├── .github └── dependabot.yml ├── COPYING ├── Changes ├── README.md ├── composer.json ├── examples └── minfraud.php └── src ├── CreditCardFraudDetection.php └── HTTPBase.php /.github/dependabot.yml: -------------------------------------------------------------------------------- 1 | version: 2 2 | updates: 3 | - package-ecosystem: composer 4 | directory: "/" 5 | schedule: 6 | interval: daily 7 | open-pull-requests-limit: 10 8 | -------------------------------------------------------------------------------- /COPYING: -------------------------------------------------------------------------------- 1 | GNU LESSER GENERAL PUBLIC LICENSE 2 | Version 2.1, February 1999 3 | 4 | Copyright (C) 1991, 1999 Free Software Foundation, Inc. 5 | 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA 6 | Everyone is permitted to copy and distribute verbatim copies 7 | of this license document, but changing it is not allowed. 8 | 9 | [This is the first released version of the Lesser GPL. It also counts 10 | as the successor of the GNU Library Public License, version 2, hence 11 | the version number 2.1.] 12 | 13 | Preamble 14 | 15 | The licenses for most software are designed to take away your 16 | freedom to share and change it. By contrast, the GNU General Public 17 | Licenses are intended to guarantee your freedom to share and change 18 | free software--to make sure the software is free for all its users. 19 | 20 | This license, the Lesser General Public License, applies to some 21 | specially designated software packages--typically libraries--of the 22 | Free Software Foundation and other authors who decide to use it. You 23 | can use it too, but we suggest you first think carefully about whether 24 | this license or the ordinary General Public License is the better 25 | strategy to use in any particular case, based on the explanations below. 26 | 27 | When we speak of free software, we are referring to freedom of use, 28 | not price. Our General Public Licenses are designed to make sure that 29 | you have the freedom to distribute copies of free software (and charge 30 | for this service if you wish); that you receive source code or can get 31 | it if you want it; that you can change the software and use pieces of 32 | it in new free programs; and that you are informed that you can do 33 | these things. 34 | 35 | To protect your rights, we need to make restrictions that forbid 36 | distributors to deny you these rights or to ask you to surrender these 37 | rights. These restrictions translate to certain responsibilities for 38 | you if you distribute copies of the library or if you modify it. 39 | 40 | For example, if you distribute copies of the library, whether gratis 41 | or for a fee, you must give the recipients all the rights that we gave 42 | you. You must make sure that they, too, receive or can get the source 43 | code. If you link other code with the library, you must provide 44 | complete object files to the recipients, so that they can relink them 45 | with the library after making changes to the library and recompiling 46 | it. And you must show them these terms so they know their rights. 47 | 48 | We protect your rights with a two-step method: (1) we copyright the 49 | library, and (2) we offer you this license, which gives you legal 50 | permission to copy, distribute and/or modify the library. 51 | 52 | To protect each distributor, we want to make it very clear that 53 | there is no warranty for the free library. Also, if the library is 54 | modified by someone else and passed on, the recipients should know 55 | that what they have is not the original version, so that the original 56 | author's reputation will not be affected by problems that might be 57 | introduced by others. 58 | 59 | Finally, software patents pose a constant threat to the existence of 60 | any free program. We wish to make sure that a company cannot 61 | effectively restrict the users of a free program by obtaining a 62 | restrictive license from a patent holder. Therefore, we insist that 63 | any patent license obtained for a version of the library must be 64 | consistent with the full freedom of use specified in this license. 65 | 66 | Most GNU software, including some libraries, is covered by the 67 | ordinary GNU General Public License. This license, the GNU Lesser 68 | General Public License, applies to certain designated libraries, and 69 | is quite different from the ordinary General Public License. We use 70 | this license for certain libraries in order to permit linking those 71 | libraries into non-free programs. 72 | 73 | When a program is linked with a library, whether statically or using 74 | a shared library, the combination of the two is legally speaking a 75 | combined work, a derivative of the original library. The ordinary 76 | General Public License therefore permits such linking only if the 77 | entire combination fits its criteria of freedom. The Lesser General 78 | Public License permits more lax criteria for linking other code with 79 | the library. 80 | 81 | We call this license the "Lesser" General Public License because it 82 | does Less to protect the user's freedom than the ordinary General 83 | Public License. It also provides other free software developers Less 84 | of an advantage over competing non-free programs. These disadvantages 85 | are the reason we use the ordinary General Public License for many 86 | libraries. However, the Lesser license provides advantages in certain 87 | special circumstances. 88 | 89 | For example, on rare occasions, there may be a special need to 90 | encourage the widest possible use of a certain library, so that it becomes 91 | a de-facto standard. To achieve this, non-free programs must be 92 | allowed to use the library. A more frequent case is that a free 93 | library does the same job as widely used non-free libraries. In this 94 | case, there is little to gain by limiting the free library to free 95 | software only, so we use the Lesser General Public License. 96 | 97 | In other cases, permission to use a particular library in non-free 98 | programs enables a greater number of people to use a large body of 99 | free software. For example, permission to use the GNU C Library in 100 | non-free programs enables many more people to use the whole GNU 101 | operating system, as well as its variant, the GNU/Linux operating 102 | system. 103 | 104 | Although the Lesser General Public License is Less protective of the 105 | users' freedom, it does ensure that the user of a program that is 106 | linked with the Library has the freedom and the wherewithal to run 107 | that program using a modified version of the Library. 108 | 109 | The precise terms and conditions for copying, distribution and 110 | modification follow. Pay close attention to the difference between a 111 | "work based on the library" and a "work that uses the library". The 112 | former contains code derived from the library, whereas the latter must 113 | be combined with the library in order to run. 114 | 115 | GNU LESSER GENERAL PUBLIC LICENSE 116 | TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 117 | 118 | 0. This License Agreement applies to any software library or other 119 | program which contains a notice placed by the copyright holder or 120 | other authorized party saying it may be distributed under the terms of 121 | this Lesser General Public License (also called "this License"). 122 | Each licensee is addressed as "you". 123 | 124 | A "library" means a collection of software functions and/or data 125 | prepared so as to be conveniently linked with application programs 126 | (which use some of those functions and data) to form executables. 127 | 128 | The "Library", below, refers to any such software library or work 129 | which has been distributed under these terms. A "work based on the 130 | Library" means either the Library or any derivative work under 131 | copyright law: that is to say, a work containing the Library or a 132 | portion of it, either verbatim or with modifications and/or translated 133 | straightforwardly into another language. (Hereinafter, translation is 134 | included without limitation in the term "modification".) 135 | 136 | "Source code" for a work means the preferred form of the work for 137 | making modifications to it. For a library, complete source code means 138 | all the source code for all modules it contains, plus any associated 139 | interface definition files, plus the scripts used to control compilation 140 | and installation of the library. 141 | 142 | Activities other than copying, distribution and modification are not 143 | covered by this License; they are outside its scope. The act of 144 | running a program using the Library is not restricted, and output from 145 | such a program is covered only if its contents constitute a work based 146 | on the Library (independent of the use of the Library in a tool for 147 | writing it). Whether that is true depends on what the Library does 148 | and what the program that uses the Library does. 149 | 150 | 1. You may copy and distribute verbatim copies of the Library's 151 | complete source code as you receive it, in any medium, provided that 152 | you conspicuously and appropriately publish on each copy an 153 | appropriate copyright notice and disclaimer of warranty; keep intact 154 | all the notices that refer to this License and to the absence of any 155 | warranty; and distribute a copy of this License along with the 156 | Library. 157 | 158 | You may charge a fee for the physical act of transferring a copy, 159 | and you may at your option offer warranty protection in exchange for a 160 | fee. 161 | 162 | 2. You may modify your copy or copies of the Library or any portion 163 | of it, thus forming a work based on the Library, and copy and 164 | distribute such modifications or work under the terms of Section 1 165 | above, provided that you also meet all of these conditions: 166 | 167 | a) The modified work must itself be a software library. 168 | 169 | b) You must cause the files modified to carry prominent notices 170 | stating that you changed the files and the date of any change. 171 | 172 | c) You must cause the whole of the work to be licensed at no 173 | charge to all third parties under the terms of this License. 174 | 175 | d) If a facility in the modified Library refers to a function or a 176 | table of data to be supplied by an application program that uses 177 | the facility, other than as an argument passed when the facility 178 | is invoked, then you must make a good faith effort to ensure that, 179 | in the event an application does not supply such function or 180 | table, the facility still operates, and performs whatever part of 181 | its purpose remains meaningful. 182 | 183 | (For example, a function in a library to compute square roots has 184 | a purpose that is entirely well-defined independent of the 185 | application. Therefore, Subsection 2d requires that any 186 | application-supplied function or table used by this function must 187 | be optional: if the application does not supply it, the square 188 | root function must still compute square roots.) 189 | 190 | These requirements apply to the modified work as a whole. If 191 | identifiable sections of that work are not derived from the Library, 192 | and can be reasonably considered independent and separate works in 193 | themselves, then this License, and its terms, do not apply to those 194 | sections when you distribute them as separate works. But when you 195 | distribute the same sections as part of a whole which is a work based 196 | on the Library, the distribution of the whole must be on the terms of 197 | this License, whose permissions for other licensees extend to the 198 | entire whole, and thus to each and every part regardless of who wrote 199 | it. 200 | 201 | Thus, it is not the intent of this section to claim rights or contest 202 | your rights to work written entirely by you; rather, the intent is to 203 | exercise the right to control the distribution of derivative or 204 | collective works based on the Library. 205 | 206 | In addition, mere aggregation of another work not based on the Library 207 | with the Library (or with a work based on the Library) on a volume of 208 | a storage or distribution medium does not bring the other work under 209 | the scope of this License. 210 | 211 | 3. You may opt to apply the terms of the ordinary GNU General Public 212 | License instead of this License to a given copy of the Library. To do 213 | this, you must alter all the notices that refer to this License, so 214 | that they refer to the ordinary GNU General Public License, version 2, 215 | instead of to this License. (If a newer version than version 2 of the 216 | ordinary GNU General Public License has appeared, then you can specify 217 | that version instead if you wish.) Do not make any other change in 218 | these notices. 219 | 220 | Once this change is made in a given copy, it is irreversible for 221 | that copy, so the ordinary GNU General Public License applies to all 222 | subsequent copies and derivative works made from that copy. 223 | 224 | This option is useful when you wish to copy part of the code of 225 | the Library into a program that is not a library. 226 | 227 | 4. You may copy and distribute the Library (or a portion or 228 | derivative of it, under Section 2) in object code or executable form 229 | under the terms of Sections 1 and 2 above provided that you accompany 230 | it with the complete corresponding machine-readable source code, which 231 | must be distributed under the terms of Sections 1 and 2 above on a 232 | medium customarily used for software interchange. 233 | 234 | If distribution of object code is made by offering access to copy 235 | from a designated place, then offering equivalent access to copy the 236 | source code from the same place satisfies the requirement to 237 | distribute the source code, even though third parties are not 238 | compelled to copy the source along with the object code. 239 | 240 | 5. A program that contains no derivative of any portion of the 241 | Library, but is designed to work with the Library by being compiled or 242 | linked with it, is called a "work that uses the Library". Such a 243 | work, in isolation, is not a derivative work of the Library, and 244 | therefore falls outside the scope of this License. 245 | 246 | However, linking a "work that uses the Library" with the Library 247 | creates an executable that is a derivative of the Library (because it 248 | contains portions of the Library), rather than a "work that uses the 249 | library". The executable is therefore covered by this License. 250 | Section 6 states terms for distribution of such executables. 251 | 252 | When a "work that uses the Library" uses material from a header file 253 | that is part of the Library, the object code for the work may be a 254 | derivative work of the Library even though the source code is not. 255 | Whether this is true is especially significant if the work can be 256 | linked without the Library, or if the work is itself a library. The 257 | threshold for this to be true is not precisely defined by law. 258 | 259 | If such an object file uses only numerical parameters, data 260 | structure layouts and accessors, and small macros and small inline 261 | functions (ten lines or less in length), then the use of the object 262 | file is unrestricted, regardless of whether it is legally a derivative 263 | work. (Executables containing this object code plus portions of the 264 | Library will still fall under Section 6.) 265 | 266 | Otherwise, if the work is a derivative of the Library, you may 267 | distribute the object code for the work under the terms of Section 6. 268 | Any executables containing that work also fall under Section 6, 269 | whether or not they are linked directly with the Library itself. 270 | 271 | 6. As an exception to the Sections above, you may also combine or 272 | link a "work that uses the Library" with the Library to produce a 273 | work containing portions of the Library, and distribute that work 274 | under terms of your choice, provided that the terms permit 275 | modification of the work for the customer's own use and reverse 276 | engineering for debugging such modifications. 277 | 278 | You must give prominent notice with each copy of the work that the 279 | Library is used in it and that the Library and its use are covered by 280 | this License. You must supply a copy of this License. If the work 281 | during execution displays copyright notices, you must include the 282 | copyright notice for the Library among them, as well as a reference 283 | directing the user to the copy of this License. Also, you must do one 284 | of these things: 285 | 286 | a) Accompany the work with the complete corresponding 287 | machine-readable source code for the Library including whatever 288 | changes were used in the work (which must be distributed under 289 | Sections 1 and 2 above); and, if the work is an executable linked 290 | with the Library, with the complete machine-readable "work that 291 | uses the Library", as object code and/or source code, so that the 292 | user can modify the Library and then relink to produce a modified 293 | executable containing the modified Library. (It is understood 294 | that the user who changes the contents of definitions files in the 295 | Library will not necessarily be able to recompile the application 296 | to use the modified definitions.) 297 | 298 | b) Use a suitable shared library mechanism for linking with the 299 | Library. A suitable mechanism is one that (1) uses at run time a 300 | copy of the library already present on the user's computer system, 301 | rather than copying library functions into the executable, and (2) 302 | will operate properly with a modified version of the library, if 303 | the user installs one, as long as the modified version is 304 | interface-compatible with the version that the work was made with. 305 | 306 | c) Accompany the work with a written offer, valid for at 307 | least three years, to give the same user the materials 308 | specified in Subsection 6a, above, for a charge no more 309 | than the cost of performing this distribution. 310 | 311 | d) If distribution of the work is made by offering access to copy 312 | from a designated place, offer equivalent access to copy the above 313 | specified materials from the same place. 314 | 315 | e) Verify that the user has already received a copy of these 316 | materials or that you have already sent this user a copy. 317 | 318 | For an executable, the required form of the "work that uses the 319 | Library" must include any data and utility programs needed for 320 | reproducing the executable from it. However, as a special exception, 321 | the materials to be distributed need not include anything that is 322 | normally distributed (in either source or binary form) with the major 323 | components (compiler, kernel, and so on) of the operating system on 324 | which the executable runs, unless that component itself accompanies 325 | the executable. 326 | 327 | It may happen that this requirement contradicts the license 328 | restrictions of other proprietary libraries that do not normally 329 | accompany the operating system. Such a contradiction means you cannot 330 | use both them and the Library together in an executable that you 331 | distribute. 332 | 333 | 7. You may place library facilities that are a work based on the 334 | Library side-by-side in a single library together with other library 335 | facilities not covered by this License, and distribute such a combined 336 | library, provided that the separate distribution of the work based on 337 | the Library and of the other library facilities is otherwise 338 | permitted, and provided that you do these two things: 339 | 340 | a) Accompany the combined library with a copy of the same work 341 | based on the Library, uncombined with any other library 342 | facilities. This must be distributed under the terms of the 343 | Sections above. 344 | 345 | b) Give prominent notice with the combined library of the fact 346 | that part of it is a work based on the Library, and explaining 347 | where to find the accompanying uncombined form of the same work. 348 | 349 | 8. You may not copy, modify, sublicense, link with, or distribute 350 | the Library except as expressly provided under this License. Any 351 | attempt otherwise to copy, modify, sublicense, link with, or 352 | distribute the Library is void, and will automatically terminate your 353 | rights under this License. However, parties who have received copies, 354 | or rights, from you under this License will not have their licenses 355 | terminated so long as such parties remain in full compliance. 356 | 357 | 9. You are not required to accept this License, since you have not 358 | signed it. However, nothing else grants you permission to modify or 359 | distribute the Library or its derivative works. These actions are 360 | prohibited by law if you do not accept this License. Therefore, by 361 | modifying or distributing the Library (or any work based on the 362 | Library), you indicate your acceptance of this License to do so, and 363 | all its terms and conditions for copying, distributing or modifying 364 | the Library or works based on it. 365 | 366 | 10. Each time you redistribute the Library (or any work based on the 367 | Library), the recipient automatically receives a license from the 368 | original licensor to copy, distribute, link with or modify the Library 369 | subject to these terms and conditions. You may not impose any further 370 | restrictions on the recipients' exercise of the rights granted herein. 371 | You are not responsible for enforcing compliance by third parties with 372 | this License. 373 | 374 | 11. If, as a consequence of a court judgment or allegation of patent 375 | infringement or for any other reason (not limited to patent issues), 376 | conditions are imposed on you (whether by court order, agreement or 377 | otherwise) that contradict the conditions of this License, they do not 378 | excuse you from the conditions of this License. If you cannot 379 | distribute so as to satisfy simultaneously your obligations under this 380 | License and any other pertinent obligations, then as a consequence you 381 | may not distribute the Library at all. For example, if a patent 382 | license would not permit royalty-free redistribution of the Library by 383 | all those who receive copies directly or indirectly through you, then 384 | the only way you could satisfy both it and this License would be to 385 | refrain entirely from distribution of the Library. 386 | 387 | If any portion of this section is held invalid or unenforceable under any 388 | particular circumstance, the balance of the section is intended to apply, 389 | and the section as a whole is intended to apply in other circumstances. 390 | 391 | It is not the purpose of this section to induce you to infringe any 392 | patents or other property right claims or to contest validity of any 393 | such claims; this section has the sole purpose of protecting the 394 | integrity of the free software distribution system which is 395 | implemented by public license practices. Many people have made 396 | generous contributions to the wide range of software distributed 397 | through that system in reliance on consistent application of that 398 | system; it is up to the author/donor to decide if he or she is willing 399 | to distribute software through any other system and a licensee cannot 400 | impose that choice. 401 | 402 | This section is intended to make thoroughly clear what is believed to 403 | be a consequence of the rest of this License. 404 | 405 | 12. If the distribution and/or use of the Library is restricted in 406 | certain countries either by patents or by copyrighted interfaces, the 407 | original copyright holder who places the Library under this License may add 408 | an explicit geographical distribution limitation excluding those countries, 409 | so that distribution is permitted only in or among countries not thus 410 | excluded. In such case, this License incorporates the limitation as if 411 | written in the body of this License. 412 | 413 | 13. The Free Software Foundation may publish revised and/or new 414 | versions of the Lesser General Public License from time to time. 415 | Such new versions will be similar in spirit to the present version, 416 | but may differ in detail to address new problems or concerns. 417 | 418 | Each version is given a distinguishing version number. If the Library 419 | specifies a version number of this License which applies to it and 420 | "any later version", you have the option of following the terms and 421 | conditions either of that version or of any later version published by 422 | the Free Software Foundation. If the Library does not specify a 423 | license version number, you may choose any version ever published by 424 | the Free Software Foundation. 425 | 426 | 14. If you wish to incorporate parts of the Library into other free 427 | programs whose distribution conditions are incompatible with these, 428 | write to the author to ask for permission. For software which is 429 | copyrighted by the Free Software Foundation, write to the Free 430 | Software Foundation; we sometimes make exceptions for this. Our 431 | decision will be guided by the two goals of preserving the free status 432 | of all derivatives of our free software and of promoting the sharing 433 | and reuse of software generally. 434 | 435 | NO WARRANTY 436 | 437 | 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO 438 | WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. 439 | EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR 440 | OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY 441 | KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE 442 | IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 443 | PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE 444 | LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME 445 | THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 446 | 447 | 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN 448 | WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY 449 | AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU 450 | FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR 451 | CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE 452 | LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING 453 | RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A 454 | FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF 455 | SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH 456 | DAMAGES. 457 | 458 | END OF TERMS AND CONDITIONS 459 | 460 | How to Apply These Terms to Your New Libraries 461 | 462 | If you develop a new library, and you want it to be of the greatest 463 | possible use to the public, we recommend making it free software that 464 | everyone can redistribute and change. You can do so by permitting 465 | redistribution under these terms (or, alternatively, under the terms of the 466 | ordinary General Public License). 467 | 468 | To apply these terms, attach the following notices to the library. It is 469 | safest to attach them to the start of each source file to most effectively 470 | convey the exclusion of warranty; and each file should have at least the 471 | "copyright" line and a pointer to where the full notice is found. 472 | 473 | 474 | Copyright (C) 475 | 476 | This library is free software; you can redistribute it and/or 477 | modify it under the terms of the GNU Lesser General Public 478 | License as published by the Free Software Foundation; either 479 | version 2.1 of the License, or (at your option) any later version. 480 | 481 | This library is distributed in the hope that it will be useful, 482 | but WITHOUT ANY WARRANTY; without even the implied warranty of 483 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 484 | Lesser General Public License for more details. 485 | 486 | You should have received a copy of the GNU Lesser General Public 487 | License along with this library; if not, write to the Free Software 488 | Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA 489 | 490 | Also add information on how to contact you by electronic and paper mail. 491 | 492 | You should also get your employer (if you work as a programmer) or your 493 | school, if any, to sign a "copyright disclaimer" for the library, if 494 | necessary. Here is a sample; alter the names: 495 | 496 | Yoyodyne, Inc., hereby disclaims all copyright interest in the 497 | library `Frob' (a library for tweaking knobs) written by James Random Hacker. 498 | 499 | , 1 April 1990 500 | Ty Coon, President of Vice 501 | 502 | That's all there is to it! 503 | 504 | 505 | -------------------------------------------------------------------------------- /Changes: -------------------------------------------------------------------------------- 1 | Revision history for MaxMind CreditCardFraudDetection PHP API 2 | 3 | ## 1.71 2016-10-13 4 | 5 | * Support for adding a proxy. Pull request by Geoffrey. GitHub #22. 6 | * Composer will now use `classmap` to load the classes on demand instead of 7 | loading them all the time. Pull request by nimasdj. GitHub #24. 8 | * The example code was updated. Pull request by nimasdj. GitHub #23. 9 | 10 | ## 1.70 2015-07-21 11 | 12 | * Support for the Telephone Verification Service was removed as this service 13 | is no longer offered. 14 | 15 | ## 1.60 2014-07-23 16 | 17 | * Important: SSL certificates are now verified. If you use SSL and are on 18 | a platform where cURL's cainfo is not set by default, you must either 19 | set set curl.cainfo in your php.ini file or use the setCurlCaInfo() 20 | method on the CreditCardFraudDetection object to set the certificates 21 | to be used. (GitHub #11) 22 | * Added a useUtf8(bool) method that can be used to enable the conversion 23 | of the web service response to UTF-8. (GitHub #12) 24 | * Undefined value warning fix. (GitHub #8) 25 | 26 | ## 1.54 2013-09-01 27 | 28 | * Remove custom DNS cache support. ( Boris Zentner ) 29 | * Fixed Composer require issue. ( james-lsn ) 30 | 31 | ## 1.53 2013-06-24 32 | 33 | * Removed deprecated use of `ereg`. 34 | * Added Composer support. 35 | * Reorganized source package. 36 | 37 | ## 1.52 2012-08-08 38 | 39 | * Allow all input fields supported by minFraud 1.4 (Boris Zentner) 40 | * Remove LocationVerification example and API (Boris Zentner) 41 | 42 | ## 1.50 2012-03-13 43 | 44 | * Check countryMatch instead of score. Score is not avail as of 45 | minfraud_version 1.3 and might be empty. (Boris Zentner) 46 | 47 | ## 1.49 2009-02-19 48 | 49 | * Add minfraud3.maxmind.com to the server list ( Boris Zentner ) 50 | 51 | ## 1.48 2008-10-03 52 | 53 | * Add new optional fields user_agent and accept_language for CCFD requests ( Boris Zentner ) 54 | 55 | ## 1.47 2008-04-25 56 | 57 | * Changed license from GPL to LGPL 58 | 59 | ## 1.46 2007-10-04 60 | 61 | * Replaced www.maxmind.com and www2.maxmind.com with minfraud1.maxmind.com and minfraud2.maxmind.com 62 | 63 | ## 1.43 2006-10-03 64 | 65 | * Added support for new input fields, usernameMD5 and passwordMD5 66 | * Changed require ("HTTPBase.php") to require_once ("HTTPBase.php") 67 | in case both CCFD and Telephone Verification files are used (Mike Mallinson) 68 | 69 | ## 1.4 2005-08-08 70 | 71 | * Added support for Telephone Verification 72 | * Use POST method instead of GET method, fixes bug where query string 73 | was truncated 74 | * Added support for bypassing DNS using IP addresses 75 | * Added shipCity shipRegion shipPostal shipCountry to list of input fields 76 | 77 | ## 1.3 2005-02-09 78 | 79 | * Added requested_type, forwardedIP, emailMD5, shipAddr, 80 | txnID, sessionID to list of input fields 81 | * Added LocationVerification.php 82 | * Replaced global variables with class fields (David Recordon) 83 | 84 | ## 1.2 2004-07-02 85 | 86 | * Added binName, binPhone, custPhone to list of input fields 87 | 88 | ## 1.1 2004-06-08 89 | 90 | * Replaced h1 and h2 servers with www and www2 (all ending with maxmind.com) 91 | * Fixed URL encoding bug 92 | * Fixed curl code 93 | * Added debug and timeout options 94 | * Failover if score field not set 95 | 96 | ## 1.0 2004-05-05 97 | 98 | * original version 99 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Maxmind minFraud PHP API # 2 | 3 | ## Deprecation ## 4 | 5 | This library is deprecated. Please use our [minFraud Score, Insights, and 6 | Factors API](https://github.com/maxmind/minfraud-api-php). 7 | 8 | ## Install via Composer ## 9 | 10 | We recommend installing this package with [Composer](http://getcomposer.org/). 11 | 12 | ### Download Composer ### 13 | 14 | To download Composer, run in the root directory of your project: 15 | 16 | ```bash 17 | curl -sS https://getcomposer.org/installer | php 18 | ``` 19 | 20 | You should now have the file `composer.phar` in your project directory. 21 | 22 | ### Install Dependencies ### 23 | 24 | Run in your project root: 25 | 26 | ``` 27 | php composer.phar require minfraud/http:~1.70 28 | ``` 29 | 30 | You should now have the files `composer.json` and `composer.lock` as well as 31 | the directory `vendor` in your project directory. If you use a version control 32 | system, `composer.json` should be added to it. 33 | 34 | ### Require Autoloader ### 35 | 36 | After installing the dependencies, you need to require the Composer autoloader 37 | from your code: 38 | 39 | ```php 40 | require 'vendor/autoload.php'; 41 | ``` 42 | 43 | ## Install without Composer ## 44 | 45 | Place the files in the `src` directory in the `include_path` as specified in 46 | your `php.ini` file or place them in the same directory as your PHP scripts. 47 | 48 | ## Example Scripts ## 49 | 50 | See `examples/minfraud.php` for complete example how to use this API with the 51 | minFraud service. 52 | 53 | These scripts can be run from the shell. 54 | 55 | ## Usage ## 56 | 57 | ```php 58 | "YOUR_LICENSE_KEY_HERE", 63 | "i" => "24.24.24.24", 64 | "city" => "New York", 65 | "region" => "NY", 66 | "postal" => "11434", 67 | "country" => "US", 68 | // Other inputs from http://dev.maxmind.com/minfraud/ 69 | ); 70 | 71 | $ccfs = new CreditCardFraudDetection; 72 | $ccfs->input($inputs); 73 | $ccfs->query(); 74 | $outputs = $ccfs->output(); 75 | 76 | print_r($outputs); 77 | ``` 78 | 79 | ### $ccfs->isSecure ### 80 | 81 | If isSecure is set to 0 then it uses regular HTTP. If isSecure is set to 1 82 | then it uses Secure HTTPS (requires Curl PHP binding). 83 | 84 | ### $ccfs->useUtf8($bool) 85 | 86 | If set to true, the output values will be converted from ISO 8859-1 to UTF-8. 87 | Defaults to false. 88 | 89 | ### $ccfs->setCurlCaInfo($cert) 90 | 91 | Sets the path to the SSL certificate to be used by cURL. If this is not set, 92 | the default certificate is used. If no certificates are available and isSecure 93 | has not been disabled, the query will fail. 94 | 95 | ### $ccfs->setCurlProxy($proxy) 96 | 97 | Sets the host:port of a proxy to be used by cURL. If this is not set, 98 | no proxy is used. For example, `$ccfs->setCurlProxy('proxy.example.com:3128');` 99 | 100 | ### $ccfs->input($array) ### 101 | 102 | Takes an array of key/value pairs to use as input for the server. See 103 | http://dev.maxmind.com/minfraud/ for details on input fields. 104 | 105 | ### $ccfs->query() ### 106 | 107 | Queries the server with the fields passed to the input method 108 | and stores the output. 109 | 110 | ### $ccfs->output(); 111 | 112 | Returns the output from the server. See http://dev.maxmind.com/minfraud/ 113 | for details on output fields. 114 | 115 | ## Secure HTTPS ## 116 | 117 | Secure HTTPS is on by default. In order to use it, you need to have 118 | the Curl PHP binding, the curl library and the OpenSSL library. 119 | 120 | You can download the curl libary at: 121 | http://curl.haxx.se/download.html 122 | http://curl.haxx.se/docs/install.html for installation details 123 | 124 | It is recommended that you install these packages in this order: 125 | 126 | 1. OpenSSL library 127 | 2. Curl library 128 | 3. Curl PHP binding 129 | 130 | =============================== 131 | Copyright (c) 2014, MaxMind, Inc 132 | 133 | All rights reserved. This package is licensed under the LGPL. For details 134 | see the COPYING file. 135 | -------------------------------------------------------------------------------- /composer.json: -------------------------------------------------------------------------------- 1 | { 2 | "name": "minfraud/http", 3 | "description": "MaxMind minFraud HTTP API", 4 | "keywords": ["fraud", "minfraud", "maxmind"], 5 | "homepage": "https://github.com/maxmind/ccfd-api-php", 6 | "type": "library", 7 | "license": "LGPL-2.1+", 8 | "authors": [ 9 | { 10 | "name": "MaxMind, Inc.", 11 | "email": "support@maxmind.com", 12 | "homepage": "http://www.maxmind.com/" 13 | } 14 | ], 15 | "autoload": { 16 | "classmap": [ 17 | "src" 18 | ] 19 | } 20 | } 21 | -------------------------------------------------------------------------------- /examples/minfraud.php: -------------------------------------------------------------------------------- 1 | #!/usr/bin/php -q 2 | isSecure = false; 60 | 61 | // Set the timeout to be five seconds. 62 | $ccfs->timeout = 10; 63 | 64 | // Convert the output to UTF-8 (it is ISO 8859-1 by default) 65 | $ccfs->useUtf8(true); 66 | 67 | // Uncomment to turn on debugging. 68 | // $ccfs->debug = true; 69 | 70 | // Add the input array to the object. 71 | $ccfs->input($input); 72 | 73 | // Query the server. 74 | $ccfs->query(); 75 | 76 | // Get the result from the server. 77 | $output = $ccfs->output(); 78 | 79 | // Finally we print out the result. 80 | print_r($output); 81 | -------------------------------------------------------------------------------- /src/CreditCardFraudDetection.php: -------------------------------------------------------------------------------- 1 | true, 64 | 'domain' => true, 65 | 'city' => true, 66 | 'region' => true, 67 | 'postal' => true, 68 | 'country' => true, 69 | 'bin' => true, 70 | 'binName' => true, 71 | 'binPhone' => true, 72 | 'custPhone' => true, 73 | 'license_key' => true, 74 | 'requested_type' => true, 75 | 'forwardedIP' => true, 76 | 'emailMD5' => true, 77 | 'shipAddr' => true, 78 | 'shipCity' => true, 79 | 'shipRegion' => true, 80 | 'shipPostal' => true, 81 | 'shipCountry' => true, 82 | 'txnID' => true, 83 | 'sessionID' => true, 84 | 'usernameMD5' => true, 85 | 'passwordMD5' => true, 86 | 'user_agent' => true, 87 | 'accept_language' => true, 88 | 'avs_result' => true, 89 | 'cvv_result' => true, 90 | 'order_amount' => true, 91 | 'order_currency' => true, 92 | 'shopID' => true, 93 | 'txn_type' => true 94 | ); 95 | 96 | /** 97 | * Constuctor. 98 | */ 99 | public function __construct() 100 | { 101 | // Set the number of allowed fields. 102 | $this->num_allowed_fields = count($this->allowed_fields); 103 | 104 | // Set the number of servers to query. 105 | $this->numservers = count($this->server); 106 | } 107 | 108 | /** 109 | * If key matches one of 'emailMD5', 'usernameMD5' or 'passwordMD5', 110 | * convert value to lowercase and return the md5. 111 | * 112 | * If key does not match one of the above, just return the value. 113 | * 114 | * @see HTTPBase::filter_field() 115 | * @param string $key 116 | * @param string $value 117 | * @return string 118 | */ 119 | public function filter_field($key, $value) 120 | { 121 | if ($key == 'emailMD5' && false !== strpos($value, '@')) { 122 | return md5(strtolower($value)); 123 | } 124 | 125 | if (($key == 'usernameMD5' || $key == 'passwordMD5') 126 | && strlen($value) != 32 127 | ) { 128 | return md5(strtolower($value)); 129 | } 130 | 131 | return $value; 132 | } 133 | } 134 | -------------------------------------------------------------------------------- /src/HTTPBase.php: -------------------------------------------------------------------------------- 1 | $key; 110 | } 111 | return null; 112 | } 113 | 114 | /** 115 | * Public setter. 116 | * 117 | * @param string $key 118 | * @param mixed $val 119 | */ 120 | public function __set($key, $val) 121 | { 122 | // Only set properties the exist. 123 | if (property_exists($this, $key)) { 124 | $this->$key = $val; 125 | } 126 | } 127 | 128 | /** 129 | * Sets the path to the SSL certificate to be used by cURL. If this is 130 | * not set, the default certificate is used. 131 | * 132 | * @param string $cert The path to the certificate to be used by cURL. 133 | */ 134 | public function setCurlCaInfo($cert) 135 | { 136 | $this->curlCaInfo = $cert; 137 | } 138 | 139 | /** 140 | * Sets the host and port of a proxy to be used by cURL. If this is 141 | * not set, no proxy is used. 142 | * 143 | * @param string $proxy The host:port of the proxy. 144 | */ 145 | public function setCurlProxy($proxy) 146 | { 147 | $this->curlProxy = $proxy; 148 | } 149 | 150 | /** 151 | * If set to true, the outputs from the web service call will be converted 152 | * from ISO 8859-1 to UTF-8. Defaults to false. 153 | * 154 | * @param boolean $useUtf8 155 | */ 156 | public function useUtf8($useUtf8) 157 | { 158 | $this->useUtf8 = $useUtf8; 159 | } 160 | 161 | /** 162 | * Sets the checked field. 163 | * 164 | * @param string $f 165 | */ 166 | public function set_check_field($f) 167 | { 168 | $this->check_field = $f; 169 | } 170 | 171 | /** 172 | * Set the allowed fields. 173 | * 174 | * @param array $i 175 | */ 176 | public function set_allowed_fields($i) 177 | { 178 | $this->allowed_fields = $i; 179 | $this->num_allowed_fields = count($i); 180 | } 181 | 182 | /** 183 | * Query each server. 184 | * 185 | * @return false|string 186 | */ 187 | public function query() 188 | { 189 | // Query every server using it's domain name. 190 | for ($i = 0; $i < $this->numservers; $i++) { 191 | $result = $this->querySingleServer($this->server[$i]); 192 | if ($this->debug) { 193 | echo "server: {$this->server[$i]}\n"; 194 | echo "result: $result\n"; 195 | } 196 | 197 | if ($result) { 198 | return $result; 199 | } 200 | } 201 | return false; 202 | } 203 | 204 | /** 205 | * Validates and stores the inputVars in the queries array. 206 | * 207 | * @param $inputVars 208 | */ 209 | public function input($inputVars) 210 | { 211 | foreach ($inputVars as $key => $val) { 212 | if (empty($this->allowed_fields[$key])) { 213 | echo "Invalid input $key - perhaps misspelled field?\n"; 214 | return false; 215 | } 216 | $this->queries[$key] = urlencode($this->filter_field($key, $val)); 217 | } 218 | $this->queries['clientAPI'] = self::API_VERSION; 219 | } 220 | 221 | /** 222 | * Child classes should override this if it needs to filter inputs. 223 | * 224 | * @param string $key 225 | * @param string $value 226 | * @return string 227 | */ 228 | public function filter_field($key, $value) 229 | { 230 | return $value; 231 | } 232 | 233 | /** 234 | * Return the output from the server. 235 | * 236 | * @return array 237 | */ 238 | public function output() 239 | { 240 | return $this->outputstr; 241 | } 242 | 243 | /** 244 | * Queries a single server. Returns true if the query was successful, 245 | * otherwise false. 246 | * 247 | * @param string $server 248 | * @return bool 249 | */ 250 | public function querySingleServer($server) 251 | { 252 | // Check if we using the Secure HTTPS proctol. 253 | $scheme = $this->isSecure ? 'https://' : 'http://'; 254 | 255 | // Build a query string from the queries array. 256 | $numQueries = count($this->queries); 257 | $queryKeys = array_keys($this->queries); 258 | if ($this->debug) { 259 | echo "Number of query keys {$numQueries}\n"; 260 | } 261 | 262 | $queryString = ''; 263 | 264 | for ($i = 0; $i < $numQueries; $i++) { 265 | /** 266 | * For each element in the array, append the key 267 | * and value of the element to the query string. 268 | */ 269 | $key = $queryKeys[$i]; 270 | $value = $this->queries[$key]; 271 | 272 | if ($this->debug) { 273 | echo " query key {$key} query value {$value}\n"; 274 | } 275 | 276 | $queryString .= $key . '=' . $value; 277 | if ($i < $numQueries - 1) { 278 | $queryString .= '&'; 279 | } 280 | } 281 | 282 | $url = $scheme . $server . "/" . $this->url; 283 | 284 | // Check if the curl module exists. 285 | if (extension_loaded('curl')) { 286 | // Use curl. 287 | if ($this->debug) { 288 | echo "Using curl\n"; 289 | } 290 | 291 | // Open curl. 292 | $ch = curl_init(); 293 | 294 | // Set curl options 295 | if ($this->debug) { 296 | echo "url {$url}\n"; 297 | } 298 | curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); 299 | curl_setopt($ch, CURLOPT_URL, $url); 300 | curl_setopt($ch, CURLOPT_TIMEOUT, $this->timeout); 301 | curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, true); 302 | curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 2); 303 | 304 | if ($this->curlCaInfo) { 305 | curl_setopt($ch, CURLOPT_CAINFO, $this->curlCaInfo); 306 | } 307 | 308 | if ($this->curlProxy) { 309 | curl_setopt($ch, CURLOPT_PROXY, $this->curlProxy); 310 | } 311 | 312 | // This option lets you store the result in a string. 313 | curl_setopt($ch, CURLOPT_POST, 1); 314 | curl_setopt($ch, CURLOPT_POSTFIELDS, $queryString); 315 | 316 | // Get the content. 317 | $content = curl_exec($ch); 318 | 319 | curl_close($ch); 320 | } else { 321 | /** 322 | * The curl extension is not loaded. 323 | * Use the fsockopen, fgets, and fclose functions. 324 | */ 325 | if ($this->debug) { 326 | echo "Using fsockopen for querySingleServer\n"; 327 | } 328 | 329 | $url .= "?{$queryString}"; 330 | if ($this->debug) { 331 | echo "url {$url}\n"; 332 | } 333 | 334 | // Check if we are using regular HTTP. 335 | if ($this->isSecure == false) { 336 | //parse the url to get host, path and query. 337 | $url3 = parse_url($url); 338 | $host = $url3["host"]; 339 | $path = $url3["path"]; 340 | $query = $url3["query"]; 341 | 342 | // Open the connection. 343 | $fp = fsockopen($host, 80, $errno, $errstr, $this->timeout); 344 | 345 | // There was a problem opening the connection. 346 | if (!$fp) { 347 | return false; 348 | } 349 | 350 | // Send the request. 351 | $post = "POST $path HTTP/1.0\n" 352 | . "Host: {$host}\n" 353 | . "Content-type: application/x-www-form-urlencoded\n" 354 | . "User-Agent: Mozilla 4.0\n" 355 | . "Content-length: " 356 | . strlen($query) 357 | . "\nConnection: close\n\n" 358 | . $query; 359 | 360 | fputs($fp, $post); 361 | $buf = ''; 362 | while (!feof($fp)) { 363 | $buf .= fgets($fp, 128); 364 | } 365 | $lines = explode("\n", $buf); 366 | 367 | // Get the content. 368 | $content = $lines[count($lines) - 1]; 369 | 370 | // Close the connection. 371 | fclose($fp); 372 | } else { 373 | // Secure HTTPS requires CURL 374 | echo 'Error: you need to install curl if you want secure HTTPS ' 375 | . 'or specify the variable to be $ccfs->isSecure = false'; 376 | return false; 377 | } 378 | } 379 | 380 | if ($this->debug) { 381 | echo "content = {$content}\n"; 382 | } 383 | 384 | if (empty($content)) { 385 | echo "Returned content is empty!\n"; 386 | return false; 387 | } 388 | 389 | if ($this->useUtf8) { 390 | $content = utf8_encode($content); 391 | } 392 | 393 | /** 394 | * Get the keys and values from the string content 395 | * and store them in the outputstr array. 396 | */ 397 | 398 | // Split content into pairs containing both the key and the value. 399 | $keyValuePairs = explode(';', $content); 400 | 401 | // Get the number of key and value pairs. 402 | $numKeyValuePairs = count($keyValuePairs); 403 | 404 | // For each pair store key and value into the outputstr array. 405 | $this->outputstr = array(); 406 | for ($i = 0; $i < $numKeyValuePairs; $i++) { 407 | // Split the pair into a key and a value. 408 | list($key, $value) = explode('=', $keyValuePairs[$i]); 409 | if ($this->debug) { 410 | echo " output {$key} = {$value}\n"; 411 | } 412 | 413 | $this->outputstr[$key] = $value; 414 | } 415 | 416 | // One other way to do it. 417 | if (!array_key_exists($this->check_field, $this->outputstr)) { 418 | return false; 419 | } 420 | 421 | return true; 422 | } 423 | } 424 | --------------------------------------------------------------------------------