diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-17 07:56:49 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-17 07:56:49 +0000 |
commit | a415c29efee45520ae252d2aa28f1083a521cd7b (patch) | |
tree | f4ade4b6668ecc0765de7e1424f7c1427ad433ff /wp-includes/https-detection.php | |
parent | Initial commit. (diff) | |
download | wordpress-a415c29efee45520ae252d2aa28f1083a521cd7b.tar.xz wordpress-a415c29efee45520ae252d2aa28f1083a521cd7b.zip |
Adding upstream version 6.4.3+dfsg1.upstream/6.4.3+dfsg1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to '')
-rw-r--r-- | wp-includes/https-detection.php | 188 |
1 files changed, 188 insertions, 0 deletions
diff --git a/wp-includes/https-detection.php b/wp-includes/https-detection.php new file mode 100644 index 0000000..f34d6a3 --- /dev/null +++ b/wp-includes/https-detection.php @@ -0,0 +1,188 @@ +<?php +/** + * HTTPS detection functions. + * + * @package WordPress + * @since 5.7.0 + */ + +/** + * Checks whether the website is using HTTPS. + * + * This is based on whether both the home and site URL are using HTTPS. + * + * @since 5.7.0 + * @see wp_is_home_url_using_https() + * @see wp_is_site_url_using_https() + * + * @return bool True if using HTTPS, false otherwise. + */ +function wp_is_using_https() { + if ( ! wp_is_home_url_using_https() ) { + return false; + } + + return wp_is_site_url_using_https(); +} + +/** + * Checks whether the current site URL is using HTTPS. + * + * @since 5.7.0 + * @see home_url() + * + * @return bool True if using HTTPS, false otherwise. + */ +function wp_is_home_url_using_https() { + return 'https' === wp_parse_url( home_url(), PHP_URL_SCHEME ); +} + +/** + * Checks whether the current site's URL where WordPress is stored is using HTTPS. + * + * This checks the URL where WordPress application files (e.g. wp-blog-header.php or the wp-admin/ folder) + * are accessible. + * + * @since 5.7.0 + * @see site_url() + * + * @return bool True if using HTTPS, false otherwise. + */ +function wp_is_site_url_using_https() { + /* + * Use direct option access for 'siteurl' and manually run the 'site_url' + * filter because `site_url()` will adjust the scheme based on what the + * current request is using. + */ + /** This filter is documented in wp-includes/link-template.php */ + $site_url = apply_filters( 'site_url', get_option( 'siteurl' ), '', null, null ); + + return 'https' === wp_parse_url( $site_url, PHP_URL_SCHEME ); +} + +/** + * Checks whether HTTPS is supported for the server and domain. + * + * @since 5.7.0 + * + * @return bool True if HTTPS is supported, false otherwise. + */ +function wp_is_https_supported() { + $https_detection_errors = get_option( 'https_detection_errors' ); + + // If option has never been set by the Cron hook before, run it on-the-fly as fallback. + if ( false === $https_detection_errors ) { + wp_update_https_detection_errors(); + + $https_detection_errors = get_option( 'https_detection_errors' ); + } + + // If there are no detection errors, HTTPS is supported. + return empty( $https_detection_errors ); +} + +/** + * Runs a remote HTTPS request to detect whether HTTPS supported, and stores potential errors. + * + * This internal function is called by a regular Cron hook to ensure HTTPS support is detected and maintained. + * + * @since 6.4.0 + * @access private + */ +function wp_get_https_detection_errors() { + /** + * Short-circuits the process of detecting errors related to HTTPS support. + * + * Returning a `WP_Error` from the filter will effectively short-circuit the default logic of trying a remote + * request to the site over HTTPS, storing the errors array from the returned `WP_Error` instead. + * + * @since 6.4.0 + * + * @param null|WP_Error $pre Error object to short-circuit detection, + * or null to continue with the default behavior. + * @return null|WP_Error Error object if HTTPS detection errors are found, null otherwise. + */ + $support_errors = apply_filters( 'pre_wp_get_https_detection_errors', null ); + if ( is_wp_error( $support_errors ) ) { + return $support_errors->errors; + } + + $support_errors = new WP_Error(); + + $response = wp_remote_request( + home_url( '/', 'https' ), + array( + 'headers' => array( + 'Cache-Control' => 'no-cache', + ), + 'sslverify' => true, + ) + ); + + if ( is_wp_error( $response ) ) { + $unverified_response = wp_remote_request( + home_url( '/', 'https' ), + array( + 'headers' => array( + 'Cache-Control' => 'no-cache', + ), + 'sslverify' => false, + ) + ); + + if ( is_wp_error( $unverified_response ) ) { + $support_errors->add( + 'https_request_failed', + __( 'HTTPS request failed.' ) + ); + } else { + $support_errors->add( + 'ssl_verification_failed', + __( 'SSL verification failed.' ) + ); + } + + $response = $unverified_response; + } + + if ( ! is_wp_error( $response ) ) { + if ( 200 !== wp_remote_retrieve_response_code( $response ) ) { + $support_errors->add( 'bad_response_code', wp_remote_retrieve_response_message( $response ) ); + } elseif ( false === wp_is_local_html_output( wp_remote_retrieve_body( $response ) ) ) { + $support_errors->add( 'bad_response_source', __( 'It looks like the response did not come from this site.' ) ); + } + } + + return $support_errors->errors; +} + +/** + * Checks whether a given HTML string is likely an output from this WordPress site. + * + * This function attempts to check for various common WordPress patterns whether they are included in the HTML string. + * Since any of these actions may be disabled through third-party code, this function may also return null to indicate + * that it was not possible to determine ownership. + * + * @since 5.7.0 + * @access private + * + * @param string $html Full HTML output string, e.g. from a HTTP response. + * @return bool|null True/false for whether HTML was generated by this site, null if unable to determine. + */ +function wp_is_local_html_output( $html ) { + // 1. Check if HTML includes the site's Really Simple Discovery link. + if ( has_action( 'wp_head', 'rsd_link' ) ) { + $pattern = preg_replace( '#^https?:(?=//)#', '', esc_url( site_url( 'xmlrpc.php?rsd', 'rpc' ) ) ); // See rsd_link(). + return str_contains( $html, $pattern ); + } + + // 2. Check if HTML includes the site's REST API link. + if ( has_action( 'wp_head', 'rest_output_link_wp_head' ) ) { + // Try both HTTPS and HTTP since the URL depends on context. + $pattern = preg_replace( '#^https?:(?=//)#', '', esc_url( get_rest_url() ) ); // See rest_output_link_wp_head(). + return str_contains( $html, $pattern ); + } + + // Otherwise the result cannot be determined. + return null; +} |