
|
|
|
|
'https' => $proxyHost,
|
|
|
|
];
|
2019-02-24 21:24:13 +03:00
|
|
|
|
2019-10-25 22:21:32 +03:00
|
|
|
$proxyExclude = $this->config->getSystemValue('proxyexclude', []);
|
|
|
|
if ($proxyExclude !== [] && $proxyExclude !== null) {
|
|
|
|
$proxy['no'] = $proxyExclude;
|
2015-03-16 13:28:23 +03:00
|
|
|
}
|
|
|
|
|
2019-10-25 22:21:32 +03:00
|
|
|
return $proxy;
|
2015-03-16 13:28:23 +03:00
|
|
|
}
|
|
|
|
|
2020-03-24 16:19:57 +03:00
|
|
|
protected function preventLocalAddress(string $uri, array $options): void {
|
|
|
|
if (($options['nextcloud']['allow_local_address'] ?? false) ||
|
|
|
|
$this->config->getSystemValueBool('allow_local_remote_servers', false)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
$host = parse_url($uri, PHP_URL_HOST);
|
2020-07-29 09:32:20 +03:00
|
|
|
if ($host === false || $host === null) {
|
2020-03-24 16:19:57 +03:00
|
|
|
$this->logger->warning("Could not detect any host in $uri");
|
|
|
|
throw new LocalServerException('Could not detect any host');
|
|
|
|
}
|
|
|
|
|
|
|
|
$host = strtolower($host);
|
2020-11-20 22:01:28 +03:00
|
|
|
// Remove brackets from IPv6 addresses
|
2020-03-24 16:19:57 +03:00
|
|
|
if (strpos($host, '[') === 0 && substr($host, -1) === ']') {
|
|
|
|
$host = substr($host, 1, -1);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Disallow localhost and local network
|
|
|
|
if ($host === 'localhost' || substr($host, -6) === '.local' || substr($host, -10) === '.localhost') {
|
|
|
|
$this->logger->warning("Host $host was not connected to because it violates local access rules");
|
|
|
|
throw new LocalServerException('Host violates local access rules');
|
|
|
|
}
|
|
|
|
|
|
|
|
// Disallow hostname only
|
|
|
|
if (substr_count($host, '.') === 0) {
|
|
|
|
$this->logger->warning("Host $host was not connected to because it violates local access rules");
|
|
|
|
throw new LocalServerException('Host violates local access rules');
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((bool)filter_var($host, FILTER_VALIDATE_IP) && !filter_var($host, FILTER_VALIDATE_IP, FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE)) {
|
|
|
|
$this->logger->warning("Host $host was not connected to because it violates local access rules");
|
|
|
|
throw new LocalServerException('Host violates local access rules');
|
|
|
|
}
|
|
|
|
|
|
|
|
// Also check for IPv6 IPv4 nesting, because that's not covered by filter_var
|
|
|
|
if ((bool)filter_var($host, FILTER_VALIDATE_IP, FILTER_FLAG_IPV6) && substr_count($host, '.') > 0) {
|
|
|
|
$delimiter = strrpos($host, ':'); // Get last colon
|
|
|
|
$ipv4Address = substr($host, $delimiter + 1);
|
|
|
|
|
|
|
|
if (!filter_var($ipv4Address, FILTER_VALIDATE_IP, FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE)) {
|
|
|
|
$this->logger->warning("Host $host was not connected to because it violates local access rules");
|
|
|
|
throw new LocalServerException('Host violates local access rules');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-16 13:28:23 +03:00
|
|
|
/**
|
|
|
|
* Sends a GET request
|
2016-05-12 14:29:45 +03:00
|
|
|
*
|
2015-03-16 13:28:23 +03:00
|
|
|
* @param string $uri
|
|
|
|
* @param array $options Array such as
|
|
|
|
* 'query' => [
|
|
|
|
* 'field' => 'abc',
|
|
|
|
* 'other_field' => '123',
|
|
|
|
* 'file_name' => fopen('/path/to/file', 'r'),
|
|
|
|
* ],
|
|
|
|
* 'headers' => [
|
|
|
|
* 'foo' => 'bar',
|
|
|
|
* ],
|
|
|
|
* 'cookies' => ['
|
|
|
|
* 'foo' => 'bar',
|
|
|
|
* ],
|
|
|
|
* 'allow_redirects' => [
|
|
|
|
* 'max' => 10, // allow at most 10 redirects.
|
|
|
|
* 'strict' => true, // use "strict" RFC compliant redirects.
|
|
|
|
* 'referer' => true, // add a Referer header
|
|
|
|
* 'protocols' => ['https'] // only allow https URLs
|
|
|
|
* ],
|
|
|
|
* 'save_to' => '/path/to/file', // save to a file or a stream
|
|
|
|
* 'verify' => true, // bool or string to CA file
|
|
|
|
* 'debug' => true,
|
|
|
|
* 'timeout' => 5,
|
2018-01-16 18:41:41 +03:00
|
|
|
* @return IResponse
|
2015-03-16 13:28:23 +03:00
|
|
|
* @throws \Exception If the request could not get completed
|
|
|
|
*/
|
2018-01-16 18:41:41 +03:00
|
|
|
public function get(string $uri, array $options = []): IResponse {
|
2020-03-24 16:19:57 +03:00
|
|
|
$this->preventLocalAddress($uri, $options);
|
2019-02-24 16:48:05 +03:00
|
|
|
$response = $this->client->request('get', $uri, $this->buildRequestOptions($options));
|
2015-08-29 15:52:37 +03:00
|
|
|
$isStream = isset($options['stream']) && $options['stream'];
|
|
|
|
return new Response($response, $isStream);
|
2015-03-16 13:28:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sends a HEAD request
|
2016-05-12 14:29:45 +03:00
|
|
|
*
|
2015-03-16 13:28:23 +03:00
|
|
|
* @param string $uri
|
|
|
|
* @param array $options Array such as
|
|
|
|
* 'headers' => [
|
|
|
|
* 'foo' => 'bar',
|
|
|
|
* ],
|
|
|
|
* 'cookies' => ['
|
|
|
|
* 'foo' => 'bar',
|
|
|
|
* ],
|
|
|
|
* 'allow_redirects' => [
|
|
|
|
* 'max' => 10, // allow at most 10 redirects.
|
|
|
|
* 'strict' => true, // use "strict" RFC compliant redirects.
|
|
|
|
* 'referer' => true, // add a Referer header
|
|
|
|
* 'protocols' => ['https'] // only allow https URLs
|
|
|
|
* ],
|
|
|
|
* 'save_to' => '/path/to/file', // save to a file or a stream
|
|
|
|
* 'verify' => true, // bool or string to CA file
|
|
|
|
* 'debug' => true,
|
|
|
|
* 'timeout' => 5,
|
2018-01-16 18:41:41 +03:00
|
|
|
* @return IResponse
|
2015-08-22 15:36:01 +03:00
|
|
|
* @throws \Exception If the request could not get completed
|
2015-03-16 13:28:23 +03:00
|
|
|
*/
|
2018-01-16 18:41:41 +03:00
|
|
|
public function head(string $uri, array $options = []): IResponse {
|
2020-03-24 16:19:57 +03:00
|
|
|
$this->preventLocalAddress($uri, $options);
|
2019-02-24 16:48:05 +03:00
|
|
|
$response = $this->client->request('head', $uri, $this->buildRequestOptions($options));
|
2015-03-16 13:28:23 +03:00
|
|
|
return new Response($response);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sends a POST request
|
2016-05-12 14:29:45 +03:00
|
|
|
*
|
2015-03-16 13:28:23 +03:00
|
|
|
* @param string $uri
|
|
|
|
* @param array $options Array such as
|
|
|
|
* 'body' => [
|
|
|
|
* 'field' => 'abc',
|
|
|
|
* 'other_field' => '123',
|
|
|
|
* 'file_name' => fopen('/path/to/file', 'r'),
|
|
|
|
* ],
|
|
|
|
* 'headers' => [
|
|
|
|
* 'foo' => 'bar',
|
|
|
|
* ],
|
|
|
|
* 'cookies' => ['
|
|
|
|
* 'foo' => 'bar',
|
|
|
|
* ],
|
|
|
|
* 'allow_redirects' => [
|
|
|
|
* 'max' => 10, // allow at most 10 redirects.
|
|
|
|
* 'strict' => true, // use "strict" RFC compliant redirects.
|
|
|
|
* 'referer' => true, // add a Referer header
|
|
|
|
* 'protocols' => ['https'] // only allow https URLs
|
|
|
|
* ],
|
|
|
|
* 'save_to' => '/path/to/file', // save to a file or a stream
|
|
|
|
* 'verify' => true, // bool or string to CA file
|
|
|
|
* 'debug' => true,
|
|
|
|
* 'timeout' => 5,
|
2018-01-16 18:41:41 +03:00
|
|
|
* @return IResponse
|
2015-08-22 15:36:01 +03:00
|
|
|
* @throws \Exception If the request could not get completed
|
2015-03-16 13:28:23 +03:00
|
|
|
*/
|
2018-01-16 18:41:41 +03:00
|
|
|
public function post(string $uri, array $options = []): IResponse {
|
2020-03-24 16:19:57 +03:00
|
|
|
$this->preventLocalAddress($uri, $options);
|
|
|
|
|
2018-02-09 19:11:59 +03:00
|
|
|
if (isset($options['body']) && is_array($options['body'])) {
|
|
|
|
$options['form_params'] = $options['body'];
|
|
|
|
unset($options['body']);
|
|
|
|
}
|
2019-02-24 16:48:05 +03:00
|
|
|
$response = $this->client->request('post', $uri, $this->buildRequestOptions($options));
|
2015-03-16 13:28:23 +03:00
|
|
|
return new Response($response);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sends a PUT request
|
2016-05-12 14:29:45 +03:00
|
|
|
*
|
2015-03-16 13:28:23 +03:00
|
|
|
* @param string $uri
|
|
|
|
* @param array $options Array such as
|
|
|
|
* 'body' => [
|
|
|
|
* 'field' => 'abc',
|
|
|
|
* 'other_field' => '123',
|
|
|
|
* 'file_name' => fopen('/path/to/file', 'r'),
|
|
|
|
* ],
|
|
|
|
* 'headers' => [
|
|
|
|
* 'foo' => 'bar',
|
|
|
|
* ],
|
|
|
|
* 'cookies' => ['
|
|
|
|
* 'foo' => 'bar',
|
|
|
|
* ],
|
|
|
|
* 'allow_redirects' => [
|
|
|
|
* 'max' => 10, // allow at most 10 redirects.
|
|
|
|
* 'strict' => true, // use "strict" RFC compliant redirects.
|
|
|
|
* 'referer' => true, // add a Referer header
|
|
|
|
* 'protocols' => ['https'] // only allow https URLs
|
|
|
|
* ],
|
|
|
|
* 'save_to' => '/path/to/file', // save to a file or a stream
|
|
|
|
* 'verify' => true, // bool or string to CA file
|
|
|
|
* 'debug' => true,
|
|
|
|
* 'timeout' => 5,
|
2018-01-16 18:41:41 +03:00
|
|
|
* @return IResponse
|
2015-08-22 15:36:01 +03:00
|
|
|
* @throws \Exception If the request could not get completed
|
2015-03-16 13:28:23 +03:00
|
|
|
*/
|
2018-01-16 18:41:41 +03:00
|
|
|
public function put(string $uri, array $options = []): IResponse {
|
2020-03-24 16:19:57 +03:00
|
|
|
$this->preventLocalAddress($uri, $options);
|
2019-02-24 16:48:05 +03:00
|
|
|
$response = $this->client->request('put', $uri, $this->buildRequestOptions($options));
|
2015-03-16 13:28:23 +03:00
|
|
|
return new Response($response);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sends a DELETE request
|
2016-05-12 14:29:45 +03:00
|
|
|
*
|
2015-03-16 13:28:23 +03:00
|
|
|
* @param string $uri
|
|
|
|
* @param array $options Array such as
|
|
|
|
* 'body' => [
|
|
|
|
* 'field' => 'abc',
|
|
|
|
* 'other_field' => '123',
|
|
|
|
* 'file_name' => fopen('/path/to/file', 'r'),
|
|
|
|
* ],
|
|
|
|
* 'headers' => [
|
|
|
|
* 'foo' => 'bar',
|
|
|
|
* ],
|
|
|
|
* 'cookies' => ['
|
|
|
|
* 'foo' => 'bar',
|
|
|
|
* ],
|
|
|
|
* 'allow_redirects' => [
|
|
|
|
* 'max' => 10, // allow at most 10 redirects.
|
|
|
|
* 'strict' => true, // use "strict" RFC compliant redirects.
|
|
|
|
* 'referer' => true, // add a Referer header
|
|
|
|
* 'protocols' => ['https'] // only allow https URLs
|
|
|
|
* ],
|
|
|
|
* 'save_to' => '/path/to/file', // save to a file or a stream
|
|
|
|
* 'verify' => true, // bool or string to CA file
|
|
|
|
* 'debug' => true,
|
|
|
|
* 'timeout' => 5,
|
2018-01-16 18:41:41 +03:00
|
|
|
* @return IResponse
|
2015-08-22 15:36:01 +03:00
|
|
|
* @throws \Exception If the request could not get completed
|
2015-03-16 13:28:23 +03:00
|
|
|
*/
|
2018-01-16 18:41:41 +03:00
|
|
|
public function delete(string $uri, array $options = []): IResponse {
|
2020-03-24 16:19:57 +03:00
|
|
|
$this->preventLocalAddress($uri, $options);
|
2019-02-24 16:48:05 +03:00
|
|
|
$response = $this->client->request('delete', $uri, $this->buildRequestOptions($options));
|
2015-03-16 13:28:23 +03:00
|
|
|
return new Response($response);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sends a options request
|
2016-05-12 14:29:45 +03:00
|
|
|
*
|
2015-03-16 13:28:23 +03:00
|
|
|
* @param string $uri
|
|
|
|
* @param array $options Array such as
|
|
|
|
* 'body' => [
|
|
|
|
* 'field' => 'abc',
|
|
|
|
* 'other_field' => '123',
|
|
|
|
* 'file_name' => fopen('/path/to/file', 'r'),
|
|
|
|
* ],
|
|
|
|
* 'headers' => [
|
|
|
|
* 'foo' => 'bar',
|
|
|
|
* ],
|
|
|
|
* 'cookies' => ['
|
|
|
|
* 'foo' => 'bar',
|
|
|
|
* ],
|
|
|
|
* 'allow_redirects' => [
|
|
|
|
* 'max' => 10, // allow at most 10 redirects.
|
|
|
|
* 'strict' => true, // use "strict" RFC compliant redirects.
|
|
|
|
* 'referer' => true, // add a Referer header
|
|
|
|
* 'protocols' => ['https'] // only allow https URLs
|
|
|
|
* ],
|
|
|
|
* 'save_to' => '/path/to/file', // save to a file or a stream
|
|
|
|
* 'verify' => true, // bool or string to CA file
|
|
|
|
* 'debug' => true,
|
|
|
|
* 'timeout' => 5,
|
2018-01-16 18:41:41 +03:00
|
|
|
* @return IResponse
|
2015-08-22 15:36:01 +03:00
|
|
|
* @throws \Exception If the request could not get completed
|
2015-03-16 13:28:23 +03:00
|
|
|
*/
|
2018-01-16 18:41:41 +03:00
|
|
|
public function options(string $uri, array $options = []): IResponse {
|
2020-03-24 16:19:57 +03:00
|
|
|
$this->preventLocalAddress($uri, $options);
|
2019-02-24 16:48:05 +03:00
|
|
|
$response = $this->client->request('options', $uri, $this->buildRequestOptions($options));
|
2015-03-16 13:28:23 +03:00
|
|
|
return new Response($response);
|
|
|
|
}
|
|
|
|
}
|